

--------------------------------------------------

--------------------------------------------------

microRNA-21 expression is elevated in esophageal adenocarcinoma after neoadjuvant chemotherapy.
We investigated whether microRNA-21 and microRNA-148a are predictive for neoadjuvant treatment in esophageal adenocarcinoma. Thirty-six patients with neoadjuvant therapy and surgical resection were included. FFPE tissue from biopsy and esophagectomy were analyzed using RT-qPCR. Results were correlated to histological tumor regression, histopathological variables, FDG-PET-CT and survival. MicroRNA-21 was significantly higher in esophagectomies than in corresponding biopsies (p = .027). No association of microRNA-21 or microRNA-148a expression in tissue specimens with other clinical parameters was present. Although no influence of microRNA-21 and microRNA-148a on the response to neoadjuvant therapy was seen, upregulation of microRNA-21 might represent an escape mechanism of tumor cells.

--------------------------------------------------

--------------------------------------------------

E-mail this article

Sending your article

Welcome to the ninth installment of the Unconventional Preview, a serious-but-lighthearted, nostalgia-tinted look at the Patriots' weekly matchup that runs right here every Friday at noon.

This Sunday, the 5-3 Patriots come off their bye week by hosting the 3-5 Bills, who put a scare into them in Week 4 before the Patriots offense went into unstoppable mode in the second half en route to a 52-28 rout. Despite the addition of Mario Williams (thus far an underachiever) and the emergence of C.J. Spiller, Buffalo seems destined to plod toward another season of mediocrity. Meanwhile, the Patriots will take their first step in their attempt to match what they accomplished last season, winning their final eight regular-season games after a 5-3 start to cruise into the playoffs. It would be stunning if this isn't their first victory of the second half. Let's dig in to the rest of the preview.

THREE PLAYERS OTHER THAN TOM BRADY I'LL BE WATCHING1. Devin McCourty: With the acquisition of talented, troubled cornerback Aqib Talib from the Buccaneers, it seems all but certain that McCourty, a solid tackler who inexplicably lost the instincts he showed as a rookie when it comes to playing the ball in the air, will make the switch from cornerback to safety. But Talib's debut is delayed by a week because of his four-game ban for violating the league's performance-enhancing drugs policy, so it's worth keeping an eye on whether McCourty has what could be his farewell performance at cornerback against Stevie Johnson (who is hampered by a thigh injury) and the Bills' receivers.

2. C.J. Spiller: The Bills' explosive third-year running back is averaging 7.2 yards per carry, and while that might suggest coach Chan Gailey is utilizing him just right, the argument can be made that he doesn't get the ball enough. Spiller hasn't had more than 15 carries in any game this season, the high coming in Week 2 when he followed up a 14-carry, 169-yard performance against the Jets with 123 yards on the ground against the Chiefs. In the last three weeks, Spiller, who suffered a collarbone injury September 23 but didn't miss a game, has had just 45 total touches -- 30 carries, 15 receptions. If the Bills are going to be able to match the Patriots on the scoreboard, Spiller used more often and not in moderation.

3. Stevan Ridley: The Patriots racked up 247 yards on the ground in that first meeting with the Bills, including 106 and a pair of touchdowns by Ridley, the increasingly impressive second-year running back. He had 22 carries in the first matchup, and with Brandon Bolden, who had 16 attempts for 137 yards in that game, banged up, it will be interesting to see whether Ridley takes on more of the load or someone such as speedy Shane Vereen gets a decent chunk of carries.

COMPLETELY RANDOM FOOTBALL CARD
It's pretty amazing how both the Bills and Patriots hosed the 49ers in late-'70s trades that sent a seemingly washed-up star to San Francisco for a bushel of draft picks. The Patriots did it, as you may remember, with Jim Plunkett, the former No. 1 overall pick who during his five seasons with the Patriots took a weekly beating akin to what Michael Vick is enduring this season. Perceived as damaged goods and having lost his job to Steve Grogan, he was sent to the Niners before the 1976 Draft for three first-round picks (two in '76, one in '77), a second-rounder ('77) and backup quarterback Tom Owen. The Patriots turned those picks into Pete Brock, Tim Fox, Raymond Clayborn and Horace Ivory, while Plunkett didn't find redemption until he moved on to the Raiders.

But the Bills pulled off an even bigger heist in March 1978, trading washed-up franchise icon O.J. Simpson to his hometown Niners for five picks. With the selections, they ended up with three marginal players -- defensive ends Scott Hutchinson and Ken Johnson and receiver Danny Fulton -- but also hit the jackpot twice. Joe Cribbs, a running back chosen in the second round in '80, ran for 1,000 yards three times and in 1981 averaged 15 yards per catch out of the backfield. Another of the picks turned out to be the top choice in the 1979 draft, which the Bills used on linebacker Tom Cousineau. He did not sign with them and went to play in Canada, but they did eventually trade him to Cleveland for the pick that would net them Jim Kelly. Simpson played just two seasons in San Francisco, totaling a little more than a 1,000 yards. No idea what became of him after football.

THE LONGEST HIGHLIGHT REEL FOR A PLAYER WHO NEVER PLAYED A MEANINGFUL GAME FOR THE BUFFALO BILLS YOU WILL EVER SEE
You asked for it -- no, demanded it -- and now you've got it. Yes, it's a highlight reel of Vince Young's greatest plays as a member of the Buffalo Bills. So what if he never actually played a regular-season game for the franchise, having cut him in late August to make room for clipboard-holding specialist Tavaris Jackson. And so what if the clip is set to horrible music and includes multiple slo-mo replays to make it appear as if the former Rose Bowl hero and third overall pick in the 2006 draft had more big moments during the Bills' pursuit of the preseason championship than he actually did. Someone put together a Vince Young-as-a-Bill highlight film, and the least you can do to reward that effort is to watch the damn thing. Snickering and snark is optional.

GRIEVANCE OF THE WEEK
My grievances, like the Patriots, were also on a bye week. I'll be back to yelping about the injustices of something like a diva wide receiver next week.

PREDICTION, ALSO KNOWN AS "YOU KNOW, 52-28 AGAIN ISN'T OUT OF THE QUESTION, CHAN"
In the teams' first meeting in Week 4, Tom Brady led the Patriots on six consecutive touchdown drives in the second half, an extraordinary display of the potency and potential of their offense. But that's not what the players will remember -- Bill Belichick will have it drilled into their brains that Buffalo led by 14 points in the second half, and that it's imperative to play a complete game, just as they did against the Rams in the week before the bye. Buffalo's secondary is banged up, which means a big day for Brady and a busy day for the Gillette Stadium scoreboard operator. Patriots 45, Bills 21.

About Touching All The Bases

Irreverence and insight from Chad Finn, a Globe/Boston.com sports writer and media columnist. A winner of several national and regional writing awards, he is the founder and sole contributor to the TATB blog, which launched in December 2004. Yes, he realizes how lucky he is.

--------------------------------------------------

--------------------------------------------------

info:
  x-logo:
    url: 'https://pbs.twimg.com/profile_images/927933988269903874/4jU82-IJ_400x400.jpg'
    backgroundColor: '#FFFFFF'
  x-apisguru-categories:
    - messaging


--------------------------------------------------

--------------------------------------------------

Transparent Wood for Thermal Energy Storage and Reversible Optical Transmittance.
Functional load-bearing materials based on phase-change materials (PCMs) are under rapid development for thermal energy storage (TES) applications. Mesoporous structures are ideal carriers for PCMs and guarantee shape stability during the thermal cycle. In this study, we introduce transparent wood (TW) as a TES system. A shape-stabilized PCM based on polyethylene glycol is encapsulated into a delignified wood substrate, and the TW obtained is fully characterized, also in terms of nano- and mesoscale structures. Transparent wood for thermal energy storage (TW-TES) combines large latent heat (∼76 J g-1) with switchable optical transparency. During the heating process, optical transmittance increases by 6% and reaches 68% for 1.5 mm thick TW-TES. Characterization of the thermal energy regulation performance shows that the prepared TW-TES composite is superior to normal glass because of the combination of good heat-storage and thermal insulation properties. This makes TW-TES composites interesting candidates for applications in energy-saving buildings.

--------------------------------------------------

--------------------------------------------------

The optical rotation of a major component of plant cutin.
The major component of cutin from the fruit of both tomato and papaya, dihydroxypalmitate, is shown to have plain positive rotation and is, therefore, assigned L configuration in analogy to other known hydroxy fatty acids.

--------------------------------------------------

--------------------------------------------------

Q:

How to push object to a new array with button click on ngFor table in angular 8

I how to arrays, one(array1) has some objects while the other(array2) has a list of objects that I want to choose from and push to array1.
.html
<div class="forArray1">
 <table >
   <tr *ngFor="list1 of array1">
       <td>{{list1.name}}</td>
       <td><button (click)=removeFunction()>Remove</button><td>
    </tr>
 <table>
</div>
<div class="forArray2">
  <table >
   <tr *ngFor="list2 of array2">
   <td>{{list2.name}}</td>
   <td><button (click)=addFunction()>Add</button><td>
   </tr>
 <table>
</div>

How to push the row object from arry2 list to arry1 list after clicking on the "Add" button on a specific object? Something like get by ID and push.
json
array1 = [
    {
     "type": "toyota", 
     "year": "2013"
    }]

***************************************

array2 = [
    {
     "type": "toyota", 
     "year": "2013"
    },
    {
     "type": "audi", 
     "year": "2010"
    },
    {
     "type": "honda", 
     "year": "2014"
    },
    {
     "type": "ford", 
     "year": "2018"
    }]

.ts
array1 = [];
array2 = [];

//add an obj to array1 and delete it from array2
addFunction() {
       //TODO
}

//it will remove the an obj from array1
removeFunction(){
      //TODO
}

How to complete the functions? Suggestion on better approach is also fine.

A:

app.component.html :
<div class="forArray1">
    <table>
        <tr *ngFor="let list1 of array1; let i=index;">
            <td>{{list1.name}}</td>
            <td><button (click)=removeFunction(i)>Remove</button><td>
        </tr>
    <table>
</div>
<div class="forArray2">
    <table >
        <tr *ngFor="let list2 of array2; let i=index;">
            <td>{{list2.name}}</td>
            <td><button (click)=addFunction(i)>Add</button><td>
        </tr>  
    <table>
</div>

app.component.ts :
addFunction(index){
    // Add selected item to first array
    this.array1.push(array2[index]);
    // Remove item from second array
    this.array2.splice(index,1);
}

removeFunction(index){
    // Replace item in second array
    this.array2.push(array1[index]);
    // Remove item from first array
    this.array1.splice(index,1);
}

I assume you want to restore a removed item back into second array. If not, just remove the line this.array2.push(array1[index]); in remove function.



--------------------------------------------------

--------------------------------------------------

<component name="libraryTable">
  <library name="Maven: org.jetbrains.kotlin:kotlin-stdlib-jdk8:1.2.41">
    <CLASSES>
      <root url="jar://$MAVEN_REPOSITORY$/org/jetbrains/kotlin/kotlin-stdlib-jdk8/1.2.41/kotlin-stdlib-jdk8-1.2.41.jar!/" />
    </CLASSES>
    <JAVADOC>
      <root url="jar://$MAVEN_REPOSITORY$/org/jetbrains/kotlin/kotlin-stdlib-jdk8/1.2.41/kotlin-stdlib-jdk8-1.2.41-javadoc.jar!/" />
    </JAVADOC>
    <SOURCES>
      <root url="jar://$MAVEN_REPOSITORY$/org/jetbrains/kotlin/kotlin-stdlib-jdk8/1.2.41/kotlin-stdlib-jdk8-1.2.41-sources.jar!/" />
    </SOURCES>
  </library>
</component>

--------------------------------------------------

--------------------------------------------------

Obituary: Scott Williams of Alpine

Scott Williams of Alpine was a builder and a renovator. On big projects ranging from The Capri in Marfa to the Mercantile Building in Valentine. He also worked on personal residences in Marfa, Alpine, and throughout the Transpecos. Here he is in February on Marfa Public Radio:

My name is Scott Williams and we’re at the Valentine Mercantile Building in Valentine, Texas. It served the ranching region out here for probably about 70 years. Oh, I love the history. It’s just a lot of fun to bring back the old building.

He is survived by his father, Jack, his wife Karen and his daughter Mariah – all in Alpine – and daughter Jessica of San Antonio. His siblings are his brother Jeff in Alpine and his sister Jaclyn in Midland.

--------------------------------------------------

--------------------------------------------------

Response of salt marshes to oiling from the Deepwater Horizon spill: Implications for plant growth, soil surface-erosion, and shoreline stability.
We investigated the initial impacts and post spill recovery of salt marshes over a 3.5-year period along northern Barataria Bay, LA, USA exposed to varying degrees of Deepwater Horizon oiling to determine the effects on shoreline-stabilizing vegetation and soil processes. In moderately oiled marshes, surface soil total petroleum hydrocarbon concentrations were ~70mgg(-1) nine months after the spill. Though initial impacts of moderate oiling were evident, Spartina alterniflora and Juncus roemerianus aboveground biomass and total live belowground biomass were equivalent to reference marshes within 24-30months post spill. In contrast, heavily oiled marsh plants did not fully recover from oiling with surface soil total petroleum hydrocarbon concentrations that exceeded 500mgg(-1) nine months after oiling. Initially, heavy oiling resulted in near complete plant mortality, and subsequent recovery of live aboveground biomass was only 50% of reference marshes 42months after the spill. Heavy oiling also changed the vegetation structure of shoreline marshes from a mixed Spartina-Juncus community to predominantly Spartina; live Spartina aboveground biomass recovered within 2-3years, however, Juncus showed no recovery. In addition, live belowground biomass (0-12cm) in heavily oiled marshes was reduced by 76% three and a half years after the spill. Detrimental effects of heavy oiling on marsh plants also corresponded with significantly lower soil shear strength, lower sedimentation rates, and higher vertical soil-surface erosion rates, thus potentially affecting shoreline salt marsh stability.

--------------------------------------------------

--------------------------------------------------

1. Field of the Invention
The present invention generally relates to a liquid crystal display apparatus and a manufacturing method thereof.
2. Description of the Related Art
FIG. 1 is a block diagram showing the configuration of a data driving unit in a conventional liquid crystal display apparatus. As shown in FIG. 1, the data driving unit in the conventional liquid crystal display apparatus includes data drivers DV1 through DVn. Each of the data drivers DV1 through DVn takes in a data signal DATA according to a supplied display start signal, and supplies an activated display start signal EOUT to a data driver situated at the following stage. In this manner, the data signal DATA is taken in one after another by the data drivers DV1 through DVn that are provided in a parallel arrangement. In addition, as shown in FIG. 1, a clock signal CLK, a latch pulse LP, and a reference voltage Vref are supplied to each of the data drivers DV1 through DVn.
FIG. 2 is a block diagram showing a configuration of the data driver DV1 shown in FIG. 1. The data drivers DV2 through DVn shown in FIG. 1 have the same configuration as the data driver DV1.
As shown in FIG. 2, the data driver DV1 includes an output amplifier 1, a D/A converter 3, a latch circuit 5, a shift register 7, and a clock controller 9. Here, the source line SL is connected to the output amplifier 1, and the D/A converter 3 is connected to the output amplifier 1. Further, the latch circuit 5 is connected to the D/A converter 3, and the shift register 7 is connected to the latch circuit 5. Further, the clock controller 9 is connected to the shift register 7. In addition, the reference voltage Vref is supplied to the D/A converter 3, and the data signal DATA is supplied to the shift register 7. Furthermore, the clock controller 9 receives the display start signal EI, the clock signal CLK, and a latch pulse, and outputs the display start signal EOUT.
Therefore, in the conventional liquid crystal display apparatus which has the above configuration, since the clock signal CLK was supplied to each of the data drivers DV1 through DVn with no regard to the data signal DATA, there was a problem of the clock signal CLK causing aggravation of an EMI (electromagnetism interference noise) level and increase in power consumption.
In recent years, the technology of electric and electric devices has been rapidly advancing. However, overheating and fire hazards of electric apparatuses by harmonics in a low frequency domain and noise interference to TV sets and the like in a high frequency domain have been caused. Electromagnetic obstacles such as these pose a common problem of every country in the world. Therefore, at present, the necessity for a measure against the electromagnetic interference (EMI measures) is increasing.
On the other hand, recently, a TFT-liquid-crystal display apparatus has become larger with finer scales and higher contrast ratios, for use as a monitor of a personal computer or TV picture display. In such applications, it is required that the liquid crystal display apparatus is viewable from all directions.
Here, the MVA (Multi-domain Vertical Alignment) type liquid crystal display apparatus has been devised as technology of realizing a liquid crystal display apparatus with an extensive view angle. That is, in an MVA type liquid crystal display apparatus, as shown in FIG. 3, it is prepared so that transparent electrodes 11 to which bank-like dielectric structures 13 are formed will face each other, and a liquid crystal layer which includes liquid crystal molecules 15 is installed between the two transparent electrodes 11.
Further, as shown in FIG. 3-(a), when a voltage is not applied between the transparent electrodes 11 which face each other, the liquid crystal molecules 15 are oriented perpendicularly, and if a voltage is applied, as shown in FIG. 3-(b), they will incline in directions that are predetermined for every four domains. In this manner, view angle characteristics of the four domains are mixed, enabling to provide a large viewing angle.
Here, in the MVA type liquid crystal display apparatus, as shown in the contrast diagram of FIG. 4, a contrast (CR) value of 10 is realized at 80 degree angles both vertically and horizontally for monochrome viewing.
In addition, as structure of the MVA type liquid crystal display apparatus, a slit may be formed on the electrode instead of the dielectric structure, and a combination of a substrate with the slit and a substrate with the dielectric structure may be used as the structure. Further, a combination of a dielectric structure and a slit may be formed on one substrate.
However, when the display of a middle tone, for example, a female picture as shown in FIG. 5, is displayed, a problem arises that the whole picture will become white and the contrast is lost at a lower view angle as shown in FIG. 6.

--------------------------------------------------

--------------------------------------------------

Q:

MVC Policy Override in Integration Tests

I am in the process of adding integration tests at work for an MVC app. Many of our endpoints have policies applied to them, e.g.
namespace WorkProject
{
  [Route("A/Route")]
  public class WorkController : Controller
  {
    [HttpPost("DoStuff")]
    [Authorize(Policy = "CanDoStuff")]
    public IActionResult DoStuff(){/* */}
  }
}

For our integration tests, I have overridden the WebApplicationFactory like it is suggested in the ASP .NET Core documentation. My goal was to overload the authentication step and to bypass the policy by making a class which allows all parties through the authorization policy.
namespace WorkApp.Tests
{
    public class CustomWebApplicationFactory<TStartup> : WebApplicationFactory<TStartup> where TStartup: class
    {
        protected override void ConfigureWebHost(IWebHostBuilder builder)
        {
            base.ConfigureWebHost(builder);
            builder.ConfigureServices(services =>
            {
                services.AddAuthentication(options =>
                {
                    options.DefaultAuthenticateScheme = "Test Scheme"; // has to match scheme in TestAuthenticationExtensions
                    options.DefaultChallengeScheme = "Test Scheme";
                }).AddTestAuth(o => { });

                services.AddAuthorization(options =>
                {
                    options.AddPolicy("CanDoStuff", policy =>
                        policy.Requirements.Add(new CanDoStuffRequirement()));
                });

             // I've also tried the line below, but neither worked
             // I figured that maybe the services in Startup were added before these
             // and that a replacement was necessary
             // services.AddTransient<IAuthorizationHandler, CanDoStuffActionHandler>();
             services.Replace(ServiceDescriptor.Transient<IAuthorizationHandler, CanDoStuffActionHandler>());
            });
        }
    }

    internal class CanDoStuffActionHandler : AuthorizationHandler<CanDoStuffActionRequirement>
    {
        public CanDoStuffActionHandler()
        {
        }

        protected override Task HandleRequirementAsync(AuthorizationHandlerContext context, CanDoStuffActionRequirement requirement)
        {
            context.Succeed(requirement);

            return Task.CompletedTask;
        }
    }

    internal class CanDoStuffRequirement : IAuthorizationRequirement
    {
    }
}

The first thing that I do to the services is override the authentication as suggested here (without the bit about overriding Startup since that didn't seem to work for me). I am inclined to believe that this authentication override works. When I run my tests, I receive an HTTP 403 from within the xUnit testing framework. If I hit the route that I am testing from PostMan I receive an HTTP 401. I have also made a class that lives in the custom web application factory that allows all requests for the CanDoStuff authorization handler. I thought this would allow the integration tests through the authorization policy, but, as stated above, I receive an HTTP 403. I know that a 403 will be returned if the app doesn't know where certain files are. However, this is a post route strictly for receiving and processing data and this route does not attempt to return any views so this 403 is most likely related to the authorization policy which, for some reason, is not being overridden.
I'm clearly doing something wrong. When I run the test under debug mode and set a breakpoint in the HandleRequirementsAsync function, the application never breaks. Is there a different way that I should be attempting to override the authorization policies?

A:

Here is what I did.

Override the WebApplicationFactory with my own. Note, I still added my application's startup as the template parameter
Create my on startup function which overrides the ConfigureAuthServices function that I added.
Tell the builder in the ConfigureWebHost function to use my custom startup class.
Override the authentication step in the ConfigureWebHost function via builder.ConfigureServices.
Add an assembly reference to the controller whose endpoint I am trying to hit at the end of builder.ConfigureServices in the ConfigureWebHost function.
Write my own IAuthorizationHandler for the policy that allows all requests to succeed.

I hope I have done a decent job at explaining what I did. If not, hopefully the sample code below is easy enough to follow.
YourController.cs
namespace YourApplication
{
  [Route("A/Route")]
  public class WorkController : Controller
  {
    [HttpPost("DoStuff")]
    [Authorize(Policy = "CanDoStuff")]
    public IActionResult DoStuff(){/* */}
  }
}

Test.cs
namespace YourApplication.Tests
{
    public class Tests
        : IClassFixture<CustomWebApplicationFactory<YourApplication.Startup>>
    {
        private readonly CustomWebApplicationFactory<YourApplication.Startup> _factory;

        public Tests(CustomWebApplicationFactory<YourApplication.Startup> factory)
        {
            _factory = factory;
        }

        [Fact]
        public async Task SomeTest()
        {
            var client = _factory.CreateClient();
            var response = await client.PostAsync("/YourEndpoint");
            response.EnsureSuccessStatusCode();

            Assert.Equal(/* whatever your condition is */);
        }
    }
}

CustomWebApplicationFactory.cs
namespace YourApplication.Tests
{
    public class CustomWebApplicationFactory<TStartup> : WebApplicationFactory<TStartup> where TStartup: class
    {
        protected override void ConfigureWebHost(IWebHostBuilder builder)
        {
            base.ConfigureWebHost(builder);
            builder.ConfigureServices(services =>
            {
                services.AddAuthentication(options =>
                {
                    options.DefaultAuthenticateScheme = "Test Scheme"; // has to match scheme in TestAuthenticationExtensions
                    options.DefaultChallengeScheme = "Test Scheme";
                }).AddTestAuth(o => { });

                services.AddAuthorization(options =>
                {
                    options.AddPolicy("CanDoStuff", policy =>
                        policy.Requirements.Add(new CanDoStuffRequirement()));
                });

             services.AddMvc().AddApplicationPart(typeof(YourApplication.Controllers.YourController).Assembly);
             services.AddTransient<IAuthorizationHandler, CanDoStuffActionHandler>();
            });
            builder.UseStartup<TestStartup>();
        }
    }

    internal class CanDoStuffActionHandler : AuthorizationHandler<CanDoStuffActionRequirement>
    {
        public CanDoStuffActionHandler()
        {
        }

        protected override Task HandleRequirementAsync(AuthorizationHandlerContext context, CanDoStuffActionRequirement requirement)
        {
            context.Succeed(requirement);

            return Task.CompletedTask;
        }
    }

    internal class CanDoStuffRequirement : IAuthorizationRequirement
    {
    }
}

TestStartup.cs
namespace YourApplication.Tests
{
    public class TestStartup : YourApplication.Startup
    {
        public TestStartup(IConfiguration configuration) : base(configuration)
        {

        }

        protected override void ConfigureAuthServices(IServiceCollection services)
        {
        }
    }
}



--------------------------------------------------

--------------------------------------------------

Q:

How to take multiple integers in the same line as an input and store them in an array or vector in c++?

For solving problems on Leetcode, Kickstart or other competitive competitions, we need to take input of multiple integers in a single line and store them in an array or vector, like
Input : 5 9 2 5 1 0
int arr[6];
for (int i = 0; i < 6; i++)
    cin >> arr[i];

or
vector<int> input_vec;
int x;

for (int i = 0; i < 6; i++) {
     cin >> x;
     input_vec.push_back(x);
}

This works, but also contributes to the execution time drastically, sometimes 50% of the execution time goes into taking input, in Python3 it's a one-line code.
input_list = list(int(x) for x in (input().split()))

But, couldn't find a solution in C++.
Is there a better way to do it in c++?

A:

Take the help of std::istringstream:
#include <iostream>
#include <vector>
#include <sstream>
#include <string>

int main(void) {
    std::string line;
    std::vector<int> numbers;
    int temp;

    std::cout << "Enter some numbers: ";
    std::getline(std::cin, line);

    std::istringstream ss(line);

    while (ss >> temp)
        numbers.push_back(temp);
    
    for (size_t i = 0, len = numbers.size(); i < len; i++)
        std::cout << numbers[i] << ' ';

    return 0;
}



--------------------------------------------------

--------------------------------------------------

Q:

How to print a statement based on hydra result in python?

I updated the code but there still seems to have an error.
import os
import subprocess

name = raw_input("\nWHO DO WE HACK? ")

passw = subprocess_check.input(['hydra -l ' + name + ' -P pss.txt smb://192.168.66.128'])

print passw
if passw == '0':
    print "HELLO"
else:
    print "NOT"

A:

os.system() doesn' work like that. Check this. You're getting the return code, not the command output. 0 means that the process exited without errors. Use the subprocess module to get the command output. 



--------------------------------------------------

--------------------------------------------------



IPG – YC Interview Simulator - jonmarkgo
http://jamescun.github.io/iPG/

======
mkal_tsr
This was fun to jump through - if I didn't immediately 'feel' the answer after
reading the question, I wrote it down because clearly that's a problem issue
for me/my product.

------
ethnomusicolog
pretty useful



--------------------------------------------------

--------------------------------------------------

Lesson 1: Attacking capital does not produce recoveries

posted at 11:14 am on April 6, 2009 by Ed Morrissey

After spending the last few weeks rabble-rousing over compensation at companies that receive TARP funds, the Obama administration has quietly reversed course. Now that Barack Obama needs partners in the private sector to unload toxic assets, the White House has begun creating work-arounds for compensation caps passed by Congress in the heat of AIG retention bonus outrage:

The Obama administration is engineering its new bailout initiatives in a way that it believes will allow firms benefiting from the programs to avoid restrictions imposed by Congress, including limits on lavish executive pay, according to government officials.

Administration officials have concluded that this approach is vital for persuading firms to participate in programs funded by the $700 billion financial rescue package.

The administration believes it can sidestep the rules because, in many cases, it has decided not to provide federal aid directly to financial companies, the sources said. Instead, the government has set up special entities that act as middlemen, channeling the bailout funds to the firms and, via this two-step process, stripping away the requirement that the restrictions be imposed, according to officials.

The news isn’t all good here. The White House wants to pick its winners and losers:

Although some experts are questioning the legality of this strategy, the officials said it gives them latitude to determine whether firms should be subject to the congressional restrictions, which would require recipients to turn over ownership stakes to the government, as well as curb executive pay.

This represents quite the sea change from Barack Obama’s “shaking with outrage” position, two days after the AIG bonuses became the focus of the national media. Instead of focusing on the incompetence of the Treasury to account for the bonuses — which Tim Geithner protected via Chris Dodd in the omnibus spending bill — Obama and his allies stoked populist fervor by demonizing AIG’s execs, most of whom had only come to work at the Financial Products division after the collapse, and whose bonuses kept them from looking at better jobs with more of a future than the soon-to-be shuttered AIG-FP. Congress pilloried Edward Liddy, who only gets $1 for his efforts to right AIG, and passed a blatantly unconstitutional bill of attainder that taxes all TARP-related company bonuses at 90%, making them effectively worthless.

That certainly got the attention of the very firms that Obama needs to invest in worthless mortgage-backed securities (MBSs) in order to shore up the financial markets. TARP funds will subsidize those transactions, which means that the new tax will affect all the employees of firms that participate in the program. If the risk make the TARP MBS program iffy, the new taxes made it untouchable. Now they want to start punching loopholes in the law, but only to the degree that they get to reward the people they like.

How legal is that? Analysts are laughing at the prospect:

Legal experts said the Treasury’s plan to bypass the restrictions may be unlawful.

“They are basically trying to launder the money to avoid complying with the plain language of the law,” said David Zaring, a former Justice Department attorney who defended the government from lawsuits involving related legal issues. “They are trying to create a loophole to ignore Congress, and I think the courts will think that it’s ridiculous.”

It will be a toss-up to see which effort the court finds more ridiculous — the bill of attainder passed by Congress with Barack Obama’s explicit endorsement, or Barack Obama’s hypocritical efforts to undermine the law he demanded in the first place. It’s Keystone Kops at Treasury, Capitol Hill, and the West Wing.

Breaking on Hot Air

Blowback

Note from Hot Air management: This section is for comments from Hot Air's community of registered readers. Please don't assume that Hot Air management agrees with or otherwise endorses any particular comment just because we let it stand. A reminder: Anyone who fails to comply with our terms of use may lose their posting privilege.

If you want to participate in this once in a life time profit making opportunity, get your kick backs in now. Do not wait and discover that you are on the bottom of the list when special package deals are handed out.

By the way – I love that Obama had the idea to come up with front companies for sending the money to the financial institutions. What’s it called when other organized crime does that? Money laundering?

Wait for it….Ah there it is…”Grown ups are in charge”…
hahahaahhwahhhahahahahahawahh,yes that maniacal cackle is me laughing and crying at the “geniuses” we have in the administration. 2010 & 2012 cant come fast enough.

At first, when the initiative was being developed last year, the Bush administration decided to apply executive-pay limits to firms participating in this program. But Obama officials reversed that decision days before it was unveiled on March 3 and lifted the curbs, according to sources who spoke on condition of anonymity because the discussions were private.

So, Bush was in favore of further throttling the Free Market, and Obama was firmly in favor of making sure his cronies got paid.

Turbo Tax Timmy Geithner wants to be the Red Queen when it comes to bank CEO’s. Is he just a Red or a queen also?

A chaotic confused message(s) from government will do nothing to engender confidence, in their competence, any contract they sign, any law they make.

Without trust and a stable background of law and expectations, people will stay very risk averse and there will be no or limited recovery.

Bama can threaten people with “the pitchforks” all he wants. He can’t get to enough of us to make a recovery happen if he doesn’t change direction. And he won’t, due to ideology and the interest groups he serves.

Barack Obama & Tim “Loot the Treasury” G-man will long be dead & buried before the companies they are trying to screw up. Capitalism will survive this pathetic attempt by Obama and his merry band of thieves. Re-distribution will happen as we pluck it back from those who are trying to take it now. Obama & his henchmen (not very good ones) are not smart enough to really take and give to others. Only really really devious and underhanded capitalists can do that.

Team members compete for the title to see who can go bankrupt first as they pay their neighbor’s mortgage and their own randomly-increasing taxes as they spend through their show-assigned nest eggs and borrow way beyond their means!

Let’s ask junior high students taking a course on U.S. government whether this makes any sense. I’m confident one smart-aleck will correctly note, “It’s as if a parent tell a kid not to smoke pot, and then lights up a joint.”

Of course, the MSM continue hibernating as blaring alarms go off all around them.

I think it’s time we all stop rearranging the deck chairs on the titanic and do something…. Action anyone? Anyone? What a bunch of boobs. Too bad they all think they have so much power so as to loot and pillage the people with reckless abandon. As we move toward a Constitutional course correction, I suggest we focus on debarking and setting adrift these tools in a leaky dinghy.

A deal’s a deal — unless you’re dealing with the Obama administration or a Democrat-controlled congress. The business world will figure this out soon enough. Some will play the banana republic game, most will walk away from the stacked deck.

I’m sure FOO (Friends Of Obama) will tend to be allowed to pay (and receive) bonuses, while FOE (Friends Of Enemies) will tend to have bonus rules enforced tightly.

But hey, what could go wrong when the government picks winners and losers?

This is going to result in a corruption scandal that may very well destroy the democrat party when all’s said and done.

You have hundreds of billions of dollars. You have the government setting up essentially “no risk sweetheart deals” to unload these assets. The same government is run by a party that eats drinks and breathes corruption.

What could possibly go wrong?

Some politician in this is going to steal so much money as to make Madoff look like an amateur.

Everything Obama says dances on the edge of a razor blade. When necessary, it falls off the edge of that blade never to be referenced by the MSM again. None of his past statements conflict with present statements because they never existed. See how easy that is.

Everything Obama says dances on the edge of a razor blade. When necessary, it falls off the edge of that blade never to be referenced by the MSM again. None of his past statements conflict with present statements because they never existed. See how easy that is.

What’s worse: the unconstitutional tax law passed by congress (the ringleaders of this should all be put in jail, for THEY are the ones that got us into this mess), or the Obama-Geithner money laundering that they are using to get around that unconstitutional law. They are all corrupt. It’s just good cop, bad cop to take control of everything they can get their hands on.
What can we do?Tax Day Tea PartiesTerm Limits
Get Out The Conservative Vote 2010

Everything Obama says dances on the edge of a razor blade. When necessary, it falls off the edge of that blade never to be referenced by the MSM again. None of his past statements conflict with present statements because they never existed. See how easy that is.
SKYFOX on April 6, 2009 at 12:02 PM

That system works perfectly fine when you’re dealing with an illiterate mob. But the guys who wear green eyeshades and count the beans keep their own records. They don’t care all that much what the rules are; they just want the rules to stay the same for more than a few days in a row.

By removing all consistency from the economy, Obama is turning America into a Chinese-style kleptocracy. Business planning is being replaced by political connection. There are a few hundred people on the inside, and a few thousand people who THINK they’re on the inside of the decision-making process.

Aside from that tiny group of powerbrokers and would-be powerbrokers, pretty much everybody in America who has money is building himself a bunker right now.

The term toxic assets carry a connotation of worthless. Who would want to purchase a worthless asset? High risk, not immediately of high value or asset worth 10% to 50% of their formerly purchase price are for sale to highest bidder might describe the situation better. The “stimulus” should be intended to bridge the chasm created that could swallow the solvency for the current holder of the troubled asset. It is perceived that meeting present obligations of doing business as normal is important to the economy. It assumes an already existing and competent business market entity that can be saved exists and will immediately provide the continuity needed to avert severe economic consequences of insufficient funds being available to conduct day to day business. It also assumes the rules that caused the problem will be changed to ensure the situation is not repeated and provide the proper oversight to verify the rules are followed and have a verifiable paper trail for public examination.
To date zero transparency prevails and the world is in the dark when the sun should be coming up. Stink is in the air as trillions of dollars float toward the cesspools of secrecy and corruption. Who, what, why, when, where, and how? Questions never answered.

I tohught he was a socialist marxist who wanted to “destroy” rich people?

DeathToMediaHacks on April 6, 2009 at 12:31 PM

He is and then reality hit him square in the face and he realized that he would be the one holding the ball when the economy REALLY took a dive. Then he decided to act all socialist for his base while passing money to people who actually do the work on the hush hush. Not hard too understand. It probably KILLS him to have to do it too. Heh. He’s such a noob.

National Socialists love Corporations and rich people, when they control the corporations and they get rich off the loot. Socialism for the rich, and stringent capitalism for the middle class, and free benefits for the poor.

You know, I thought one of our rights was the “pursuit of happiness.” I guess I always thought that meant that you could be as successful as you wished, as long as you played by the legal rules. It seems our Dear Leader wants us to not be too successful, because making money is evil. But now he also wants to determine who can be successful, cause face it, even he needs backers with lots of money. (at least when I’m laughing hysterically, I’m not really depressed, am I?)

After spending the last few weeks rabble-rousing over compensation at companies that receive TARP fundslaundering the taxpayers’ money into massive payoffs for his political cronies, the Obama administration has quietly reversed course.

Whats interesting is that these “toxic assets” represent Real property. Real land, real houses. Even when a house gets foreclosed on, it still exists… it still has value…. Someone is going to make a killing on this… and its all going to end up being Geithners friends….
Romeo13 on April 6, 2009 at 12:53 PM

Obama is slavering over that money, but the “Lightworker” won’t take the blame for foreclosing on a million homeowners.

The LAND always had appreciable value. The “toxic assets” were the LOANS themselves – marketed as a separate commodity. Even without Mark to Market, it’s going to be really hard to unload that bogus paper. Even at pennies on the dollar, investors are going to want to just cherry-pick the few remaining good loans out of the sludge.

Obama’s plan is to unload all this stuff, with some short-term restrictions on foreclosures and long-term restrictions on interest rates. AFTER that, he’ll pull the chocks out from under the inflation train so the homeowners will be able to pay their mortgages on a minimum wage income.

It’s a win-win situation for everyone involved. Except of course for the people who take Obama at his word. But let’s face it; whose fault is that?

I tohught he was a socialist marxist who wanted to “destroy control” rich people?
DeathToMediaHacks on April 6, 2009 at 12:31 PM

FIFY
dominigan on April 6, 2009 at 1:29 PM

Either one works perfectly fine. It’s been 60 years since the Socialists and Fascists were at war with each other. Now, for all practical purposes, the world’s collectivists are just one big, unhappy family.

The US can’t be a banana republic (one because that’s a TM company not yet receiving a bailout from the US; and two, that would make the President the Chief Banana, and because he’s half black, it would associate an African American with a banana and a republic which is RACIST). So go to your rooms without dinner, any calling this man and this republic banana associated.

Lesson 2: Attacking people for questioning Wall Street only
turns their anger up.

You can only defend Goldman Sachs, AIG, and such for so long before people see right through it. You can only demonize Detroit so much before Cloward-Piven describes your actions completely.

That’s what’s being heard from Wall Street as people hear of their lack of accountability to the nation. It doesn’t matter if it’s Soros or Santelli. Both of them have the proverbial blood on their hands. Santelli for defending AIG’s no-renegotiate bonuses while Detroit gets raked through the coals. Soros has blood for any *provable* influence he has(not counting Horowitz’s delusions). The people are asking for Wall Street to stop acting as if they were “petulant children” who act as if they were masters of the universe.

We can reconcile our nation or let folks run interference for Wall Street. Eventually the former will happen when the latter can no longer be done. I hope that moment comes as soon as possible.

It will be a toss-up to see which effort the court finds more ridiculous — the bill of attainder passed by Congress with Barack Obama’s explicit endorsement, or Barack Obama’s hypocritical efforts to undermine the law he demanded in the first place.

Exactly, or “un-Constitutional” may be a better word than “ridiculous”. And while I initially supported TARP, the more I learn about how it’s being implemented, the more it reeks.

Sock puppet definitely lacks the ability to plan ahead. Reviewing his entire political career it’s obvious that if he didn’t have the left wing scumbags dressing him up in Chicago his political career would have been limited to helping people die of mesothelioma from inhaling asbestos in the slums of Chicago.

We’re not only suffering from his complete ineptitude and idiocy, we’re also and even more so suffering from the corrupt cretins he has working to move the agenda he adopted from his handlers. He doesn’t have a plan, he only skims along taking bad advice from the people that pull his strings.

We know it is wrong, and are astonished that no one is doing anything about it!

Seven Percent Solution on April 6, 2009 at 2:09 PM

Suggestions? Yes, I’m starting to feel that while the Tea Party movement is a well intentioned thing – it’s not going to be enough to change anything in Washington. In case no one has noticed, they aren’t listening to us.

lenin i mean obama will make a great dictator and a rotten president.what he is doing is what lenin done in 1917.why don’t you robot libs think for your self stop letting obama think for you read the history of russia .grow a brain

--------------------------------------------------

--------------------------------------------------

Aetna Dental Insurance Reviews

Aetna Dental Insurance

Aetna Dental insurance offers several coverage options for individuals, families and groups. They have the nation's largest network of dentists for members to choose from, and their website offers a great user friendly array of online tools to manage your account with, from choosing a dentist to managing your claims. Most people covered by Aetna Dental get access to their dental insurance plans via their employer.

The big drawback with Aetna is that it provides individual plans only in five states, Alaska, Arizona, Delaware, Illinois and Pennsylvania. If you are self-employed or have no dental plan from an employer, and do not live in one of these five states, take a look at our other reviews of dental insurance companies.

For those in one of the five states, Aetna offers some decent plans. You can buy at their website, navigating to state specific pages through their "Buy Dental Coverage" page. You can save money on your dental visits, as Aetna pays expenses on exams and x-rays and most cleanings with the majority of its plans, as well as a percentage of major dental care. Up to 80 percent of denture repairs are covered. Those looking for crowns or dentures can expect to wait up to more than a year. Here's an overview of the dental insurance plans and coverage options offered by Aetna:

Dental Maintenance Organization Plans

Aetna offers Dental Maintenance Organizations (DMO) plans with dependable coverage and cost savings. The plans are easy to use. You must use a primary care dentist (PCD) from the Aetna network with this coverage option. Your PCD coordinates your dental care. Many preventive and major services are covered. Your PCD give you a referral when specialty care is needed. If you plan covers orthodontia, no referral is needed, but not every DMO plan covers orthodontia.

The DMO plan costs less than a traditional PPO dental insurance plan. The plan has no deductibles or dollar amount maximums, but in some cases age, frequency and orthodontia limits may apply.

You can choose from fixed or copay plans to keep your rates low. The DMO plan is available for fully insured customers.

PPO Plans

Aetna also offers Preferred Provider Organization (PPO) dental plans. You have the flexibility to see any dentist but you save more when you use a network dentist. You do not need a referral to see the dentist of your choice. The PPO plan covers preventive, basic and major services. If you see a dentist in the Aetna network, they must stay with contracted rates set by Aetna. So you do save money staying within their network.

Members have a choice of benefit levels, deductibles, coinsurance and maximums. You can choose from self-funded or fully insured options including the Aetna Dental Care Reward plan and the Aetna DentalFund plan. The choices affect your monthly premiums and level of care. One of the choices is the low cost PPO plan, Aetna Dental Preventive Care.

Dental Indemnity Plans

Another coverage option from Aetna is the Dental Indemnity plans, where you can choose any dentist without a referral. Most preventive, basic and major services are covered. Deductibles, coinsurance and annual plan maximums do apply. You are responsible for paying at the time of dental service and then the plan reimburses you.

Hybrid Plans

Aetna Dental offers a Hybrid plan, where members choose between the benefits of two plans. This plan gives businesses the chance to offer employees a DMO plan, with either a PPO or indemnity plan option. Employees can even switch between the optional plan each month with a call to member services, or they can log into the member website to switch.

Again, you save money if you use a dentist within the Aetna network with this plan. Members who switch to the PPO or indemnity plan gain access to a broader choice of dentists, but may pay more.

The big advantage here is for employers, who can provide a common plan across an entire company even if it has multiple business locations.

Managing Your Care

Aetna's website is user friendly. You can process and manage your claims online. You also make your payments online. Tools at the site make it easy to find a dentist.

Orthodontic Care

You do not need a referral to see an orthodontist, but if you are a DMO member you must visit an orthodontist in the Aetna network. Check your coverage documents to see what level of orthodontic treatment is covered in your plan. Not all plans include orthodontic coverage.

Oral Surgery

Coverage of oral surgery varies from plan to plan. Aetna recommends you get an estimate on oral surgery procedures up from and submit it for review prior to treatment. You can also phone the Aetna Oral Surgery Center of Excellence to check coverage.

Customer Service

For the most part, you can manage your Aetna coverage from the members section of their website. The site has a good General Dental FAQ page, as well as FAQ pages for both PPO and DMO plans. You can contact Aetna Dental via phone and twitter. The contact options are specific to your plan, you must navigate through the website to find the specific phone numbers and contact options available for service for your plan. Some members report frustration with the phone support.

With Aetna Dental, some serious dental problems are covered only in very specific instances, such as crowns, inlays and labial veneers. The good news is that Aetna does cover the entire cost of preventative exams and x-rays with its premium plan.

Verdict - Good

Aetna Dental insurance is worth a serious look. The website provides a user friendly experience with good online tools. The network of dentists is huge and covers the full range of care. There is a variety of coverage options, good news for those on a budget. While these are some complaints about customer service, on balance they deliver. If you are shopping for individual dental insurance, Aetna is only available in Alaska, Arizona, Delaware, Illinois or Pennsylvania, so those in other states need to look elsewhere. Coverage options vary by state and offerings from employers

Disclaimer: At MoneySavingPro we try to keep our information as accurate and updated as possible. However, this information may be different than the information provided by the companies and financial institutions we cover. This site also receives compensation from third party affiliates. However, we remain independent and our affiliates do not affect what we choose to write, what we write or the accuracy of our information. For more details, see our Advertiser Disclosure.

In order for MoneySavingPro to remain a consumer free service, many of the companies covered in our industry reviews compensate MoneySavingPro for new sign ups.

However, the results of our comparison tools, the rankings of the providers and the information presented is not affected by compensation. Indeed, many of these companies approach us for an advertising partnership after we have already written a published their reviews.

While we try to research and review as many providers as possible in the 100+ industries we cover, we have not reviewed every company available.

Our rating system is independent of compensation and reflects our true understanding of the industry and the company based on a variety of factors. The companies that receive the highest rating will always be the providers that we believe offer the best value to the consumer.

Advertiser Disclosure

In order for MoneySavingPro to remain a consumer free service, many of the companies covered in our industry reviews compensate MoneySavingPro for new sign ups.

However, the results of our comparison tools, the rankings of the providers and the information presented is not affected by compensation. Indeed, many of these companies approach us for an advertising partnership after we have already written a published their reviews.

While we try to research and review as many providers as possible in the 100+ industries we cover, we have not reviewed every company available.

Our rating system is independent of compensation and reflects our true understanding of the industry and the company based on a variety of factors. The companies that receive the highest rating will always be the providers that we believe offer the best value to the consumer.

--------------------------------------------------

--------------------------------------------------

Leonid Haydamaka

Leonid Haydamaka () (27 April 1898 – 21 July 1991) has left his impression on the development of bandura art in the 20th century.

Born in Kharkiv the son of a Medical practitioner he studied at the Kharkiv Realschule Gymnasium, and later received an engineering degree at the Kharkiv Institute of Technology.

Biography
From early childhood he became interested in music, and at the age of 10 began to play the violin. During his high school days he played in the school orchestra on the violin and later became the director of the orchestra.

In 1918 Haydamaka entered the Kharkiv Higher Music school (conservatory) where he studied cello and bass for 5 years.

Interest in the bandura
Haydamaka first became interested in the bandura in 1913-14. He took an instrument from his school orchestra to the instrument maker S. Snehiriov for repairs, and he saw there an unknown instrument. Snehiriov explained that the instrument was a Ukrainian folk instrument known as a bandura, and that he was making the instrument for the bandurist-artist of the Kharkiv drama theatre - I. Bondarenko. The bandura interested the young Haydamaka greatly, and Haydamaka ordered an instrument for himself. When the bandura was ready, the question arose - where to learn to play the instrument? Haydamaka chased down Bondarenko and asked him to tune up the instrument and show him some initial exercises. He later devised exercises and pieces for the instrument by himself and began to arrange pieces for the instrument himself.

The Kharkiv style bandura

In 1923 Haydamaka was introduced to Hnat Khotkevych. Khotkevych showed him the manuscript of a bandura textbook which he had prepared for publication and allowed him to copy out technical exercises and pieces, which helped him further develop his technique.

Khotkevych had a small bandura with only two octaves of treble strings. Haydamaka was involved in the development of the concert version of the Kharkiv bandura. He consulted with Khotkevych and on the basis of these consultations he made blueprints for the construction of a diatonic bandura with 8 basses and 23 treble strings which later became the standard for the Kharkiv and Poltava Bandurist Capella which used the Kharkiv technique.

In the 1920s, especially in the second half of the decade a mass interest in the bandura meant the rapid growth of amateur ensembles and bandura choruses, however there was little material such as textbooks or musical arrangements. There was also a lack of qualified professionally trained bandurists. This need was recognized and the People's Komissariat of Education which was headed at that time by Mykola Skrypnyk resolved to form a bandura course at the Kharkiv Music-drama institute for the educating of professional cadres. Hnat Khotkevych was invited to head the position of professor for the bandura courses.

Haydamaka signed up for these courses which he completed in 1930.

First orchestra of Ukrainian Folk Instruments

In 1921 Leonid Haydamaka had already formed a bandurist ensemble at the Metalist club, but because of the lack of good quality banduras and the fact that the bandura movement had not yet become mainstream, this attempt was not very successful.

In 1923 the Metalist club obtained money form the government and invited Haydamaka back to try to revive the ensemble. This time Haydamaka was able to negotiate not only the establishment of a bandura ensemble but a whole orchestra of Ukrainian folk instruments.

The money promised was slow in coming and it was only in 1925 after 3 hard years that the orchestra was able to receive a full complement of instruments. In 1925 it consisted of:

14 banduras (3 piccolo, 8 primas and 3 basses) 
2 tsymbaly (hammer dulcimers) Prima and bass 
4 liry (hurdy-gurdies) - 2 soprano and 2 tenor 
2 sopilka (duct flutes) 
1 sviril (Pan pipe) 
2 trembity (alpine horns) 
and percussion - drums, timpani and triangle.

The work required to establish any type of orchestra is complicated and difficult, but the process of developing an orchestra of rare and almost forgotten instruments was at times bordering on the impossible. The instruments could not be obtained, and some could only be viewed in museums. Instruments had to be designed and made in a way that they stayed true to the traditional instrument. After instruments were procured, one had to teach players to play on these instruments, and this was an additional problem because written music for these instruments did not exist, and here Haydamaka had to arrange and compose music for the instruments. The scores had to be written and parts copied out and to form this mass into one orchestral whole.

Haydamaka did all this himself and did it the best way he could. Within 7 years the orchestra had given over 500 concerts.

The repertoire of the orchestra included folk songs and classical transcriptions.
  
In 1929 a number of articles appeared in the "Muzyka Masam" magazine regarding the formation of similar Orchestras of Ukrainian Folk Instruments. A number of orchestrations were also published in the magazine. In 1930 a book of 3 orchestrations was published (1100 copies) containing a number of arrangements for the orchestra. In that year also L. Haydamaka was able to also publish some arrangements for the Kharkiv style bandura.

In 1931 a number of records were recorded and produced in Moscow with recordings of the ensemble.

Emigration
WWII had left its imprint on the Haydamaka family and with the return of Soviet forces they had to leave Ukraine where he wandered through Western Europe. Haydamaka made a living performing, giving concerts and writing out music and orchestrations. In Germany, for a period of time he was a member of the Ostap Veresai Brotherhood directed by Hryhory Bazhul.

After the war he moved to the USA in 1950, where he found employment as a draftsman in a company designing hydro-electric dams in Flushing, Queens, New York where he worked until the age of 74.

He continued to occasionally perform and teach music and the bandura in New York, publishing articles on the history of the bandura in various semi-scholarly journals such as Guitar Review - a journal of the Society of Classical Guitar in 1971. He occasionally attended meetings of the NY Society of Classical Guitar, which was led by his pre-revolutionary friend from Kharkiv - Vladimir Bobri.

After his retirement he moved to New Hampshire to live with his daughter.

Haydamaka died in New Hampshire in 1991.

Publications

Гайдамака, Л.Г. - Оркестр українських народних інструментів // “Музика Масам” 1928, №10-11 (С.6-7)
Гайдамака, Л.Г. – Оркестр українських народних інструментів – № 2 // “Музика масам” 1929, №1,
Гайдамака, Л.Г. – Оркестр українських народних інструментів – № 3 // “Музика масам” 1929, №3/4,
Гайдамака, Л.Г. – Оркестр українських народних інструментів – ч. 4 // “Музика масам” 1929, №5,
Гайдамака, Л. – “Без тебе Олесю” (М.Лисенка) для оркестру українських народних інструментів // “Музика масам” 1929, №5. (Додаток)
Гайдамака, Л. –“Дванадцять косарів” (музика К.Богуславського) для оркестру українських народних інструментів - // “Музика масам” 1929, №7/8, (Додаток)
Гайдамака, Л. – Оркестр українських народних інструментів – № 5 // “Музика масам” 1929, №10/11.
Гайдамака, Л. – Оркестр українських народних інструментів – № 6 // “Музика масам” 1929, №12.
Гайдамака,  Л.Г. – Революційні пісні для оркестр українських народних інструментів – ДВУ, Х.:1930 (16с.)
Гайдамака,  Л.Г. (арр) - Дванадцять косарів К.Богуславського для бандури соло – серія “Музика трудящим” Х.:1930 – (Реклама поміщена в ж. “Музика масам” 1930, №7/8.) (16с.)
Гайдамака,  Л.Г. – Друга молодість бандури - // “Соціалістична Харківщина” – 24.Х.1936
Гайдамака,  Л.Г. – Спогади – Інтерв’ю на плівці 1984 р. (8 годин)
Haydamaka, L. – Kobza-bandura – National Ukrainian Musical Instrument // “Guitar Review” №33, Summer 1970 (С.13-18)
Гайдамака. Л. - Кобза – Бандура // “Бандура” 1986, №17-18. (С.12-16)

Sources
Мішалов, В. – Бандурист Леонід Гайдамака "Bandura", 1986, №17/18, (С.1-10)
Ветеран Палій-Неїло – Ще кілька слів про Братство кобзарів імени О. Вересая // “Українські Вісті” 57/58 №115-116,  31.VIII.1947
Штокалко, З. – Критичні завваги до стану сучасного кобзарства // “Українські вісті” 6.ІІ.1949, Новий Ульм, Німеччина та // “Бандура” 1981, № 3-4, (С.11-15)
Мішалов, В. – Леонід Гайдамака – Фундатор Бандурного професіоналізму  –Матеріали міжнародної науково-практичної конференції – Кобзарство в контексті становлення української професійної культури, 14 жовтня, 2005 р. Київ., 2005. 206 с. (с.107-109)

Students
 Perekop Ivanov
 Illia Filkenberg
 Heorhy Kazakov
 Oleksander Nezovybat'ko

Category:Ukrainian musicians
Category:Kobzarstvo
Category:Bandurists
Category:1991 deaths
Category:1898 births

--------------------------------------------------

--------------------------------------------------

/*****************************************************************
|
|    AP4 - Byte Stream support
|
|    Copyright 2002 Gilles Boccon-Gibod
|
|
|    This file is part of Bento4/AP4 (MP4 Atom Processing Library).
|
|    Unless you have obtained Bento4 under a difference license,
|    this version of Bento4 is Bento4|GPL.
|    Bento4|GPL is free software; you can redistribute it and/or modify
|    it under the terms of the GNU General Public License as published by
|    the Free Software Foundation; either version 2, or (at your option)
|    any later version.
|
|    Bento4|GPL is distributed in the hope that it will be useful,
|    but WITHOUT ANY WARRANTY; without even the implied warranty of
|    MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
|    GNU General Public License for more details.
|
|    You should have received a copy of the GNU General Public License
|    along with Bento4|GPL; see the file COPYING.  If not, write to the
|    Free Software Foundation, 59 Temple Place - Suite 330, Boston, MA
|    02111-1307, USA.  
|
 ****************************************************************/

/*----------------------------------------------------------------------
|       includes
+---------------------------------------------------------------------*/
#include "Ap4ByteStream.h"
#include "Ap4Utils.h"
#include "Ap4Debug.h"

/*----------------------------------------------------------------------
|       constants
+---------------------------------------------------------------------*/
const int AP4_BYTE_STREAM_COPY_BUFFER_SIZE = 4096;

/*----------------------------------------------------------------------
|       AP4_ByteStream::WriteString
+---------------------------------------------------------------------*/
AP4_Result
AP4_ByteStream::WriteString(const char* buffer)
{
    AP4_Size string_length = static_cast<AP4_Size>(strlen(buffer));

    // shortcut
    if ((buffer == NULL) || (string_length == 0)) return AP4_SUCCESS;

    // write the string
    return Write((const void*)buffer, string_length);
}

/*----------------------------------------------------------------------
|       AP4_ByteStream::WriteUI64
+---------------------------------------------------------------------*/
AP4_Result
AP4_ByteStream::WriteUI64(AP4_UI64 value)
{
    unsigned char buffer[8];

    // convert value to bytes
    AP4_BytesFromUInt64BE(buffer, value);

    // write bytes to the stream
    return Write((void*)buffer, 8);
}

/*----------------------------------------------------------------------
|       AP4_ByteStream::WriteUI32
+---------------------------------------------------------------------*/
AP4_Result
AP4_ByteStream::WriteUI32(AP4_UI32 value)
{
    unsigned char buffer[4];

    // convert value to bytes
    AP4_BytesFromUInt32BE(buffer, value);

    // write bytes to the stream
    return Write((void*)buffer, 4);
}

/*----------------------------------------------------------------------
|       AP4_ByteStream::WriteUI24
+---------------------------------------------------------------------*/
AP4_Result
AP4_ByteStream::WriteUI24(AP4_UI32 value)
{
    unsigned char buffer[3];

    // convert value to bytes
    AP4_BytesFromUInt24BE(buffer, value);

    // write bytes to the stream
    return Write((void*)buffer, 3);
}

/*----------------------------------------------------------------------
|       AP4_ByteStream::WriteUI16
+---------------------------------------------------------------------*/
AP4_Result
AP4_ByteStream::WriteUI16(AP4_UI16 value)
{
    unsigned char buffer[2];

    // convert value to bytes
    AP4_BytesFromUInt16BE(buffer, value);

    // write bytes to the stream
    return Write((void*)buffer, 2);
}

/*----------------------------------------------------------------------
|       AP4_ByteStream::WriteUI08
+---------------------------------------------------------------------*/
AP4_Result
AP4_ByteStream::WriteUI08(AP4_UI08 value)
{
    return Write((void*)&value, 1);
}

/*----------------------------------------------------------------------
|       AP4_ByteStream::ReadUI64
+---------------------------------------------------------------------*/
AP4_Result
AP4_ByteStream::ReadUI64(AP4_UI64& value)
{
    unsigned char buffer[8];

    // read bytes from the stream
    AP4_Result result;
    result = Read((void*)buffer, 8);
    if (AP4_FAILED(result)) {
        value = 0;
        return result;
    }

    // convert bytes to value
    value = AP4_BytesToUInt64BE(buffer);
    
    return AP4_SUCCESS;
}

/*----------------------------------------------------------------------
|       AP4_ByteStream::ReadUI32
+---------------------------------------------------------------------*/
AP4_Result
AP4_ByteStream::ReadUI32(AP4_UI32& value)
{
    unsigned char buffer[4];

    // read bytes from the stream
    AP4_Result result;
    result = Read((void*)buffer, 4);
    if (AP4_FAILED(result)) {
        value = 0;
        return result;
    }

    // convert bytes to value
    value = AP4_BytesToUInt32BE(buffer);
    
    return AP4_SUCCESS;
}

/*----------------------------------------------------------------------
|       AP4_ByteStream::ReadUI24
+---------------------------------------------------------------------*/
AP4_Result
AP4_ByteStream::ReadUI24(AP4_UI32& value)
{
    unsigned char buffer[3];

    // read bytes from the stream
    AP4_Result result;
    result = Read((void*)buffer, 3);
    if (AP4_FAILED(result)) {
        value = 0;
        return result;
    }

    // convert bytes to value
    value = AP4_BytesToUInt24BE(buffer);
    
    return AP4_SUCCESS;
}

/*----------------------------------------------------------------------
|       AP4_ByteStream::ReadUI16
+---------------------------------------------------------------------*/
AP4_Result
AP4_ByteStream::ReadUI16(AP4_UI16& value)
{
    unsigned char buffer[2];

    // read bytes from the stream
    AP4_Result result;
    result = Read((void*)buffer, 2);
    if (AP4_FAILED(result)) {
        value = 0;
        return result;
    }

    // convert bytes to value
    value = AP4_BytesToUInt16BE(buffer);
    
    return AP4_SUCCESS;
}

/*----------------------------------------------------------------------
|       AP4_ByteStream::ReadUI08
+---------------------------------------------------------------------*/
AP4_Result
AP4_ByteStream::ReadUI08(AP4_UI08& value)
{
    unsigned char buffer[1];

    // read bytes from the stream
    AP4_Result result;
    result = Read((void*)buffer, 1);
    if (AP4_FAILED(result)) {        
        value = 0;
        return result;
    }

    // convert bytes to value
    value = buffer[0];
    
    return AP4_SUCCESS;
}

/*----------------------------------------------------------------------
|       AP4_ByteStream::ReadString
+---------------------------------------------------------------------*/
AP4_Result
AP4_ByteStream::ReadString(char* buffer, AP4_Size size)
{
    if (buffer == NULL || size == 0) {
        return AP4_ERROR_INVALID_PARAMETERS;
    }

    AP4_Size bytes_read = 0;
    while (bytes_read < size-1) {      
        AP4_Result result;
        result = Read(&buffer[bytes_read], 1, NULL);
        if (AP4_FAILED(result)) {
            buffer[bytes_read] = '\0';
            return result;
        }
        if (buffer[bytes_read] == '\0') {
            // end of string
            return AP4_SUCCESS;
        }
        bytes_read++;
    }

    // the string was not null terminated, terminate it
    buffer[size-1] = '\0';
    return AP4_SUCCESS;
}

/*----------------------------------------------------------------------
|       AP4_ByteStream::CopyTo
+---------------------------------------------------------------------*/
AP4_Result
AP4_ByteStream::CopyTo(AP4_ByteStream& stream, AP4_Size size)
{
    unsigned char buffer[AP4_BYTE_STREAM_COPY_BUFFER_SIZE];
    while (size) {
        AP4_Size bytes_read;
        AP4_Size bytes_to_read;
        AP4_Result result;

        // decide how much to read
        if (size >= sizeof(buffer)) {
            bytes_to_read = sizeof(buffer);
        } else {
            bytes_to_read = size;
        }

        // read up to one buffer full
        result = Read(buffer, bytes_to_read, &bytes_read);
        if (AP4_FAILED(result)) return result;

        // copy to destination
        if (bytes_read != 0) {
            result = stream.Write(buffer, bytes_read);
            if (AP4_FAILED(result)) return result;
        }

        // update the size
        size -= bytes_read;
    }

    return AP4_SUCCESS;
}

/*----------------------------------------------------------------------
|       AP4_SubStream::AP4_SubStream
+---------------------------------------------------------------------*/
AP4_SubStream::AP4_SubStream(AP4_ByteStream& container, 
                             AP4_Offset      offset, 
                             AP4_Size        size) :
    m_Container(container),
    m_Offset(offset),
    m_Size(size),
    m_Position(0),
    m_ReferenceCount(1)
{
    m_Container.AddReference();
}

/*----------------------------------------------------------------------
|       AP4_SubStream::~AP4_SubStream
+---------------------------------------------------------------------*/
AP4_SubStream::~AP4_SubStream()
{
    m_Container.Release();
}

/*----------------------------------------------------------------------
|       AP4_SubStream::Read
+---------------------------------------------------------------------*/
AP4_Result 
AP4_SubStream::Read(void*     buffer, 
                    AP4_Size  bytes_to_read, 
                    AP4_Size* bytes_read)
{
    // default values
    if (bytes_read) *bytes_read = 0;

    // shortcut
    if (bytes_to_read == 0) {
        return AP4_SUCCESS;
    }

    // clamp to range
    if (m_Position+bytes_to_read > m_Size) {
        bytes_to_read = m_Size - m_Position;
    }

    // check for end of substream
    if (bytes_to_read == 0) {
        return AP4_ERROR_EOS;
    }

    // seek inside container
    //AP4_Result result;
    //result = m_Container.Seek(m_Offset+m_Position);
    //if (AP4_FAILED(result)) {
    //    return result;
    //}

    // read from the container
    AP4_Size local_bytes_read;
    AP4_Result result = m_Container.Read(buffer, bytes_to_read, &local_bytes_read);
    if (bytes_read) *bytes_read = local_bytes_read;
    if (AP4_SUCCEEDED(result)) {
        m_Position += local_bytes_read;
    }
    return result;
}

/*----------------------------------------------------------------------
|       AP4_SubStream::Write
+---------------------------------------------------------------------*/
AP4_Result 
AP4_SubStream::Write(const void* buffer, 
                     AP4_Size    bytes_to_write, 
                     AP4_Size*   bytes_written)
{
    // default values
    if (bytes_written) *bytes_written = 0;

    // shortcut
    if (bytes_to_write == 0) {
        return AP4_SUCCESS;
    }

    // clamp to range
    if (m_Position+bytes_to_write > m_Size) {
        bytes_to_write = m_Size - m_Position;
    }

    // check for en of substream
    if (bytes_to_write == 0) {
        return AP4_ERROR_EOS;
    }

    // seek inside container
    //AP4_Result result;
    //result = m_Container.Seek(m_Offset+m_Position);
    //if (AP4_FAILED(result)) return result;

    // write to container
    AP4_Size local_bytes_written;
    AP4_Result result = m_Container.Write(buffer, bytes_to_write, &local_bytes_written);
    if (bytes_written) *bytes_written = local_bytes_written;
    if (AP4_SUCCEEDED(result)) {
        m_Position += local_bytes_written;
    }
    return result;
}

/*----------------------------------------------------------------------
|       AP4_SubStream::Seek
+---------------------------------------------------------------------*/
AP4_Result 
AP4_SubStream::Seek(AP4_Offset offset)
{
    if (offset > m_Size) return AP4_FAILURE;
    AP4_Result result;
    result = m_Container.Seek(m_Offset+offset);
    if (AP4_SUCCEEDED(result)) {
        m_Position = offset;
    }
    return result;
}

/*----------------------------------------------------------------------
|       AP4_SubStream::AddReference
+---------------------------------------------------------------------*/
void
AP4_SubStream::AddReference()
{
    m_ReferenceCount++;
}

/*----------------------------------------------------------------------
|       AP4_SubStream::Release
+---------------------------------------------------------------------*/
void
AP4_SubStream::Release()
{
    if (--m_ReferenceCount == 0) {
        delete this;
    }
}

/*----------------------------------------------------------------------
|       AP4_MemoryByteStream::AP4_MemoryByteStream
+---------------------------------------------------------------------*/
AP4_MemoryByteStream::AP4_MemoryByteStream(AP4_Size size) :
    m_BufferIsLocal(true),
    m_Size(size),
    m_Position(0),
    m_ReferenceCount(1)
{
    m_Buffer = DNew AP4_UI08[size];
}

/*----------------------------------------------------------------------
|       AP4_MemoryByteStream::AP4_MemoryByteStream
+---------------------------------------------------------------------*/
AP4_MemoryByteStream::AP4_MemoryByteStream(AP4_UI08* buffer, AP4_Size size) :
    m_BufferIsLocal(false),
    m_Buffer(buffer),
    m_Size(size),
    m_Position(0),
    m_ReferenceCount(1)
{}

/*----------------------------------------------------------------------
|       AP4_MemoryByteStream::~AP4_MemoryByteStream
+---------------------------------------------------------------------*/
AP4_MemoryByteStream::~AP4_MemoryByteStream()
{
    if (m_BufferIsLocal) delete[] m_Buffer;
}

/*----------------------------------------------------------------------
|       AP4_MemoryByteStream::Read
+---------------------------------------------------------------------*/
AP4_Result 
AP4_MemoryByteStream::Read(void*     buffer, 
                           AP4_Size  bytes_to_read, 
                           AP4_Size* bytes_read)
{
    // default values
    if (bytes_read) *bytes_read = 0;

    // shortcut
    if (bytes_to_read == 0) {
        return AP4_SUCCESS;
    }

    // clamp to range
    if (m_Position+bytes_to_read > m_Size) {
        bytes_to_read = m_Size - m_Position;
    }

    // check for end of stream
    if (bytes_to_read == 0) {
        return AP4_ERROR_EOS;
    }

    // read from the memory
    memcpy(buffer, &m_Buffer[m_Position], bytes_to_read);
    m_Position += bytes_to_read;

    if (bytes_read) *bytes_read = bytes_to_read;

    return AP4_SUCCESS;
}

/*----------------------------------------------------------------------
|       AP4_MemoryByteStream::Write
+---------------------------------------------------------------------*/
AP4_Result 
AP4_MemoryByteStream::Write(const void* buffer, 
                            AP4_Size    bytes_to_write, 
                            AP4_Size*   bytes_written)
{
    // default values
    if (bytes_written) *bytes_written = 0;

    // shortcut
    if (bytes_to_write == 0) {
        return AP4_SUCCESS;
    }

    // clamp to range
    if (m_Position+bytes_to_write > m_Size) {
        bytes_to_write = m_Size - m_Position;
    }

    // check for en of stream
    if (bytes_to_write == 0) {
        return AP4_ERROR_EOS;
    }

    // write to memory
    memcpy(&m_Buffer[m_Position], buffer, bytes_to_write);
    m_Position += bytes_to_write;

    if (bytes_written) *bytes_written = bytes_to_write;

    return AP4_SUCCESS;
}

/*----------------------------------------------------------------------
|       AP4_MemoryByteStream::Seek
+---------------------------------------------------------------------*/
AP4_Result 
AP4_MemoryByteStream::Seek(AP4_Offset offset)
{
    if (offset > m_Size) return AP4_FAILURE;
    m_Position = offset;
    return AP4_SUCCESS;
}

/*----------------------------------------------------------------------
|       AP4_MemoryByteStream::AddReference
+---------------------------------------------------------------------*/
void
AP4_MemoryByteStream::AddReference()
{
    m_ReferenceCount++;
}

/*----------------------------------------------------------------------
|       AP4_MemoryByteStream::Release
+---------------------------------------------------------------------*/
void
AP4_MemoryByteStream::Release()
{
    if (--m_ReferenceCount == 0) {
        delete this;
    }
}


--------------------------------------------------

--------------------------------------------------

Q:

Google map not displaying in "row" class

I'm trying to display google maps and every time I use this 
<div class="large-12 columns" id="map-canvas"></div>

The map is showing.It is working as it should.
but when I put this div in a "row" class
<div class="row">
<div class="large-12 columns" id="map-canvas"></div>
</div>

the map disappears.
This is the css
html{
height: 100%;
  }

body{
height: 100%;
 }

#map-canvas{
height: 100%;
 }

A:

height:100% will only work if parent's height is explicitly defined or if all the parents have height 100% till html tag.



--------------------------------------------------

--------------------------------------------------

Case report - spontaneous chest pain in a 14-year-old boy.
A case of paediatric aortic dissection is reported. The pathogenesis, investigation and treatment are discussed. We highlight that the history and nature of the pain should alert clinicians to this condition and that baseline investigations may be normal.

--------------------------------------------------

--------------------------------------------------

Q:

When I try to open a fifo O_WRONLY I get a "No such device or address" error

In my code I create a fifo named "my_fifo", if I open it in O_WRONLY | O_NONBLOCK mode, open() returns a -1 and an error number of "No such device or address", on the other hand, if I open the fifo in O_RDONLY | O_NONBLOCK mode, it works perfectly. Why is this happening? Is there something I'm doing wrong?
#include <sys/types.h>
#include <sys/stat.h>
#include <fcntl.h>
#include <unistd.h>
#include <stdio.h>
#include <stdlib.h>

int main(int argc, char *argv[])
{

    char *fifoname = "my_fifo";
    mkfifo(fifoname, 0666);

    int fd;
    if ((fd = open(fifoname, O_WRONLY | O_NONBLOCK)) == -1)
    {
        perror("open pipe");
        exit(EXIT_FAILURE);
    }

    close(fd);

    exit(EXIT_SUCCESS);
}

A:

Check out the Linux fifo man page:

A process can open a FIFO in nonblocking mode.  In this case, opening
         for read-only will succeed even if no-one has opened on the write
         side yet, opening for write-only will fail with ENXIO (no such device
         or address) unless the other end has already been opened.

If you want non-blocking mode, you need to make sure the reader opens the fifo before the writer.



--------------------------------------------------

--------------------------------------------------

Self-management of medication during hospitalisation: Healthcare providers' and patients' perspectives.
To explore healthcare providers' and patients' perspectives on self-management of medication during the patients' hospital stay. Self-administration of medications relates to the process in which hospitalised patients-instead of healthcare professionals-prepare and consume medications by themselves. Literature suggests possible advantages of medication self-management such as increased patient satisfaction, adherence to pharmacotherapy and self-care competence. A qualitative descriptive study design was adopted, using semistructured interviews and qualitative content analysis to examine data. Six physicians, 11 nurses, six hospital pharmacists and seven patients were recruited from one regional hospital and two university hospitals, situated in Belgium. Interviews were conducted between October 2014-January 2015. Strengths of medication self-management were described by participants, relating to benefits of self-management for patients, time-saving benefits for nurses and benefits for better collaboration between patients and healthcare providers. Weaknesses were also apparent for patients as well as for nurses and physicians. Opportunities for self-management of medication were described, relating to the organisation, the patient and the process for implementing self-management. Threats for self-management of medication included obstacles related to implementation of self-managed medications and the actual process of providing medication self-management. A structured overview of conditions that should be fulfilled before allowing self-management of medication concerned patient-related conditions, the self-managed medication and the organisation of self-management of medication. This study provides new insights on the strengths, weaknesses, opportunities and threats from the perspectives of key stakeholders. Interpretation of these findings resulted in an overview of adaptations in the medication management process to facilitate implementation of self-management of medication. A medication management process for self-management of medication was proposed. Further interventional studies are needed to test and refine this process before implementing it in daily practice.

--------------------------------------------------

--------------------------------------------------

Q:

Angular losing scope in ng-form template

I am trying this ,
    <div ng-form="sadadPaymentForm" class="sadadPaymentForm"  ng-if="vm.isSadadEnabled" name="sadadPaymentForm"  validate-popup-form>
     <div ng-if="vm.isSadadEnabled">
       <div class="credit-debit-card-div" ng-include="'sadadTemplate'" ng-show="vm.view_tab == 'tab7'">
       </div>
    </div>
   </div>
   <span ng-show="vm.view_tab=='tab7' && vm.isSadadEnabled">
     <button type="button" class="primary inline pay-now" id="paynowbtn" ng-disabled="!vm.checked3 || vm.sadadPaymentForm.$invalid" ng-click="vm.payByVoucher();" analytics-on="click" analytics-event="uaevent" analytics-eventcategory="Payment" analytics-eventaction="PayNow"
             analytics-eventlabel="Pay now">
               Pay by sadad
     </button>
   </span>

And , my template in another html file
  <script type="text/ng-template" id="sadadTemplate">
    <input fieldlabel="Online Payment ID" type="text" name="onlinePaymentId" ng-model="vm.sadadpayment.onlinePaymentId"  class="form-control input-type-text"
                    ng-model-options="{ debounce: 100 }" validationKey-required="PaymentAdress1IsRequired" required maxlength="200">
  </script>

Here the vm.sadadPaymentForm.$invalid does not work but Indidual components validation works on blur on blur of input .
BUT , if I add vm to ng-form ,ie like this

    <div ng-form="vm.sadadPaymentForm" class="sadadPaymentForm"  ng-if="vm.isSadadEnabled" name="vm.sadadPaymentForm"  validate-popup-form>
     <div ng-if="vm.isSadadEnabled">
       <div class="credit-debit-card-div" ng-include="'sadadTemplate'" ng-show="vm.view_tab == 'tab7'">
       </div>
    </div>
   </div>

Here the vm.sadadPaymentForm.$invalid works but Indidual components validation fails on blur of input for eg, TypeError: Cannot read property 'onlinePaymentId' of undefined
Help me understand how can I make both individual validation and the final form validation work together.Angular Ver 1.5,cannot upgrade this now.Need a solution with 1.5.

A:

Ok found out the issue , its basically a scope issue.
replaced
ng-if="vm.isSadadEnabled"

with
ng-show="vm.isSadadEnabled"

ng-if was preventing the DOM from rendering thus killing the scope variable vm itself



--------------------------------------------------

--------------------------------------------------

The psychology of typography

Emma Cownley

4 years ago

Votes

2

Typography is a powerful tool in any graphic designer’s arsenal when creating branding that is going to stand out from the crowd. If you’re a graphic designer then you have probably spent hours sifting through different typography styles, in order to find that perfect one for a customer or client. What is it about typography that can change a perception so quickly? We’re going to take a look at the psychology of typography, its importance, and how knowing your stuff can enhance graphic design even further.

What is typography?

Typography and graphic design goes hand in hand; after all, there is no denying that typography is an art form. A mixture of good skills, good taste and a keen eye will ensure your work as a typographer doesn’t go unnoticed. This art form is more than just being able to pick out a certain font, however. Although the font or typeface used does pay an imperative part, typography is so much more than that. Effectively, typography is the parent of typeface and has a lot bigger responsibility than just looking pretty on paper.

What typography can tell you

The great thing about mastering typography is that you can effectively tell a story, through the use of this art form. The correct typeface, for example, can completely change a consumer’s perception of a brand. There is no denying that typography and branding go hand in hand, as many of the big name companies will tell you. Take a look at innocent drinks, M&S, and even Lego, if you want to see the power of typography branding. Let’s take a look at some of the most popular type of fonts and how graphic designers have used them to empower a brand.

Serif – Here we have fonts such as Times New Roman and Georgia; some of the most widely recognized fonts in the world. A serif typeface makes you think grandeur, tradition and even garners respect. Yale, Time Magazine and The New York Times all use Serif to highlight their authority.

Script – Another popular font family, although used in a far different way from our last example. Script is far more feminine and creative, creating intrigue in consumers. Lucida, Pacifo and Brush Script are all fine examples from this family and ones you’ll see on a regular basis. Where? Take a look at Cadbury and Coca-Cola for Script typography.

Slab Serif – Want to attract the attention of the masses? Make sure you use some slab serif style fonts! They are bold and strong, calling attention and perfect for billboard ads. Rockwell and Courier are some of the most used, although there are plenty more from the same family. Take a look at companies such as Sony, Honda and Volva for a prime example of how best to use slab serif fonts.

These are just some of the typography and branding examples we think are the most impressive, although there are dozens more of them everywhere you look. The next time you’re out and about cast your eye over the hundreds of different typography combinations. By understanding the psychology of typography, and its importance in branding, you will be able to further enhance your own skills as a graphic designer.

--------------------------------------------------

--------------------------------------------------

Monte Carlo simulations for scattering of electromagnetic waves from perfectly conductive random rough surfaces.
Numerical calculations of mean scattered intensities by simulation of one-dimensional perfectly conductive random rough surfaces are presented. Results relative to backscattering enhancement and more accurate criteria for the validity of the Kirchhoff approximation are obtained. This method can also be used for assessing perturbative theories and for further experiments.

--------------------------------------------------

--------------------------------------------------

Bossk jump nerf is LAZY programming. It just drops the vector to ZERO halfway through the arc. VERY LAZY NERF on the use of code by the developers! It FEELS like he has LEAD BOOTS now!!! PLease for the love of the Force revert this nerf back to the BOSSK we bought 2 years ago. TWO years we have had a certain type of Bossk....now he has been ruined!!!!

--------------------------------------------------

--------------------------------------------------

Pathophysiology of lymphedema-Is there a chance for medication treatment?
Lymphedema is a common morbid after cancer treatment. The disease characterizes with progressive inflammatory process that result in irreversible fibrosis. Its chronology and progressive disease character often impacts the quality of life of cancer survivors. The pathophysiology of lymphedema remains unclear and the disease remains non-curable. In this article, we reviewed available studies of lymphedema and concluded possible treatment strategies for lymphedema. J. Surg. Oncol. 2017;115:96-98. © 2016 Wiley Periodicals, Inc.

--------------------------------------------------

--------------------------------------------------

Q:

Comparing two numbers from a form in JavaScript

When i try to compare different numbers, the numbers change but the text part remains the same. This only happens with greater/lesser, and not with NaN or equal case.
Here's my code:

function check() {
    var a = document.getElementById("a").value;
    var b = document.getElementById("b").value;
    
    if (isNaN(a) || isNaN(b) === true) {
        document.getElementById("result").innerHTML = "It's not a number";
    } else {
        if (a > b) {
            document.getElementById("result").innerHTML = "Number " + a + " is greater than number " + b;
        } else if (a == b) {
            document.getElementById("result").innerHTML = "number " + a + " is equal to number " + b;
        } else if (a < b) {
            document.getElementById("result").innerHTML = "number " + a + " is lesser than  number " + b;
        }
    }
}
body {
    background-color: black;
    color: white;
    font-size: 28px;
}
<!DOCTYPE HTML>
<html lang="pl">
    
<head>
    <meta charset="utf-8">
    <title>Check the value of a number compared to the second number</title>
    <script type="text/javascript" src="sprawdzanie.js"></script>
    <link href="style.css" rel="stylesheet">
</head>

<body>

    <input id="a" type="text">
    <input id="b" type="text">
    <input value="Check" type="submit" onclick="check()">
    


    <div id="result"></div>

</body>
    
    
</html>

A:

The values a and b are both strings. If you want to compare them like numbers, use parseInt() or parseFloat() on them before you perform the comparison.
So, before the if statement:
a = parseInt(a);
b = parseInt(b);



--------------------------------------------------

--------------------------------------------------

DESCRIPTION: There is a large body of evidence that suggests that the unique extracellular environment in the brain, which contains few fibrous proteins and high amounts of hyaluronic acid (HA), is responsible for the characteristic aggressiveness and resistance to conventional treatments observed in brain tumors categorized as glioblastoma mulitforme (GBM). However the specific interactions between tumor cells and the extracellular matrix (ECM) and their relationship to tumor physiology are largely unknown. In general, these mechanisms have been challenging to elucidate, in large part because of the lack of physiologically translatable models that can be studied in controlled context ex vivo. To fulfill this need, we propose a biomaterials-based approach to create three-dimensional (3D) cultures of primary GBM cells that accurately represent the complex, in vivo microenvironment and preserve physiology of clinical tumors. These culture platforms permit independent, orthogonal control of multiple micro environmental parameters (modulus, peptide content, HA content) with unprecedented precision. By combining this approach with dynamic measurements of micro environmental parameters and transcription factor (TF) activity, we propose to investigate the relationships between the GBM microenvironment and drug resistance on multiple biological levels. In particular, we aim to identify specific cell-ECM interactions as potential clinical targets whose disruption inhibits acquisition of resistance epidermal growth factor receptor (EGFR) inhibitors. Aim 1 of this application describes a plan to 1) fully characterize the biochemical and biophysical landscape in clinical GBM and 2) identify specific cell-ECM interactions that relay these microenvironment cues, inducing GBM cells to exhibit poor response to treatment with EGFR inhibitors. To identify specific interactions, patient- derived GBM cells will be cultured within 3D, HA-based hydrogels, which represent a controlled experimental system where HA concentration, density and identity of available integrin-binding peptides, and mechanical modulus can be precisely varied and their independent effects distinguished. In parallel, Aim 2 describes studies in which the intracellular response to the EGFR inhibition using a high-throughput approach to dynamically monitor TF activity in live, 3D cultures. As the unique ECM in the brain is a major mediator of drug resistance, the brain-mimetic hydrogel platforms outlined in Aim 1 will provide an ideal culture environment in which to perform these studies. These experiments will characterize the complex transcriptional events that occur when non-resistance GBM cells are first exposed to EGFR inhibitors and quantitative measure the progressive response to these treatments, including acquisition of resistance, in real-time. Together, these studies provide a promising opportunity to identify new pharmacological targets for adjunct treatments to EGFR inhibition at multiple biological levels (i.e., cell surface-ECM interface in Aim 1 and TF binding to gene promoters in the nucleus in Aim 2). Given the significant heterogeneity of cells within GBM tumors and the variety of mechanisms that these cells may adopt to gain resistance to chemotherapeutic drugs [46,47,50,51], a systems-level understanding of the signaling networks involved would be a valuable asset to the field for identifying potent pharmacological targets for GBM treatment.

--------------------------------------------------

--------------------------------------------------

Uncertainty is an intriguing but essential aspect of social life. Although total certainty would probably be unbearable, we are often plagued by uncertainty. Uncertainty is epistemic, future-oriented, and refers to a lack of knowledge concerning how to act with predictable outcomes. Uncertainty means that we cannot predict or foresee what will happen when acting or not acting (Beckert [@CR8], pp. 3--4; Beckert [@CR9]; Keynes [@CR48]; Knight [@CR49]).

The future is unknown by definition, but over time human ingenuity and established practices have given us a stock of institutionalized knowledge about matters that reduce uncertainty. This requires involvement of several actors and some kind of publicness (Berger and Luckmann [@CR12]). Law and scientific work are paradigmatic examples of establishing certainty with regard to existing states and correlated predictability between states. Also social conventions, e.g., norms and practices, facilitate decision making.

By employing our current knowledge and the combination of states of what I call institutionalized certainty we can not only predict, but also fashion, the future. This is the case when we use pesticides to protect plants from various diseases, but they may also pollute the water. These predictions are based on statements of institutionalized certainty. We have thereby, for example, been able to leave the life of European Middle Ages, i.e., at the time humans lived with no security and when one could not calculate for the future (Elias [@CR28], p. 277) behind us in many parts of the world. By ordering the world, either in the form of a decided order, for example setting laws, standards, and rules, or out of mutual adjustment by interacting actors who develop conventions, uncertainty is reduced. This knowledge, however, is only "institutionalized" in a given context and not true in an absolute sense (Heidegger [@CR41]; Quine [@CR68]).[1](#Fn1){ref-type="fn"} It may even be "wrong." There are, for example, many rules of thumb, as institutionalized knowledge, that people make use of, but that may be incorrect (Kahneman and Tversky [@CR44]; Tversky and Kahneman [@CR76]). It is, nonetheless by and large taken for granted and for the time being not put in question. Institutional knowledge refers to codified praxis, such as legal system, standards to facilitate coordination (such as the metric standard), and states generated by science (as in scientific propositions backed by evidence). Much of this part of the lifeworld is that upon which more explicit and codified institutions rest (Berger and Luckmann [@CR12]; Husserl [@CR42]). The line between what we "know" and not know has changed over time due to the growth of an extended body of knowledge (Pareto [@CR61]).

In many cases uncertainty refers to states that are not institutionalized. Some of these states cannot even be "known," which means that they have not yet been, or cannot be, reduced to "laws," or standards. In these cases judgment by other means is needed. Judgment may, for example, be used to find out what is a good action in, for example, a moral, aesthetic sense; when one is uncertain about the quality of the paper one has just finished; for identifying the best candidate for a job; or to identify the best sailor in the Laser boat class. Such judgements, if reached in social processes, may reduce uncertainty.

By which means is uncertainty reduced by result of judgments? This article analyzes forms (cf. Simmel [@CR72], p. 47) of uncertainty reduction in cases when no institutionalized certainty exists. It presents and analyses three forms of uncertainty reduction and looks at the questions to which they give rise. The upshot of applying these forms is to increase the certainty of alternatives in relation to one another, in terms of rank lists, scores, quality assessments, and "winners and losers." By their means, uncertainty concerning---in the widest sense---what is good and bad or what has worth and what does not, is reduced. *Forms* of reduction refer here to the social structure of roles that reduce uncertainty. This article studies forms of uncertainty reduction and its public implications that affect several actors. Furthermore, the outcome of the forms is not institutionalized. Based on the "judgments" of these forms, actions are facilitated.

The forms may be legitimate in a smaller or larger domain, existing in all spheres of life---for example, in sports competitions such as the US Open in tennis, as well as in labor markets, and when universities are ranked. Deciding what car to buy, what film to see, or which of the 500 academic papers on trust on the desk in front of us we should read requires reduction of uncertainty. The concrete output may be a statement of which actions are good, a rank list of job applicants, or a winner in a regatta.

This text makes a contribution, above all, to the field of valuation studies. The problem of what are good and bad, in the widest sense, is the theme in this nascent field. Valuations have become common in contemporary society, but have always been central in social life: "man designated himself as the creature that measures values, evaluates and measures, as the 'valuating animal as such,'" declared Nietzsche ([@CR59], p. 70). The centrality of valuation, both as social phenomena and a topic of academic interest, is acknowledged by researchers. There are many empirical studies, as shown in two comprehensive overviews of the field (Lamont [@CR51]; Zuckerman [@CR87]), and the related work by Fourcade ([@CR34]) on ordinalization. Little attention is paid, however, to the ways in which reduction of uncertainty is carried out, and no attention at all to the discussion of more generally existing forms that might be observed. Markets are the obvious case of a form, but markets are often discussed in their own right, and not in relation to more general forms. This article, in brief, argues that uncertainty is reduced by the following ideal typical forms: (1) decisions made for others by authority (i.e., a decided order of general principles); (2) valuation, by which certainty emerges as the result of actors ascribing values; and (3) contest, in which the certainty is "fought out." That is, 2 and 3 are not results of an intended process, but of a mutual adjustment.

These three forms depict the ways in which certainty is achieved by means of judgment in social life as a consequence of individual decisions, judgment devices, and various strategies employed to affect values, such as marketing and political voice, across all domains of social life. They enable us to understand how, and under what conditions, values result from mutual adjustment and when they are the result of design (certainty achieved by decision-making). To have such ideal types available facilitates policy decisions, for example, concerning what type of form is to be used, how the forms come about, and the consequences of the different forms. This raises questions concerning why certain forms are used, the consequences for those involved in the forms that lead to uncertainty, and the consequences for those who are affected by these processes. That they are ideal-types means that they are presented in a pure form, which thus plays down empirical variety and the mixed forms that we observe in real life. Although this is a theoretical article, it provides empirical examples to illustrate the theoretical points.

Institutionalizing certainty {#Sec1}
============================

Uncertainty is diminishing due to conventions and practices that grow out of actors who mutually adjust to one another, e.g., norms, or due to deliberate attempts such as setting laws or implementing standards. Certainty, in other words, can be institutionalized by these two ways. Before turning to the forms of uncertainty reduction, institutionalization of certainty is briefly discussed. The focus is here on one way that is used to institutionalize certainty about what is right, wrong, good, or bad, namely standards, resulting from decisions. Scientific laws and social conventions, practices and norms result from a process of mutual adjustment of actors. Both the deliberately made standards and the unintended emergence of norms are in the existing literature discussed in great detail (Busch [@CR22], pp. 3--4).

By having law, standards uncertainty is reduced. Law, more specifically natural law, is defined as "any criteria of right judgment in the matter of practice (conduct, action), any standard for assessing options for human conduct as good or bad, right or wrong, desirable or undesirable, decent or unworthy" (Finnis [@CR32], p. 1). This definition encapsulates the core of what is meant by decision of general principles, which means that the uncertainty is radically diminished already before adjudications, i.e., before judges decide on cases (if it should go that far).

To enable coordination and calculation, thereby reducing uncertainty, standards can, and have been, introduced. Standards refer to the simplification of interaction and coordination and are a result of decisions. When, for example in the field of business, industrial-technical standards were introduced, it became possible to relate to these as facts, and it made business and technical development easier and cheaper (Brunsson, Jacobsson, and associates [@CR20]; Pentzlin [@CR62]). Many goods were standardized to enable transaction of derivatives instead of the actual physical goods, in exchanges (Aspers [@CR4]). To adjust to standards is more a routine than it is decision making (Luhmann [@CR53], p. 401).

Standards can be used for the purpose of evaluation. Evaluation refers to the act of benchmarking "things," such as cars, groups, and people, according to a standard. The thing or concern that actors are uncertain about can thus be settled. As an ideal type, no one has to make a decision or ask someone whether whatever is at stake is "good" or "bad"; the standard can be seen as a scale for measuring quality---or whatever is measured---in an "objective" way (Aspers [@CR3]). Evaluation is thus defined as the process by which value is conferred on actors or things, based on a given standard, That is to say, it is institutionalized and independent of individuals' views or preferences. If it is a purely technical standard this may be obvious, and by technical devices objective evaluations can be made. In the strictest sense, evaluation implies the elimination of judgments. Evaluation, as it were, is independent of who is evaluating and who is evaluated. One may have opinions about how reasonable a standard is, but not about how it is measured. Hence, also when people are involved as evaluators it is "objective" and evaluation is not (supposed to be) based on their "opinions," "views," or "preferences" (Busch [@CR22], pp. 57--58). In reality, however, judgments are included in many evaluations with proclaimed standards.

Based on a standard, it is possible to evaluate things, humans or non-human, directly, according to their properties; for example, depending on their weight or wealth, or indirectly for their deeds, such as being "ethical," or running fast, or the quality, including their tolerance, of screws made for machines. This means that one can rank them as being "good" or "bad" or being "more" or "less," according to the standard. But what if there are, for example, no laws---man made or natural laws---that can guide us; how is uncertainty reduced in cases when we are left to our own views or preferences?

Approaches to uncertainty reduction {#Sec2}
===================================

To the best of my knowledge, there is no available text that deals explicitly with forms of reducing uncertainty. The sources of uncertainty are many, including lack of decisions and lack of standards, but most research revolves around the issue of value, valuation, and evaluation, with more or less direct connections to uncertainty (cf. Lamont [@CR51]; Zuckerman [@CR87]). Work has been done on valuation, including actual moments of valuation (Berthoin Antal et al. [@CR13]), many of which can be seen as single decisions that together make up the order of worth that is the outcome of valuation processes, as shown by Menger ([@CR56], [@CR57]). Simmel stresses how selection of incumbents for positions is partly stochastic ([@CR72], pp. 183--185). Stark ([@CR75]) argues that values are the outcome of dissonance.

There has also been discussion of values and value conflicts. Lamont stresses the existence of matrices of evaluation, and she studies above all practices of evaluation and valuation (Lamont [@CR50], [@CR51]). There has been work on commensuration (Espeland and Stevens [@CR31]; Fourcade and Healy [@CR35]), namely the process through which several values or entities are reduced to one common denominator. In reality, most forms of valuation imply a combination or commensuration of different values and the exclusion of other values, that is, values that are not part of the process. Vatin introduces the notion of valorization, referring to the manner in which the worth of something increases in processes; he also points out that evaluation and what he calls "valorization" are intertwined in reality (Vatin [@CR77], p. 32). Much work has been done on the variety of specific values (e.g., Boltanski and Thévenot [@CR14]; Pareto [@CR61]), tools, and strategies involved in processes of valuation and evaluation (cf. Aspers and Beckert [@CR6]; Beckert and Musselin [@CR10]; Karpik [@CR47]; Stark [@CR75]). Values in markets have also been discussed (e.g., Alexius and Hallström [@CR1]).

There is a literature on uncertainty reduction by means of attempts to affect and to control the future (Beckert [@CR9]). Lucien Karpik's ([@CR47]) work is especially relevant to what is discussed here. He addresses the problem of uncertainty concerning which individual product is good; in other words, what non-homogenous offers are of high or low quality. His analysis is presented as standing in opposition to neoclassical economic analysis, in which the market and price differentiation of homogenous offers are at the fore. The tools Karpik presents for assessing quality are called "judgment devices." The word "device" is rooted in "division"; division, between qualities, or in more general terms, different values, is exactly what these devices enable. These devices are means of separating what is good in markets from what is not good, and they make it easier for actors to make informed choices; they are also \"guideposts for individual and collective action\" (Karpik [@CR47], p. 44). Judgment devices reduce the quality uncertainty of products in markets.

There are at least five devices. *Networks* are an actor's ties through which trustworthy information of what is good flow. It is a form of social capital for adjudicating the quality of products and services in markets. Ties between actors cannot be institutionalized, and they fall outside the analysis of this article. *Cicerones* are critics, that is, experts, and guidebooks that \"embody a soft, symbolic form of authority\" (Karpik [@CR47], p. 46). The *Michelin Guide* in the French restaurant market is one such example (Karpik [@CR46]), comparing, selecting, and rating restaurants according to a set of judgment criteria. *Confluences* are techniques that sellers use to form buyers' decisions, \"ranging from territorial location, spatial organization and displays to selling skills\" (Karpik [@CR47], p. 46). In other words, by means of how objects---such as clothes or cars---are presented for sale, where those objects are sold and the style of selling, information is sent out to potential buyers. *Rankings* are the ordering of alternatives: bestseller lists such as those for books or cars, but also the rankings for academic researchers, restaurants, teachers, or wine are instances of this device. These lists are created, for example, by websites or magazines. Credit rating firms, such as Fitch and Moodys are also instances of the ranking device (Rona-Tas and Hiss [@CR69]). The fifth device is *appellations*, which area form of standard. These include labels that inform consumers, in a broad sense, about origin, certifications, brands, and professional titles as institutions of quality. Often a third party makes these appellations legitimate. These devices can exist and be used in various combinations.

Karpik makes an important contribution to our understanding of how uncertainty is reduced. His typology of devices includes empirical categories, some of which are strategies, such as confluences and networks, whereas others are more like public statements of uncertainty reduction, such as rankings. He focuses on a particular type of market good. Forms of uncertainty reduction, however, cover a much larger domain, encompassing all types of things, as well as people, whether in markets or not. The approach taken in the present article looks at some of the basic forms that increase certainty of matters in social life. Most of the cases here refer to objects that are compared with one another, implying that some form of commensuration takes place. Much of Karpik's work, most clearly rankings, can be integrated into a more general frame of uncertainty reduction, which offers explanations of concrete cases.

The best-known form by which uncertainty is reduced is perhaps the market. The order of worth, manifested in prices of objects, is the outcome of evaluations or valuations carried out by the individuals in the market. However, others have shown (Aspers and Beckert [@CR6]; Vatin [@CR77]) that much of what goes into valuation in markets is the result of non-market valuation processes. Prices in markets result from actors coming together and ordering products. This ordering is of use to those who are actively taking part in the activities, but also---by way of signaling (Spence [@CR74])---to others. In economics there is also a wide discussion on tournaments, which arguably are about reducing uncertainty, but this has been used primarily to account for wage differences in hierarchies; the higher pay for those with higher rank can be seen as a reward for winning several "competitions" to get promoted (Rosen [@CR70]). In biology the notion "contest" is often used (Fitzpatrick et al. [@CR33]), However, the economic use of tournaments and the biological use of contest are, above all, metaphorical.

Uncertainty is obviously not restricted to markets. When the next president of a club is selected or "the best paper of the year" in a particular section at an American Sociological Association meeting is awarded to an author, it implies a ranking of the candidates. When a group of performers reach agreement on what is a good performance, or when, after voting, the winner of the Eurovision Song Contest is announced, uncertainty is diminished. The announcement of every winner, however, triggers excitement for next year's contest. In academia we are familiar with evaluation, ranking, and the like, both due to New Public Management and to collegial procedures. As a result of uncertainty reduction, predictability, coordination, and decision-making are facilitated.

Three forms of uncertainty reduction {#Sec3}
====================================

There are, I propose, different ways to reduce uncertainty when there is no institutionalized certainty, i.e., lack of standards or other means for objectively knowing and adjudicating what to do and or what will happen if one acts in a certain way. All of these ways increase certainty of matters in social life by sorting out what, for example, is of high quality and has worth, what is to be highly priced---what, in short, is good, and consequently, what is bad. By this differentiation and ordering, whatever things are at stake are positioned in relation to one another in a way that not only makes them different, but also orders them so that some are better than others, so that we can speak of a hierarchy (at least on an ordinal scale).

Forms can exist in domains, and the particular domains over which the resulting ordering has an impact may differ: the FIFA World Cup encompasses all national teams, in contrast to national cups, which order a much smaller part of the social world. Ordering may have large or small implications for social life. There may of course be conflict over values, there are processes for establishing forms, actors may react to what is happening, and much more. Moreover, reduced uncertainty in one domain does not necessarily result in increased uncertainty at a more global level. In many cases the forms reproduce order over time, and in this sense uncertainty is preserved at a certain level; the absence of a form would, in contrast, increase uncertainty. For example, the ranking of academic journals, which is done every year, will not necessarily diminish uncertainty from year to year, but the absence of any ranking would increase uncertainty. In a sense, uncertainty may in some cases be transformed, rather than fundamentally reduced. In other words, the complexity of social life must not diminish to implementation of any of the forms descried here. However, analysis of these implications, which affect observable outcomes, fall outside this article, as does any way to reduce uncertainty that does not directly include human preferences, wants, and interaction among people.[2](#Fn2){ref-type="fn"} I now turn to the three forms of uncertainty reduction.

Decision {#Sec4}
--------

Decisions can be made to establish general principles that reduce uncertainty by means of institutionalization as discussed above. But uncertainty can be reduced by decisions, without establishing general principle or institutionalized certainty. Decision, as discussed under this heading, represents an adjudication. The uncertainty is reduced for those "deciding" and for those "affected" by the decision. Here the focus is on those affected by others' decisions (e.g., Brunsson [@CR19]), not on decision theory. All decisions to affect others are attempts to accomplish something, by which one of several alternatives is chosen (Luhmann [@CR53], p. 399). Decisions made for others by one actor who has authority to determine good and bad is one obvious way of reducing uncertainty, at least until the next decision is made. The authority may arise from a variety of sources (Weber [@CR81]). There must, moreover, be a reference group (Merton [@CR58]) for which the decision supposedly matters to constitute a form. The decision may be made by the chief of a tribe, a king, or a head of a department, or by a governing body deemed legitimate to make decisions for a group of "others." There is often an expectation on the part of others that a decision is to be made (Luhmann [@CR53], p. 400). In other words, only if people orient themselves towards and, in a sense, accept a decision will it result in an ordering. Thus, not just anyone making a "decision" on what is good and bad, such as when one decides to have a cup of tea instead of coffee, will directly lead to an ordering of the world. The form of decision refers to case of *decisions* made for others, but not to decisions of general principles.

There are many examples of decisions that attempt to reduce uncertainty. A head of department may decide which faculty members get some of any extra research time that might be at his or her disposal and the coach of a soccer team decides who gets to play in the final. Promotion of potential candidates within a bureaucratic organization after a vacancy may cause uncertainty about who will get the position. This, in turn, may lead to stress, interaction, and attempts at positioning among candidates. A decision by a superior may diminish this uncertainty. Decisions, in their pure form, are unambiguous: if it is decided that A is better than B, and that B is better than C, there is no doubt as long as the decision is clear. Actors then react to the decision and adjust their behavior. This means that the decision has consequences.

Let us look at another example, the case of establishing what is---or to be more accurate, what is seen as---good fashion design. When a few well-known fashion designers take on the role of judge in a recurrent designer competition to award the "designer of the year," this constitutes a form for valuation.[3](#Fn3){ref-type="fn"} That the competition is recurrent and that every year established designers enact the role of judge mean that it is institutionalized, but not the outcome. The legitimacy of acting in this role is the joint effect of this institutionalized form and the established actors who are members of the jury. The verdict of this judge---in other words, what is valued in the form---is determined largely by the judge's status, which is a narrative that is linked to his or her name, and on which status is endowed. As a consequence of his or her verdict and the ranks the competitors obtain, their identities can be ordered in relation to each other. Uncertainty, consequently, diminishes among the competitors and those who have an interest in identifying "good" designers and avoiding those who are not "considered good".

A decision may diminish uncertainty about the things considered; the same decision may, however, disrupt other things, and consequently---seen in a wider context---increase uncertainty. Frequent and erratic decisions may thus hence increase uncertainty at a more global level. Leaders with the formal authority to decide, but who are deemed to be irrational or unpredictable may cause further uncertainty by their behavior. Their power increases where institutions and standards are few.

Valuation {#Sec5}
---------

A decision requires no external principle of justification; it is enough that the actor making the decision has legitimacy, though such principles of course may bring legitimacy about (Boltanski and Thévenot [@CR14]). The result is a decided order. In other cases the reduced uncertainty is emergent, i.e., resulting from interaction of actors leading to an outcome. Valuation is here defined as the form by which values are ascribed to actors or things based on peoples' views (preferences). It is thus directly contrasted with evaluation, in which value is given to actors or things based on standards that exist and are in use independent of individuals' views or preferences; valuation is about differentiation and evaluation is about uniformity. In contrast to a decision that requires only one actor who makes it, valuation is a result of mutual adjustment in a process in which many actors take part.

For valuation, not only do people's views matter; who these people are matters, too. More precisely, who they are is conceptualized in terms of identity---each has more or less status. This is to say that the "outcome" of the empirically existing instances of the forms, in terms of what is "good," boils down to peoples' "emotions," "preferences," or, more generally, what they value (cf. Kant [@CR45], e.g., pp. 198--203). The determination of what is good and bad can be made in discussions among members of a group, or by an "audience" (cf. Bourdieu [@CR15]; White [@CR84]; Zuckerman [@CR86]). In markets, for example, the relationship between those who perform something and their audience "constitute\[s\] one of the bases for evaluating the producers and their products" (Bourdieu [@CR16], p. 46; cf. Goffman [@CR38]). The audience, which may be composed of ideal-typical consumers (cf. White [@CR82]), by acknowledging the actors who take part and what they do, endows the actors, or indirectly endows their deeds, with status (Smith Spence [@CR73]). In this way, a rank order of actors making up the social structure emerges. Audiences thereby fulfill a "function" similar to the standard, although they cannot do this with a single act or decision, since they are not a single actor. But an audience, too, provides valuations and an ordering of alternatives that reduces uncertainty concerning what is "good" and "bad" (e.g., "in fashion," "out of fashion," and so on). The important difference, to a standard, is that what the audience will say about a "performance" cannot be known in advance. This kind of situation is common in the art world (Beckert and Rössel [@CR11]; Bourdieu [@CR16]; Menger [@CR56]; Plattner [@CR63]; Velthuis [@CR78]), among critics (Bourdieu [@CR17]), and in the markets in these spheres, as well as, generally speaking, in situations characterized by aesthetic values (Podolny [@CR64], p. 192; Warde [@CR80]), and where there are goods that have been called "singularities" by Lucien Karpik ([@CR48]). Fashion (Aspers and Godart [@CR7]) and valuation in its specific markets, such as valuing models (Entwistle [@CR29]; Mears [@CR54]), are perhaps the clearest examples of status forms of valuation, since no standard exists and also what is "beautiful" is subject to fashion. Fashion, for example, cannot be the result of a decision; it is instead the result of valuation (Aspers and Godart [@CR7]).

The form of valuation is made up of the relevant roles---those evaluating and those being evaluated. In this form, it is the institutionalized role structure that orders its environment. In contrast to decision, it is not one single actor who decides; the result is an outcome of many single decisions that jointly and in a process of mutual adjustment result in an outcome. The output is, as in the case of evaluation, numbers or the rank order of whatever is ranked. By ranking or valuing a "thing" an implicit value is created by the actors who are enacting the roles of the form.

Because status orders are made up of actors' identities and these are more stable than what they give off (for example, produced commodities or verdicts), it is more difficult than in cases based on a standard to know what to do to reshape one's status (for example, to move up the status ladder). This means that the influence an actor has depends on the position in the social structure. Consequently, actors' orientations are directed to one another, as indicated by the centrality of gossip (cf. White [@CR83], p. 167), because there is no standard to which those who ascribe value and those who are ascribed values can orient themselves.

In academia, we are familiar with the review process, of potential publications, proposals, positions, and promotions. This may be presented as a standard of quality, and, though reviewers tend to agree, it indeed matters who is reviewing, for example, proposals (Roumbanis [@CR71]). If it did not matter, we would, as authors, be able to predict whether a paper is good enough to be published even before submitting it to the journal. Furthermore, there would, in principle, be no rejections, because authors would easily know in advance whether the paper is good enough to be published. The high rejection rates of the top journals, which arguably uphold the scientific quality standard, indicate the uncertainty of success (cf. Menger [@CR57]).[4](#Fn4){ref-type="fn"}

Contest {#Sec6}
-------

Contest is a direct way to settle uncertainty between those taking part, a result that radiates to all those with an interest in the contest. Combat, duel (Ciklamini [@CR24]), or war, by which uncertainty about strength of the parties is settled, are noticeable examples since life is at stake.[5](#Fn5){ref-type="fn"} The outcome of the struggle is uncertain prior to the contest. The notions of struggle and conflict are correlates and above all discussed in terms of their forms and consequences by Georg Simmel (cf. Simmel's notion of *"Kampf"* (struggle); Simmel [@CR72], pp. 186ff). He was not, however, focusing on the issue of uncertainty.

A contest may start as a negotiation and end with violence, such as combat, or vice versa; in both cases actors are in opposition. Combat as a way of reducing uncertainty is, however, intransitive; it only settles the uncertainty between those combatting. For example, if boxer A won against B at a certain point in time and B around the same time won against C, it does not follow that A would definitely win against C.

In a contest there are rules determining what is to be done to achieve what is good and not so good---rankings, positions, and so on. Only those battling directly affect the outcome. Others' views, ideas, and arguments do not matter in the ideal-typical world. In reality, of course, things are less clear. A typical example is boxing (Øygarden [@CR60]). Before the match, uncertainty about the outcome may be high, and the stakes for those involved are extremely high. Uncertainty is both the reason for the match and what may cause the hype with speculation, betting, verbal assaults, and the enormous emotional charge that is often recognized between boxers in a title bout and in the audience. That one boxer has the great majority of supporters shouting his name may affect how he is doing, but no matter how much they shout, if he is knocked out he has lost. It is indisputably all over. The shouting crowd and many other things, too, will affect the judges and the referee. Even in cases in which there is a knock out or if the judges decide on the outcome using points, the notion of contest still makes sense; the interaction is direct, and the outcome follows from the contest.[6](#Fn6){ref-type="fn"} The contest, though it may work itself out in many ways, diminishes uncertainty; one participant loses; the one still standing after a boxing match is the winner. Provided that the rules have been followed, the result of the ordering cannot be undone and the outcome is[7](#Fn7){ref-type="fn"} publicly known. Also combat, duel, and war will make this clear.

There are several empirical examples by which outcomes of contests result in reduced uncertainty. E-sport, or competitive gaming, tennis matches, and boxing matches are examples that generate order resulting in rankings, prizes, or the like. In this way uncertainty about who is good and not so good is reduced, or even settled, at least temporarily. Games have a temporal structure; as soon as one game ends, the focus can shift to the next one. Associations capitalize on this insight to run leagues and not just single matches.[8](#Fn8){ref-type="fn"}

Several contests that are tied together in a system of rules represent a tournament or a sequence of connected contests. There are various forms of tournaments, such as the round-robin (everyone involved meets at least once), such as the soccer Premier League in the United Kingdom, or elimination tournaments in which only the winner stays in the competition, such as the US Open in tennis. In tournaments, the players meet and "fight" directly with one another to settle, normally according to rules, what (or who) is (good) and what is not (so good). The result is order. The World Cup in soccer is a contest that in the end produces certainty about quality of the teams: the cup and gold medals go to the winning team, the silver to the team that comes second, and so on. Moreover, a formal ranking list with all member nations is presented by FIFA. This ranking is not the result of a decision, not an evaluation, not a valuation, but results ultimately from the scores achieved on the pitch.

Contest also includes the idea of a combat, or even war, as a state of violent conflict with weapon by means of several battles over time between groups (states) (Janssen et al. [@CR43], p. 703), including a war of "all against all." Some computer games use a multiplayer online combat arena in which different players or teams of players are involved in the combat. The combat usually ends when the opponents' bases have been destroyed or when there is one part still standing. The teams can be ordered according to their scores, or one can create tournaments of different types to let more than two actors enter a combat.

Future research {#Sec7}
===============

This article presents three ideal-typical forms of uncertainty reduction. One form, decision, represents a decided order, and the other two forms result from mutual adjustment. As theoretical forms, they cannot be reduced to one another. Generally speaking, hybrid forms of ideal types exist in real life, as indicated above. One may, for example, think that the verbal duels in rap, known as "rap battles," are pure instances of what I have called "contest" in this article, but the language leads us astray. Although there are rules, the ultimate outcome of a contest---who wins---is a result of the onlookers' response: "The participant who is able to get louder and longer reactions from onlookers wins the verbal duel" (Lee [@CR52], p. 581). In contrast to boxing, in which a boxer may have the entire crowd of onlookers against him, but still win, the rap battle is much more a form of valuation, in which the onlookers' preferences diminish the initial uncertainty concerning who is the best rapper of the two.

This article cannot cover all relevant aspects or the consequences that follow from uncertainty reduction. Let me briefly mention six additional issues that might be addressed in relation to a discussion of these forms. The first concerns material objects. I have been discussing almost exclusively about actors---mainly humans---in this article. Uncertainty reduction refers also to material objects, as well as organizations that gain meaning in these social processes. Only actors can make decisions and be accountable for them. In contests, actors take part, directly, or indirectly; for example, when cocks are fighting, as described by Geertz ([@CR37], pp. 412--453). Objects, such as antiquities, cars, or model trains, are valued by people in relation to other objects, such as horses and chairs, but they are ordered in relation to other antiquities, cars, and real trains.

Objects do not have reflexive capacity, and therefore cannot directly operate as an audience, for example in cases of valuation. Material objects can, however, be part of the ranking process of humans or other objects. When athletes compete, for example, by running the 110-m hurdles, the time is measured by a clock connected to other technical devices, including a camera, track, hurdles, and a computer. Standards or "technologies" and thus "equipment" can replace objective judges of standards (a "quality") to "test and measure the goods" (Callon et al. [@CR23], p. 199), which is to say that man can be a function of, and thus ordered by technology (Heidegger [@CR40], p. 271). However, human beings can also become integrated in technological production systems. Timber trading is a good example of how this can be done. Timber is traded in different quality segments, and in this "pure" standard market, the evaluation of the quality classes of timber is made by humans (Aspers [@CR5]). Generally speaking, we should address the relations among the taken for granted lifeworld, codified institutions, and the "outcome" of the forms of uncertainty reduction (Husserl [@CR42]).

The second issue that we can discuss in more detail is how these ideal-typical forms are fashioned and how they disappear. These forms, for example, may be the result of individual decisions; either as a result of mutual adjustment ("spontaneous order") or a decided order. The forms discussed may last for a very short period, but most, such as markets, are fairly stable (Burt [@CR21]). The forms may also gradually turn into one another. Weber ([@CR81], pp. 770--771) describes how combat is gradually transformed into the "thing" (the old Scandinavian term for a place to settle disputes among free men without weapons), and gradually come to rest on formal law (evaluation/valuation) (cf. Elias [@CR28]). How do forms turn into other forms, and does it matter?

A third issue concerns the domain of the forms. Within the economy, much uncertainty is reduced by markets. Markets order alternatives and provide values for them. Firms gain identities in producer markets (White [@CR82]) as a result of valuation by customers. In other markets, typically with homogenous products---such as the trading of stocks on an exchange (Walras [@CR79])---evaluation of price appears to dominate; the stocks themselves are identical and "given." Decisions on value may occur in some cases; this is typical of socialist economies (Gronow [@CR39]). Direct physical "contests" are today unusual in the market economy, but negotiations, a peaceful form of "contest," are central. We cannot, therefore, rule out any form in any sphere of life. To what extent do the forms format the domains?

A fourth issue is the important fact that these forms provide not only certainty and order "within" a domain. Perhaps just as important, but less discernible, is their gatekeeping function. Only those who are considered with regard to, or included in, the form are serious contenders for being seen as "good." To be a boxer one has to have been in the ring. To be an academic one needs an advanced degree, and to be an author one must be published. Many try to take part in different activities, but are refused entry; this is particularly true of those trying to publish their first novel, who often are involved in a process with limited chances of success and requires much effort and commitment from those trying (Furst [@CR36]). Which forms are "efficient" for gatekeeping and which are open for entry?

A fifth issue is the existential concern that often follows from judgment concerning one's body, performances, deeds, or way of life. Regardless of whether one wants to take part in a form or not, one has to relate to the "verdict"; simply because what people are and do is crucial for their identities (Mears and Finlay [@CR55]; White [@CR85]). Thus, actors may be affected by what others do; they may be "pulled in" to be evaluated, valued, or even challenged in contests, even against their will. This exposure causes reactions, leading to actions and reactions (Espeland and Sauder [@CR30]; Furst [@CR36]). But what existential consequences can we observe?

A sixth issue concerns the more general societal level. In this article the theme is uncertainty reduction. But uncertainty is also a trigger for commercial activity, creative work, and much more (Menger [@CR57]; Beckert [@CR9]). Uncertainty is often produced, for example to make profit, and the large number of television shows that are based on competitions and eliminations, sets the scene for those who profit from "uncertainty." Many of the various television shows use the forms described in this article to combine the effects of enhanced uncertainty, before it is eventually diminished when the winner eventually emerges. It is important to realize that the forms themselves are not inherently oriented towards the betterment of the world. A completely certain world is not imaginable. What do the attempts of uncertainty reduction lead to?

Conclusion {#Sec8}
==========

Fundamentally, this article addresses uncertainty about values; ultimately "good" and "bad". Uncertainty is persistent, and even uncertainty reduction itself is an uncertain endeavor (Knight [@CR49], pp. 347--348); that is to say that uncertainty is a condition of human life. Over time, the types of uncertainty we face have changed. By institutionalization, by setting laws, and by producing scientific knowledge decreased some uncertainties have decreased, while others have been created. Most of us can be fairly certain that there will be food on the table tomorrow, but perhaps not be certain that the globe can accommodate our pollution. Uncertainty is fundamentally about not knowing the future. Institutionalized certainty increases predictability and increases our chances of controlling the future.

Based on the idea of forms as means of uncertainty reduction, this article makes two contributions. The first is the presentation of the forms: decision, valuation, and contest. The findings of the article adds to the ongoing discussion of valuation and evaluation, partly by clarifying the role of uncertainty and how there are different forms by means of which this uncertainty may be reduced.

The more theoretical contribution of this article offers tools for addressing and understanding the activities, processes, and trends that point towards the increased role of competitions, rankings, auditing, and evaluations in social life. The process of marketization (Braudel [@CR18]; Polanyi [@CR65]), which indeed has accelerated over recent decades, increases the number of areas of uncertainty. Furthermore, in some markets there are no standards to adjudicate between the different offers, typically status markets, in other markets the presence of standards enable just this type of comparison of "quality" of the offers, of which type the perfect market with homogenous products is the extreme instance. Moreover, the increased role of auditing (Power [@CR66]), evaluation (Dahler-Larsen [@CR25]), and standardization (Brunsson, Jacobsson, and associates [@CR20]; Busch [@CR22]), including the construction of tools that can be used to evaluate and benchmark risks (Power [@CR67]), should be seen as ways in which actors try to control and bring more certainty to the world, often by trying to impose it using standards, and thereby diminishing the role of valuation. Some of these standards and evaluations are global, which is notable in relation to global markets, but also non-governmental organizations and standard settings, in which firms, organizations, and even states are evaluated according to the same standard, such as accounting standards (Djelic and Quack [@CR26], pp. 174--181). The forms of uncertainty reduction do not make the world "certain" in any sense; these are mere attempts to, as we have seen, both create and reduce uncertainties.

There are of course always ways of questioning institutionalized knowledge, but the point is that the decision is made on the existing evidence. Uncertainty, moreover, is not ontological but epistemic and implies, for example, that though one knows that there is a restaurant on the block (an "ontological" statement), one does not yet know whether it is good or not in relation to other restaurants (an epistemic statement).

Randomization is one alternative, but it is hard to see how it reduces uncertainty, it merely shifts the basis of uncertainty. Aristotle ([@CR2], e.g., pp. 250, 252), for example, suggested that the lottery offers a way of addressing the uncertainty of elections to avoid. A lottery distributes whatever is at stake based on probabilities, but it does not in any relevant way represent interdependent interaction.

For an example, see <http://designaward.hm.com/> (accessed December 07, 2017).

The review process, though it to some extent resembles the form of evaluation, also resembles the form of valuation, both in academic review processes (Lamont [@CR50]) and in publication of novels (Furst [@CR36]).

Elias points out that the war and fighting was normal among knights in the Middle ages, but this violent way of interaction gradually gave way to more civilized interactions ([@CR28], pp. 263--301).

Corrupt judges who make their decision regardless of course do exist. And in contemporary military conflicts it is the international audience, not least United Nation's Security Council, which decides on outcomes. But with the strong external parties making decisions, we can no longer speak of a strong, or "pure," form.

In even more violent games, such as MMA this is even more distinct, since it less frequently comes to a draw.

Football was originally a single game activity; only later were leagues (and tournaments) organized (Döllinger [@CR27]).

Financial support for this research is provided by the European Research Council, CEV (263699). The author is grateful for the comments by the *Theory and Society* Editors and reviewers and members of the Uppsala Laboratory of Economic Sociology, Ilmari Käihkö and Lambros Roumbanis, Elena Esposito, and Tobias Werron.


--------------------------------------------------

--------------------------------------------------

1. Introduction {#sec1}
===============

Molecular oxygen is necessary for the survival of most complex multicellular organisms. The necessity of oxygen comes from its role in aerobic respiration, a process of extracting energy from food that is approximately 19 times more efficient than its anaerobic counterpart. In eukaryotes, aerobic respiration is carried out in the mitochondria (descendant of an aerobically respiring bacterium) by a series of electron transfer reactions that are coupled to the generation of a proton gradient. This proton gradient is used to generate the cellular fuel adenosine triphosphate (ATP). The residual energy of the spent electrons is consumed in the reduction of molecular oxygen (O~2~) to water (H~2~O). Aerobic respiration cannot occur without this last step, but the reliance on oxygen as the final electron acceptor poses a continual threat of oxidative damage to aerobically respiring organisms.

The threat posed by oxygen comes largely from its conversion to the free radical superoxide (O~2~ ^•−^) rather than water \[[@B1]\]. Superoxide is a highly reactive short-lived ROS. Detoxification of superoxide and other ROS is performed by antioxidants, which convert ROS to less reactive molecules. The antioxidant enzyme superoxide dismutase (SOD) converts superoxide to water and hydrogen peroxide (H~2~O~2~), which is another ROS and a potent oxidising agent (see [Figure 1](#fig1){ref-type="fig"}) \[[@B2]\]. Under normal conditions, antioxidants help to prevent oxidative damage by using electrons to reduce ROS, thus inhibiting ROS from oxidising other molecules. However, an imbalance between ROS production and detoxification can result in oxidative stress. Numerous studies have found that high ROS levels are damaging to DNA, RNA, proteins, and lipids \[[@B3]--[@B6]\]. Additionally, oxidative (ROS) damage is thought to be one of the major causes of ageing, according to the free-radical theory of ageing \[[@B7]\]. However, the free-radical theory seems to conflict with recent findings regarding the role of ROS in redox signalling, findings that have unveiled an additional mechanism for oxidative toxicity besides simply macromolecular damage.

ROS are now known to do more than indiscriminately damage macromolecules; they function as important signalling molecules (reviewed by D\'Autréaux and Toledano \[[@B8]\]). For instance, superoxide and H~2~O~2~ are part of a second messenger system involved in controlling subcellular redox states; modulating protein activation and turnover; regulating gene expression; and mediating extracellular signalling \[[@B9]\]. For this crucial messaging system to function, the levels of superoxide/H~2~O~2~ must be maintained at concentrations far below the level of toxicity. Therefore, ROS are unlikely to cause macromolecular damage under normal *in vivo* conditions. Consistent with this idea, recent studies have found that mitochondria produce superoxide/H~2~O~2~ at levels much lower than those previously estimated \[[@B10]--[@B12]\].

Jones \[[@B13]\] recently proposed the "redox hypothesis" as an alternative to the free-radical theory of ageing that accommodates recent discoveries in redox signalling. This hypothesis states that changes to redox state, rather than oxidative damage, cause aging and age-related diseases. The redox state of a cell, cellular compartment, or molecular system is a measure of the availability of chemically reactive electrons. In the reducing state, such electrons are more abundant whereas in the oxidising state they are less abundant. With regards to oxidative stress, the redox hypothesis suggests that an increase in ROS levels can be deleterious if the resulting oxidative shift in redox state causes a disruption to redox signalling.

To date much of what has been discovered in redox biology has resulted from work in *E. coli, S. cerevisiae*, mammals, and plants. While unicellular organisms such as *E. coli*and *S. cerevisiae*offer obvious advantages as model organisms due to their relative simplicity, short generation times, ease of culturing and maintenance, and so forth, they cannot be used to study systems/mechanisms unique to multicellularity in general, and animals in particular. Although not to the same extent, *C. elegans* offers similar advantages to working with the simple unicellular systems above, with the addition of being a multicellular, metazoan system allowing for much more of what is discovered in this organism to be extrapolated to research in other animals, including humans. This article seeks to scope out the redox proteins/systems of *C. elegans* as a resource for future work on redox signalling and oxidative stress within this model organism. In addition, this article will briefly explain the function of each protein family and how it relates to redox signalling and oxidative stress, with specific mention of what has been discovered in *C. elegans.*

2. Redox State, Redox Signalling, and Oxidative Stress {#sec2}
======================================================

2.1. Redox-Sensitive Cysteine Switches {#sec2.1}
--------------------------------------

The majority of available reactive electrons in a biological redox system are found in cysteines (as in the abundant tripeptide glutathione). Cysteine is an amino acid with a thiol (sulfur) group that is easily oxidized. When oxidised, two thiols in close proximity to one another can bond to form a disulfide. Formation of disulfides is important in protein folding and maintaining protein structure, however, a small fraction of thiols have another function: redox-sensitive switches (see [Figure 2](#fig2){ref-type="fig"}) \[[@B14]--[@B18]\]. These redox-sensitive thiol switches are generally found at the surface or in the active sites of proteins. Change from a thiol state to a disulfide can alter a protein\'s shape and function. The propensity for a redox-sensitive switch to be in one state or the other (thiol or disulfide) is dependent on the redox state of the cellular compartment and/or redox system to which it belongs. Therefore, the activity and conformation of a large number of proteins can be altered by changes in redox state \[[@B13]\].

2.2. The Redox State as a Signal {#sec2.2}
--------------------------------

Redox signalling relies on oxidants and reductants that react preferentially with redox sensitive cysteines. Methionine also contains a redox active sulfur and is used in redox signalling \[[@B19]\], but this occurs to a lesser extent and is not discussed in this article. The most important oxidants that participate in signalling-related modification of cysteine residues are hydrogen peroxide (H~2~O~2~), a reactive oxygen species, and nitric oxide (NO), a reactive nitrogen species \[[@B20]\]. The focus of this article will be H~2~O~2~ as the signalling role of NO has been reviewed extensively \[[@B21]\]. Although a potent oxidant, the signalling role of H~2~O~2~ is primarily limited to redox-sensitive cysteine and methionine residues \[[@B22]--[@B24]\]. The fact that much of the cellular H~2~O~2~ is formed via the dismutation of superoxide (O~2~ ^•−^) by SOD enzymes means that the amount of superoxide produced directly contributes to the levels of H~2~O~2~ in a cell or cellular compartment \[[@B9]\]. This gives superoxide an important indirect role in redox signalling. In animals, superoxide is primarily generated by NADPH oxidase (NOX) \[[@B25]\], Coenzyme Q~10~ \[[@B9], [@B26]\], and Complex I and III \[[@B12]\] of the mitochondrial electron transport chain.

The difference in redox states between organelles results from differences in the ratio between H~2~O~2~ and other thiol oxidants and various disulfide reductants/antioxidants. Because the redox state can alter protein conformation and reactivity, it can be used to activate or inactivate protein function. For example, the redox state of two different cellular compartments regulates DNA binding of the nuclear factor erythroid 2-related factor 2 (Nrf-2) transcription factor \[[@B27]\]. Nrf-2 is activated in the cytoplasm by an oxidative signal that results in translocation to the nucleus. However, in order to bind to DNA in the nucleus, a redox-sensitive cysteine must be reduced. This demonstrates specificity in redox signalling between different cellular compartments, for which the redox state of the compartment must be appropriate to its role (see [Figure 3](#fig3){ref-type="fig"}) \[[@B28]\].

2.3. Major Redox Systems: Glutathione, Thioredoxin, and Cysteine {#sec2.3}
----------------------------------------------------------------

Two central thiol/disulfide couples work in the reduction of protein disulfides as counterparts to H~2~O~2~ and other oxidising agents to control redox state: the glutathione/glutathione disulfide (GSH/GSSG) couple (mediated through glutaredoxins) and the active site dithiol/disulfide of thioredoxins (Trx~red~/Trx~ox~; see [Figure 4](#fig4){ref-type="fig"}) \[[@B29]\]. Glutathione and thioredoxins each interact with a different subset of proteins thus forming distinct redox systems. The redox state of one of these systems may differ from the other even in the same cellular compartment \[[@B27], [@B30]--[@B34]\]. As well as glutathione and thioredoxin working as reducers of protein disulfides, a third thiol/disulfide couple, cysteine/cystine, has also been proposed by Jones et al. \[[@B32]\] as a possible oxidiser of protein dithiols used in redox regulation and signalling. Changes to the ratios of these three redox couples have been observed in various disease states, and it is possible that a gradual loss of redox state homeostasis over time contributes to ageing and age-related diseases \[[@B13]\].

2.4. Redox State versus Transient Local Redox Signalling {#sec2.4}
--------------------------------------------------------

The redox state of the various redox systems in a cell or cellular compartment must normally reside within a narrow range, not only to maintain the constitutive signals resulting from the homeostatic redox state itself, but also to allow for meaningful thresholds, where a change in redox state outside the typical range of a cellular compartment can be used to signal a change in metabolism, environment, or stress. In addition to global signals at the level of an entire organelle, generation of H~2~O~2~ with no measureable effect on overall redox state of the various redox systems in a cell or cellular compartment may still have a very real effect on proteins in close proximity to the site of generation, resulting in a transient local signal---an idea explored more fully by Dwivedi and Kemp \[[@B35]\]. An example of modulation of signalling by transient local changes rather than a global shift in redox state is altered protein phosphorylation \[[@B36]\] resulting, for example, from the inactivation of protein tyrosine phosphatases \[[@B37], [@B38]\], MAP kinase phosphatases \[[@B39]\], and PTEN \[[@B40]\]. Within the redox hypothesis paradigm, much of the toxicity of oxidative stress could result from an oxidative shift in redox state within one or more cellular compartments. This shift would likely disrupt transient redox signalling as well as perturb the regular function of redox regulated proteins within these compartments. The end result could still be pathological oxidative damage to cellular components even though the cause could be indirect.

3. Phylogenetic Analysis {#sec3}
========================

3.1. Thiol/Disulfide Redox Regulators {#sec3.1}
-------------------------------------

### 3.1.1. Thioredoxin and Related Proteins {#sec3.1.1}

Thioredoxin (TRX) was first discovered in *Escherichia coli* as a hydrogen donor for ribonucleotide reductase \[[@B41], [@B42]\]. Since the initial characterisation, TRX proteins have been recognized as more general disulfide reductases that are found in all phylogenetic domains of life. TRX proteins have a distinct structure that encompasses the active site dithiol known as the "thioredoxin fold." This domain is also found in a variety of related proteins including glutaredoxin, protein disulfide isomerase, peroxiredoxin, and glutathione S-transferase \[[@B43]\]. Each of these protein families is discussed in other sections of this article. The characteristic CGPC active site dithiol motif can be oxidised to a disulfide to release electrons that are used to reduce redox-sensitive disulfides within a wide range of target proteins \[[@B44]\].

TRX proteins were long thought to be primarily involved in restoration of redox-sensitive disulfides to their reduced state after being oxidised by ROS. In particular, ROS scavengers such as peroxiredoxin require the activity of TRX proteins for their regeneration. However, the role of TRX as a disulfide reductase is now known to be important for immune signalling \[[@B45]\], regulating transcription factors \[[@B46]\], and modulating cellular signalling \[[@B47]\].

Sequence comparisons and phylogenetic analysis revealed that *C. elegans* possesses twenty proteins closely related in sequence and length to TRX proteins in yeast, humans and fruit flies. Seven of these twenty proteins contain the characteristic CGPC active site sequence required for TRX activity. Five of these CGPC containing proteins, TRX-1, TRX-2, TRX-4, Y45E10.A, and Y55F3AR.2, are closely related to proteins of known TRX activity in *S. cerevisiae, H. sapiens, and D. melanogaster*. Human cytosolic thioredoxin 1 (TRXN1) has roles in the activation of transcription factors activator protein-1 (AP-1) \[[@B48]\] and nuclear factor kappa B (NF*κ*B) \[[@B49], [@B50]\], as well as in immune signalling \[[@B45], [@B51]\]. Although orthology is unclear between human TRXN1 and *C. elegans* TRX proteins ([Figure 5](#fig5){ref-type="fig"}), both human TRXN1 and *C. elegans* TRX-1 are cytoplasmic \[[@B52]\]. TRX-1 is expressed in intestinal cells as well as the ASJ pair of neurons and modulates adult lifespan extension induced by dietary restriction \[[@B53]\]. Human mitochondrial TRXN2, for which there is likely orthology with *C. elegans* TRX-2, is part of a mitochondria-dependent superoxide/TRXN2/apoptosis signal-regulating kinase 1 (ASK-1) apoptosis signalling pathway \[[@B54]\]. In *C. elegans* interactions of TRX-1 and TRX-2 with exonuclease 3 (EXO-3) and *C. elegans* p53-like protein (CEP-1), appear to play a role in neural structure and function as well as ageing \[[@B55]\]. Some of the functions of TRX are redox independent. For example, TRX-1 modulates the activity of the insulin-like neuropeptide DAF-28 in ASJ sensory neurons in the head during *C. elegans* dauer formation. This function was retained even after the redox activity of the protein was disrupted by replacing the two Cys residues of its active site with two Ser residues \[[@B56]\]. In regard to thioredoxin-like (TRXL) proteins, the close relationship found between Y45E10.A and Y55F3AR.2 and the thioredoxin-like proteins of humans (TXNL1) and *D. melanogaster* (TXL) suggests possible orthology. Functions of the TRXL proteins are yet to be determined.

The other two *C. elegans* homologs containing the CGPC sequence, TRX-3 and TRX-5, were found as part a clade containing nucleoredoxin (NXN) and related proteins. Humans possess a single NXN, which contains a CPPC active site, and two nucleoredoxin-like proteins (NXNL1 and NXNL2). NXN (reviewed in \[[@B57]\]) has been shown to function as a redox regulator of gene expression \[[@B58]\] and a negative regulator of toll-like receptor signalling \[[@B59]\]. It also sustains Wnt/ß -Catenin signalling \[[@B60]\]. Six out of the nine *C. elegans* proteins within the NXN clade contain the CPPC NXN active site sequence, suggesting a possible expansion of the NXN subfamily. Proteins within this NXN clade are also closely related to the 16-Kilodalton class of thioredoxins described in the parasitic nematode *Brugia malayi* \[[@B61]\].

### 3.1.2. Glutathione {#sec3.1.2}

Reduced glutathione (GSH) is a tripeptide consisting of glycine, cysteine and glutamic acid. GSH synthesis is performed in a two-step ATP-dependent process. In the rate-limiting first step *gamma*-glutamylcysteine synthetase (GCS; see [Table 1](#tab1){ref-type="table"}) synthesises *gamma*-glutamylcysteine from L-glutamate and cysteine. In the second-step glutathione synthetase (GSS; see [Table 2](#tab2){ref-type="table"}) adds glycine to the C-terminal of *gamma*-glutamylcysteine. These enzymes are highly conserved in eukaryotes (Tables [1](#tab1){ref-type="table"} and [2](#tab2){ref-type="table"}) and even in prokaryotes (not shown).

Glutathione plays an essential role in antioxidant defence as a source of electrons for antioxidant enzymes such as glutaredoxins and peroxidases \[[@B62]\]. The high (millimolar) concentrations of glutathione in the cell ensure an abundance of electrons for these antioxidant systems and thus provide a robust buffer against oxidative shifts in redox state \[[@B63]\]. GSH also serves as a reversible cysteine adduct. Glutathione S-transferases (GSTs) can form mixed disulfides between glutathione and redox-sensitive cysteine thiols of proteins. This activity can be used to regulate protein activity and under oxidizing conditions can prevent irreversible oxidation of thiols to sulfinic (SO~2~H) and sulfonic acid (SO~3~H) oxoforms \[[@B64], [@B65]\]. GST can also conjugate glutathione to xenobiotic compounds as part of a detoxification response \[[@B66]\] and to a fatty acid in the synthesis of prostaglandin hormone \[[@B67], [@B68]\].

The ratio of reduced glutathione to glutathione disulfide within a cellular compartment, that is, \[GSH\]^2^/\[GSSG\], determines its redox state. High \[GSH\]^2^/\[GSSG\] ratios such as those found in the mitochondria, cytoplasm, and nucleus ensure that the majority of redox-sensitive protein switches within these compartments are in the reduced (--SH) state \[[@B69]\]. Maintenance of the proper \[GSH\]^2^/\[GSSG\] ratio ensures redox homeostasis, whereas changes to this ratio provide a simple means to adjust the redox state between compartments as well as within compartments under different physiological conditions. For example, changes in redox state have been found to trigger responses associated with defence against particular biotic or abiotic stressors \[[@B70]\]. In plants, changes to the cellular glutathione pool havebeen shown to elicit pathogen resistance responses \[[@B71], [@B72]\]. These examples demonstrate that global changes to protein activity and widespread changes to signalling can be achieved quite readily by simply changing the redox set point within a cellular compartment.

### 3.1.3. Glutathione Disulfide Reductase and Thioredoxin Reductase {#sec3.1.3}

When oxidised, the reduced (thiol) states of glutathione and TRX enzymes are restored by glutathione disuflide reductase (GSR) and TRX reductase (TRXR), respectively, using electrons obtained from NADPH ([Figure 4](#fig4){ref-type="fig"}) \[[@B73]\]. The maximum likelihood tree of this family forms three clades ([Figure 6](#fig6){ref-type="fig"}). GSR is absent from *D. melanogaster* and has been substituted by a novel glutaredoxin-thioredoxin reductase fusion protein (TRXR-1) \[[@B74]\]. *S. cerevisiae* possess proteins with TRXR enzymatic activity, however, these proteins are evolutionarily unrelated to the animal forms and are thus not represented on the phylogenetic tree \[[@B75]\]. Interestingly, TRXR-1 is the only selenocysteine containing protein in *C. elegans*, and both TRXR-1 and GSR-1 are essential for proper moulting \[[@B76]\].

The third clade of this protein family is composed of dihydrolipoamide dehydrogenase (DLD) orthologs. DLD is similar in structure to both TRXR and GSR, however, its functions are quite different. DLD is a component of various protein complexes located within the mitochondrial matrix, including pyruvate dehydrogenase, alpha-ketoglutarate dehydrogenase, and the branched chain amino acid-dehydrogenase complexes as well as the glycine cleavage system. In these complexes DLD is required for regeneration of oxidised lipoamide from the reduced dihydrolipoamide cofactor. The pyruvate dehydrogenase and branched chain amino acid-dehydrogenase complexes (2-Oxo acid dehydrogenase complexes) are thought to play a role in redox regulation via the reduction of thioredoxins \[[@B77]\]. In addition, the alpha-ketoglutarate dehydrogenase complex has been found to be a generator of H~2~O~2~ \[[@B78], [@B79]\].

### 3.1.4. Glutaredoxin {#sec3.1.4}

Glutaredoxin (GLRX) uses electrons extracted from GSH to reduce redox-sensitive disulfides of a variety of proteins, thereby modulating enzyme activity \[[@B80]\]. GLRX can also carry out oxidative cysteine glutathionylation of proteins resulting in protein-glutathione mixed disulfides \[[@B70]\], and the reverse reaction, deglutathionylation (i.e., the reduction of the mixed disulfides), restoring the protein to its unmodified form. GLRX enzymes come in two forms: a monothiol form that contains a single cysteine in the active site and a dithiol form that contains two cysteines in the active site. These two forms differ in function and can be seen as distinct clades in the phylogenetic tree ([Figure 7](#fig7){ref-type="fig"}). The reduction of protein disulfides as well as the oxidative formation of protein-glutathione-mixed disulfides are both catalysed via dithiol mechanisms, whereas reductive deglutathionylation is performed by a monothiol mechanism \[[@B81]\].

One of the GLRX clades contains only monothiol proteins with the CGFS active site sequences, whereas the other clade contains mostly dithiols with a variety of active site sequences, as well as a few proteins with a single cysteine active site. The mammalian GLRX3 (PICOT), likely ortholog of *C. elegans* GLRX-3, has been characterised as an iron-sulfur binding protein possibly regulated by ROS and reactive nitrogen species \[[@B82]\]. GLRX3 is essential for embryonic development, postembryonic growth, and heart function \[[@B83]\]. Human GLRX1 has a number of roles including the regulation of redox signal transduction and protein translocation \[[@B84]\], caspase-3 signalling in tumor necrosis factor-*α*-induced cell death \[[@B85]\], and angiotensinII redox signalling via glutathionylation of Ras \[[@B86]\]. *C. elegans*GLRX-10 is closely related to human GLRX1, both of which are nested within a subclade of dithiol GLRX enzymes, all of which except GLRX2 contain the CPYC active site sequence. F10D7.3 is somewhat similar to Grx6p and Grx7p from *S. cerevisiae*, although the difference in size and active site makes orthology unlikely. GLRX-21, GLRX-22, and ZC334.7 were found to group closely with *S. cerevisiae* Grx8p, but again differences in size (particularly the larger size of ZC334.7) and the sequence of their dithiol active sites makes orthology unlikely. To date very little work on GLRX proteins has been performed in *C. elegans*. Worth mentioning, however, is a paper published in 2010 which found that GLRX-21 functions in the prevention of selenium-induced oxidative stress \[[@B87]\].

### 3.1.5. Protein Disulfide Isomerase {#sec3.1.5}

The protein disulfide isomerase (PDI) protein family is composed of a large and diverse group of enzymes, most of which contain at least one TRX-like domain with a CxxC active site motif. PDI enzymes reside in the endoplasmic reticulum (ER) where their usual function is to catalyse protein folding. The active site cysteines of PDI are used in thiol-disulfide exchange between cysteine residues of the substrate proteins. This PDI thiol-disulfide exchange enables proteins to rapidly aquire the correct configuration of structural disulfide bonds required to achieve their native structure \[[@B88]\]. PDI functions in four different chemical reactions: (1) the oxidation of protein disulfides, using GSSG as the electron acceptor; (2) the reduction of protein disulfides, using GSH or NADPH as the electron donor; (3) the deglutathionylation of mixed disulfides; (4) the isomerization (rearrangement) of intra-molecular disulfides. These functions of PDI proteins require the more oxidised redox state of the ER \[[@B89], [@B90]\]. In addition to passively relying on a more oxidised redox state, it has also been suggested that some PDI proteins may play a role in redox regulation \[[@B91]\].

In *C. elegans*, Karala et al. \[[@B92]\] analysed and compared the activities of PDI-1, PDI-2, and PDI-3 and found that all three displayed thiol-disulfide exchange activity, but that each showed a difference in reactivity towards various protein substrates. RNAi knockdown of the *pdi-2* and *pdi-3* genes results in an unflolded protein response, which suggests PDI-2 and PDI-3 are indeed required for proper protein folding \[[@B75]\]. Additionally, Winter et al. \[[@B93]\] studied PDI-1, PDI-2, and PDI-3 and found that PDI activity is required for embryonic development and proper formation of the extracellular matrix.

Comparision of PDI sequences and phylogentic analysis revealed a number of unnamed proteins with likely othology to known human PDIs, as well as a few small gene expansion events both in *C. elegans* and human. The end result is 19 proteins in both *C. elegans* and human, but only 8 in *D. melanogaster* and 4 in *S. cerevisiae*(see [Figure 8](#fig8){ref-type="fig"}). Human P4HB (PDI/PDIA1), PDIA3 (ERp57), and PDIA4 (ERp72)---the probable orthologs of *C. elegans* PDI-2 (or PDI-1), PDI-3, and C14B9.2, respectively---all react readily with peptide dithiols *in vitro* to form disulfides \[[@B94]\]. *C. elegans* PDI-1 is peculiar in that the N-terminal active sites of all of its closely related homologs contain the characteristic PDI sequence CGHC, whereas in *C. elegans* the glycine has been replaced by a valine (CVHC). The similarity of *C. elegans* PDI-1 to human P4HB in size and sequence would suggest an orthologs relationship between these two proteins. However, human P4HB can be found as the beta subunit of prolyl 4-hydroxylase (P4H),a complex which hydroxylatesprolinetohydroxyproline in the production ofcollagen \[[@B95]\]. In *C. elegans*, the beta subunit of the P4H complex is PDI-2 \[[@B96], [@B97]\], making PDI-2 the more likely ortholog of P4HB, despite PDI-2 being \~100 amino acids shorter than *C. elegans* PDI-1 and human P4HB. Regarding the other PDI homologs, Ko and Chow \[[@B98]\] found that the DPY-11 protein of *C. elegans* that is a possible ortholog of human TMX1, is necessary for body and sensory organ morphogenesis, which they argue is due to its role in substrate modification in the hypodermis. In terms of redox signalling, human P4HB has been found to work antagonistically with TRXN1 in the regulation of nuclear factor kappa-light-chain-enhancer of activated B cells (NF-*κ*B)-dependent gene expression: TRXN1 actives the NF-*κ*B pathway, whereas P4HB expression suppresses NF-*κ*B activity in a dose-dependent manner \[[@B99]\]. Other possible PDI orthologous relationships involving *C. elegans* include human TMX3, *D. melanogaster* CG5027, and *C. elegans* ZK973.11; human TXNDC12 (ERp18) and *C. elegans* Y57A101.23; *D. melanogaster* CG4670 and *C. elegans* F47B7.2; human PDIA6 (p5), *C. elegans* TAG-320 and *C. elegans* Y49E10.4 (see [Table 3](#tab3){ref-type="table"}). Although, whether any of these proteins participate in redox signalling remains to be investigated.

3.2. Superoxide/H~2~O~2~ Generation and Removal {#sec3.2}
-----------------------------------------------

### 3.2.1. NADPH Oxidase {#sec3.2.1}

The NADPH oxidase (NOX) system was first described as a system used by mammalian phagocytes in the production of superoxide as a response to infection by microorganisms \[[@B100]\]. The core enzyme of this microbial defence system is NOX2, which---under the regulation of its p22phox, p47phox, p40phox, p67phox, and RAC subunits---catalyses the formation of large amounts of superoxide, which in turn is converted to additional reactive oxygen species. The resulting high ROS levels results in the death of invading microbial pathogens. A total of seven NOX homologues exist in mammals, including NOX1 through 5 and the dual oxidases DUOX-1 and DUOX-2. Most of these homologs generate much lower of levels of ROS than NOX2 and are found in a much wider range of cell types. Lambeth \[[@B25]\] presents a case for the importance of NOX proteins in the generation of ROS signals, but this hypothesis has not yet been rigorously tested.

Most important to a discussion of NOX activity in *C. elegans* is the function of DUOX, as the only two NOX homologs in *C. elegans*, DUOX-2 and BLI-3, are related to the DUOX proteins of humans and *D. melanogaster* ([Figure 9](#fig9){ref-type="fig"}). These proteins contain an additional peroxidase domain not found in the NOX1 through 5. DUOX serves a dual role in both the generation of superoxide and catalysis of reactions in the extracellular matrix using H~2~O~2~. The subunits used to regulate NOX2 are not used in the regulation of DUOX enzymes. Additionally, blastp searches do not reveal homology to any of the NOX2 regulating subunits in *C. elegans*. It is important to note the DUOX has not been implicated in ROS signalling, and there is evidence to suggest that in mammals they instead play a role in the biosynthesis of thyroid hormones in the extracellular matrix \[[@B101]\]. In *C. elegans*, the DUOX homolog BLI-3 functions in tyrosine cross-linking in the extracellular matrix \[[@B102], [@B103]\]. Further research may yet reveal additional mechanisms for the DUOX homologs in *C. elegans*.

### 3.2.2. Superoxide Dismutase {#sec3.2.2}

SOD proteins are generally regarded as antioxidants responsible for eliminating the ROS superoxide. An alternative view is that these enzymes generate H~2~O~2~ for use in redox signalling \[[@B104]\]. In this regard, the levels of SOD activity could be important in regulating H~2~O~2~ levels. A signalling role for SOD goes well beyond the popular view that SOD is responsible for the complete removal of superoxide from cellular compartments for the sole purpose of preventing oxidative damage.

Much of the recent research on SOD enzymes has focused on their possible role in the ageing process, in experiments designed to test the free-radical theory of ageing. In some cases, decreasing levels of SOD have been shown to shorten the lifespan of yeast \[[@B105]--[@B108]\], fruit flies \[[@B109]\], and mice \[[@B110]\], but this is not uniformly the case. In fact, an analysis of the entire *sod* gene family in *C. elegans* revealed that both increasing and decreasing expression of the *sod* genes had little effect on lifespan \[[@B111]\]. When *sod* gene expression is experimentally increased, lifespan is either unaltered or decreased \[[@B111]--[@B114]\]. A report from Y. Honda and S. Honda \[[@B115]\] showed that increased expression of *sod-1* and *sod-2* extended the lifespan of *C. elegans*, but that this was not due to decreased oxidative damage. While results are inconsistent between species and are not even consistent between experiments on a single species, it is clear that the view of SOD as an eliminator of ROS that would otherwise limit lifespan is much too simplistic.

Two distinct classes of SOD enzymes exist within eukaryotes: copper/zincSOD (Cu/Zn SOD), found in the cytosol or extracellular matrix \[[@B116]\]; manganese SOD (Mn SOD), found in the mitochondria \[[@B117]\]. Phylogenetic analysis clearly shows two main clades corresponding to Mn and Cu/Zn enzymes ([Figure 10](#fig10){ref-type="fig"}). Unlike the other three species in the analysis, each of which has only a single Mn SOD, there has been a duplication of the gene in *C. elegans*, *sod-2* and *sod-3.* The same is true of the human Cu/Zn *sod-1*, in that human and the other two species have a single gene that corresponds to a pair of genes in *C. elegans*, *sod-1* and *sod-5*. The last *sod* gene in *C. elegans*, *sod-4*, corresponds to a single gene in each of human and *D. melanogaster*. It is an extracellular Cu/Zn SOD \[[@B118]\], with a possible function is *daf-2* signalling \[[@B111]\].

### 3.2.3. Glutathione Peroxidase {#sec3.2.3}

The glutathione peroxidases (GPX) were first characterised as a family of proteins that reduce H~2~O~2~ to H~2~O using GSH as the electron donor \[[@B119]\]. Humans and *C. elegans* both contain a large number of GPX proteins (8 and 7, resp.) compared to yeast (3 proteins) and *D. melanogaster* (only 2 proteins). Most of these appear to have arisen independently by gene duplications within the two taxonomic lineages ([Figure 11](#fig11){ref-type="fig"}). While five of the eight humans GPX contain a selenocysteine in their active site, not a single selenocysteine is found in any of the *C. elegans* GPX homologs.

Despite the relatedness of *C. elegans* proteins with proteins of known GPX activity, Vanfleteren \[[@B120]\] was unable to detect any GPX activity in *C. elegans* tissue. However, the *in vitro* assay used in this article only included GSH as a reducing substrate. Use of GSH appears to be limited to GPX enzymes that contain selenocysteine; the cysteine-containing GPX homologs of *C. elegans* likely use a peroxiredoxin-like mechanism with thioredoxin as their reducing substrate \[[@B121]\].

Numerous studies have implicated GPX proteins in redox signalling. For example, Faltin et al. \[[@B122]\] found that ROS signalling used in the early stage shoot organogenesis of plants is regulated by the GPX homolog PHGPx. In mammals, ROS regulation of lipopolysaccharide (LPS) signalling is modulated by GPX1 \[[@B123]\], while GPX1 deficiency is found to enhance proinflammatory cytokine-induced redox signalling \[[@B124]\]. Conversely, high levels of catalase and GPX activity have been found to diminish H~2~O~2~ signalling in human alveolar macrophages \[[@B125]\]. The *C. elegans* protein F26E4.12, a homolog of human GPX4 and plant PHGPx, regulates the peptide transporter PEPT-1 \[[@B126]\].

### 3.2.4. Peroxiredoxin {#sec3.2.4}

Peroxiredoxins (PRDX) are found as homodimers in which the active site cysteines align in close proximity and form intermolecular dithiols/disulfides. PRDX disulfides function in the reduction of H~2~O~2~ to H~2~O for both antioxidant defence and mediation of ROS signalling \[[@B127], [@B128]\]. Active site disulfides formed in the reduction of H~2~O~2~ are reduced back to dithiols by the thioredoxin redox system. PRDX comes in three forms: "Typical" 2-Cys, "Atypical" 2-Cys, and 1-Cys.

Phylogenetic analysis showed that *C. elegans* have two typical 2-Cys PRDX, 1-Cys PRDX, but does not possess an atypical 2-Cys PRDX homolog ([Figure 12](#fig12){ref-type="fig"}). Human PRDX1 and PRDX2, two of the typical 2-Cys PRDX homologs to *C. elegans* PRDX-2, might participate in both intra- and extracellular signalling cascades by regulating levels of H~2~O~2~ \[[@B23]\]. The human mitochondrial typical 2-Cys PRDX3, which is closely related to *C. elegans* PRDX-3, participates in the regulation of apoptotic signalling. Little research has been done on the PRDX proteins of *C. elegans*. What is known is that PRDX-2 is necessary for normal growth and egg production in *C. elegans*, which Isermann et al. \[[@B129]\] argue is likely due to its role in peroxide signalling. Interestingly, loss of PRDX-2 actually increases resistance to some oxidative stress causing agents but results in a decrease in lifespan \[[@B130]\].

### 3.2.5. Catalase {#sec3.2.5}

Catalase functions in the decomposition of H~2~O~2~ to H~2~O and O~2~. Phylogenetic analysis shows a lineage specific expansion from one catalase to three in *C. elegans*([Figure 13](#fig13){ref-type="fig"}). *C. elegans* CTL-1 is required for the extended adult lifespans of *daf-2*, *age-1*, and *clk-1* mutants \[[@B131]\]. CTL-2 is found in the peroxisomes of *C. elegans* \[[@B132]\] and a lack of this protein has been found to cause a progeric phenotype and adversely affect development/egg laying \[[@B133]\]. The *ctl-1* and *ctl-2* genes are both negatively regulated by DAF-2-mediated insulin signalling \[[@B134]\]. As such, DAF-2 signalling might result in an increase in the levels of H~2~O~2~, and thus a more oxidizing state.

4. Conclusion {#sec4}
=============

Reactive oxygen species are thought to play a role in many diseases of ageing, including Parkinson\'s disease, Alzheimer\'s disease, heart failure, and myocardial infarction. This makes understanding their dual roles as oxidative stressors and signalling molecules highly significant. Important to this understanding is a clear description of the protein families that contribute to the generation and metabolism of ROS. Most of the known protein families that participate in redox biology are discussed in this article, but it is likely that additional, undescribed families of redox proteins remain to be discovered. It is striking that of the protein families that have been compared in this study, most show clear relationships between sequences, with no extreme examples of species-specific family expansion. *S. cerevisiae* frequently, and *D. melanogaster* sometimes, had smaller gene families than the other two species.

In addition to oxidative damage, higher ROS levels disrupt the regular function of redox regulators and their downstream effectors. It is, therefore, likely that at least some, if not many, of the toxic effects associated with oxidative stress are the result of disruption to redox signalling. Continued research into the various functions of the *C. elegans* redox proteins discussed in this article will help to achieve a better understanding of redox signalling, oxidative stress, and the relationship between these two biological phenomena. *C. elegans* and *H. sapiens* exhibited fairly conserved gene family structure, indicating that *C. elegans* will provide a medically relevant model of redox signalling.

![Simplified pathways of ROS production and antioxidant detoxification in a *C. elegans*cell. ROS molecules superoxide (O~2~ ^•−^), hydrogen peroxide (H~2~O~2~), and hydroxyl radical (^•^OH) are depicted in red. Antioxidants convert ROS to less reactive molecules. The five different superoxide dismutase enzymes convert superoxide to H~2~O~2~ and are depicted in their respective cellular compartments. Catalase, peroxiredoxin (Prx), and glutathione peroxidase (Gpx) convert H~2~O~2~ to H~2~O and O~2~. Rapid detoxification of H~2~O~2~ is necessary as it can become oxidised to form the potent free-radical ^•^OH. ROS can be damaging to DNA, RNA, proteins, and lipids, and high ROS levels can cause oxidative stress. Some antioxidant genes, such as catalase and *sod-3,*can be upregulated in response to oxidative stress.](JT2012-546915.001){#fig1}

![Cartoon of protein with redox-sensitive thiol switch. Structural disulfides can be seen on the inside of this protein, protected from redox reactions (those attached to the green and blue segments). A redox-sensitive thiol/disulfide switch is depicted on the protein surface (attached to the red segment). When reduced the redox-sensitive switch is in its dithiol state, however, when these thiols become oxidised (i.e., electrons are removed by an oxidant such as ROS) they bond to form a disulfide, altering the structure and/or function of the protein.](JT2012-546915.002){#fig2}

![Redox state of between different cellular compartments. Redox state is a measure of the amount of electrons available for redox reactions. In the reducing state electrons are donated, whereas in the oxidising state electrons are removed. The mitochondria and nucleus are reducing (a and b). The endoplasmic reticulum is more oxidising (c).](JT2012-546915.003){#fig3}

![Glutathione-glutaredoxin and thioredoxin redox regulation systems. (a) Thioredoxin receives electrons from thioredoxin reductase and uses these to directly reduce protein disulfides. (b) Glutathione receives electrons from glutathione disulfide reductase; however, reduction of protein disulfides by glutathione is mediated through glutaredoxin. These two systems have similar functions, although there is evidence that indicates they each interact with different subsets of proteins. Arrows represent a change in redox state (loss or gain of electrons).](JT2012-546915.004){#fig4}

![Maximum likelihood majority-rule bootstrap consensus tree of thioredoxin (TRX) and nucleoredoxin (NXN) proteins. A blast (blastp) search of known *Homo sapiens* (*H.s*), *Saccharomyces cerevisiae* (*S.c*), and *Drosophila melanogaster*(*D.m*) proteins was undertaken to identify all the homologs within these three species. The proteins from these species were then blasted against *Caenorhabditis elegans* (*C.e*) to identify homologues in the Genbank database. Identified sequences with significant expected value (≤\~1E − 10) were used to generate a multiple sequence alignment (MSA) via ClustalW 2.1. The MSAs were then trimmed and used to produce a maximum likelihood majority-rule bootstrap consensus tree inferred from 1000 replicates via Mega 5.10. Proteins with sequences greater that \~350aa that were more closely related to other families discussed in this paper, such as GRX or PDI, were removed from this analysis. Some proteins fit equally well with TRX and TRX-related families, for example, DPY11 can be found in both the TRX and protein disulfide isomerase (PDI) trees.](JT2012-546915.005){#fig5}

![Maximum likelihood majority-rule bootstrap consensus tree of thioredoxin reductase (TRXR), glutathione disulfide reductase (GSR) and dihydrolipoamide dehydrogenase (DLD) proteins. *C. elegans*possess two TRXR: mitochondrial TRXR-1 and cytosolic TRXR-2. In addition *C. elegans*contain a single glutathione disulfide reductase (GSR) and the closely related DLD. See [Figure 5](#fig5){ref-type="fig"} for details of how the sequences were identified and processed as well as how the phylogenetic analysis was carried out.](JT2012-546915.006){#fig6}

![Maximum likelihood majority-rule bootstrap consensus tree of glutaredoxin (GLRX) proteins. Dark blue signifies the conserved active site of monothiol GLRX. Light blue signifies proteins of greater similarity to known dithiol GLRX, regardless of whether or not two cysteines are actually is present in the region aligned to the active sites. See [Figure 5](#fig5){ref-type="fig"} for details of how the sequences were identified and processed as well as how the phylogenetic analysis was carried out.](JT2012-546915.007){#fig7}

![Maximum likelihood majority-rule bootstrap consensus tree of protein disulfide isomerase (PDI) proteins. Green boxes are likely TRX-like fold in human PDI; blue are likely noncatalytic thirodoxin domains (according to Hatahet and Ruddock \[[@B91]\]). White boxes show CxxC catalytic motifs, in *C. elegans* and *D. melanogaster*. Although domain structure cannot be inferred from sequence alone, it is likely that proteins that share similar sequences, catalytic motifs, and length also share a similar domain structure and in some cases are likely orthologous. See [Figure 5](#fig5){ref-type="fig"} for details of how the sequences were identified and processed as well as how the phylogenetic analysis was carried out.](JT2012-546915.008){#fig8}

![Maximum likelihood majority-rule bootstrap consensus tree of NADPH oxidase (NOX)/dual oxidase (DUOX) proteins. See [Figure 5](#fig5){ref-type="fig"} for details of how the sequences were identified and processed as well as how the phylogenetic analysis was carried out.](JT2012-546915.009){#fig9}

![Maximum likelihood majority-rule bootstrap consensus tree of superoxide dismutase (SOD) proteins. See [Figure 5](#fig5){ref-type="fig"} for details of how the sequences were identified and processed as well as how the phylogenetic analysis was carried out.](JT2012-546915.010){#fig10}

![Maximum likelihood majority-rule bootstrap consensus tree of GPX proteins. See [Figure 6](#fig6){ref-type="fig"} for details on the phylogenetic analysis.](JT2012-546915.011){#fig11}

![Maximum likelihood majority-rule bootstrap consensus tree of peroxiredoxin (PRDX) proteins."Typical" 2-Cys PRDX is shown in green and purple; "Atypical" 2-Cys in blue and yellow; and 1-Cys in green. Active site cysteine regions highlighted in the same colour are those that aligned in the MSA. See [Figure 5](#fig5){ref-type="fig"} for details of how the sequences were identified and processed as well as how the phylogenetic analysis was carried out.](JT2012-546915.012){#fig12}

![Maximum likelihood majority-rule bootstrap consensus tree of catalase proteins. See [Figure 6](#fig6){ref-type="fig"} for details on the phylogenetic analysis.](JT2012-546915.013){#fig13}

###### 

Similarity between *C.e gamma*-glutamylcysteine synthetase and orthologues in *H.s., S.c.,* and *D.m*.

  Species name   Protein name   Function                              \% identity     *E* value
  -------------- -------------- ------------------------------------- --------------- ------------
  *H.s.*         GCLC           *gamma*-glutamylcysteine synthetase   350/643 (54%)   0.0
  *D.m.*         GCLC           *gamma*-glutamylcysteine synthetase   281/498 (56%)   0.0
  *S.c.*         GSH1           *gamma*-glutamylcysteine synthetase   254/672 (38%)   2*e* − 138

*C.e*: *C. elegans*, *H.s*: *H. sapiens*, *S.c*: *S. cerevisiae*, *D.m*: *D. melanogaster.*

###### 

Similarity between *C.e* glutathione synthetase and orthologues in *H.s., S.c*., and *D.m*.

  Species name   Protein name   Function                 \% identity     *E* value
  -------------- -------------- ------------------------ --------------- ------------
  *H.s.*         GSS            glutathione synthetase   185/470 (39%)   3*e* − 95
  *D.m.*         CG32495        glutathione synthetase   180/491 (37%)   8*e* − 102
  *S.c.*         GSH2           glutathione synthetase   147/494 (30%)   1*e* − 56

*C.e*: *C. elegans*, *H.s*: *H. sapiens*, *S.c*: *S. cerevisiae*, *D.m*: *D. melanogaster*.

###### 

Characterised protein disulfide isomerase and their *C. elegans* orthologs.

  ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
  PDI homolog   Known functions                                                                                                                         *C. elegans* ortholog\
                                                                                                                                                        (paralogs)
  ------------- --------------------------------------------------------------------------------------------------------------------------------------- ------------------------
  AGR2          Unknown                                                                                                                                 None

                                                                                                                                                        

  AGR3          Unknown                                                                                                                                 None

                                                                                                                                                        

  *ERp27*       *Unknown*                                                                                                                               *(C30H6.8, C35B1.5,*

  *DNAjc10*     *ER-associated protein degradation* *\[[@B89]\]*                                                                                        *F47B7.2, Y52E8A.3)*

                                                                                                                                                        

  ERp29         Specialist ''escort" chaperone \[[@B139]\]\                                                                                             None
                Thyroglobulin processing \[[@B140]\]                                                                                                    

                                                                                                                                                        

  ERp46         Some P4HB functional redundancy\                                                                                                        (W01B11.6, Y55F3AR.2)
                Protective role against hypoxia \[[@B89]\]                                                                                              

                                                                                                                                                        

  ERp44         Possible role in late-stage oligomerization reactions\                                                                                  C06A6.5, C30H7.2
                Possible role in late-stage, thiol-dependent, protein quality-control system or trafficking \[[@B89]\]                                  

                                                                                                                                                        

  P4HB          Thiol-disulfide exchange catalysis\                                                                                                     PDI-2, PDI-1
                Role in protein folding\                                                                                                                
                Beta subunit of P4H complex \[[@B89]\]                                                                                                  

                                                                                                                                                        

  PDIA2         Expressed in pancreas and brain \[[@B135], [@B136]\]\                                                                                   None
                Thiol-disulfide exchange catalysis similar to P4HB\                                                                                     
                Specific function still unclear                                                                                                         

                                                                                                                                                        

  PDIA3         Involved in MHC class I folding as part of MHC I peptide-loading complex \[[@B137]\]\                                                   PDI-3
                Oxidative folding of glycoproteins                                                                                                      

                                                                                                                                                        

  PDIA4         Thiol-disulfide exchange catalysis similar to P4HB\                                                                                     C14B9.2
                Some PDIA3 redundancy\                                                                                                                  
                Can form part of a complex with P4HB, PDIA6, ERdj3, BiP, CypB, HSP40, GRP94, GRP170, UDP glucosyltransferase, and SDF2-L1 \[[@B138]\]   

                                                                                                                                                        

  PDIA5         Unknown                                                                                                                                 (F35G2.1, T10H10.2)

                                                                                                                                                        

  PDIA6         Likely catalyze thiol-disulfide exchange similar to P4HB\                                                                               TAG-320, Y49E10.4
                Likely role in protein folding                                                                                                          

                                                                                                                                                        

  PDILT         Unknown                                                                                                                                 None

                                                                                                                                                        

  TMX1          ER transmembrane PDI\                                                                                                                   DPY-11
                Unknown function                                                                                                                        

                                                                                                                                                        

  TMX2          ER transmembrane PDI\                                                                                                                   None
                Unknown function                                                                                                                        

                                                                                                                                                        

  TMX3          ER transmembrane PDI\                                                                                                                   ZK973.11
                Protein dithiol-disulfide oxidant                                                                                                       

                                                                                                                                                        

  TMX4          ER transmembrane PDI\                                                                                                                   None
                Unknown function                                                                                                                        

                                                                                                                                                        

  TXNDC12       Unknown                                                                                                                                 Y57A10A.23
  ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

Italic rowsare human proteins that share the same *C. elegans* paralogs.

[^1]: Academic Editor: Cinta Porte


--------------------------------------------------

--------------------------------------------------

Opinion networks among long-term care specialists.
A challenge in the adoption of long-term care (LTC) policy reform is the number of constituency groups active in LTC and historical antagonism among these groups regarding critical issues such as LTC financing and regulation. As part of a national survey of LTC specialists, the authors asked previously identified specialists to nominate other "experts" with known or demonstrable experience in LTC. As a proxy for potential information exchange, data about nominations were used to construct and describe the networks of LTC specialists representing consumer advocates, provider representatives, public officials, policy experts, and others. Associations between network characteristics and attitudes about LTC policy reform were also examined. Individuals tended to nominate other people within their same constituency group as experts. Academic and research-based policy experts were most likely to be classified as prominent network members. Network structure was associated with attitudes toward LTC financing but not the regulation of nursing homes.

--------------------------------------------------

--------------------------------------------------

Search This Blog

Fabric Arrived!

It is always so nice to come home from work to learn that a package has arrived. My fabric from Vogue Fabrics came yesterday. Everything looked in good order. The pale aqua fabrics I purchased looked so springish. I also got a teal solid rayon/polyester and teal with black/white geometric designs.

The other color I got was a buttery yellow fabric. It is silk and cotton and feels so great!

My DH looked at the fabric briefly, shook his head and asked if everything was okay? Oh yes! was my reply. I also noticed that he was staring at the mounds of fabric laying on the ironing board as well as other fabrics on the cutting table. All of those are ideas or projects in work.

Popular posts from this blog

I finally wore my PP Bias Skirt made during a recent sewing retreat with Pamela Leggett.

I normally do not wear long skirts, I did not get on the maxi dress/skirt train. I did go with a midi length though. I wore this to work on Thursday. I like the drape of the fabric on the bias.

The skirt past the weariability test, not a lot of wrinkles. This is a rayon purchased from Fabric Mart that was in a kit to make a wrap dress by McCall's. It was called Pick Up Sticks and the little sticks remind me of that game I played a lot as a child.

After taking these pictures I realized that my black top tucked into the skirt left a blackish background under the skirt. I wore a flesh colored slip.

Some of the bias skirts shown by Pamela at the retreat were from some gorgeous fabrics that had great drape and very flattering. I do want to make a shorter version and plan to do so toward September.

I finished a Simplicity top pattern by Cynthia Rowley. Hope to wear it soon, here it is on A…

I wanted to replace my current iron. It was an okay iron and I have had it for three years. I read a great article about irons on Sie Macht. Then I came across this iron (affiliate link)

I was able to use this iron at the sewing session with Pamela Leggett. The steam with this iron is great. The best feature is the override of the auto shut off. I hate that feature on my current iron. Just as I am about to get up from the sewing machine or serger to press a seam or hem, the iron has shut off and waking it up is just annoying.

I found it on Nancy's Notions as well as Amazon. The price was similar but shipping with Amazon Prime just can't be beat! So my new iron arrived this past Tuesday and I have used it several times this week, most particularly today as I have spent lots of time in my sewing room. I finished my cold shoulder pattern. Review post soon!

I started working on a tunic for the Tunic Contest on Pattern Review.
This is the front view. This is a border print fabric I acquired from Les Fabrique, formerly located in Charlottesville, VA. Unfortunately they closed their shop. They had some gorgeous fabrics for sewist and quilters. This was fabric in their remnant section. This is a linen rayon blend. Medium weight.

I cut the ruffle piece using some of the border print. There was not enough of the border print to use so had to sew the border print to a piece of the main fabric to have enough fabric to ruffle.

I have a ruffle attachment foot for my sewing machine and have tried using it. Tested it on some fabric pieces to mimic the ruffle piece and I still need to practice getting this to the right ruffle length as well as depth.

I have had this foot forever and never used. I still may end up attaching knit yarn to the edge, zigzagging over it and then pulling the yarn to get the fabric to gather, which is similar to …

Sewcialists

Websta Widget

Native of Danville, VA. I have lived in VA, TX, CA, FL, PA and now back in Virginia. I have been sewing since Junior High School. I like to sew fashion garments. I have made items for the Sulky Challenge and made numerous wearable art jackets, purses and vest in the past. Member of Roanoke Chapter of ASG.

--------------------------------------------------

--------------------------------------------------

1850s in Zimbabwe



Births
28 November 1851 - Albert Grey, 4th Earl Grey, administrator, is born at St James's Palace
1852 - Philip Lyttleton Gell, 3rd Chairman of British South Africa Company
9 February 1853 - Leander Starr Jameson, statesman, is born at Stranraer, Scotland
3 December 1854 - William Henry Milton, sportsman and statesman, is born at Little Marlow, Buckinghamshire, England

See also
1840s in Zimbabwe
other events of 1850s
1860s in Zimbabwe
Years in Zimbabwe

Category:Decades in Zimbabwe
Zimbabwe

--------------------------------------------------

--------------------------------------------------

Splurge vs. Steal

Now is typically the time of year when I start looking for pieces that can work now, but will transition into the Spring as well. I just ordered the "steal" and can't get over the similarities between the two!

--------------------------------------------------

--------------------------------------------------

Q:

OpenGL LookAt function: is the up vector arbitrary?

I am trying to understand the glLookAt function. 
It takes 3 triplets. The first is the eye position, the second is the point at which the eye stares. That point will appear in the center of my viewport, right? The third is the 'up' vector. I understand the meaning of the 'up' vector if it is perpendicular to the vector from eye to starepoint. The question is, is it allowed to specify other vectors for up, and, if yes, what's the meaning then?
A link to a graphical detailed explanation of gluPerstpective, glLookAt and glFrustum would be also much appreciated. The official OpenGL documentation appears not to be intended for newbies.
Please note that I understand the meaning of up vector when it is perpendicular to eye->object vector. The question is what is the meaning (if any), if it is not. I can't figure that out with playing with parameters.

A:

It works as long as it is "sufficiently perpendicular" to the up vector. What matters is the plane between the up-vector and the look-at vector.
If these two become aligned the up-direction will be more or less random (based on the very small bits in your values), as a small adjustment of it will leave it pointing above/left/right of the look-at vector.  
If they have a sufficiently large separating angle (in 32-bit floating point math) it will work well. This angle needs usually not be more than a degree or so, so they can be very close. But if the difference is down to a few bits, each changed bit will yield a huge direcitonal change.
It comes down to numerical precision. 
(I'm sure there are more mathematical terms & definitions for this, but it's been a few years since college.. :)
final word: If the vectors are parallel, then the up-direction is completely undefined and you'll get a degenerate view matrix. 

A:

The up vector lets openGL know what way your have your camera.
Think in the really world, if you have to points in space, you can draw a line from one to the other. You can then align an object, such as a camera so that it points from one to the other. But you have no way of knowing how you object should be rotated around this axis that the line makes. The up vector dictates which direction the camera should be standing.
most of the time, your up vector will be (0,1,0) which means that the camera will be rotated just like you would normally hold a camera, or if you held your head up straight. if you set your up vector (1,0,0) it would be like holding your head on its side, so from the base of your head to the top of your head it pointing to the right. You are still looking from the same point (more or less) to the same point, but your 'up' has changed. A look vector of(0,-1,0) would make the camera be up side down, like if you where doing a hand stand.
One way you could think about this, your arm is a vector from the camera position (your shoulder) to the camera look at point (your index finger) if you stick you thumb out, this is your up vector.
This picture may help you http://images.gamedev.net/features/programming/oglch3excerpt/03fig11.jpg
EIDT
Perpendicular or not.
I see what you are asking now. example, you at (10,10,10) looking at (0,0,0) the resulting vector for your looking direction is (-10,-10,-10) the vector perpendicular to this does not matter for the purpose of you up vector glLookAt, if you wanted the view to orientated so that you are like a normal person just looking down a bit, just set you up vector to (0,1,0) In fact, unless you want to be able to roll the camera, you don't need this to be nay thing else.



--------------------------------------------------

--------------------------------------------------

If this is your first visit, be sure to
check out the FAQ by clicking the
link above. You may have to register
before you can post: click the register link above to proceed. To start viewing messages,
select the forum that you want to visit from the selection below.

TripleA: Axis & Allies Clone

During the late 80s and early 90s, I spent hours upon hours playing the board game Axis & Allies with several of my closest friends. In 1998, I purchased the video game version of this classic and thoroughly enjoyed being able to play against others online. However, I disliked the 2004 version that changed its format to real-time strategy and moved onto other games.

While browsing a local toy store this holiday season, I found Axis & Allies had been revised and expanded by Avalon Hill to include new pieces and a more detailed map. This brought back many found memories of the epic battles I engaged in while playing this game, so I decided to search the Internet for a patch to make the 1998 PC version compatible with Windows XP. During my search, I stumbled upon TripleA, an open source clone of Axis & Allies.

A quick search of the Tactical Gamer forums revealed several references to Axis & Allies, so I figured there may be some interest in revisiting this classic with a few fellow members. TripleA is free to download and plays exactly like the board game version.

If anyone is interested in playing Axis & Allies using TripleA, please let me know.

--------------------------------------------------

--------------------------------------------------

Menu

Download A Political And Diplomatic History of Afghanistan, 1863-1901 by M. Hassan Kakar PDF

This political and diplomatic heritage of overdue nineteenth-century Afghanistan and its significant ethnic teams lays naked how the floor was once laid for the emergence of Afghanistan as a geographical region in addition to for the implementation of schemes of modernization.

It describes how Amir Sher ‘Ali Khan and, extra absolutely, Amir ‘Abd al-Rahman Khan for the 1st time consolidated the authority of the significant govt on the price of the normal self reliant neighborhood magnates, and hence controlled to arrange a centralized monarchical kingdom and expand its direct rule thoughout Afghanistan.

They did so within the days of what has turn into referred to as the nice online game for the mastery of significant Asian states. even supposing the nice video game ended in the relief of Afghanistan in measurement, it additionally resulted in the transparent demarcation of its barriers in response to foreign agreements.

Within the Shadow of the satan is the second one experience within the Coryani Chronicles, a sequence of adventures that target the Romanesque Coryani Empire. From out of the murky centuries, the dastardly works of betrayal and heresy display themselves in a flurry of mysterious omens, robbery, bloody homicide, and open rebellion.

Political Islam and Violence in Indonesia offers a penetrating new research of non secular radicalism within the biggest Muslim kingdom on this planet. Indonesia is a rustic lengthy recognized for its variety and tolerant model of Islam. notwithstanding, because the fall of Suharto, a extra illiberal kind of Islam has been transforming into, one whose adherents have conducted terrorist assaults, waged sectarian battle, and voiced strident anti-Western rhetoric.

On conceal: The Mongol hordes--Rise of the Shoguns--Slave sultans of Egypt--The West's embattled empire--The Baltic Crusades--Europe's new monarchies.

Extra resources for A Political And Diplomatic History of Afghanistan, 1863-1901 (Brill's Inner Asian Library)

Sample text

29 Kakar, Jang-e-Dowom-e-Afghan-Englis, 79. 23 the british afghan war 33 The instructions strengthened him still further in his resolve, since he then committed excesses in aﬀecting the killing of so many Afghans that news of this outraged the liberal press in India, as well as England. 30 The public in Britain was also outraged and this in part contributed to the defeat of the government in the general election that was held later, in April 1880. The executions were followed by the deportation to India of the amir, and his principal advisers, among them Sardar Yahya Khan (the amir’s father-in-law), Shah Mohammad Khan, Minister of External Aﬀairs; and Sardar Zakria Khan.

Other measures included the establishment of postal services, the building of the Sherpur (also Sher Abad) cantonment, and the setting up of a lithographic printing press in which Shams al-Nahar, the ﬁrst oﬃcial periodical in Afghanistan, was published. ”43 Previously, coins bore the names of rulers with anonymous titles such as sahib-e-zaman (lord of the age) or Sahib-e-mulk (lord of the land). 44 Additionally, for the ﬁrst Collected Works of Riyazi], Mashhad, 1904, 173. Ghobar, Afghanistan Dar Masire-Tarikh, 595.

Hanna, H. B. The Second Afghan War, 1878–79, 3 Vols. London, 1899–1910. , The Afghan War of 1879–80, London, 1881. 5 Tarzi, Reminiscences, 6. 6 Ibid. 7 Kakar, Jang-e-Dowom-e-Afghan-Englis, 41. ”8 He then accepted Lytton’s demands by concluding a treaty with Major Pierre Louis N. Cavagnari, an envoy of the British government of India, on May 26, 1879. The treaty was concluded in a British military camp in the Safed Sang village in Gandumak, in eastern Afghanistan, where the last troops of the British army retreating from Kabul had perished, in 1842.

--------------------------------------------------

--------------------------------------------------

Q:

KOMA-Script: Making Preface Page Like Chapter

I am finishing setting up my thesis LaTeX document using scrreprt class.
I am trying to add the final touches which include a List of Acronyms. Now I want it to look exactly the same as the ToC does in style as far as the title "List of Acronyms" goes. I have managed to do this by using \chapter*{List of Acronyms} whereby it uses the chapter style without printing a chapter page, and here is where the problem arises, when I do this the page numbering is automatically switched to arabic; I wish for the LoA to be in the preface which should all be in roman page numbering.
How can I use the exact same style of the chapter* font for the title (which also omits it from the ToC which is fine) without losing the roman page numbering?
Please find below my MWE with included an acronym (side note if someone could also direct me to a post which explains how to customise the \printacronyms format I would be very grateful).
\documentclass[
bibliography=totoc,
headings=big,
captions=tableheading,
chapterprefix=true% like in standard class "report"
]{scrreprt}
\usepackage[left=2cm,right=2cm,top=2.5cm,bottom=3cm]{geometry}
\usepackage{xcolor}
\usepackage{graphicx}
\usepackage{minitoc}
\usepackage{setspace}
\usepackage{lmodern}
\usepackage{notoccite}
\usepackage{acro}
\usepackage{hyperref}

\setcounter{secnumdepth}{3} % number subsubsections
\setcounter{tocdepth}{3} % list subsubsections

%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% ACRONYM DEFINITION
\DeclareAcronym{pwr}{
short = PWR ,
short-plural = s ,
long = Pressurised Water Reactor ,
long-plural = s ,
class = reactors ,
}

\begin{document}

\pagenumbering{roman}

\cleardoublepage
\dominitoc
\pdfbookmark[1]{Contents}{}
\tableofcontents
\cleardoublepage

%%%%%%%%%%%%%%%%%%%%%%%%%%%%% LIST OF ACRONYMS
\chapter*{List of Acronyms}

\addcontentsline{toc}{section}{List of Acronyms}

\printacronyms[include-classes=reactors,name=Reactor Acronyms]

\pagestyle{headings}
\pagenumbering{arabic}

%%%%%%%%%%%%%% Chapter Style Controls
\addtokomafont{chapterprefix}{\raggedleft \linespread{1}}
\addtokomafont{chapter}{\fontsize{35}{30}\selectfont}
\addtokomafont{section}{\fontsize{20}{11}\selectfont}
\addtokomafont{subsection}{\fontsize{18}{11}\selectfont}
\addtokomafont{subsubsection}{\fontsize{16}{11}\selectfont}

\renewcommand*{\chapterformat}{%
\mbox{\scalebox{0.80}{\chapappifchapterprefix{\nobreakspace}}%
\scalebox{2.5}{\color{gray}\thechapter\autodot}\enskip}}

\chapter{Testing}

Pasting an acronym \ac{pwr}

\end{document}

A:

Add a \clearpage (or \cleardoublepage) command after \printacronyms; otherwise, the \pagenumbering{arabic} will take effect too soon. 
As Speravir mentions in his comment, the KOMA classes scrbook and scrreprt offer \addchap, (and a starred version \addchap*) which can produce unnumbered chapters which show up in the table of contents and in the running heading (the starred version doesn't show up in the headings), so instead of
\chapter*{List of Acronyms}
\addcontentsline{toc}{chapter}{List of Acronyms}

you can simply use, for example,
\addchap{List of Acronyms}

The code:
\documentclass[
bibliography=totoc,
headings=big,
captions=tableheading,
chapterprefix=true% like in standard class "report"
]{scrreprt}
\usepackage[left=2cm,right=2cm,top=2.5cm,bottom=3cm]{geometry}
\usepackage{xcolor}
\usepackage{graphicx}
\usepackage{minitoc}
\usepackage{setspace}
\usepackage{lmodern}
\usepackage{notoccite}
\usepackage{acro}
\usepackage{hyperref}

\setcounter{secnumdepth}{3} % number subsubsections
\setcounter{tocdepth}{3} % list subsubsections

%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% ACRONYM DEFINITION
\DeclareAcronym{pwr}{
short = PWR ,
short-plural = s ,
long = Pressurised Water Reactor ,
long-plural = s ,
class = reactors ,
}

\begin{document}

\pagenumbering{roman}

\cleardoublepage %<- seems not necessary
\dominitoc
\pdfbookmark[1]{Contents}{}
\tableofcontents
\cleardoublepage

%%%%%%%%%%%%%%%%%%%%%%%%%%%%% LIST OF ACRONYMS
%\chapter*{List of Acronyms}
%\addcontentsline{toc}{chapter}{List of Acronyms}
\addchap{List of Acronyms}
\printacronyms[include-classes=reactors,name=Reactor Acronyms]
\clearpage

\pagestyle{headings}
\pagenumbering{arabic}

%%%%%%%%%%%%%% Chapter Style Controls
\addtokomafont{chapterprefix}{\raggedleft \linespread{1}}
\addtokomafont{chapter}{\fontsize{35}{30}\selectfont}
\addtokomafont{section}{\fontsize{20}{11}\selectfont}
\addtokomafont{subsection}{\fontsize{18}{11}\selectfont}
\addtokomafont{subsubsection}{\fontsize{16}{11}\selectfont}

\renewcommand*{\chapterformat}{%
\mbox{\scalebox{0.80}{\chapappifchapterprefix{\nobreakspace}}%
\scalebox{2.5}{\color{gray}\thechapter\autodot}\enskip}}

\chapter{Testing}

Pasting an acronym \ac{pwr}

\end{document}

Section 7.3. Options Regarding the List of the package decumentation has some explanations regarding options and customization of the list.



--------------------------------------------------

--------------------------------------------------

Does Edmund Burke accept a universal moral order, or does his thought
rest on mere utilitarianism and subjectivistic ethics? In the final
chapter
of Natural Right and History, Leo Strauss suggests the latter.
Though
acknowledging many classical and Christian overtones in Burke's
political
writings, he argues that, at its core, Burke's thinking is profoundly
modern
and that it prepares the way for a morally relativistic historicism. In
support of this view, Strauss cites what to his mind is Burke's
excessive
depreciation of "reason or theory" in favor of concrete human
experience,
practice, and tradition.1

At first glance, says Strauss, Burke's emphasis on the
importance of
practical wisdom or prudence in the political sphere might appear to be
a return to the Aristotelian view—forgotten by modern natural-right
theorists
like Hobbes—"according to which theory cannot be the sole, or the
sufficient,
guide of practice." 2 But while
Aristotle
stresses the preeminence of theory as providing a conceptual model of
what
the best society ought to be like—a model which it is the duty of
legislators
using prudence to approximate as nearly as possible in given
circumstances—"Burke
asserts that theory . . . has essentially a tendency to mislead
practice." 3

Strauss explains that speculation or reason, "being
essentially 'private,'
is concerned with the truth without any regard to public opinion." 4
But for Burke, he continues, society rests

on consent. Yet the consent cannot be achieved by
reasoning
alone, and in particular not by the mere calculation of the advantages
of living together—a calculation which may be completed in a short span
of time—but solely by habits and prejudices which grow up only in long
periods. . .

The intrusion of theory into politics is liable to have an
unsettling
and inflaming effect. No actual social order is perfect. "Speculative
inquiries"
necessarily bring to light the imperfect character of the established
order.
If these inquiries are introduced into political discussion, which, of
necessity, lacks "the coolness of philosophic inquiry," they are liable
"to raise discontent in the people" in regard to the established order,
discontent which may make rational reform impossible. The most
legitimate
theoretical problems become, in the political arena, "vexatious
questions"
and cause "a spirit of litigation" and "fanaticism." Considerations
transcending
"the arguments of states and kingdoms" must be left "to the schools;
for
there only they may be discussed with safety." 5

Thus, Strauss concludes, Burke "parts company with the
Aristotelian tradition
by disparaging theory and especially metaphysics. He uses 'metaphysics'
and 'metaphysician' frequently in a derogatory sense." His "opposition
to modern 'rationalism' shifts almost insensibly into an opposition to
'rationalism' as such." 6

Strauss notes that a direct consequence of Burke's critique
of reason
is his rejection of the view that constitutions can be "made" by "a
wise
'legislator' or founder" based on the reasoned understanding of man's
"highest
end"—regarded by Strauss as the classical position—in favor of the view
that constitutions must "come into being . . . slowly, not to say
imperceptibly,
'in a great length of time, and by a great variety of accidents.' " 7
Related to this belief, Strauss contends, are tendencies on Burke's
part
to regard the common good as the product of accidental causation
without
benefit of specifically moral intentions; to accept evil fatalistically
in the face of apparently overwhelming historical trends; and to see
what
is "inherited"—or in Burke's case, the British constitution—as a
sufficient
standard of the good, rendering recourse to a higher standard
unnecessary. 8

According to Strauss, what later came to be called
"historical process"
was for Burke "still accidental causation or accidental causation
modified
by the prudential handling of situations as they arose." Burke, he
writes,
saw the sound political order as "the unintended outcome of accidental
causation. He applied to the production of the sound political order
what
modern economy had taught about the production of public prosperity:
the
common good is the product of activities which are not by themselves
ordered
to the common good. Burke accepted the principle of modern political
economy
which is diametrically opposed to the classical principle: 'the love of
lucre', 'this natural, this reasonable . . . principle', 'is the grand
cause of prosperity to all states.' " 9

Strauss sees in Burke the beginnings of a secularized
version of the
traditional belief in Providence. "It almost goes without saying," he
writes,
"that Burke regards the connection between 'the love of lucre' and
prosperity,
on the one hand, and 'a great variety of accidents' and a healthy
political
order, on the other, as part of the providential order. . . ," 10
The theological tradition recognized that God's ways are mysterious,
says
Strauss, and therefore held "that man cannot take his bearings by God's
providence but only by God's law, which simply forbids men to do evil."
But Burke, he contends, "comes close to suggesting that to oppose a
thoroughly
evil current in human affairs is perverse if that current is
sufficiently
powerful; he is oblivious of the nobility of last-ditch resistance." 11
Moreover, Strauss continues, while "political theory had been from its
inception the quest for civil society as it ought to be," Burke's
"political
theory is, or tends to become, identical with a theory of the British
constitution,
i.e., an attempt to 'discover the latent wisdom which prevails' in the
actual." Citing Burke's emphasis on the prescriptive nature of that
constitution,
Strauss argues: "Prescription cannot be the sole authority for a
constitution,
and therefore recourse to rights anterior to the constitution, i.e., to
natural rights, cannot be superfluous unless prescription itself is a
sufficient
guaranty of goodness. Transcendent standards can be dispensed with if
the
standard is inherent in the process; 'the actual and the present is the
rational.' " Thus, he concludes, Burke's thinking is a major step
toward
the historical relativism of Hegel. 12

Strauss is by no means alone in this assessment. Others
expressing similar
interpretations include Harold J. Laski and Lee Cameron McDonald. Laski
sees Burke as, at bottom "a utilitarian who was convinced that what was
old was valuable by the mere fact of its arrival at maturity." 13
He adds that Burke's was essentially a "monistic view of society" which
"maintained the inherent rightness of the existing order." 14
Similarly, McDonald sees Burke as accepting the "English Constitution"
as the ultimate measure of political wisdom while being "too
anti-philosophical"
to be consciously aware of his own "historical relativism." While Burke
often appealed in defense of his various policies to concepts such as
"moral
law" or "experience," writes McDonald, in "all these cases what he was
really appealing to was what we all know deep down to be right because
we are, after all, Englishmen. In the case of Irishmen, Americans,
Indians,
and Frenchmen, they were judged as if they were Englishmen. . . . 15

But such interpretations fail to do justice to the
complexity of Burke's
position. If it were true, as these authors contend, that Burke was an
historical relativist for whom the prescriptive rights of Englishmen
provided
the ultimate ethical standard, then it seems that one of two things
would
have to follow: Either he would (consciously or unconsciously) equate
the
British constitution with a universal standard of right, in which event
he would insist that the details of that constitution should everywhere
apply, or else he would view morality as being merely conventional, in
which case he would see the moral obligation as differing according to
time and place. In fact Burke did neither.

While Burke's fulsome praise for the British constitution in
the Reflections
is often taken as showing an overly exalted view of the existing order,
it is important to remember his purpose on that occasion. He was
upholding
British institutions not as perfect in the abstract but as vastly
preferable
to the approach taken by the French revolutionaries—an approach then
being
vigorously touted by Dr. Richard Price and others for possible
emulation
in England. 16 Burke explicitly
stated,
moreover—and a careful reading of the Reflections bears him
out—that,
in praising the British constitution, he "did not mean that its
exterior
form and positive arrangement should become a model for. . . [France],
or for any people servilely to copy." 17

Burke believed strongly that political constitutions and the
details
of government should differ in accordance with the "character and
circumstances"
of various peoples. 18 But he
also
affirmed that the "principles of true politics are those of morality
enlarged" 19
and that these principles are the same throughout the world. When the
defense
in the impeachment trial of Warren Hastings, governor-general of
Bengal,
argued that "the exercise of arbitrary power" was the historical norm
in
India and that the moral imperative did not hold with the same force
there,
Burke thundered in reply:

This geographical morality we do protest against. .
. . We
think it necessary . . . to declare that the laws of morality are the
same
everywhere, and that there is no action which would pass for an act of
extortion, of peculation, of bribery, and of oppression in England,
that
is not an act of extortion, of peculation, of bribery, and oppression
in
Europe, Asia, Africa, and all the world over. This I contend for not in
the technical form of it, but I contend for it in the substance. 20

As he opposed the notion of a "geographical" morality, so, too, did
Burke
denounce the idea that man's moral duty changes with the passage of
time.
"We know that we have made no discoveries," he writes, "and we think
that
no discoveries are to be made, in morality; nor many in the great
principles
of government, nor in the ideas of liberty, which were understood long
before we were born, altogether as well as they will be after the grave
has heaped its mould upon our presumption, and the silent tomb shall
have
imposed its law on our pert loquacity." 21

For Burke, the moral obligation is "eternal"; it provides
the basis
of all community; and it has its source in the will of God. 22
Hence, all "persons possessing any portion of power ought to be
strongly
and awefully impressed with an idea that they act in trust; and that
they
are to account for their conduct in that trust to the one great master,
author and founder of society." 23

Such examples could be multiplied almost endlessly. A deep
awareness
of a universal moral order having its source in God's will pervades
Burke's
writings. Whatever the issue at hand, Burke constantly repairs in one
way
or another to the theme that all "human laws are, properly speaking,
only
declaratory; they may alter the mode and application, but have no power
over the substance of original justice." 24

How, then, to explain, in the face of such evidence to the
contrary,
the widely held view that Burke was in significant ways a moral
relativist?
An answer may be found in the fact that, while Burke placed great
importance
on the historical nature of human existence, the possibility of an
historicism
that accepts a universal moral order is widely overlooked. 25
In the remaining pages, which will rely heavily on the work of Irving
Babbitt
and Claes Ryn, I intend to argue that Burke was gravitating toward such
a "value-centered historicism." 26
In addition, I hope to show that a key ingredient in Burke's thought is
his tendency to conceive of morality in terms of practical action—i.e.,
in terms of will—rather than reason, and, finally, to reconsider in
this
light some of the points made by Strauss.

We have seen that Strauss, in line with older Western
thought, tends
to associate the moral order with norms of conduct or "general
principles"
accessible to reason, which it is the duty of statesmen and indeed all
men to imitate in the practical realm. He sees such terms as "prudence"
or "practical wisdom" in Burke as connoting mere economic efficiency or
utility unordered by principles of natural right, which are accessible
only to reason or theory. It is for this reason that Strauss concludes
from Burke's elevation of practice over theory that, for Burke, the
common
good results in some way from actions not motivated by moral intent. 27

From the way Burke uses "prudence" or "practical wisdom,"
however, it
becomes apparent that he does not assume, as does Aristotle, a sharp
break
between the realm of action and the realm of the universal or the good.
Rather, prudence itself (also "practical wisdom," "practical science,"
"political reason," which are used interchangeably) has a moral
dimension. 28
And this moral dimension, according to Burke, is not to be found in
rigid
adherence to preconceived rules but in a sense of high purpose, or will,
that accords with the "permanent part" of man's nature. 29

Traditional natural-law thinkers who are accustomed to
associating the
moral imperative with rules or precepts of reason often see a conflict,
as Ryn points out,30 between
stressing
the ultimacy of will and accepting a universal moral order. Heinrich
Rommen
writes, for example, that to assert the superiority of will over
intellect
"means relativism in ethics. . . . It means positivism in
jurisprudence,
non-morality in politics, denial of the natural rights of men, and the
acceptance of absolute power of the state. It leaves no alternative but
to profess that might is right." 31

But this ignores the distinction, long recognized by
Christianity and
other religions, between different qualities of will. Irving Babbitt
has
described the existence within the human breast of two competing
elements
of will: the lower will, which is manifested in the expansive desires,
and the higher will, which is experienced as a propensity to put a
check
on those desires in favor of a unifying and more deeply satisfying goal.32

Commenting on Babbitt's work, Ryn notes that the higher will
itself—and
not some preexisting set of rules discovered by reason—is the ultimate
"moral imperative at the center of [man's] awareness in terms of which
everything is finally evaluated." The higher will, says Ryn, "is in one
sense particular and mutable; it is experienced by individual men and
has
an effect in the unique circumstances of their lives. But this
will
is also the same in all men; it is universal and immutable in that it
pulls
all in the same direction, towards the special quality of life which is
its own reward by satisfying man's deepest yearning." 33
The ethical will is experienced as a negative in that it is felt as an
"inner check" or restraint on man's merely selfish impulses. Yet,
paradoxically,
it is simultaneously experienced in a profoundly positive way as the
potentiality
of a truly meaningful existence: the source of true happiness and
genuine
community. "To the extent," Ryn explains, "that man acts from within
that
special will and thus disciplines opposing inclinations, he unifies his
personality and tends to move into communion with others who are
similarly
motivated." Conversely, the "effect of indulging the selfish will is
deepening
disharmony and isolation from others." 34

Despite intermittent lapses by Burke into the older
rationalist terminology,
it is nonetheless true that he ultimately associates the moral
imperative
with what Babbitt later called the higher will, rather than with
abstract
laws or precepts of reason. In matters of morality and politics,
virtuous
habits and noble character clearly count for more to Burke than
brilliance
of intellect. 35 He frequently
differentiates
between men's "true rights" or their "interest," on the one hand, and
their
"occasional" or "selfish" will, on the other. The people have a right
to
expect of their leaders "an entire devotion to their interest," he
writes,
"but an abject submission to their occasional will" would extinguish in
governmental officials "all moral principle, all sense of dignity, all
use of judgment, and all consistency of character. . . . For power to
be
legitimate, it must be exercised not according to the people's "sordid
selfish interest, nor to their wanton caprice, nor to their arbitrary
will,"
but according to "that eternal immutable law, in which will and reason
are the same." 36

A key difference between Burke and older natural-law
thinkers such as
Thomas Aquinas can be seen in Burke's understanding of the role played
by laws and rules of conduct. Burke sees the establishment of good laws
as crucial to civilized society. Indeed, society cannot exist if the
law
is not respected. But unlike those traditional natural-law thinkers who
viewed the universal moral order as actually inhering in general laws
or
principles of behavior, Burke regards legal codes as means to a higher
end. Civil society, he writes, "is an institution of beneficence; and
law
itself is only beneficence acting by a rule." 37
Laws, then, are instrumental: Their purpose is to help men to achieve
"beneficence"
or, as Burke puts it a sentence later, "justice." And as the
requirements
of justice change with circumstances, the laws should also vary. They
are
not abstract and immutable, he tells us, but matters of "convention."
This
does not mean, however, that legislators or voters in democracies are
free
to act at whim. Morality is not merely subjective. Rather, men must
actively
seek the just solution in the circumstances: the solution that accords
with man's "permanent" nature. 38
While everything else changes, says Burke, this obligation never
changes.
"My Lords," he declared as the Hastings trial drew to its close,

it has pleased Providence to place us in such a
state, that
we appear every moment to be on the verge of some great mutations.
There
is one thing, and one thing only, which defies all mutation; that which
existed before the world, and will survive the fabrick of the world
itself;
I mean justice; that justice, which, emanating from the Divinity, has a
place in the breast of every one of us, given us for our guide with
regard
to ourselves and with regard to others, and which will stand, after
this
globe is burned to ashes, our advocate or our accuser before the great
Judge, when He comes to call upon us for the tenour of a well-spent
life.
. . . 39

The importance Burke places on tradition, prescription and sound
prejudice
is analogous in many ways to the importance he places on legal
enactments:
All provide indispensable support to man's higher disposition in its
continual
struggle against contrary inclinations. Tradition for Burke is the
summing
up in concrete experience of innumerable attempts by men to embody the
good in particular circumstances. As such, it offers to the imagination
a valuable source of inspiration for new acts of morality. "Always
acting
as if in the presence of canonized forefathers," Burke explains in the Reflections,
"the spirit of freedom, leading in itself to misrule and excess, is
tempered
with an awful gravity.40 On the
other
hand, the partial manifestation of the good in tradition never
completely
exhausts the good in its full transcendence. Hence, no
tradition—British
or otherwise—provides for Burke a complete model of the good to be
slavishly
imitated without regard to circumstances. By "following wise examples
you
would have given new examples of wisdom to the world," he says
of
the French revolutionaries. 41

Strauss suggests that Burke abandoned the ancient "quest for
civil society
as it ought to be" in favor of a too-ready acceptance of the existing
as
good. Actually, Burke was too keenly aware of the infinite complexity
of
human existence for him passively to accept any preconceived
set
of behavioral norms (whatever their source) as adequately reflecting
man's
ethical duty. For Burke, man's ethical imperative is an active power.
It
requires the creative ordering of particular circumstances with
reference
to man's ultimate purpose—a purpose emanating from the Divine will. And
as circumstances are constantly changing, man is forever faced with the
necessity of making new moral choices—but always with a view to the one
unchanging end, which is the transcendent good for all. It is this that
Burke probably had in mind when he described himself near the end of
the Reflections
as a person "who would preserve consistency by varying his means to
secure
the unity of his end." 42

In Burke's view, "civil society as it ought to be" is one
that restrains
man's arbitrary impulses while at the same time allowing the higher
will
as much freedom of action as possible. But since the proper balance
depends
upon the (ever changing) "character and circumstances" of the people to
be governed, the "quest" is an eminently practical one. One of the
major
needs of men which it is the office of government to provide, says
Burke,
is "a sufficient restraint upon their passions." "In this sense," he
adds,
"the restraints on men, as well as their liberties, are to be reckoned
among their rights. But as the liberties and restrictions vary with
times
and circumstances, and admit of infinite modifications, they cannot be
settled upon any abstract rule; and nothing is so foolish as to discuss
them on that principle." 43

In Burke's eyes, then, the "quest for government as it ought
to be"
requires not abstract speculation but "a deep knowledge of human nature
and human necessities, and of the things which facilitate or obstruct
the
various ends which are to be pursued by the mechanism of civil
institutions." 44
In other words, it requires both philosophic and pragmatic knowledge of
tremendous proportions; and since mistakes could have disastrous
effects,
not mere utility but morality itself dictates caution and proper
intellectual
humility. "If circumspection and caution are a part of wisdom, when we
work only upon inanimate matter," writes Burke, "surely they become a
part
of duty too, when the subject of our demolition and construction is not
brick and timber, but sentient beings, by the sudden alteration of
whose
state, condition, and habits, multitudes may be rendered miserable." 45
"The true lawgiver," he continues,

ought to have an heart full of sensibility. He
ought to love
and respect his kind, and to fear himself. It may be allowed to his
temperament
to catch his ultimate object with an intuitive glance; but his
movements
towards it ought to be deliberate. Political arrangement, as it is a
work
for social ends, is to be only wrought by social means. There mind must
conspire with mind. Time is required to produce that union of minds
which
alone can produce all the good we aim at. 46

According to Burke, "True humility, the basis of the Christian system,
is the low, but deep and firm, foundation of all real virtue." 47
And among the most important forms of humility, he said many times, is
humility of intellect—"a strong impression of the ignorance and
fallibility
of mankind." 48 Hence, says
Burke,
good statesmen, giving proper regard to their own fallibility, will
proceed
slowly in the task of constitution-building—step by step, using trial
and
error over scores of years and even centuries—so that the resulting
civilization
could not have been foreseen in its fullness by any of the generations
whose efforts helped to build it. It is in this sense that Burke
praised
the British constitution as having come into existence "in a great
length
of time, and by a great variety of accidents." 49
In referring to "accidents," however, he clearly did not mean that the
constitution was good because the product of actions not guided by
moral
intent. On the contrary, as we have seen, Burke viewed the British
constitution
as good precisely to the extent that it had resulted from innumerable
moral
actions, each participating in the universal good but in different
circumstances.
At the same time, he realized full well that many other actions not
ethically
motivated had also gone into the making of his and all societies, and
that
even such good as men had been able painstakingly to build into
civilization
over millennia was constantly threatened by man's lower nature. Given
the
perennial tug-of-war between the lower and higher wills which defines
the
human condition, society short of the eschaton will always be
imperfect,
embodying the universal good in some of its aspects but never
completely.

The mark of a good statesman, according to Burke, is "a
disposition
to preserve" what is good in the existing order, combined with "an
ability
to improve" it. 50 In this
practical
way, the ancient "quest for society as it ought to be" continues even
to
the end of time.

Notes

1. Leo Strauss, Natural Right and History
(Chicago:
University of Chicago Press, 1953), pp. 300-314. [Back]

9. Ibid., pp. 314-15. It should he
noted here
that, while Burke recognized the motivating force of self-interest in
economic
affairs, he did not believe the "love of lucre" alone was sufficient to
produce prosperity or good of any other kind. On the contrary, he
frequently
refers to the subordinate place in the moral order held by the merely
economic,
and condemns economic practices that are not ordered to moral ends. One
of Burke's major complaints against Hastings and the East India
Company,
for instance, was the company's ruthless economic exploitation of
India.
See Russell Kirk, Edmund Burke: A Genius Reconsidered (New
Rochelle,
N.Y.: Arlington House, 1967), pp. 109-111. Also see Edmund Burke, Reflections
on the Revolution In France, ed. Conor Cruise O'Brien
(Harmondsworth:
Penguin Books, 1969), pp. 173-74, 194-95, 3O6-l3. [Back]

11. Ibid., pp. 317-18. Strauss
bases this criticism
on the final paragraph of Burke's Thoughts on French Affairs.
"If
a great change is to be made in human affairs," Burke wrote, "the minds
of men will be fitted to it, the general opinions and feelings will
draw
that way. Every fear, every hope, will forward it; and then they, who
persist
in opposing this mighty current in human affairs, will appear rather to
resist the desires of Providence itself, than the mere designs of men.
They will not be resolute and firm, but perverse and obstinate.''
Strauss
interprets this as meaning that Burke thought the victory of the French
revolution might have been decreed by Providence and that, assuming
that
were so, it would be "perverse'' to oppose it, no matter how evil it
might
be. But as Russell Kirk points out, Burke was not hinting "that perhaps
the champions of religion and of things established ought to let
themselves
be swept away by the current of the French Revolution. On the contrary,
he says that effectual opposition to the Revolution must be the work of
many people, acting together intelligently. . . . The 'mighty current'
for which he hopes is an awakening of the men with 'power, wisdom, and
information' to the peril of the Revolution. . . ." See Russell Kirk,
"Three
Pillars of Order: Edmund Burke, Samuel Johnson, Adam Smith,'' Modern
Age, XXV (Summer 1981), 228. Significantly, Burke's actual
conduct—which
he insisted was the best test of a man's principles—is in direct
contradict
ion to Strauss's interpretation. As Kirk notes (''Three Pillars of
Order,''
p. 228): "Of all the men of his time, Burke was the most vehemently
opposed
to any compromise with Jacobinism. He would have chosen the guillotine
rather than submission—or, as he put it, death with the sword in hand.
He broke with friends and party, sacrificing reputation and risking
bankruptcy,
rather than countenance the least concession to the 'peace' faction in
England.'' [Back]

27. Compare Strauss's assertion that
"skepticism in
regard to theoretical metaphysics . . . culminated in the depreciation
of theory in favor of practice" and that this brought "into being a new
type of theory, of metaphysics, having as its highest theme human
action
and its product rather than the whole [i.e., the transcendent good],
which
is in no way the object of human action" (Natural Right and History),
p. 320, with Aristotle's description of wisdom (sophia) as "most
precious for it is extraordinary that anyone should regard political
science
or prudence as most important, unless man is the highest being in the
world,"
(Nicomachean Ethics, trans. J. A. K. Thomson [revised ed.,
Harmonsworth:
Penguin Books, 1976], Bk. VI, Ch. VII, p. 212.) [Back]

34. Ibid. For a more extensive
discussion of
the moral imperative as will, see Claes G. Ryn, Democracy and the
Ethical
Life Baton Rouge: Louisiana State University Press, 1978), esp.
Part
Two. [Back]

35. Burke writes (Letter to [William
Markham],
Letters, p. 131) that, "when your lordship speaks of tests of
public
principles, there is one which you have not mentioned, but which, let
me
say, is far above them all,—the actions and conduct of men. Let mine,
and
those of my friends, speak for our public principles." [Back]

38. "Lawyers . . . have their strict rule
to go by,"
Burke writes (Sheriffs of Bristol, Works, II, p.7). "But
legislators ought to do what lawyers cannot; for they have no other
rules
to bind them, but the great principles of reason and equity, and the
general
sense of mankind. These they are bound to obey and follow; and rather
to
enlarge and enlighten law by the liberality of legislative reason, than
to fetter and bind their higher capacity by the narrow constructions of
subordinate, artificial justice." [Back]

48. Burke, Reflections, p. 376.
Referring to
the French revolutionaries' lack of appreciation for the good examples
of the past, Burke notes (Of the National Assembly, Works,
II, p. 553) that "a certain intemperance of intellect is the disease of
the time, and the source of all its other diseases." [Back]

--------------------------------------------------

--------------------------------------------------

Job Description:

Manages the strategy and planning of activities, and oversees staff responsible for coordinating and organizing meetings and special events and of various sizes. Plans logistics and negotiates contract(s) for conferences, and/or events, with respect to budgets, speakers, entertainment, transportation, facilities, technology, equipment, logistical requirements, printing, food and beverage, and other related issues. Negotiates terms and fees, and executes and administers multiple contracts with facilities, vendors, speakers, entertainers, etc., for service, in accordance with budget constraints and company policies and procedures. Serves as liaison between contractors, organizers, and management with regards to all facets of the programs and events. Designs and prepares various marketing materials, to include brochures and flyers, for meetings, conferences, and other events; and promotes events using means such as flyers, cold calling, and social media. Performs duties of Event Coordinator in absence of Coordinator. Analyzes all aspects of event performances. Plans and monitors budgets, adjusts when necessary, and ensures they are adhered to. Hires, trains, and educates staff on proper event procedures. Less

Manages the strategy and planning of activities, and oversees staff responsible for coordinating and organizing meetings and special events and of various sizes. Plans logistics and negotiates contract(s) for conferences, and/or events, with respect to budgets, speakers, entertainment, transportation, facilities,... More

--------------------------------------------------

--------------------------------------------------

There has so far been used a computer system provided with a normal or operating site and a standby site for maintaining the system function even on outbreak of disasters. Such computer system is termed a replication system. During normal operation time, the normal site is performing operation for providing system functions and, in case the normal system is unable to operate as regularly, the standby site comes into operation to take the place of the normal site.
For providing the functions as the computer system, the operating site and the standby site have respective storage systems for storing data. In the replication system, data in the storage system of the operating site is replicated and retained in the storage system of the standby site, such that the standby site may come into operation to take the place of the operating site (for example, see Patent Documents 1 and 2). This processing is termed the ‘replication’.
In the replication system, the normal site and the standby site may be ‘synchronized’, in which case the replication is termed ‘synchronous replication’. Or, the normal site and the standby site may be ‘non-synchronized’, in which case the replication is termed ‘asynchronous replication’.
If, in the synchronous replication, there occurs Write in a storage device in the normal site, the same data is written in the storage device of the stand-by site, with the Write for the normal site acting as a trigger. In the asynchronous replication, WRITE in the storage device of the stand-by site is carried out subsequently, with the WRITE for the normal site then not acting as a trigger.
Among the methods currently known for decreasing the band of the network, there is a method in which only the data updated latest in the storage is transmitted as update data for the same block (Non-Patent Document 1). The amount of data traffic over a network may be reduced more than in case of complete data copying by transferring and copying only the difference (‘gap’) between the data stored in the normal system and that stored in the standby system. However, in these systems, the amount of data transfer may be decreased only when update has occurred for the same area during predetermined time duration. The amount of data transfer cannot be decreased for data update for physically or logically differing areas.
In a system for implementing the replication with a middleware layer, such as a database, there is known a method which resides in transferring a REDO log to create a data file in the standby site (Non-Patent Document 3). If replication is used even with this system, data not in need of being sent to the stand-by site do not have to be sent, thereby diminishing the amount of data transferred on the network. However, there arises the necessity for a computer capacity for running the middleware, software or software license in the stand-by site. In addition, there is a possibility that the application run on the normal site may be lowered in performance as a result of the middleware or the replication function in the middleware being run on the host. There is also presented a problem that the application being run has to be developed using the middleware, and hence the system has to be modified for newly introducing the middleware in mirroring a pre-existing system.
Meanwhile, as a prior-art publication, the Patent Document 1 shows a method and a system for reducing the amount of data transfer necessary for copying DB data to assure data matched as DB table of the destination of copy. It is stated that, with use of the log, data to be copied to a remote device may be buffered with the amount of information less than with buffering on a cache. However, with the method and the system disclosed in Patent Document 1, if data of the same contents are written in plural distinct locations, it becomes necessary to transmit data per se.
In Patent Document 2, there is disclosed a system in which a frame from a central processing unit is temporally stored in a header converting buffer in a master side disc apparatus and in which the header part of the frame is converted into a header part for a remote side disc apparatus, and the resulting frame is then transmitted.
In Patent Document 3, there is disclosed the configuration in which copying means in a concentrator in a disc array device of a primary site copies update data on a cache in a manner of sequentially packing the data in a transmitting buffer from the leading end, a transmitting means transfers the packing data of the storage buffer to a disc array device of a secondary site, and in which a receiving means in the disc array device of the secondary site copies update data in the packing data in a multiplexed form in the packing sequence. In this case, the update data are transmitted in their entirety.
In Patent Document 4, there is disclosed a system reducing the amount of communication in multiplexing a master file and a duplicated file. In this system, a master file read in from a master area is cached in a cache area, a changed data part in the cache area is transferred to an associated part in a master area, and the changed data part is multiplexed in the master area and in the cache area, while the non-changed data part is multiplexed in the master area and the copying area. Finally, the non-changed data part is transferred to the cache area and the duplicated data is integrated in the cache area to provide a duplicated area. It is sufficient to transfer data only to the master area at the time of preparation of the duplicated file, and hence the volume of communication may be reduced for multiplication.
[Non-Patent Document 1]
EMC Corporation, EMC SRDF, SRDF/A [ONLINE] (Retrieved on Jul. 28, 2004, Internet <URL http://japan.emc.com/local/ja/jp/products/networking/srdf.jsp>
[Non-Patent Document 2]
NEC Corporation, SYSTEM GLOBE REMOTE DATA REPLICATION [ONLINE] [Retrieved on Jul. 28, 2004], Internet <URL http://www.sw.nec.co.jp/products/istorage/product/software/rdr/index.s html>
[Non-Patent Document 3]
Oracle, ORACLE DATA GUARD 10G White Paper [ONLINE] [Jul. 28, 2004] Internet <URL: http://otn.oracle.co.jp/cgi-bin/otn/auth_r.cgi?path=/download/products/database/oracle10g/pdf/twp_ha_dataguardoverview—10gr1—1103.pdf>
[Patent Document 1]
JP Patent Kokai Publication No. JP-P2000-347917A
[Patent Document 2]
JP Patent Kokai Publication No. JP-P2003-085017A
[Patent Document 3]
JP Patent Kokai Publication No. JP-P2003-167684A
[Patent Document 4]
JP Patent Kokai Publication No. JP-P2003-323328A

--------------------------------------------------

--------------------------------------------------

Circulating monoclonal B lymphocytes in multiple myeloma.
Peripheral blood mononuclear cells from 28 patients with multiple myeloma (MM) and nine patients with monoclonal gammopathy of unknown significance (MGUS) were studied by immunoglobulin gene analysis. Clonal immunoglobulin gene rearrangements in peripheral blood mononuclear cells (PBIGRA) were demonstrated in 10 of the 28 MM patients (36%). Bone marrow and peripheral blood mononuclear cells were studied simultaneously in five of these 10 patients, and identical gene rearrangements were demonstrated in both. The incidence of such gene arrangements was higher in patients with active disease (cases at presentation or relapsed = 10/19 [47%]) compared to remission status (0/9) and higher in untreated (47%) compared to treated patients (11%) (P less than 0.05). Patients with this phenomenon had higher serum calcium levels (P less than 0.001), and higher bone marrow plasma cell counts (P less than 0.05). Serum creatinine and beta 2-microglobulin were also higher but did not reach statistical significance. None of the patients with monoclonal gammopathy of uncertain significance had gene arrangements. Our findings confirm that circulating B lymphocytes are part of the malignant clone in MM and their presence correlates with high tumour volume.

--------------------------------------------------

--------------------------------------------------

Iron overload in β-thalassemia intermedia: an emerging concern.
The aim is to overview recent evidence on consequences, assessment, and management of iron overload in transfusion-independent patients with β-thalassemia intermedia. Despite their transfusion-independence, β-thalassemia intermedia patients can still accumulate iron due to increased intestinal absorption. Recent observational studies show that iron burden in this group of patients can ultimately reach considerably high thresholds, and leads to a variety of serious morbidities involving the liver, endocrine glands, and arguably the vascular system. The diagnosis of iron overload in this patient population can follow established guidelines from β-thalassemia major patients, although with careful interpretation of spot serum ferritin levels. Data from a recent randomized clinical trial demonstrated the efficacy and safety of iron chelation therapy in decreasing liver iron concentration in this group of patients, which may ultimately help in reducing morbidity risk. Iron overload in transfusion-independent patients with β-thalassemia intermedia deserves careful attention, and prompt diagnosis and management are recommended.

--------------------------------------------------

--------------------------------------------------

matt's notebook

New Year's Day

You sleep away your acid head, and I,
high on the mountain, nailed down by the noon,
watch the wasp dig, oviposit and fly.
Cease, diethylamide, sleep like the Stag
at Bay. The city, plumbed into the sea,
hums no tune from here. Linen straps your leg
to the mattress, my foot suffers the scree
path to the car park at Pick 'n' Pay. Cool
my cheek on the freezer cabinet. I
will prepare a pawpaw, quarter the fruit
in its skin, etch it with sugar and lime.
My shoulders scratch, antsy for a shower.
We drift off on the fruit flies' dance and dream.
We match our shagged shins. We, finally, surrender.

--------------------------------------------------

--------------------------------------------------

Stroke and migraine--the spectrum of cause and effect.
The relationship of migraine and stroke is complex. Stroke may be coincidental with migraine but migraine may confer an increased risk of stroke in women under 45 years of age and possibly in men who have migraine with aura. Stroke may mimic migraine but migraine syndromes may be symptomatic of underlying cerebrovascular disorders. True migraine-induced stroke is rare. The mechanisms of stroke induced during a migraine attack remain to be determined but probably involve an interaction between the dynamic shifts in cerebral blood flow and stroke risk factors.

--------------------------------------------------

--------------------------------------------------

X-Faktor (series 6)

X-Faktor is a Hungarian television music competition to find new singing talent. The sixth series aired on RTL Klub in 2016. Bence Istenes presented his third series of X-Faktor. Gabi Tóth returned as a judge for the third time. Laci Gáspár, Peti Puskás and ByeAlex, joined her, who replaced judges Róbert Alföldi, Róbert Szikora and Gábor Szűcs (Little G. Weewil).

The series also saw the age limit decreased from 14 to 12.

Judges' houses
At this stage of the competition each judge mentored six acts. 24 acts went through for this stage of the show. Each judge had help from a guest judge to choose their final acts.

The twelve eliminated acts were:
Boys: József Berki, Kristóf Petics, Máté Türk
Girls: Cintia Laszló, Stephanie Semeniuc, Fanni Sorbán
Over 25s: Laszlo Brantner, Nikoletta Colette Horváth, Anita Anissza Sárosi 
Groups: Atomic Playboyz, Dynamite Dudes, The Wedding at the Slaughterhouse

Finalists

Key:
 – Winner
 – Runner-Up
 – Third place

Kristóf Petics had originally been chosen for the live shows, but was disqualified from the competition due to him performing fighting and problematic behavior. He was replaced by Ricsi Mata.

Results summary

{|
|-
| – mentored by Gabi Tóth (Girls)
|| – Bottom two/three
|-
| – mentored by Peti Puskás (Boys)
| – Safe
|-
| – mentored by ByeAlex (Groups)
|| – Eliminated by SMS vote
|-
| – mentored by Laci Gáspár (Over 25s)
|}

Live Shows

Week 1 (5 November)
 Theme: Songs that describe the contestants
 Celebrity performer: Spoon 21 & Dirty LED Light Crew ("Deák")
 Group performance: "Minden a miénk"

Judge's vote to eliminate
 Gáspár: Jaggers
 ByeAlex: Szandra Fejes
 Puskás: Jaggers
 Tóth: Jaggers

Week 2 (12 November)
 Theme: Love songs
 Celebrity performer: Margaret Island ("Sárga levelek")
 Group performance: "Sugar"

Judge's vote to eliminate
 Puskás: Liza Vince Aliz
 Tóth: Gergő Dánielfy
 Gáspár: Gergő Dánielfy
 ByeAlex: Gergő Dánielfy

Week 3 (19 November)
 Theme: When Calling the City
 Celebrity performer: The KOLIN ("Soda & Lime")
 Group performance: "Can't Stop the Feeling!"

Judge's vote to eliminate
 Gáspár: János Ónodi
 Puskás: János Ónodi
 Tóth: János Ónodi
 ByeAlex: not required to vote as there was already a majority, but stated that he would have eliminated Szandra Fejes

Week 4 (26 November)
 Celebrity performer: JETLAG ("Karszalagok")
 Group performance: "Up"

Judge's vote to eliminate
 Gáspár: Liza Vince Aliz
 Tóth: Szandra Fejes
 Puskás: Liza Vince Aliz
 ByeAlex: Szandra Fejes

With each act receiving two votes, the result was reverted to the earlier public vote. Liza Vince Aliz received the fewest votes and was eliminated.

Week 5 (3 December)
 Theme: One Hungarian song and one English song

Judge's vote to eliminate
 Gáspár: Dmitrij Gorbunov
 Puskás: Szandra Fejes
 ByeAlex: Szandra Fejes
 Tóth: Szandra Fejes

Week 6 (10 December)
 Theme: Contestant's choice and Mentor's choice

Judge's vote to eliminate
 ByeAlex: Dmitrij Gorbunov
 Puskás: Ham ko Ham
 Tóth: Ham ko Ham
 Gáspár: Dmitrij Gorbunov

With each act receiving two votes, the result was reverted to the earlier public vote. Ham ko Ham received the fewest votes and was eliminated.

Week 7 Final (17 December)
 Theme: mentor's choice, a duet with mentor, contestant's choice, winner's single

Category:Hungarian reality television series
Category:2016 Hungarian television seasons

--------------------------------------------------

--------------------------------------------------

[Medical student-patient relationship: the students' perspective].
The relationship between medical students and patients has special characteristics that require to be well understood to prepare both students and tutors. To learn about medical students' thoughts and experiences once they start working with patients, how do they solve difficulties or problems and their perceptions about professional roles and patient rights. Qualitative study based on semi-structured interviews applied to 30 volunteer third year medical students who were beginning their clinical practice. The answers to open questions were transcribed and then analysed and grouped by topics and categories. Helping others was the main motivation to go to medical school. Other reasons were scientific interest and social status. Students felt prepared to communicate with patients. However they felt anxious, stressful and fearful of not being competent or not being able to answer patients' questions. There were some differences between male and female students' feelings. Nevertheless students declared that they had rewarding experiences with patients. They all recognized that patients have the right to reject being treated by students. The answers also showed that the first clinical experiences led to significant changes in their views of the medical profession. Students are aware of their trainee condition, the benefits that they obtain being in contact with patients and of their limitations. Patients must voluntarily accept to be subject of the students' training program and informed consent procedures need to be developed.

--------------------------------------------------

--------------------------------------------------


98 Cal.Rptr.2d 852 (2000)
82 Cal.App.4th 1263
The PEOPLE, Plaintiff and Respondent,
v.
Cheryl COVINGTON, Defendant and Appellant.
No. F032872.
Court of Appeal, Fifth District.
August 11, 2000.
*853 Gregory H. Mitts, Bakersfield, for Defendant and Appellant.
Bill Lockyer, Attorney General, David P. Druliner, Chief Assistant Attorney General, Robert R. Anderson, Assistant Attorney General, Stan Cross and Brian G. Smiley, Deputy Attorneys General, for Plaintiff and Respondent.

OPINION
BUCKLEY, J.
The defendant, Cheryl Covington, appeals from an order denying her petition to expunge a grand theft conviction following termination of her probation. (Pen. Code, § 1203.4.)[1] She contends she was entitled to expungement as a matter of right because she complied with all the conditions of her probation, and in particular *854 the requirement she pay restitution commensurate with her ability to pay. We disagree and will affirm the order.

BACKGROUND
Covington worked as a bookkeeper for Kern River Distributors. In 1989, she began diverting company funds to her personal use and continued to do so over the next three years until she was finally discovered and arrested in November of 1992. She subsequently was charged with four counts of grand theft (former § 487, subd. (1), now § 487, subd. (a))one count for each year from 1989 to 1992and one count of forgery (§ 470). Pursuant to a plea agreement, Covington pleaded guilty to one of the theft counts subject to a Harvey waiver (People v. Harvey (1979) 25 Cal.3d 754, 159 Cal.Rptr. 696, 602 P.2d 396). The other charges were dismissed.
On March 10, 1993, the court suspended imposition of sentence and placed Covington on five years' probation on the condition, among others, she serve one year in jail. The court also ordered her, pursuant to former section 1203.04, to pay $99,473.48 in restitution to her former employer through the probation department.
Following her release from jail, Covington began making payments at the rate of $150 per month, the amount the probation department determined she could afford. She evidently made all the payments as scheduled over the next four years. In addition, she deeded her interest in her house to the owner of Kern River Distributors, further reducing her liability by about $4,000.
In January of 1998, some two months before Covington's probation was due to end, the probation department filed a "DECLARATION LETTER" asking the court to revoke her probation for failure to comply with the restitution condition. Her outstanding balance was then about $88,000. At a hearing in April, the court denied the revocation petition, finding no evidence Covington had willfully failed to pay when she had the means to do so. (§ 1203.2.)[2] The court therefore reinstated her probation, which it then terminated. (§ 1203.3.)
Covington thereafter filed a section 1203.4 petition to expunge her conviction. The court denied the petition on the ground she had not met the restitution condition.

DISCUSSION
Covington maintains the court was required to grant her expungement petition, despite her failure to pay the full amount of restitution, because she complied with the terms of her probation by making all court-ordered payments prior to termination. She argues, in effect, that her compliance was established by the court's earlier finding she had done nothing to warrant revocation of her probation.
Section 1203.4 provides in pertinent part:
"(a) In any case in which a defendant has fulfilled the conditions of probation for the entire period of probation ... the defendant shall, at any time after the termination of the period of probation, if he or she is not then serving a sentence *855 for any offense, on probation for any offense, or charged with the commission of any offense, be permitted by the court to withdraw his or her plea of guilty ... and enter a plea of not guilty ... and... the court shall thereupon dismiss the accusations or information against the defendant and except as noted below, he or she shall thereafter be released from all penalties and disabilities resulting from the offense of which he or she has been convicted...."
Under section 1203.4, when a defendant has "fulfilled the conditions of probation for the entire probationary period" he or she "is entitled as a matter of right to have the plea or verdict of guilty changed to one of not guilty, to have the proceedings expunged from the record, and to have the accusations dismissed." (People v. Chandler (1988) 203 Cal.App.3d 782, 787, 250 Cal.Rptr. 730, fn. omitted; People v. Johnson (1955) 134 Cal.App.2d 140,144, 285 P.2d 74.)
In finding Covington had not satisfied the restitution condition of her probation, the court relied in large part on People v. Chandler, supra, 203 Cal.App.3d 782, 250 Cal.Rptr. 730. As in the present case, the defendant in Chandler was granted probation on the condition, among others, he pay restitution to his victim. The amount was later determined to be $2,571.65, made payable at $20 per month over the three-year probationary period. The defendant, who was unemployed for the first year, initially made some payments of $5 or $10, but eventually started paying $20 each month once he found a job. Even so, over the course of the three years he paid only a few hundred dollars. Therefore, on the day before probation was to end, the probation department asked the court to extend it by two years so the defendant could pay the balance. In order to retain jurisdiction and toll the running of the probationary period (§ 1203.2, subd. (a)), the court made a preliminary finding the defendant had failed to comply with the restitution condition, and so revoked his probation subject to a formal violation hearing. At the hearing however, the court reinstated and terminated probation in light of the defendant's efforts to pay. A year later, the defendant filed a section 1203.4 petition. The petition was denied based on the court's determination the defendant had failed to satisfy the restitution condition. (Chandler, supra, 203 Cal. App.3d at pp. 785-786, 250 Cal.Rptr. 730.)
The appellate court framed the issue on appeal as follows: "[W]hether the trial court was required to grant defendant's application for relief under Penal Code section 1203.4 because, as defendant contends, he had complied with the terms of probation during the probationary period, and the court terminated probation before defendant had paid restitution in full." (People v. Chandler, supra, 203 Cal.App.3d at p. 786, 250 Cal.Rptr. 730.) The defendant argued the lower court's decision not to revoke his probation amounted to an implied finding of "`good conduct and reform'" to the effect that he had met all the conditions of his probation notwithstanding his failure to pay restitution in full. (Id. at pp. 787-788, 250 Cal.Rptr. 730.)
The appellate court rejected this contention. As it explained, a grant of probation is not a matter of right but an act of clemency, and a decision to revoke probation when the defendant fails to comply with its terms rests within the broad discretion of the trial court. By contrast, the defendant is entitled by right to relief under section 1203.4 if he or she has fulfilled the conditions of probation during the entire probationary period. Thus a decision by the court, in the exercise of its discretion, declining to revoke probation despite a violation is not the same as a determination the defendant fully complied with all its conditions. (People v. Chandler, supra, 203 Cal.App.3d at pp. 788-789, 250 Cal. Rptr. 730; see also People v. Turner (1961) 193 Cal.App.2d 243, 247, 14 Cal. Rptr. 130.)
The Chandler court's conclusion, of course, rested on the premise there were *856 grounds to revoke the defendant's probation. "Although the court could have revoked defendant's probation for failure to pay restitution in full [citation], it chose not to do so." (People v. Chandler, supra, 203 Cal.App.3d at p. 789, 250 Cal.Rptr. 730.) The basis of this statement, however, is not altogether clear. As noted, section 1203.2 provides, as it did at the time Chandler was decided, that "probation shall not be revoked for failure of a person to make restitution pursuant to Section 1203.04 as a condition of probation unless the court determines that the defendant has willfully failed to pay and has the ability to pay. Restitution shall be consistent with a person's ability to pay." (See People v. Hernandez (1991) 226 Cal.App.3d 1374, 1378, 277 Cal.Rptr. 444.) There is nothing in the Chandler decision to indicate the defendant could have satisfied the restitution condition during the period of probation.[3]
In any event, there were no grounds in the present case to revoke Covington's probation for failure to pay restitution. The trial court so found, and thus had no choice but to terminate probation. Consequently, we are presented with a somewhat different question than was the court in Chandler. We must decide whether a defendant who has fully complied with a schedule of restitution payments approved by the probation department and implicitly ordered by the court (as well as all other terms of probation) has thereby "fulfilled the conditions of probation for the entire period of probation" (§ 1203.4) even though an unpaid balance remains at the time probation is terminated. In order to answer this question, it is necessary to reconcile the general requirement that a defendant pay restitution to his or her victim with the limitation that "[restitution shall be consistent with a person's ability to pay." (§ 1203.2.) It will often be the case, as it was here, that a defendant lacks the ability to pay restitution in full within the period he or she is on probation.
The right of a crime victim to recover restitution is set out in article I, section 28, subdivision (b) of the California Constitution, which was enacted by a vote of the people in June of 1982 as part of Proposition 8. (People v. Vega-Hernandez (1986) 179 Cal.App.3d 1084, 1091-1092, 225 Cal. Rptr. 209.) It provides in part:
"It is the unequivocal intention of the People of the State of California that all persons who suffer losses as a result of criminal activity shall have the right to restitution from the persons convicted of the crimes for losses they suffer. [¶] Restitution shall be ordered from the convicted persons in every case, regardless of the sentence or disposition imposed, in which a crime victim suffers a loss, unless compelling and extraordinary *857 reasons exist to the contrary." (Cal. Const., art. I, § 28, subd. (b).)
This statement of intent was not self-executing, but required action by the Legislature to implement it. (179 Cal.App.3d at p. 1092, 225 Cal.Rptr. 209.)
In 1983, the Legislature adopted former section 1203.04. Subdivision (a) stated: "In every case where a person is convicted of a crime and is granted probation, the court shall require, as a condition of probation, that the person make restitution ... [¶] (1) To the victim...." (Stats.1983, ch. 568, § 2, p. 2434. See also § 1203.1, subd. (a)(3).) Although exceptions could be made if "compelling and extraordinary reasons" were found to exist, the statute did not predicate imposition of a restitution condition on the defendant's ability to pay. However, section 1203.2 was enacted at the same time and, as noted above, provided that probation could not be revoked for the defendant's nonwillful failure to pay restitution. It also provided that "[r]estitution shall be consistent with a person's ability to pay." (See People v. Ryan (1988) 203 Cal.App.3d 189, 194-195, 249 Cal.Rptr. 750.)
Section 1203.1k, enacted in 1987, made provision for determining the amount of restitution and the manner in which it was to be paid. The determination can be made by the court upon the probation officer's recommendation or, with the defendant's consent, by the probation officer directly, subject to the defendant's right at hearing to dispute the probation officer's determination.
Despite what Covington seems to believe, these various provisions, read together, do not say that a probationer's obligation to pay restitution is limited to what he or she can afford to pay while on probation. Instead we understand them to mean, in effect, that a restitution condition has two requirements, both of which must be satisfied before the probationer has "fulfilled the conditions of probation for the entire period of probation."
First, the defendant must make all court-ordered restitution payments during "the entire period of probation" insofar as he or she has the ability to do so. A defendant who fails to meet this requirement is in violation of probation, and so is not entitled to section 1203.4 relief whether or not the violation results in revocation. (People v. Chandler, supra, 203 Cal. App.3d 782, 250 Cal.Rptr. 730; People v. Turner, supra, 193 Cal.App.2d at p. 247, 14 Cal.Rptr. 130.) But compliance with this first requirement, i.e., the fact the defendant did not violate probation by failing to make restitution payments, does not mean he or she has "fulfilled the [restitution] conditions of probation."[4] Compliance with a restitution condition also requires that the defendant pay the full amount of the victim's losses as determined by the court.
"Conditions are imposed on probation `to the end that justice may be done, that amends may be made to society for the breach of the law, for any injury done to any person resulting from that breach, and generally and specifically for the reformation and rehabilitation of the probationer....' (§ 1203.1.) Restitution `may serve the salutary purpose of making a criminal understand that he has harmed not merely society in the abstract but also individual human beings, and that he has a responsibility to make them whole.' (People v. Richards (1976) 17 Cal.3d 614, 620 [131 Cal.Rptr. 537, 552 P.2d 974]) Thus, aside from making the victim whole, restitution serves valid punitive, deterrent, and rehabilitative objectives by requiring the defendant to return his ill-gotten gains and helping *858 him appreciate the harm done to the victim. [Citation.]." (People v. Cookson, supra, 54 Cal.3d at p. 1097, 2 Cal. Rptr.2d 176, 820 P.2d 278.)
A grant of probation is also in effect "a bargain made by the People, through the Legislature and the courts, with the convicted individual, whereby the latter is in essence told that if he complies with the requirements of probation, he may become reinstated as a law-abiding member of society. [Citation.] As an additional inducement, the `[r]emoval of the blemish of a criminal record' is held out through the provisions of Penal Code section 1203.4. [Citation.]" (People v. Chandler, supra, 203 Cal.App.3d at p. 788, 250 Cal.Rptr. 730.) "The expunging of the record of conviction is, in essence, a form of legislatively authorized certification of complete rehabilitation based on a prescribed showing of exemplary conduct during the entire period of probation." (People v. Turner, supra, 193 Cal.App.2d at p. 247, 14 Cal.Rptr. 130.) Certainly the rehabilitative purposes of probation, much less the constitutional right of a victim to restitution, would be ill served if the defendant could have his or her conviction expunged without having made up for the victim's losses.
Nor is such a result required by equal protection principles. Covington asserts, without any further discussion or citation to authority, that she was denied relief under section 1203.4 simply because she was not wealthy enough to have paid her court-ordered restitution in full while she was on probation. The "ability to pay" provision of section 1203.2 was intended to Protect the right of an indigent defendant to due process and equal protection (Bearden v. Georgia, supra, 461 U.S. 660, 103 S.Ct. 2064, 76 L.Ed.2d 221), not to relieve a wrongdoer from responsibility for the consequences of his or her criminal act. It would be anomalous indeed if a provision designed to equalize the treatment of rich and poor defendants were applied in a way that only shifted the inequality to the other extreme. Equal protection means only that Covington can have her conviction expunged, the same as the wealthier defendant in her hypothetical, if and when she pays restitution to Kern River Distributors in the total amount of $99,473.48.
In summary, we hold that, for purposes of section 1203.4, a defendant has not fulfilled a restitution condition of probation unless he or she has made all court-ordered payments "for the entire period of probation" and has paid his or her obligation in full. Here Covington satisfied the first requirement but not the second. Therefore, she was not entitled to have her grand theft conviction expunged.

DISPOSITION
The order denying Covington's application for relief under section 1203.4 is affirmed.
THAXTER, Acting P.J., and HARRIS, J., concur.
NOTES
[1]  All future statutory references are to the Penal Code.
[2]  Section 1203.2, subdivision (a) states in part: "... probation shall not be revoked for failure of a person to make restitution pursuant to Section 1203.04 as a condition of probation unless the court determines that the defendant has willfully failed to pay and has the ability to pay." The prosecutor conceded the allegations in the declaration letter were not sufficient to show Covington had been able but unwilling to pay more than she did.

For the first time at the April hearing, the probation officer alleged, as a separate ground for the revocation, that Covington had failed to report a change in her financial situation that would have enabled her to pay more than $150 per month. However, the prosecutor acknowledged due process would require a supplemental petition be filed and a new hearing be held to establish the truth of the allegation before probation could be revoked on that basis. Instead, the prosecutor asked the court to dismiss the revocation petition.
[3]  The "ability to pay" provision was added in 1983 and took effect on January 1 of the following year. (Stats. 1983, ch. 568, § 2.5, p. 2435.) It was adopted in response to the decision in Bearden v. Georgia (1983) 461 U.S. 660, 103 S.Ct. 2064, 76 L.Ed.2d 221, where the Supreme Court held, on due process grounds, that a probationer may not be imprisoned for failing to pay a fine or restitution unless the court has first inquired into the reasons for the failure. "If the probationer has willfully refused to pay the fine or restitution when he has the means to pay, the State is perfectly justified in using imprisonment as a sanction to enforce collection." (Id. at p. 668, 103 S.Ct. 2064.) But if the probationer was unable to pay despite sufficient bona fide efforts to do so, imprisonment is permissible only if alternative measures of punishment have been considered and found to be inadequate. (Id. at p. 672, 103 S.Ct. 2064; see also People v. Cookson (1991) 54 Cal.3d 1091, 1096-1097, 2 Cal.Rptr.2d 176, 820 P.2d 278.)

The defendant in Chandler evidently was granted probation on January 14, 1983, before section 1203.4 was amended, but the hearing at which he was found to have violated the restitution condition occurred three years later, well after the ability to pay amendment took effect. Indeed, notwithstanding the appellate court's conclusion, the trial court in Chandler may have reached the result it did because it determined the defendant had not willfully failed to pay restitution within his means.
[4]  Covington's reliance on People v. Hawley (1991) 228 Cal.App.3d 247, 278 Cal.Rptr. 389 is misplaced. The defendant in that case was found to be entitled to relief under section 1203.4 not because he had fulfilled the conditions of probation (he admittedly had not), but because he had been discharged from probation prior to the termination of the period of probation, which is an entirely separate ground for relief.


--------------------------------------------------

--------------------------------------------------

Conf

Conf may stand for:
Configuration (disambiguation), a term with a number of meanings used in different fields.
conf.exe, the filename of Microsoft NetMeeting
Confessor of the faith, in the Christian Church; when the term Conf. follows the name of a Christian saint it denotes that the saint was a Confessor of the Faith.

--------------------------------------------------

--------------------------------------------------

Q:

Default scheduling in OpenMP (gcc compiler)

I am using OpenMP in a C++ progam. According to the gcc documentation, the default scheduling is dynamic with a chunk size of 1 -> https://gcc.gnu.org/onlinedocs/gcc-9.3.0/libgomp.pdf (p22).
I decided to test this so I wrote a simple C++ test program:
#include <chrono>
#include <cmath>
#include <iostream>
#include <omp.h>
#include <vector>

int main()
{
    std::vector<double>  myArray {};
    for(std::size_t i {0} ; i < 100000000 ; ++i)
    {
        myArray.push_back(static_cast<double>(i));
    }

    #pragma omp parallel
    {
        if(omp_get_thread_num() == 0)
        {
            std::cout << "Number of threads = " << omp_get_num_threads() << "/" << omp_get_num_procs() << std::endl;
            omp_sched_t schedule {};
            int chunk_size {};
            omp_get_schedule(&schedule , &chunk_size);
            std::string scheduleStr {};
            switch(schedule)
            {
                case omp_sched_static:
                    scheduleStr = "static";
                    break;
                case omp_sched_dynamic:
                    scheduleStr = "dynamic";
                    break;
                case omp_sched_guided:
                    scheduleStr = "guided";
                    break;
                case omp_sched_auto:
                    scheduleStr = "auto";
                    break;
                default:
                    scheduleStr = "monotonic";
                    break;
            }
            std::cout << "Default schedule: " << scheduleStr << "," << chunk_size << std::endl;;
        }
    }

    auto startTime {std::chrono::high_resolution_clock::now()};
    #pragma omp parallel for default(shared) schedule(dynamic, 1)
    for(std::size_t i = 0 ; i < myArray.size() ; ++i)
    {
        myArray[i] = std::pow(myArray[i], 10);
    }
    auto endTime {std::chrono::high_resolution_clock::now()};
    auto ellapsedTime {std::chrono::duration_cast<std::chrono::milliseconds>(endTime - startTime)};
    std::cout << "OMP for Time: " << static_cast<double>(ellapsedTime.count())/1000.0 << " s" << std::endl;

    return 0;
}

I compiled the code using MSYS2's mingw version (gcc 9.3.0) with no optimisations and -g enabled. The default schedule is dynamic, 1 as in the documentation. However, the computation times on my computer are (with 2 threads):

with schedule(static) : ~2.103s
with schedule(dynamic, 1) : ~24.096s
omitting schedule (should be dynamic, 1) : ~2.101s 

So that the default schedule seems to be static! I know I am asking a very specific question, but is it an intended behaviour ?

A:

OMP_SCHEDULE and omp_set_schedule() affect runtime loop scheduling, that is for constructs with schedule(runtime) clause. With most OpenMP runtimes, the default scheduling when no schedule clause is present is static with chunk size equal to #iterations / #threads (the handling of the case where #threads does not divide #iterations is implementation-specific, but usually the remainder of the iterations is spread over the first #iterations % #threads threads). No sane OpenMP vendor would choose dynamic,1 as the default in that case, given the overhead it entails.



--------------------------------------------------

--------------------------------------------------

Greg Sand “Remnants” is a series about recollection and remembrance. Each ‘remnant’ in the series is composed of three found photos–each from a different point in the subject’s life–that have been cut.

--------------------------------------------------

--------------------------------------------------

After being adopted earlier this week, her owner began posting photos and videos online to share with friends and family. Of course, with a face like that, it wasn't long before the tiny kit gained a larger audience when the photos went viral.

Because she is just a little baby, Rylai currently spends the vast majority of her day simply sleeping, eating and pooping. Once she gets a bit older, she'll begin exhibiting more rambunctious fox-like behaviors.

As Rylai's human explains, "[Domesticated foxes] need enrichment and attention or they will quickly become bored and destructive. They [are] notorious for being difficult to litter train and stealing all of your favorite trinkets and hiding them."Source

--------------------------------------------------

--------------------------------------------------

Q:

PowerShell: How to check for multiple conditions (folder existence)

I am in the process of writing a script to make changes to folder permissions. Before it does that I would to do some checking to make sure that I am working in the correct directory. My problem is how do I check to see if four subfolders (i.e. Admin, Workspace, Com, & Data) exists before the script progresses. I assume I would be using Test-Path on each directory.

A:

What's wrong with the following?
if ( (Test-Path $path1) -and (Test-Path $path2) ) { 

}



--------------------------------------------------

--------------------------------------------------

Physical Characteristics of Elite Youth Female Soccer Players Characterized by Maturity Status.
Emmonds, S, Scantlebury, S, Murray, E, Turner, L, Robsinon, C, and Jones, B. Physical characteristics of elite youth female soccer players characterized by maturity status. J Strength Cond Res XX(X): 000-000, 2018-The purpose of this study was to investigate the influence of maturity status on the physical characteristics of youth female soccer players. One hundred fifty-seven players from 3 elite soccer academies in England completed assessments of anthropometry, strength (isometric midthigh pull), lower-body power (countermovement jump [CMJ]), aerobic capacity (Yo-Yo intermittent recovery test level 1), change of direction (CoD: 505-left/right), and speed (10 and 30 m). Each player was classified into 1 of 6 maturity groups based on their estimated years from peak height velocity (YPHV). Magnitude-based inferences were used to assess for the practical significance between consecutive groups. Speed, CoD time, CMJ, and aerobic capacity were all possibly most likely better in more mature players. However, there was a likely difference in relative peak force between maturity groups -0.5 YPHV (27.13 ± 4.24 N·Kg) and 0.5 YPHV (24.62 ± 3.70 N·Kg), which was associated with a likely difference in 10-m sprint time (-0.5 YPHV: 2.00 ± 0.12 vs. 0.5 YPHV 2.08 ± 0.16 seconds) and unclear changes in CMJ and CoD time. Findings provide novel comparative data for this cohort relative to maturity status and can be used by strength and conditioning coaches to inform the design of training programs for youth female soccer players. Strength and conditioning coaches should be aware that youth female soccer players may experience a decrease in relative strength around peak height velocity, which may impact upon the speed, CoD time, and CMJ of players.

--------------------------------------------------

--------------------------------------------------

25 F.3d 1042NOTICE: Fourth Circuit I.O.P. 36.6 states that citation of unpublished dispositions is disfavored except for establishing res judicata, estoppel, or the law of the case and requires service of copies of cited unpublished dispositions of the Fourth Circuit.
UNITED STATES of America, Plaintiff-Appellee,v.Al Malik Sharief Kareem WRIGHT, Defendant-Appellant.
No. 93-5608.
United States Court of Appeals, Fourth Circuit.
Submitted May 3, 1994.Decided May 25, 1994.

Appeal from the United States District Court for the District of South Carolina, at Spartanburg.  William B. Traxler, Jr., District Judge.  (CR-92-408-7)
John D.  (Jay) Elliott, Columbia, SC, for appellant.
J. Preston Strom, Jr., U.S. Atty., David C. Stephens, Asst. U.S. Atty., Greenville, SC, for appellee.
D.S.C.
AFFIRMED.
Before WILKINS, NIEMEYER, and WILLIAMS, Circuit Judges.
OPINION
PER CURIAM:


1
Al Malik Wright appeals from the sentence imposed by the district court after his plea of guilty to the charge of possession with intent to distribute cocaine base.  He contends that his plea was invalid, that the court made inadequate findings regarding his plea, and that he was erroneously sentenced as a career offender.  He requests resentencing or to withdraw his plea.  We affirm.


2
Wright pled guilty to possession with intent to distribute approximately four grams of crack cocaine in violation of 21 U.S.C. Sec. 841(a)(1) (1988).  Under the terms of the oral plea agreement stated on the record, the government agreed to dismiss the count charging conspiracy to possess with intent to distribute and to distribute cocaine and cocaine base in violation of 21 U.S.C.Sec. 846 (1988).  The government further agreed that Wright should be entitled to a three-point reduction for acceptance of responsibility.  There was no agreement as to the amount of drugs to be considered as relevant conduct or as to Wright's role in the offense, and the government reserved the right to argue that Wright should be sentenced as a career offender.  The agreement capped Wright's sentence at twenty years.  Wright agreed that the stated terms completely and accurately stated the plea agreement as he understood it.


3
After making the findings required by Fed.R.Crim.P. 11, the court accepted Wright's plea, finding that it was knowingly and voluntarily entered.  A presentence report was prepared, classifying Wright as a career offender, assigning a four-level enhancement for Wright's leader or organizer role in the offense, and attributing four grams of cocaine to Wright without any consideration of relevant conduct.  Wright objected to the adjustment for role in the offense and to his classification as a career offender.  The government objected to the probation officer's failure to consider relevant conduct in determining Wright's base offense level.  A second presentence report was prepared, attributing in excess of 500 grams of cocaine base to Wright as relevant conduct.  Wright objected to this.


4
After hearing testimony from an investigating officer, the court found that the government proved by a preponderance of the evidence that the amount of crack cocaine properly attributable to Wright was 672 grams.  Wright argued that the plea agreement limited his exposure to the four grams to which he pled;  however, Wright did not wish to withdraw his plea.


5
On the issue of classification as a career offender, Wright argued that his two prior state convictions were related because they were informally consolidated.  He noted that the plea on the second charge occurred on the same day as the sentencing on the first charge and that the probation sentences were run concurrently with each other.  Wright argued that because the sentences were concurrent, the charges ought to be treated as one offense under the guidelines;  therefore, he was not a career offender.  The government argued that the offenses were separated by an intervening arrest, and therefore could not be treated as one offense.  The court noted that the commentary set forth the general rule that offenses are not related if separated by an intervening arrest, and the exception that the offenses are treated as related if they were consolidated for sentencing.  Finding that Wright was correctly classified as a career offender, the court adopted the presentence report and sentenced Wright to 240 months imprisonment, five years of supervised release, and a special assessment of $50.  Wright appealed.


6
After counsel filed a brief on Wright's behalf, Wright moved for leave to file a pro se supplemental brief.  Because the issues in Wright's proposed brief are adequately addressed by counsel, we deny Wright leave to file his supplemental brief.


7
Wright's plea was knowing and voluntary.


8
Wright contends that his guilty plea was induced by his belief that his sentence would be computed with reference to only the four grams of cocaine base to which he pled.  He argues that the plea agreement was ambiguous with respect to relevant conduct and seeks resentencing in accordance with his understanding of the agreement.  In the alternative, Wright wishes to withdraw his plea.


9
To be valid, a guilty plea must be knowingly and voluntarily entered.  Fed.R.Crim.P. 11;   Boykin v. Alabama, 395 U.S. 238, 242 (1969).  In addressing this issue at sentencing, after Wright stated that he did not wish to withdraw his plea,  see United States v. Conner, 930 F.2d 1073 (4th Cir.), cert. denied, 60 U.S.L.W. 3359 (U.S.1991), the court determined that the ambiguity was not created by the plea agreement;  rather, it was based upon Wright's reliance upon the initial presentence report.  In the initial presentence report, the probation officer believed that the government had limited Wright's exposure to the amount of cocaine to which he pled.  This belief was mistaken.  During its recitation of the terms of the plea, the government stated:  "There will be a question for the court to determine as to relevant conduct as to the amount of drugs that he was associated with.  We have no agreement on that."


10
Wright acknowledged that the terms stated on the record accurately and completely reflected his understanding of the plea agreement.  Because this agreement included the statement that the sentencing court would determine the amount of drugs considered as relevant conduct, we find that Wright's plea was knowingly and voluntarily entered and it was not induced by a promise to limit his involvement to four grams of cocaine base.   See United States v. DeFusco, 949 F.2d 114, 119 (4th Cir.1991), cert. denied, 60 U.S.L.W. 3717 (U.S.1992);   Via v. Superintendent, Powhatan Correctional Ctr., 643 F.2d 167, 171 (4th Cir.1981).


11
The district court properly conducted the Rule 11 colloquy.


12
Section 6B1.2(a) of the guidelines* provides that when a plea agreement includes the dismissal of charges, "the court may accept the agreement if the court determines, for reasons stated on the record, that the remaining charges adequately reflect the seriousness of the actual offense behavior and that accepting the agreement will not undermine the statutory purposes of sentencing or the sentencing guidelines."   U.S.S.G. Sec. 6B1.2(a).  Wright contends that the district court did not make such a finding on the record and his plea was defective.


13
Section 6B1.2(a) requires the court to state that the plea conforms to the purposes of sentencing and the policies of the sentencing guidelines.  U.S.S.G. Sec. 6B1.2(a).  There is no requirement that the court advise the defendant that dismissed charges may be considered as relevant conduct for sentencing.  We find that the failure to explicitly state that acceptance of the plea conforms to the purposes of sentencing and the guidelines was harmless error.  See United States v. Olano, 61 U.S.L.W. 4421, 4424 (U.S.1993);   DeFusco, 949 F.2d at 117.  Wright acknowledged that he faced a maximum sentence of twenty years imprisonment and that the plea agreement included the fact that the court would determine the amount of drugs that would be charged as relevant conduct for purposes of sentencing.  The court's failure to state for the record that acceptance of Wright's plea and dismissal of the conspiracy count conformed to the purposes of sentencing and the guidelines did not affect Wright's substantial rights.


14
Wright was properly sentenced as a career offender.


15
To be sentenced as a career offender, the defendant must have at least two prior felony convictions of either a crime of violence or a controlled substance offense.  U.S.S.G. Sec. 4B1.1.  Section 4A1.2, application note 3, explains that prior sentences are not related if they were imposed for offenses which were separated by an intervening arrest.  Otherwise, prior sentences are considered related if they resulted from offenses that were consolidated for trial or sentencing.  U.S.S.G. Sec. 4A1.2, comment (n.3).


16
Wright was arrested on the first state charge of possession with intent to distribute on October 11, 1989.  His arrest for the second state charge of possession with intent to distribute occurred on April 20, 1990, for a crime committed on that day.  Wright's state sentences were separated by an intervening arrest, therefore the offenses were unrelated.  U.S.S.G. Sec. 4A1.2, comment (n.3);   see United States v. Gallegos-Gonzalez, 3 F.3d 325, 327-28 (9th Cir.1993);   United States v. Woods, 976 F.2d 1096, 1102 (7th Cir.1992) ("[I]f the criminal conduct is separated by arrests, the ensuing convictions are never considered related even if consolidated for trial or sentencing.").  Because Wright had "at least two prior felony convictions of [ ] a controlled substance offense" he was properly sentenced as a career offender.  U.S.S.G. Sec. 4B1.1.


17
For the foregoing reasons, we affirm Wright's conviction and sentence and deny leave to file a supplemental brief.  We dispense with oral argument because the facts and legal contentions are adequately presented in the materials before the Court and argument would not aid the decisional process.


18
AFFIRMED.



*
 United States Sentencing Commission, Guidelines Manual, Sec. 6B1.2(a) (Nov.1992)




--------------------------------------------------

--------------------------------------------------

class ArcModule {
  constructor(wasm) {
      this.initialized = false;

      if (typeof wasm === 'string') {
        if (!WebAssembly.instantiateStreaming) {
          this.wasmPromise = fetchAndInstantiateFallback(wasm);
        } else {
          this.wasmPromise = WebAssembly.instantiateStreaming(fetch(wasm));
        }
      } else {
          this.wasmPromise = WebAssembly.instantiate(wasm);
      }

      this.wasmPromise = this.wasmPromise.then(result => {
          this.wasmInstance = result.instance;
          this.wasmExports = result.instance.exports;
      });
  }

  get ready() {
      return this.wasmPromise;
  }

  init(rows, cols, frameCount, fps, isFirst) {
      if (!this.wasmInstance) {
          throw new Error("Wasm module not loaded");
      }

      try {
        this.bufferSize = rows * cols * frameCount * 3;
        this.wasmExports.init(rows, cols, frameCount, fps, isFirst);
        this.initialized = true;
      } catch (e) {
        console.log(e.stack);
      }
  }

  transform(input) {
      if (!this.initialized) {
          throw new Error("Wasm module not initialized");
      }

      let bufferOffset = this.wasmExports.getAnimationBuffer();
      let animationBuffer = new Uint8Array(this.wasmExports.memory.buffer, bufferOffset, this.bufferSize);

      animationBuffer.set(input);
      this.wasmExports.apply();
      return animationBuffer;
  }
}

async function fetchAndInstantiateFallback(url, imports) {
  const response = await fetch(url);
  const buffer = await response.arrayBuffer();
  return WebAssembly.instantiate(buffer, imports);
}

export default async function () {
  let module = new ArcModule("../out/lib.wasm");
  await module.ready;

  return {
    transform(buffer, rows, cols, frameCount, fps, isFirst) {
      module.init(rows, cols, frameCount, fps, isFirst);
      let input = new Uint8Array(buffer);
      let output = module.transform(input);
      input.set(output);
    }
  }
}


--------------------------------------------------

--------------------------------------------------

Jacques-Martin Hotteterre

Jacques-Martin Hotteterre (29 September 167416 July 1763), also known as Jacques Martin or Jacques Hotteterre, was a French composer and flautist who was the most celebrated of a family of wind instrument makers and wind performers.

Biography
Hotteterre was born in Paris, the son of Martin Hotteterre (d. 1712) and Marie Crespy. In about 1704, Jacques-Martin Hotteterre succeeded his cousin Jacques in the post of basse de hautbois et taille de violon at the royal court.

Hotteterre lived and studied in Rome early in his career, and his nickname le Romain (the Roman) came from this period. He spent two years (1698–1700) employed by Prince Francesco Ruspoli in Rome, before adopting the nickname of "Le Romain" at some point between 1705 and 1707.  By 1708, he became a musician to the King of France, in the king's 'Grande Écurie, and in 1717, he inherited René Pignon Descoteaux's post as Jouëur de Fluste de la musique de chambre.

Hotteterre owed his fame largely to his talent for playing the flute, an instrument for which he wrote a number of pieces, significantly extending the repertory for the instrument. In addition, he played the bassoon, oboe, and musette. Hotteterre was also an internationally celebrated teacher to aristocratic patrons. He wrote one method for the transverse flute, recorder, and oboe, published in 1707, as well as a method for the musette, published in 1737.  His L'Art de préluder sur la flûte traversière was published in 1719. It was Europe's first flute manual and was used widely. "The music of the modern flute begins with this author, the most celebrated flutist of the end of the seventeenth and the beginning of the eighteenth centuries. Hotteterre was Chamber Musician to the King of France, and was the first one to play a transverse flute in the orchestra of the Paris Grand Opera. This extremely rare work is the earliest known book of instructions, in any language, for the transverse flute".—Dayton C. Miller (1866–1941)

Several transverse flutes marked HOTTETERRE with the device of an anchor, discovered within the last hundred years or more, have provided actual specimens of the alleged result of the Hotteterres' efforts.  Specialists in woodwind history are generally aware of three "Hotteterre" flutes—in Berlin, St. Petersburg and Graz—all of which closely resemble the one in Picart's engraving. However it has recently been shown that two of these are nineteenth-century replicas of a specimen now lost, and only the Graz example is in fact the work of Jacques Hotteterre or his father, Martin.

In addition to performance and teaching, Hotteterre continued his family's tradition of wind instrument making. It may have been Hotteterre who made a number of changes in the design of the transverse flute, though there is little concrete evidence for this. Most notably, the flute, which had previously been made in one cylindrical piece, was cut in three pieces: the head (with the mouthpiece), the body (with most of the holes), and the foot (with one, keyed hole for the low E).

Numerous other members of the Hotteterre family were reputed to have been fine woodwind players; some also had a decisive impact on woodwind instrument construction. Jacques's grandfather Jean (c. 1605 to 1690–1692) was noted for his playing and innovative building. He may have been influential in certain developments in woodwind instruments, and he is credited with creating the oboe. Jean and his son Martin (c. 1640–1712), father of Jacques-Martin, were responsible for important advances in musette making. A number of recorders by the Hotteterre family also survive, none of which are believed to be by Jacques-Martin.

Jacques-Martin Hotteterre died in Paris in 1763.

Compositions 
 Op. 1 Principes de la flûte traversière, ou flûte d'Allemangne, de la flûte à bec ou flûte douce et du hautbois, divisez par traictez (1707)
 Op. 2 Premier livre de pièces pour la flûte traversière et autres instruments avec la basse (1708)
 Op. 3 Sonates en trio pour les flûtes traversières et a bec, violon, hautbois (1712)
 Op. 4 Première suitte de pièces suite de pièces à deux dessus, sans basse continue. Pour les flûtes-traversières, flûtes à bec, violes, " (1712)
 Op. 5 Deuxième livre de pièces pour la flûte traversière et autres instruments avec la basse (1715)
 Op. 6 Deuxième suite de pièces à deux dessus pour les flûtes-traversières, flûtes à bec, violes, etc... avec une basse adjoutée et sans altération des dessus, laquelle on y pourra joindre pour le concert" (1717)
 Op. 7 L'art de Préluder (1719)
 Op. 8 Troisième suite de pièces à deux dessus (1722)
 Op. 9 Concert de Rossignol (lost)
 Op. 10 Méthode pour la Musette contenant des principes, par un recueil d'airs et quelques préludes (1738)
 Airs et brunettes à deux et trois dessus avec la basse – Tirez des meilleurs autheurs (1721)
 Arrangements of pieces by Valentine and Torelli for two flutes
 Arrangement of trios by Albinoni (lost)

Media

References

Giannini, Tula. 1993a. "Jacques Hotteterre le Romain and his Father Martin: A Re-examination Based on Recently Found Documents".  Early Music 21, no. 3 (August): 377–95.  [Includes genealogical chart, illustrations, transcriptions and translations of documents.]
Giannini, Tula. 1993b. Great Flute Makers of France, the Lot and Godfroy Families (1650–1900). London: Tony Bingham. 
Sardelli, Federico Maria. 2007. Vivaldi's Music for Flute and Recorder, translated by Michael Talbot. Aldershot, England; Burlington, VT: Ashgate, in association with the Istituto Italiano Antonio Vivaldi/Fondazione "Giorgio Cini".

External links

Category:Musicians from Paris
Category:1674 births
Category:1763 deaths
Category:French Baroque composers
Category:Flute makers
Category:French classical bassoonists
Category:French classical composers
Category:French male classical composers
Category:French classical flautists
Category:18th-century classical composers
Category:18th-century French composers
Category:18th-century male musicians

--------------------------------------------------

--------------------------------------------------

Álvaro da Cunha

Álvaro da Cunha (1371-?) was a Portuguese nobleman, 3rd Lord of Pombeiro.

Biography 

Álvaro was born in Portugal, was the son of João Lourenço da Cunha and Leonor Telles de Meneses. His wife was Beatriz Martins de Melo (descendant of Afonso Mendes de Melo).

References 

Category:1371 births
Category:1400s deaths
Category:14th-century Portuguese people
Category:15th-century Portuguese people
Category:Portuguese nobility
Category:Portuguese Roman Catholics

--------------------------------------------------

--------------------------------------------------

/* Copyright (c) 2014 Broadcom Corporation
 *
 * Permission to use, copy, modify, and/or distribute this software for any
 * purpose with or without fee is hereby granted, provided that the above
 * copyright notice and this permission notice appear in all copies.
 *
 * THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES
 * WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
 * MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY
 * SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
 * WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION
 * OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN
 * CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
 */
#ifndef BRCMFMAC_PCIE_H
#define BRCMFMAC_PCIE_H


struct brcmf_pciedev {
	struct brcmf_bus *bus;
	struct brcmf_pciedev_info *devinfo;
};


void brcmf_pcie_exit(void);
void brcmf_pcie_register(void);


#endif /* BRCMFMAC_PCIE_H */


--------------------------------------------------

--------------------------------------------------

21 August 2017

NEW BAND

Saw these freeks tonight in Oakland. A flash in the pan project that consisted of two rehearsals, five tracks (one is a cover), one demo (this one, duh), and one gig (tonight, duh) with NOSFERATU, STERILE MIND and PROVOKE. That show ended about three hours ago, and I figured the band's life cycle should be completed with an urgency that compliments their existence. To further encourage hesitant visitors/listeners, this quartet is/was made up of people who are or have been members of: CCTV, THE WORLD, MOZART, BIG ZIT, OOZE, NEON, HOLIDAYS IN UNITED STATES, LIFE STINKS, PANG, PENNY MACHINE, CONEHEADS and likely many others. Listen...and then go make your own band.

1 comment:

TAPES....FUCKING TAPES!!!

TERMINAL ESCAPE is a home for cassettes. Terminal Escape is here to share music that was released on, or copied onto, cassette. You are encouraged to acquire physical copies of the tapes you enjoy, as this blog is meant to support those artists and labels, not circumvent them. If you have a legitimate claim to any of the music I've shared and would like it removed, I'm happy to do so....but someone is probably already streaming it on YouTube anyway so you shouldn't be so uptight.

DEAD LINKS are common. Digital media are temporary. I will re-post tapes from Terminal Escape's infancy from time to time (primarily when requested), but I will not chase dead links.

--------------------------------------------------

--------------------------------------------------

Q:

Are sun-synchronous orbits possible around any body?

Sun-synchronous orbits are popular around Earth, and the Mars Reconnaisance Orbiter uses one as well (so I think Wikipedias definition as a geocentric orbit is wrong).  Considering that probably any rotating body has some oblateness, is a sun-synchronous orbit always possible, or are there some fundamental limitations that make sun-synchronous orbits impossible around certain planets, minor planets, moons, or other bodies in the solar system?
(A heliocentric orbit is of course a special case)

A:

No. First, the matter of oblateness which introduces the necessary precession. In some cases it will force the sun-synchronous orbit altitude below the body's surface (obviously impossible). In other cases other bodies will disturb the orbital motion too strongly, destabilizing the orbit. 



--------------------------------------------------

--------------------------------------------------

Q:

Entity Framework with text files (no database!)

I'm used to Forms and DataSets but now I'm trying out WPF and the Entity Framework. My goal is to fill a DataGrid in WPF with the use of the Entity Framework. However, I do NOT have a database! I have simple text files with data that I have to parse to fill my Entities.
However, I get errors like "Entity type 'TableName' is not mapped." and crashes like that I don't have a connection string.
Is it possible to use the Entity Framework without a database? Or do I have to go back to use a DataSet?

A:

Interesting idea. Microsoft's quite enthusiastic that in theory you can write an EF provider that maps to any kind of data store. I've not got experience with one that maps to a text file, but this link suggests that someone's done it with CSV(!): http://social.msdn.microsoft.com/Forums/ar-SA/adodotnetentityframework/thread/a0e9e20f-66d2-447c-8b7e-75de18535e63?persist=True
If you're stuck with using text files though, why not try LINQ to XML?
And: Entity Framework with XML Files



--------------------------------------------------

--------------------------------------------------

The present invention relates to electrofluidic and electrowetting display pixels, electrofluidic and electrowetting displays, and methods of operating electrofluidic and electrowetting display pixels.
Electrowetting is a highly attractive modulation scheme for a variety of optical applications. For example, electrowetting has been used to provide optical switches for fiber optics, optical shutters or filters for cameras and guidance systems, optical pickup devices, optical waveguide materials, and video display pixels. Electrowetting has also found application in lab-on-chip devices, primarily in the form of digital droplet-driven flow.
Despite the numerous commercial applications and a large body of on-going research, nearly all conventional electrowetting-based devices require a constant application of voltage to hold a polar fluid in a particular geometry. These devices are not ‘bistable,’ that is to say, when the voltage is removed, the fluid is free to return to a spherical geometry along all non-confined fluid surfaces.
What is needed is an advanced electrowetting or electrofluidic display technology that is suited to more advanced control of colored polar fluid geometry and flow for display applications.

--------------------------------------------------

--------------------------------------------------

Energy2D

NSF-Funded Free Software

“Please accept our thanks and congratulations for your very interesting work which I am sure are having a great positive impact in our society.”
— from Roberto Quevedo, Instituto Volcanológico de Canarias, INVOLCAN, Puerto de la Cruz, Tenerife, Canary Islands, Spain

By Carmen Trudell, University of Virginia

What is it?

Based on computational physics research ([1], [2], [3]),
Energy2D is an interactive, visual multiphysics simulation program that models all three modes of heat transfer—conduction, convection, and radiation, and their coupling with particle dynamics.
Energy2D runs very quickly on most computers and eliminates the switches among preprocessors, solvers, and postprocessors typically needed to perform computational fluid dynamics simulations.
It allows you to design "computational experiments" to test a scientific hypothesis or solve an engineering problem without resorting to complex mathematics.

In addition to heat transfer, work is also underway to incorporate other types of energy transformations (e.g., phase changes and chemical reactions through
the Stefan condition), to support multiple types of fluids (e.g., air and water),
and to provide sensor interfaces for creating mixed-reality applications.

What is the goal?

The ultimate goal of Energy2D is a versatile computer-aided engineering (CAE) system
for exploring and learning science and engineering through virtual experimentation, investigation, and design.
Therefore, the capability of creating complex, accurate scientific simulations of natural phenonmena and engineering problems is the most important goal of Energy2D.
Realizing that many existing engineering simulation programs are too difficult to use by novices, our main objective is to rethink a CAE
system that empowers, rather than frustrating, the majority of users.

An IR image of a heated model house with a ceiling

An IR image of a heated model house without a ceiling

An Energy2D simulation of a heated house with a ceiling

An Energy2D simulation of a heated house without a ceiling

How well does it model reality?

The conduction part of Energy2D is highly accurate, but the convection and radiation parts are not 100% accurate. Hence, in cases
that involve convection and radiation, Energy2D results should be considered as qualitative.
The pictures to the right show a comparison of the results of Energy2D simulations with images from infrared (IR)
thermography for a simple model house. The thermal patterns predicted by Energy2D roughly match those from an IR camera.

What people are saying about it?

“The software program Energy2D is used to solve the dynamic Fourier heat transfer equations for the Convective Concrete case. Energy2D is a relatively new program (Xie, 2012)
and is not yet widely used as a building performance simulation tool. To gain more confidence in the predictions with Energy2D, an analytical validation study was therefore carried out first,
inspired by the approach described in Hensen and Nakhi (1994). Those analytical solutions and the simulation results of the dynamic response to a 20°C temperature step change on the surface
of a concrete construction with the following properties were compared for this research... the simulation results never divert from the exact solution more than 0.45°C and it is therefore
considered acceptable to further use this model.”
— Dennis de Witte, Marie L. de Klijn-Chevalerias, Roel C.G.M. Loonen, Jan L.M. Hensen, Ulrich Knaack, & Gregor Zimmermann, Journal of Facade Design and Engineering

“Speaking of the thermo-electric analogy being presented in this work, it is worth mentioning the freely downloadable Java app Energy2D, which permits the
numerical/interactive solution of a basically unlimited series of simulations concerning heat transfer. As such, this app can also be seen as an almost perfect and very customizable
numerical engine for treating electrostatic problems of various assortment.”
— from Stefano Oss & Giuliano Zendri, European Journal of Physics

“Thank you for your absolutely great app which helps me a lot for visualizing my lecture in thermodynamics. It is also very nice to see that three platforms are supported
and every single one is free to use. That is just awesome and I want to say thank you for all users. I do not know how many messages of this type you are receiving.”
— from Martin Weise, Austria

“In gearing up to teach a course called Building Science this semester, I somehow stumbled across your program Energy2D and Energy3D. I was really impressed by how simple
and easy these tools were and I'm definitely going to integrate them into some portion of my lectures.”— Prof. Brent Stephens, Department of Civil,
Architectural and Environmental Engineering, Illinois Institute of Technology, USA

“I am currently involved in renewable energy related research activities and teaching. I have downloaded and demonstrating Energy2D for my heat transfer course.
It is really a very useful tool.”— Dr. Mazharul Islam, Department of Mechanical Engineering, Taibah University, Saudi Arabia

“Today during the lunch break a little simulated comparison fan in the suction and blowing operation collector here about 50x70 cm and fan with 2 meters / second. [The result] is
confirmed by the experiences of several users: pressure losses and less volume of air in the blowing operation.”
(Link to the source)

“...what was really interesting, was that when I continued playing with the simulator, sometimes my convection examples would split into two cycling air cells, one above and to the left,
one below and to the right, with the hot air blasting right for the cold source, rather than rising. That's really interesting, because I've experienced this when using smoke demonstrations
in class, and the fact that the simulator can capture that behavior shows how accurate this teaching tool actually is.”
(Link to the source)

“...this free software is basic, yet you can modify properties and all, the desktop download gives better results and the pages have a choice of practical setups to download and use that are very practical”
(Link to the source)

Miscellaneous

The development of this program is funded by the National Science Foundation under grants #0918449 and #1304485.
Any opinions, findings, and conclusions or recommendations expressed in the materials associated with this program
are those of the author(s) and do not necessarily reflect the views of the National Science Foundation.

--------------------------------------------------

--------------------------------------------------

Denouncing his "strong ties to corporate agribusiness and pesticide companies," more than 240 groups urged the Senate on Wednesday to reject the nomination of Scott Hutchins, President Donald Trump's pick for chief scientist at the U.S. Department of Agriculture (USDA).

Scientists from around the world issued a stark warning to humanity Tuesday in a semi-annual report on the Earth's declining biodiversity, which shows that about 60 percent of mammals, birds, fish and reptiles have been wiped out by human activity since 1970.

Philip Hammond presents the red Budget Box as he departs from 11 Downing Streets to make his way to the Parliament to deliver his 2018 budget announcement, London on Oct. 29, Alberto Pezzali / NurPhoto / Getty Images

While British Prime Minister Theresa May's Autumn budget rollout was accompanied by much fanfare and lofty promises—"the era of austerity is finally coming to an end," proclaimed UK Finance Minister Philip Hammond—the specifics of the budget detailed on Monday were met with a mixture of disgust and alarm by the Labour Party and environmentalists, who argued that the plan is stuffed with "half measures" and tax cuts for the rich but zero policies to address the human-caused climate crisis.

Addressing some 10,000 people in Helsinki on Saturday at what some campaigners are calling Finland's largest ever climate demonstration, 15-year-old Greta Thunberg urged marchers to fight for the major systemic changes that experts have said are necessary to limit greenhouse gas emissions and avert a looming climate catastrophe.

A year after researchers at a New York university discovered microplastics present in sea salt thanks to widespread plastic pollution, researchers in South Korea set out to find out how pervasive the problem is—and found that 90 percent of salt brands commonly used in homes around the world contain the tiny pieces of plastic.

Driving is dangerous. In fact, it's about the riskiest activity most of us engage in routinely. It requires one's full attention—and even then, things can sometimes go horribly awry. The brakes fail. Weather turns roads to ice. A driver in the oncoming lane falls asleep. Tragedy ensues. But if we're asleep at the wheel, the likelihood of calamity skyrockets. That's why distracted driving is legally discouraged: no cell phones, no reading newspapers or books, no hanky-panky with the front-seat passenger. If you're caught, there's a hefty fine.

--------------------------------------------------

--------------------------------------------------

Eight Views of Danyang

The Eight Views (or Vistas) of Danyang  (Hangeul: 단양팔경, Hanja: 丹陽八景) are the selected natural scenes of Danyang County, Chungcheongbuk-do in Korea.

General
The Eight Views (or Vistas) of Danyang are the selected natural scenes of Danyang County, Chungcheongbuk-do in Korea.  They are mainly famous rocks and peaks of this mountainous region.
 Dodam Sambong (3 Peak Island - Hangeul: 도담삼봉, Hanja: 島潭三峰)
 Seokmun (Stone Gate - Hangeul:석문, Hanja:石門)
 Gudambong (Hanja:亀潭峰)
 Oksunbong (Hanja:玉筍峰)
 Sangseonam (Hanja:上仙岩)
 Jungseonam (Hanja:中仙岩)
 Haseonam (Hanja:下仙岩)
 Sainam (Hanja:舎人岩)

Among these sights the best known is Dodam Sambong (3 Peak Island), representing the typical love triangle of ancient Korea: a husband, his wife and his mistress. The biggest peak, about 20 feet high with a pavilion on top, in the middle represents the husband, while the first smaller peak on one side of the husband is the wife. On the other side the smallest peak is the mistress. According to legend, the wife was not able to give birth to a son, so the husband found a mistress to produce a son. The wife was upset, which is why the wife peak is farther from the husband than the mistress.  If you look at the wife from a specific angle and use a bit of imagination, you will see that the wife was so angry that she turned away from the husband.

Danyang County is in the area of the Namhan River, upstream south of the Han River where Seoul is located.  It is said to be in the middle of the route on which the Chinese culture in ancient days reached the southern area of Korean and ultimately Japan.

References

See also

 Eight Views
 Eight Views of Korea

External links
 Eight Views of Danyan County (Danyang County’s official web site in English)

Category:Geography of North Chungcheong Province
Category:Arts in Korea
Category:Tourist attractions in South Korea
Category:Tourist attractions in North Chungcheong Province
Category:Danyang County

--------------------------------------------------

--------------------------------------------------

1. Field of the Invention
The invention relates to elements faced with superhard material, and particularly to preform cutting elements comprising a facing table of superhard material having a front face, a peripheral surface, and a rear surface bonded to a substrate of material which is less hard than the superhard material.
2. Description of Related Art
Preform elements of this kind are often used as cutting elements on rotary drag-type drill bits, and the present invention will be particularly described in relation to such use. However, the invention is not restricted to cutting elements for this particular use, and may relate to preform cutting elements for other purposes. For example, elements faced with superhard material, of the kind referred to, may also be employed in workpiece-shaping tools.
Preform elements used as cutting elements in rotary drill bits usually have a facing table of polycrystalline diamond, although other superhard materials are available, such as cubic boron nitride and amorphous diamond-like carbon (ADLC). The substrate of less hard material is often formed from cemented tungsten carbide, and the facing table and substrate are bonded together during formation of the element in a high pressure, high temperature forming press. This forming process is well known and will not be described in detail.
Each preform cutting element may be mounted on a carrier in the form of a generally cylindrical stud or post received in a socket in the body of the drill bit. The carrier is often formed from cemented tungsten carbide, the surface of the substrate being brazed to a surface on the carrier, for example by a process known as "LS bonding". Alternatively, the substrate itself may be of sufficient thickness as to provide, in effect, a cylindrical stud which is sufficiently long to be directly received in a socket in the bit body, without being brazed to a carrier. The bit body itself may be machined from metal, usually steel, or may be moulded using a powder metallurgy process.
Such cutting elements are subjected to extremes of temperature during formation and mounting on the bit body, and are also subjected to high temperatures and heavy loads when the drill is in use down a borehole. It is found that as a result of such conditions spalling and delamination of the superhard facing table can occur, that is to say the separation and loss of the diamond or other superhard material over the cutting surface of the table.
This may also occur in preform elements used for other purposes, and particularly where the elements are subjected to repetitive percussive loads, as in tappets and cam mechanisms.
Commonly, in preform elements of the above type, the interface between the superhard table and the substrate has usually been flat and planar. However, particularly in cutting elements for drill bits, attempts have been made to improve the bond between the superhard facing table and the substrate by configuring the rear face of the facing table and the front face of the substrate so as to provide a degree of mechanical interlocking between them.
It is also desirable, in preform elements of the above type, to provide increased thickness of the superhard facing table at its periphery to provide additional strength in that region which, in a cutting element for a rotary drill bit, provides the cutting edge of the element. Normally this has been achieved by forming a continuous peripheral ring of greater thickness and constant depth around the outer periphery of the rear surface of the facing table. In known arrangements it is often necessary or desirable for the projections on the rear surface of the facing table to be of greater depth than the peripheral ring, in order to provide adequate mechanical interlocking with the substrate.
Various configurations of the interface between the superhard facing table and substrate in a preform element are described in British Patent Applications Nos. 2283773, 9512173.7, 9512174.5, 9512177.8 and 9512175.2.
While some of these existing designs can provide advantages, it may sometimes be found that the projections on the rear surface of the facing table require to project into the substrate to a considerable depth in order to provide an adequate locking function. For example, in some types of preform element the thickness of the substrate may be less than 3mm, and if the projections on the facing table are extended into the substrate to provide adequate interlocking between the facing table and substrate they may have the undesirable effect of weakening the structure of the substrate. This difficulty might, of course, be overcome by increasing the thickness of the substrate, but not only may thicker preforms be more difficult and costly to manufacture, but difficulties are also likely to arise due to existing manufacturing processes and designs of drill bit already being geared to preforms of the standard thickness.
The present invention sets out to provide a design of preform element where the configuration of the projections on the rear surface of the facing table is such that they provide good interlocking between the facing table and substrate with comparatively small depth of the projections to the rear of the facing table.
Preform elements of the kind to which the present invention relates are usually manufactured by first pre-forming a shaped solid substrate from suitable material, such as tungsten carbide, and then applying to one surface of the substrate a layer of diamond or other superhard particles. The superhard layer then automatically conforms to the shape of the substrate surface, the particles filling any recesses which have been pre-formed in that surface. When the substrate and superhard layer are bonded together in the high pressure, high temperature forming press, the diamond particles bond together and to the substrate, and the rear surface of the superhard facing table becomes integrally formed with projections of superhard material which extend into the recesses in the substrate.
As previously explained, certain characteristics of the finished preform element may depend on the shape and configuration of these superhard projections. However, since the projections are usually, in practice, moulded according to the shape of the pre-formed substrate, it is convenient to define a desired configuration of superhard projections in terms of the shape of the substrate which is required to produce them, and the present invention will therefore be defined in such terms.

--------------------------------------------------

--------------------------------------------------

[Specific features of detection and treatment of tuberculosis in homeless persons].
The outcomes of treatment of 110 homeless patients with tuberculosis admitted to Moscow City Clinical Hospital No. 7 in 1993-1996 were followed up. All homeless persons have various concurrent diseases, such as alcoholism, chronic nonspecific diseases of the lung, diseases of the cardiovascular system, kidney, liver, etc., which require their treatment by physicians of different disciplines. Good results of treating the homeless may be obtained when rehabilitative services are used and hospital treatment is performed for at least 4 months. All homeless patients who admitted to general hospitals are to be physically, roentgenologically, and bacterioscopically examined whether they have tuberculosis.

--------------------------------------------------

--------------------------------------------------

Exploring the characteristics of dissolved organic matter and succession of bacterial community during composting.
The objective of this study was to explore the relationships among physico-chemical parameters, dissolved organic matters (DOM), and bacterial community during composting to better understand composting performances. The results showed total Kjeldahl nitrogen (TKN) (57%), temperature (39%), and pH (3%) were main factors driving the succession of bacterial communities. Firmicutes was a crucial phylum degrading organic matters for DOM formation, whereas the aromaticity and humification of DOM were closely related to Luteimonas (R2 = 0.971, p < 0.05) and Sphingobacteriaceae (R2 = 0.931, p < 0.05). Additionally, total phosphorus (TP), total potassium (TK), and TKN increased by 34.84%, 43.66%, and 65.91%, respectively, while organic matter decreased by 61.79%. The final compost had a C/N of 6.91 (<15) and a germination index of 97.81% (>80%), indicating that compost reached maturity and could be safely applied for soil amendment.

--------------------------------------------------

--------------------------------------------------

# 20161207 码农日报

[前端日报](http://caibaojian.com/c/news)栏目数据来自[码农头条](http://hao.caibaojian.com/)（我开发的爬虫），每日分享前端、移动开发、设计、资源和资讯等，为开发者提供动力，点击Star按钮来关注这个项目，点击Watch来收听每日的更新[Github主页](https://github.com/kujian/frontendDaily)
* [我的 web 前端面试经历](http://hao.caibaojian.com/17148.html) （稀土掘金）
* [前端工作面试问题合集](http://hao.caibaojian.com/17177.html) （IT程序狮）
* [深入了解 JavaScript 中的 for 循环](http://hao.caibaojian.com/17230.html) （开发者头条）
* [浅谈框架模式(MVC MVP MVVM)](http://hao.caibaojian.com/17171.html) （前端大全）
* [提高HTML5 Canvas性能的技巧](http://hao.caibaojian.com/17179.html) （前端开发博客）

***
* [CSS Selectors Level 4新特性全面解析](http://hao.caibaojian.com/17153.html) （CSDN）
* [JavaScript 有个 Unicode 的天坑](http://hao.caibaojian.com/17172.html) （前端大全）
* [CodePen上值得关注的 7 款 CSS 动画](http://hao.caibaojian.com/17176.html) （DevStore）
* [10个帅酷的HTML5最新动画应用](http://hao.caibaojian.com/17220.html) （程序员俱乐部）
* [Eclipse Che：下一代基于 Web 的 IDE](http://hao.caibaojian.com/17168.html) （Linux中国）

***
* [大爱HTML5 9款超炫HTML5最新动画源码](http://hao.caibaojian.com/17219.html) （程序员俱乐部）
* [译文丨Node.js 垃圾回收机制-基础](http://hao.caibaojian.com/17184.html) （SegmentFault）
* [如何用 JavaScript 作画](http://hao.caibaojian.com/17243.html) （稀土掘金）
* [还在比较 JSON 和 XML？Stop](http://hao.caibaojian.com/17218.html) （JAVA大本营）
* [如何使用 jstack 分析线程状态](http://hao.caibaojian.com/17150.html) （伯乐在线官方微博）

***
* [各种Docker注册中心一览](http://hao.caibaojian.com/17154.html) （InfoQ）
* [JavaScript——这道闭包题做起来有意思](http://hao.caibaojian.com/17318.html) （IT程序狮）
* [如何在 ESP-12F/ESP8266 上实现 webserver](http://hao.caibaojian.com/17233.html) （开发者头条）
* [REST架构风格的由来](http://hao.caibaojian.com/17149.html) （伯乐在线官方微博）
* [Linux系统安装git服务器](http://hao.caibaojian.com/17196.html) （实验楼官方微博）

***
* [Redis 4.0 新功能简介](http://hao.caibaojian.com/17234.html) （开发者头条）
* [9 款经典华丽的 CSS3 分享按钮](http://hao.caibaojian.com/17214.html) （JAVA大本营）
* [在 IE、Firefox、Opera 的乱世里现身的 Chrome](http://hao.caibaojian.com/17185.html) （SegmentFault）
* [使用Netsil监控Kubernetes上的微服务](http://hao.caibaojian.com/17158.html) （Docker精选）
* [ORM的核心注解 – 关系类型](http://hao.caibaojian.com/17157.html) （ImportNew）

***
* [谈谈程序员如何找下一份工作](http://hao.caibaojian.com/17217.html) （JAVA大本营）
* [垂直居中一张图片在固定的盒子内](http://hao.caibaojian.com/17180.html) （前端开发博客）
* [通过项目逐步深入了解 Mybatis](http://hao.caibaojian.com/17182.html) （SegmentFault）
* [七个你必须重视的 Git 使用技巧](http://hao.caibaojian.com/17216.html) （JAVA大本营）
* [Android 源码分析之 Fragment 的 View 管理](http://hao.caibaojian.com/17273.html) （开发者头条）

日报维护作者：[前端开发博客](http://caibaojian.com/) 

--------------------------------------------------

--------------------------------------------------

; RUN: llc -frame-pointer=all -O0 -fast-isel -filetype=obj < %s | llvm-dwarfdump -v - | FileCheck %s
; Test that a variable with multiple entries in the MMI table makes it into the
; debug info.
;
; CHECK: DW_TAG_inlined_subroutine
; CHECK:    "_Z3f111A"
; CHECK: DW_TAG_formal_parameter
; CHECK: DW_AT_location [DW_FORM_block1]    (DW_OP_piece 0x1, DW_OP_fbreg -47, DW_OP_piece 0xf, DW_OP_piece 0x1, DW_OP_fbreg -54, DW_OP_piece 0x7)
; CHECK: DW_AT_abstract_origin {{.*}} "p1"
;
; long a;
; struct A {
;   bool x4;
;   void *x5;
;   bool x6;
; };
; int *b;
; struct B {
;   B(long);
;   ~B();
; };
; void f9(A);
; void f13(A p1) {
;   b = (int *)__builtin_operator_new(a);
;   f9(p1);
; }
; void f11(A p1) { f13(p1); }
; void f16() {
;   A c;
;   B d(a);
;   c.x6 = c.x4 = true;
;   f11(c);
; }
; ModuleID = 'test.cpp'
source_filename = "test/DebugInfo/AArch64/frameindices.ll"
target datalayout = "e-m:o-i64:64-i128:128-n32:64-S128"
target triple = "aarch64-apple-ios"

%struct.A = type { i8, i8*, i8 }
%struct.B = type { i8 }

@a = global i64 0, align 8, !dbg !0
@b = global i32* null, align 8, !dbg !4

define void @_Z3f131A(%struct.A* nocapture readonly %p1) !dbg !32 {
entry:
  %agg.tmp = alloca %struct.A, align 8
  tail call void @llvm.dbg.declare(metadata %struct.A* %p1, metadata !36, metadata !37), !dbg !38
  %0 = load i64, i64* @a, align 8, !dbg !39, !tbaa !40
  %call = tail call noalias i8* @_Znwm(i64 %0) #4, !dbg !44
  store i8* %call, i8** bitcast (i32** @b to i8**), align 8, !dbg !45, !tbaa !46
  %1 = getelementptr inbounds %struct.A, %struct.A* %agg.tmp, i64 0, i32 0, !dbg !48
  %2 = getelementptr inbounds %struct.A, %struct.A* %p1, i64 0, i32 0, !dbg !48
  call void @llvm.memcpy.p0i8.p0i8.i64(i8* align 8 %1, i8* align 8 %2, i64 24, i1 false), !dbg !48, !tbaa.struct !49
  call void @_Z2f91A(%struct.A* %agg.tmp), !dbg !52
  ret void, !dbg !53
}

; Function Attrs: nounwind readnone
declare void @llvm.dbg.declare(metadata, metadata, metadata) #0

; Function Attrs: nobuiltin
declare noalias i8* @_Znwm(i64) #1

declare void @_Z2f91A(%struct.A*)

; Function Attrs: argmemonly nounwind
declare void @llvm.memcpy.p0i8.p0i8.i64(i8* nocapture writeonly, i8* nocapture readonly, i64, i1) #2

define void @_Z3f111A(%struct.A* nocapture readonly %p1) !dbg !54 {
entry:
  %agg.tmp.i = alloca %struct.A, align 8
  tail call void @llvm.dbg.declare(metadata %struct.A* %p1, metadata !56, metadata !37), !dbg !57
  %0 = getelementptr inbounds %struct.A, %struct.A* %p1, i64 0, i32 0, !dbg !58
  %1 = getelementptr inbounds %struct.A, %struct.A* %agg.tmp.i, i64 0, i32 0, !dbg !59
  call void @llvm.lifetime.start(i64 24, i8* %1), !dbg !59
  %2 = load i64, i64* @a, align 8, !dbg !61, !tbaa !40
  %call.i = tail call noalias i8* @_Znwm(i64 %2) #4, !dbg !62
  store i8* %call.i, i8** bitcast (i32** @b to i8**), align 8, !dbg !63, !tbaa !46
  call void @llvm.memcpy.p0i8.p0i8.i64(i8* align 8 %1, i8* align 8 %0, i64 24, i1 false), !dbg !64
  call void @_Z2f91A(%struct.A* %agg.tmp.i), !dbg !65
  call void @llvm.lifetime.end(i64 24, i8* %1), !dbg !66
  ret void, !dbg !67
}

define void @_Z3f16v() personality i8* bitcast (i32 (...)* @__gxx_personality_v0 to i8*) !dbg !68 {
entry:
  %agg.tmp.i.i = alloca %struct.A, align 8
  %d = alloca %struct.B, align 1
  %agg.tmp.sroa.2 = alloca [15 x i8], align 1
  %agg.tmp.sroa.4 = alloca [7 x i8], align 1
  tail call void @llvm.dbg.declare(metadata [15 x i8]* %agg.tmp.sroa.2, metadata !56, metadata !74), !dbg !75
  tail call void @llvm.dbg.declare(metadata [7 x i8]* %agg.tmp.sroa.4, metadata !56, metadata !77), !dbg !75
  tail call void @llvm.dbg.declare(metadata %struct.A* undef, metadata !72, metadata !37), !dbg !78
  %0 = load i64, i64* @a, align 8, !dbg !79, !tbaa !40
  tail call void @llvm.dbg.value(metadata %struct.B* %d, metadata !73, metadata !37), !dbg !80
  %call = call %struct.B* @_ZN1BC1El(%struct.B* %d, i64 %0), !dbg !80
  call void @llvm.dbg.value(metadata i8 1, metadata !72, metadata !81), !dbg !78
  call void @llvm.dbg.value(metadata i8 1, metadata !72, metadata !82), !dbg !78
  call void @llvm.dbg.value(metadata i8 1, metadata !56, metadata !81), !dbg !75
  call void @llvm.dbg.value(metadata i8 1, metadata !56, metadata !82), !dbg !75
  call void @llvm.dbg.declare(metadata %struct.A* undef, metadata !56, metadata !37), !dbg !75
  %1 = getelementptr inbounds %struct.A, %struct.A* %agg.tmp.i.i, i64 0, i32 0, !dbg !83
  call void @llvm.lifetime.start(i64 24, i8* %1), !dbg !83
  %2 = load i64, i64* @a, align 8, !dbg !85, !tbaa !40
  %call.i.i5 = invoke noalias i8* @_Znwm(i64 %2) #4
          to label %call.i.i.noexc unwind label %lpad, !dbg !86

call.i.i.noexc:                                   ; preds = %entry
  %agg.tmp.sroa.4.17..sroa_idx = getelementptr inbounds [7 x i8], [7 x i8]* %agg.tmp.sroa.4, i64 0, i64 0, !dbg !87
  %agg.tmp.sroa.2.1..sroa_idx = getelementptr inbounds [15 x i8], [15 x i8]* %agg.tmp.sroa.2, i64 0, i64 0, !dbg !87
  store i8* %call.i.i5, i8** bitcast (i32** @b to i8**), align 8, !dbg !88, !tbaa !46
  store i8 1, i8* %1, align 8, !dbg !89
  %agg.tmp.sroa.2.0..sroa_raw_idx = getelementptr inbounds i8, i8* %1, i64 1, !dbg !89
  call void @llvm.memcpy.p0i8.p0i8.i64(i8* %agg.tmp.sroa.2.0..sroa_raw_idx, i8* %agg.tmp.sroa.2.1..sroa_idx, i64 15, i1 false), !dbg !89
  %agg.tmp.sroa.3.0..sroa_idx = getelementptr inbounds %struct.A, %struct.A* %agg.tmp.i.i, i64 0, i32 2, !dbg !89
  store i8 1, i8* %agg.tmp.sroa.3.0..sroa_idx, align 8, !dbg !89
  %agg.tmp.sroa.4.0..sroa_raw_idx = getelementptr inbounds i8, i8* %1, i64 17, !dbg !89
  call void @llvm.memcpy.p0i8.p0i8.i64(i8* %agg.tmp.sroa.4.0..sroa_raw_idx, i8* %agg.tmp.sroa.4.17..sroa_idx, i64 7, i1 false), !dbg !89
  invoke void @_Z2f91A(%struct.A* %agg.tmp.i.i)
          to label %invoke.cont unwind label %lpad, !dbg !90

invoke.cont:                                      ; preds = %call.i.i.noexc
  call void @llvm.lifetime.end(i64 24, i8* %1), !dbg !91
  call void @llvm.dbg.value(metadata %struct.B* %d, metadata !73, metadata !37), !dbg !80
  %call1 = call %struct.B* @_ZN1BD1Ev(%struct.B* %d) #3, !dbg !92
  ret void, !dbg !92

lpad:                                             ; preds = %call.i.i.noexc, %entry
  %3 = landingpad { i8*, i32 }
          cleanup, !dbg !92
  call void @llvm.dbg.value(metadata %struct.B* %d, metadata !73, metadata !37), !dbg !80
  %call2 = call %struct.B* @_ZN1BD1Ev(%struct.B* %d) #3, !dbg !92
  resume { i8*, i32 } %3, !dbg !92
}

declare %struct.B* @_ZN1BC1El(%struct.B*, i64)

declare i32 @__gxx_personality_v0(...)

; Function Attrs: nounwind
declare %struct.B* @_ZN1BD1Ev(%struct.B*) #3

; Function Attrs: nounwind readnone
declare void @llvm.dbg.value(metadata, metadata, metadata) #0

; Function Attrs: argmemonly nounwind
declare void @llvm.lifetime.start(i64, i8* nocapture) #2

; Function Attrs: argmemonly nounwind
declare void @llvm.lifetime.end(i64, i8* nocapture) #2

attributes #0 = { nounwind readnone }
attributes #1 = { nobuiltin }
attributes #2 = { argmemonly nounwind }
attributes #3 = { nounwind }
attributes #4 = { builtin }

!llvm.dbg.cu = !{!8}
!llvm.module.flags = !{!29, !30}
!llvm.ident = !{!31}

!0 = !DIGlobalVariableExpression(var: !1, expr: !DIExpression())
!1 = !DIGlobalVariable(name: "a", scope: null, file: !2, line: 1, type: !3, isLocal: false, isDefinition: true)
!2 = !DIFile(filename: "test.cpp", directory: "")
!3 = !DIBasicType(name: "long int", size: 64, align: 64, encoding: DW_ATE_signed)
!4 = !DIGlobalVariableExpression(var: !5, expr: !DIExpression())
!5 = !DIGlobalVariable(name: "b", scope: null, file: !2, line: 7, type: !6, isLocal: false, isDefinition: true)
!6 = !DIDerivedType(tag: DW_TAG_pointer_type, baseType: !7, size: 64, align: 64)
!7 = !DIBasicType(name: "int", size: 32, align: 32, encoding: DW_ATE_signed)
!8 = distinct !DICompileUnit(language: DW_LANG_C_plus_plus, file: !9, producer: "clang version 3.7.0 ", isOptimized: true, runtimeVersion: 0, emissionKind: FullDebug, enums: !10, retainedTypes: !11, globals: !28, imports: !10)
!9 = !DIFile(filename: "<stdin>", directory: "")
!10 = !{}
!11 = !{!12, !6, !19}
!12 = !DICompositeType(tag: DW_TAG_structure_type, name: "A", file: !2, line: 2, size: 192, align: 64, elements: !13, identifier: "_ZTS1A")
!13 = !{!14, !16, !18}
!14 = !DIDerivedType(tag: DW_TAG_member, name: "x4", scope: !12, file: !2, line: 3, baseType: !15, size: 8, align: 8)
!15 = !DIBasicType(name: "bool", size: 8, align: 8, encoding: DW_ATE_boolean)
!16 = !DIDerivedType(tag: DW_TAG_member, name: "x5", scope: !12, file: !2, line: 4, baseType: !17, size: 64, align: 64, offset: 64)
!17 = !DIDerivedType(tag: DW_TAG_pointer_type, baseType: null, size: 64, align: 64)
!18 = !DIDerivedType(tag: DW_TAG_member, name: "x6", scope: !12, file: !2, line: 5, baseType: !15, size: 8, align: 8, offset: 128)
!19 = !DICompositeType(tag: DW_TAG_structure_type, name: "B", file: !2, line: 8, size: 8, align: 8, elements: !20, identifier: "_ZTS1B")
!20 = !{!21, !25}
!21 = !DISubprogram(name: "B", scope: !19, file: !2, line: 9, type: !22, isLocal: false, isDefinition: false, scopeLine: 9, flags: DIFlagPrototyped, isOptimized: true)
!22 = !DISubroutineType(types: !23)
!23 = !{null, !24, !3}
!24 = !DIDerivedType(tag: DW_TAG_pointer_type, baseType: !19, size: 64, align: 64, flags: DIFlagArtificial | DIFlagObjectPointer)
!25 = !DISubprogram(name: "~B", scope: !19, file: !2, line: 10, type: !26, isLocal: false, isDefinition: false, scopeLine: 10, flags: DIFlagPrototyped, isOptimized: true)
!26 = !DISubroutineType(types: !27)
!27 = !{null, !24}
!28 = !{!0, !4}
!29 = !{i32 2, !"Dwarf Version", i32 2}
!30 = !{i32 2, !"Debug Info Version", i32 3}
!31 = !{!"clang version 3.7.0 "}
!32 = distinct !DISubprogram(name: "f13", linkageName: "_Z3f131A", scope: !2, file: !2, line: 13, type: !33, isLocal: false, isDefinition: true, scopeLine: 13, flags: DIFlagPrototyped, isOptimized: true, unit: !8, retainedNodes: !35)
!33 = !DISubroutineType(types: !34)
!34 = !{null, !12}
!35 = !{!36}
!36 = !DILocalVariable(name: "p1", arg: 1, scope: !32, file: !2, line: 13, type: !12)
!37 = !DIExpression(DW_OP_deref)
!38 = !DILocation(line: 13, column: 12, scope: !32)
!39 = !DILocation(line: 14, column: 37, scope: !32)
!40 = !{!41, !41, i64 0}
!41 = !{!"long", !42, i64 0}
!42 = !{!"omnipotent char", !43, i64 0}
!43 = !{!"Simple C/C++ TBAA"}
!44 = !DILocation(line: 14, column: 14, scope: !32)
!45 = !DILocation(line: 14, column: 5, scope: !32)
!46 = !{!47, !47, i64 0}
!47 = !{!"any pointer", !42, i64 0}
!48 = !DILocation(line: 15, column: 6, scope: !32)
!49 = !{i64 0, i64 1, !50, i64 8, i64 8, !46, i64 16, i64 1, !50}
!50 = !{!51, !51, i64 0}
!51 = !{!"bool", !42, i64 0}
!52 = !DILocation(line: 15, column: 3, scope: !32)
!53 = !DILocation(line: 16, column: 1, scope: !32)
!54 = distinct !DISubprogram(name: "f11", linkageName: "_Z3f111A", scope: !2, file: !2, line: 17, type: !33, isLocal: false, isDefinition: true, scopeLine: 17, flags: DIFlagPrototyped, isOptimized: true, unit: !8, retainedNodes: !55)
!55 = !{!56}
!56 = !DILocalVariable(name: "p1", arg: 1, scope: !54, file: !2, line: 17, type: !12)
!57 = !DILocation(line: 17, column: 12, scope: !54)
!58 = !DILocation(line: 17, column: 22, scope: !54)
!59 = !DILocation(line: 13, column: 12, scope: !32, inlinedAt: !60)
!60 = distinct !DILocation(line: 17, column: 18, scope: !54)
!61 = !DILocation(line: 14, column: 37, scope: !32, inlinedAt: !60)
!62 = !DILocation(line: 14, column: 14, scope: !32, inlinedAt: !60)
!63 = !DILocation(line: 14, column: 5, scope: !32, inlinedAt: !60)
!64 = !DILocation(line: 15, column: 6, scope: !32, inlinedAt: !60)
!65 = !DILocation(line: 15, column: 3, scope: !32, inlinedAt: !60)
!66 = !DILocation(line: 16, column: 1, scope: !32, inlinedAt: !60)
!67 = !DILocation(line: 17, column: 27, scope: !54)
!68 = distinct !DISubprogram(name: "f16", linkageName: "_Z3f16v", scope: !2, file: !2, line: 18, type: !69, isLocal: false, isDefinition: true, scopeLine: 18, flags: DIFlagPrototyped, isOptimized: true, unit: !8, retainedNodes: !71)
!69 = !DISubroutineType(types: !70)
!70 = !{null}
!71 = !{!72, !73}
!72 = !DILocalVariable(name: "c", scope: !68, file: !2, line: 19, type: !12)
!73 = !DILocalVariable(name: "d", scope: !68, file: !2, line: 20, type: !19)
!74 = !DIExpression(DW_OP_LLVM_fragment, 8, 120)
!75 = !DILocation(line: 17, column: 12, scope: !54, inlinedAt: !76)
!76 = distinct !DILocation(line: 22, column: 3, scope: !68)
!77 = !DIExpression(DW_OP_LLVM_fragment, 136, 56)
!78 = !DILocation(line: 19, column: 5, scope: !68)
!79 = !DILocation(line: 20, column: 7, scope: !68)
!80 = !DILocation(line: 20, column: 5, scope: !68)
!81 = !DIExpression(DW_OP_LLVM_fragment, 0, 8)
!82 = !DIExpression(DW_OP_LLVM_fragment, 128, 8)
!83 = !DILocation(line: 13, column: 12, scope: !32, inlinedAt: !84)
!84 = distinct !DILocation(line: 17, column: 18, scope: !54, inlinedAt: !76)
!85 = !DILocation(line: 14, column: 37, scope: !32, inlinedAt: !84)
!86 = !DILocation(line: 14, column: 14, scope: !32, inlinedAt: !84)
!87 = !DILocation(line: 22, column: 7, scope: !68)
!88 = !DILocation(line: 14, column: 5, scope: !32, inlinedAt: !84)
!89 = !DILocation(line: 15, column: 6, scope: !32, inlinedAt: !84)
!90 = !DILocation(line: 15, column: 3, scope: !32, inlinedAt: !84)
!91 = !DILocation(line: 16, column: 1, scope: !32, inlinedAt: !84)
!92 = !DILocation(line: 23, column: 1, scope: !68)



--------------------------------------------------

--------------------------------------------------

Neural correlates of olfactory change detection.
Detecting changes in a stream of sensory information is vital to animals and humans. While there have been several studies of automatic change detection in various sensory modalities, olfactory change detection is largely unstudied. We investigated brain regions responsive to both passive and active detection of olfactory change using fMRI. Nine right-handed healthy, normosmic subjects (five men) were scanned in two conditions while breathing in synchrony with a metronome. In one condition, subjects mentally counted infrequent odors (Attend condition), whereas in the other condition, subjects' attention was directed elsewhere as they counted auditory tones (Ignore condition). Odors were delivered via a nasal cannula using a computer-controlled air-dilution olfactometer. Infrequently occurring olfactory stimuli evoked significant (P < .05, corrected) activity in the subgenual cingulate and in central posterior orbitofrontal cortex, but only in the Ignore condition, as confirmed by direct comparison of the Ignore session with the Attend session (P < .05, corrected). Subgenual cingulate and posterior orbital cortex may therefore play a role in detecting discrepant olfactory events while attention is otherwise engaged in another sensory modality.

--------------------------------------------------

--------------------------------------------------

1. Field of the Invention
The present invention relates to a drawing apparatus, and a method of manufacturing an article.
2. Description of the Related Art
In recent years, with an increase in packing density and miniaturization of semiconductor integrated circuits, the line width of a circuit pattern has become very small, so further miniaturization of a pattern (resist pattern) formed (drawn) on a substrate is required in a lithography process. As one of techniques which achieves such pattern miniaturization, a drawing apparatus (charged particle beam drawing apparatus) which performs drawing on a substrate with a charged particle beam is known.
A multi-charged particle beam drawing apparatus generally focuses a plurality of charged particle beams on a substrate, and moves a stage which holds the substrate and the charged particle beams relative to each other, thereby drawing a pattern on the substrate. Therefore, to draw a fine pattern, it is important to accurately align the substrate and the charged particle beams relative to each other.
In aligning a charged particle beam and a substrate with each other in a drawing apparatus, secondary electrons from an alignment mark set (formed) on the substrate are detected by a detector while the charged particle beam is deflected relative to the alignment mark, thereby obtaining the position of the alignment mark. Note that the range of deflection of each of a plurality of charged particle beams is narrower in a multi-charged particle beam drawing apparatus than in a single-charged particle beam drawing apparatus which performs drawing on a substrate with one charged particle beam. Therefore, if the dimension (deflection distance) of each charged particle beam in the direction in which an alignment mark is measured within the range of deflection of this charged particle beam is smaller than the dimension (width) of the alignment mark in the direction in which it is measured, the alignment mark cannot be measured using one charged particle beam alone. Hence, Japanese Patent Nos. 4026872 and 4327434 propose techniques of measuring alignment marks in drawing apparatuses.
Japanese Patent No. 4026872 discloses a drawing apparatus which measures an alignment mark by simultaneously deflecting a plurality of charged particle beams arrayed in the direction in which the alignment mark is measured. In the drawing apparatus disclosed in Japanese Patent No. 4026872, the interval between charged particle beams in the direction in which the alignment mark is measured is set equal to an integer multiple of the pitch between pattern elements (mark elements) which form the alignment mark. Upon this operation, detection signals (secondary electrons) detected by a detector are combined with each other while a plurality of charged particle beams are simultaneously deflected relative to the alignment mark to reduce the influence of distortion and random noise of the detection signals, thereby accurately measuring the alignment mark.
Also, Japanese Patent No. 4327434 discloses two methods for measuring an alignment mark. The first method serves to detect secondary electrons from an alignment mark by a detector while sequentially deflecting a plurality of charged particle beams in accordance with the property of the alignment mark. In the first method, the effective deflection distance of each charged particle beam in the direction in which the alignment mark is measured is set large, and secondary electrons are individually detected by a detector while the charged particle beams are sequentially deflected relative to the alignment mark, thereby allowing measurement of the alignment mark. The second method serves to measure an alignment mark as the deflection distance of each charged particle beam in the direction in which the alignment mark is measured is set large using a measuring deflector for the alignment mark. In the second method, a measuring deflector for the alignment mark is provided separately from a pattern drawing deflector, thereby allowing measurement of the alignment mark with one charged particle beam alone.
However, the pitch between pattern elements which form the alignment mark, and the interval between charged particle beams in the direction in which the alignment mark is measured are not always equal in periodicity. This is because in a process of manufacturing a device, the alignment mark is commonly used even in an apparatus (for example, an exposure apparatus) other than a drawing apparatus, so the pitch between pattern elements cannot be determined only for the sake of convenience of the drawing apparatus. Therefore, a shift may occur in the relative positional relationship between the charged particle beams and the alignment mark (pattern elements), thus making the two ends (their positions) of each of some pattern elements fall outside the range of deflection of each charged particle beam.
Also, when one pattern element (the positions of its two ends) is measured using at least two charged particle beams, as the number of charged particle beams increases, the effective deflection distance of each charged particle beam increases more than when the pattern element is measured using one charged particle beam alone. Especially when the spot size of the charged particle beam is smaller than the length of the alignment mark in the non-measurement direction, it is necessary to measure a plurality of portions in the non-measurement direction for one pattern element, and obtain their integral, in order to reduce an error due to factors associated with the edge flatness of the pattern elements. This prolongs the measurement time of the alignment mark, thus lowering the throughput of the drawing apparatus.
Also, in the drawing apparatus, due, for example, to manufacturing errors of a charged particle optical system, differences may occur in the incident angles (irradiation angles) or intensities (irradiation intensities) of respective charged particle beams. Therefore, when one pattern element is measured using at least two charged particle beams, distortions or variations may occur in the waveforms of detection signals obtained from respective charged particle beams, thus degrading the measurement accuracy of the alignment mark.
FIG. 9 is a view for explaining measurement of an alignment mark in the related art technique. FIG. 9 shows the positional relationship between five charged particle beams CPa to CPe and two pattern elements PEa and PEb which form the alignment mark in the drawing apparatus, and detection signals (their waveforms) obtained by detecting secondary electrons from the pattern elements PEa and PEb, respectively.
Referring to FIG. 9, two ends (positions) M1 and M1′ of the pattern element PEa fall within the range of deflection of the charged particle beam CPa (a range defined by dotted lines P1 and P2), so the position of the pattern element PEa can be measured by deflecting the charged particle beam CPa. In such a case, compared to the case wherein one pattern element is measured using a plurality of charged particle beams, the number of charged particle beams required for measurement is smaller, and the deflection distance of each charged particle beam is smaller, so the alignment mark can be measured in a shorter time. Also, since one pattern element is measured using one charged particle beam, the position of the pattern element PEa can be accurately measured free from the influence of differences in incident angle and intensity of respective charged particle beams (that is, free from the occurrence of distortions or variations in the waveforms of detection signals).
On the other hand, two ends (positions) M2 and M2′ of the pattern element PEb are positioned across the range of deflection of a charged particle beam PEd (a range defined by dotted lines P4 and P5) and that of a charged particle beam PEe (a range defined by dotted lines P5 and P6). In such a case, the pattern element PEb must be measured while the charged particle beams PEd and PEe are sequentially deflected. This lowers the throughput due to an increase in number of charged particle beams required to measure pattern elements, or the measurement accuracy due to differences in incident angle and intensity of respective charged particle beams.
Note that as disclosed in Japanese Patent No. 4026872, when a plurality of charged particle beams are simultaneously deflected, it is possible to prevent a decrease in throughput due to an increase in number of charged particle beams required to measure pattern elements. However, the pitch between pattern elements and the interval between charged particle beams are not always proportional to each other, as described above. Therefore, detection signals having different waveforms are obtained in accordance with the amount of shift between the irradiation positions of the charged particle beams and the positions of the pattern elements, and an error may occur in the waveform obtained by combining these detection signals with each other, thus degrading the measurement accuracy.
Also, as disclosed in Japanese Patent No. 4327434, when a plurality of charged particle beams are sequentially deflected in accordance with the property of the alignment mark (pattern elements), a detection signal is detected for each charged particle beam, so the measurement accuracy degrades due to neither distortions nor variations of the waveforms of the detection signals. However, because at least two charged particle beams are sequentially deflected relative to the two ends of the pattern element, the effective deflection distance of each charged particle beam increases, so the measurement time of the alignment mark increases, thus lowering the throughput of the drawing apparatus, as described above. Due to differences in incident angle and intensity of respective charged particle beams, distortions or variations may occur in the waveforms of detection signals obtained from these charged particle beams, thus degrading the measurement accuracy of the alignment mark.
Moreover, as disclosed in Japanese Patent No. 4327434, when a measuring deflector for the alignment mark is used, the alignment mark (pattern elements) can be measured using one charged particle beam alone, so neither the throughput nor the measurement accuracy lowers in principle. This leads to degradation in measurement accuracy and rise in cost due to an increase in aberration.

--------------------------------------------------

--------------------------------------------------

The Compound

The Compound, also known as Street Patterns or The Grid, is an area in southwestern Palm Bay, Florida, similar to Flagler Estates. It is a largely undeveloped area of some  of paved road. General Development Corporation began development of the area in the 1980s, but went bankrupt in 1991; afterward, few residents ever moved in, and the streets fell into serious disrepair by the early 2000s.

Affected streets
Bombardier Boulevard: Now home to a facility for Bombardier Recreational Products, after which the road was renamed.
Gamrott Street
Olsen Street
Gatsin Street
Hammonton Street
Hanford Road
Gamewell Road
Gaspar Street
Heritage Street
Emerson Drive: Paved, and renamed Osmosis Drive as of late 2009.
Olean Street
Olsmar Street: Paved as of late 2009.
Galicia Street
Lachine Street
Ocarina Street
Friendly Street
Fitchburg Street: Paved as of late 2009.
Garder Road
Olin Road
Felton Street
Fredrick Street
Frazer Street
Labra Road
Haines Road
Franzing Road
La Fleur Street
Faulkner Street
St. Andre Boulevard: Paved as of 2016 for use in the recent St. Johns Heritage Parkway extension. 

Most roads in the area have not since been repaved.

Geography
The Compound is located at . The area of The Compound is . To the west is the St. Johns River and Three Forks Marsh.  To the southeast is Deer Run.  To the east is Bayside Lakes, and to the north is Palm Bay Regional Park. The average elevation is  above sea level.

Paintball
A section of Palm Bay is also home to the first city-run paintball park known as Hurricane Paintball Park. Discharge of a paintball gun is illegal within the city of Palm Bay, except at a municipal paintball field. In response to complaints of illegal paintball games within the compound, the Palm Bay City Council ordered the Palm Bay Department of Parks and Recreation to develop a city paintball park as a safe, legal and affordable place to play paintball within the city.

Initially constructed with city funds, materials donated by local businesses and volunteer labor provided by local paintball players, the park has suffered several closures due to management issues, allegations of wrongdoing by contractors and budget issues. The most recent of which was "Invincibles Paintball," a commercial paintball field operator that runs additional locations in Port St. Lucie and Fort Pierce.

As of December 26, 2009, Fillion Paintball has been in charge of park operations.

Off-Road sports 
The compound is also used by off-road sports enthusiasts. There are sections of the area that have dirt trails that have been formed from repeated use. The sand tends to be sugar sand and very soft in spots, making it challenging at times. Riding dirt bikes and ATVs off road here is probably illegal and would be considered trespassing, but as long as the riders refrain from becoming nuisances, they are tolerated. The police have cracked down on off-road use after several events resulting in the death of riders. The northern edge of the property is particularly appealing to dirt bikers and ATV riders because there are some large man-made hills there, but this is private property owned by Bombardier Industries.

Paramotoring 
Initially used as a means of surveillance by law enforcement, the Palm Bay Police Department began paramotoring in the vicinity of the compound. Para sport enthusiasts since, have used The Compound, due to its large open spaces, contiguous uninhabited areas and skyline free from obstructions for both recreational purposes and training. As a safe minimal risk operating location for paramotoring, the paramotoring community has contributed much to the preservation of The Compound, by working with law-enforcement, reporting law and traffic violations while providing a general custodianship of the properties. The paramotoring community further enhances public relations, by organizing property maintenance such as mowing, occasional roadway maintenance and trash removal. The air space immediately overhead The Compound and some of the adjacent agricultural and swamp areas, is arguably the least congested airspace in the entire state of Florida.  It is therefore an ideal safe haven for the activity, which brings a significant financial revenue to the greater municipal areas of Palm Bay.

Remote control airplane operations 
RC airplane enthusiasts frequently use the stretch of Sapodilla Rd SW by Wishbone Ave SW.

Tough Mudder 
The Compound has played host to two annual Tough Mudder events in 2015, and 2016 respectively. Both events generated large amounts of revenue for both Palm Bay and surrounding areas that hosted competitors. As of 2017, it unknown whether the site will host future Tough Mudder events.

Future use 
The St. Johns Heritage Parkway will pass through this portion of Palm Bay as a part of the future connection to the currently under construction Interstate 95 interchange just north of Micco Rd., construction of this section of the parkway is tentatively set to begin in the early 2020s.

References

External links
Hog Wild Paintball Field
Hurricane Paintball Park
Tough Mudder

Category:Palm Bay, Florida
Category:Geography of Brevard County, Florida

--------------------------------------------------

--------------------------------------------------

[Testosterone's effect on tPA and PAI-1 mRNA levels of HUVEC].
To investigate the effect of testosterone with varied concentrations on the tPA and PAI-1 mRNA levels of Human umbilical vein endothelial cells (HUVEC). HUVEC within 2 - 3 passages were cultured with testosterone (3, 30, 3 x 10(3), 3 x 10(4) nmol/L) , and the control confluent cells were cultured in the same medium without steroid for 48 hours. RT-PCR was carried out to detect tPA and PAI-1 mRNA levels. tPA mRNA level increased, while PAI-1 mRNA levels decreased significantly, at the testosterone concentrations ranging from 3 to 3 x 10(3) nmol/L (P < 0.05). Both tPA and PAI-1 mRNA level decreased obviously of 3 x 10(4) nmol/L group. The results indicated that testosterone could stimulate tPA gene expression, while decreased PAI-1 mRNA level of HUVEC, which suggested that testosterone might have beneficial effects on preventing male's thrombotic diseases.

--------------------------------------------------

--------------------------------------------------

نحو مدرسة أنثروبولوجية لدراسةالمجتمعات في المنطقةالعربية

محمد سليمان شناق

Résumé

This paperwillpresent an intellectualattemptbased on the reality in whichwe live in the Arabregion, withoutseparating or departingfrom the prevailinganthropologicaltheory in thisfield of knowledge, and not isolating the Arabsocieties in a unique and isolatedsense of the world'santhropological and anthropologicalheritage. In the expression, discussion and study of issues of particularAraboriginstemmingfrom the historicalheritage, religious and humanitarian, whichinhabit the regionwithvarious components expressed by the culture of thisregion.

--------------------------------------------------

--------------------------------------------------

We noticed that you're using an unsupported browser. The TripAdvisor website may not display properly.We support the following browsers:Windows: Internet Explorer, Mozilla Firefox, Google Chrome. Mac: Safari.

I'd read reviews of other springs and really wanted to go. I rented a cottage nearby and was warned by the owners of sewage issues, but NOT at Ahalanui State Park. I had SUCH a great swim and snorkel. I saw so many fish (one little, brave guy that kept looking me in the eye). Great park, well maintained and...
More

--------------------------------------------------

--------------------------------------------------

-3.47, -2
Put 4/3, -2/23, 1, -9.91, -2 in descending order.
4/3, 1, -2/23, -2, -9.91
Put -1/7, 33, 1/5, 4, 0.4 in ascending order.
-1/7, 1/5, 0.4, 4, 33
Put -43, 1, -2, 3 in increasing order.
-43, -2, 1, 3
Sort 1/2, 0.2, -606 in decreasing order.
1/2, 0.2, -606
Sort 5, 1, -659 in decreasing order.
5, 1, -659
Put 42, 4, -3 in decreasing order.
42, 4, -3
Put -0.1, 10, -1, -2/3, 2/5 in decreasing order.
10, 2/5, -0.1, -2/3, -1
Sort -19, 2/3, 2, 12 in decreasing order.
12, 2, 2/3, -19
Put 0, -4, 300, -2 in decreasing order.
300, 0, -2, -4
Put 7/4, 5, 0.06 in decreasing order.
5, 7/4, 0.06
Put -4, 70, -1 in decreasing order.
70, -1, -4
Put -3, 1, -89 in descending order.
1, -3, -89
Put 0.2, -0.1, -2/31, -0.24 in increasing order.
-0.24, -0.1, -2/31, 0.2
Sort 2, 16, -1, 4.
-1, 2, 4, 16
Put 0.2, 1/4, 4, 0.0045 in decreasing order.
4, 1/4, 0.2, 0.0045
Sort -0.1, -0.068, 0.1.
-0.1, -0.068, 0.1
Put -0.5, 0.09, -3, 4 in ascending order.
-3, -0.5, 0.09, 4
Put 3/4, 5, -58, -2 in increasing order.
-58, -2, 3/4, 5
Sort -1, -3, 2, 18.
-3, -1, 2, 18
Sort 0, 4, -350 in ascending order.
-350, 0, 4
Sort -3, -69, 0 in decreasing order.
0, -3, -69
Put -3, -4, 4, 2 in ascending order.
-4, -3, 2, 4
Sort -2, 6, -4, -5 in descending order.
6, -2, -4, -5
Sort 41, 7, -2, -1.
-2, -1, 7, 41
Put 1, -4, 2, 15 in descending order.
15, 2, 1, -4
Put -0.3, 2, -3879 in descending order.
2, -0.3, -3879
Sort -5, 0.5, -2/11 in descending order.
0.5, -2/11, -5
Sort 0.5, -1059/2, -0.2 in descending order.
0.5, -0.2, -1059/2
Sort -21, -0.4, 238 in decreasing order.
238, -0.4, -21
Put 12, 2, -0.1, -4 in increasing order.
-4, -0.1, 2, 12
Sort -5, 1, -163, -3, 3.
-163, -5, -3, 1, 3
Sort 2, -1, 3, -7 in increasing order.
-7, -1, 2, 3
Put 21, 4, -240 in descending order.
21, 4, -240
Sort -7, 1, 6, -11, -5 in descending order.
6, 1, -5, -7, -11
Put -20, -3, 3, 3/7 in decreasing order.
3, 3/7, -3, -20
Sort -1/6, 122, -2/11, -4.
-4, -2/11, -1/6, 122
Sort 5, -114, 37.
-114, 5, 37
Sort 4, -2, 1, 12 in decreasing order.
12, 4, 1, -2
Sort 50, -5, -3, 18 in decreasing order.
50, 18, -3, -5
Sort 5, 3, -94, 4 in decreasing order.
5, 4, 3, -94
Sort -1, -2, -165, 3.
-165, -2, -1, 3
Sort -5, 32, 4, -2, 2 in ascending order.
-5, -2, 2, 4, 32
Put 20, -2, 7, 2 in descending order.
20, 7, 2, -2
Put 4, -1/4, 5, 2, -0.01 in descending order.
5, 4, 2, -0.01, -1/4
Put -32, -4, 5, 2, -5 in descending order.
5, 2, -4, -5, -32
Put -7, 2, 9 in descending order.
9, 2, -7
Sort 7, -2, 4, 5 in decreasing order.
7, 5, 4, -2
Sort 1/2, -1/3, -4/7, 3 in decreasing order.
3, 1/2, -1/3, -4/7
Sort -15, 10, -5, -2 in descending order.
10, -2, -5, -15
Put -213, 5, 3 in increasing order.
-213, 3, 5
Sort -1, 7, -5, 1 in increasing order.
-5, -1, 1, 7
Put 1.1, 3, -5, 0.12 in ascending order.
-5, 0.12, 1.1, 3
Put -3/8, 5, -5 in decreasing order.
5, -3/8, -5
Sort -66, 1/7, -0.2 in ascending order.
-66, -0.2, 1/7
Sort 10, 4, 34 in increasing order.
4, 10, 34
Sort 5/8, 2/9, -0.2 in descending order.
5/8, 2/9, -0.2
Put 0, -2, 3, -3 in increasing order.
-3, -2, 0, 3
Put -2/27, 5, -0.1 in increasing order.
-0.1, -2/27, 5
Put -3, 2, 5859 in descending order.
5859, 2, -3
Put -0.1, 3/335, -0.4 in descending order.
3/335, -0.1, -0.4
Sort 0, -4, -355, 6 in decreasing order.
6, 0, -4, -355
Put 4, 97, -2, -6 in descending order.
97, 4, -2, -6
Sort 2, 5/3, 3, -0.4.
-0.4, 5/3, 2, 3
Sort -3, 2, -4, 4, -253 in ascending order.
-253, -4, -3, 2, 4
Put -1, 250, -7, -4, 0 in descending order.
250, 0, -1, -4, -7
Sort 4/9, 0.7, -4, -1/4, 0.6 in decreasing order.
0.7, 0.6, 4/9, -1/4, -4
Sort -29, -5, 3, 1 in descending order.
3, 1, -5, -29
Sort 4, 3, -0.23 in ascending order.
-0.23, 3, 4
Sort -267, -1, 3 in ascending order.
-267, -1, 3
Put 3, 2/19, -4/7, 10/19 in descending order.
3, 10/19, 2/19, -4/7
Sort -0.5, 0.008, 1 in ascending order.
-0.5, 0.008, 1
Put -4, -1, 48, 0 in increasing order.
-4, -1, 0, 48
Sort -1/113, -1, 5, 1/9 in descending order.
5, 1/9, -1/113, -1
Sort -5, -4, 4, -18 in increasing order.
-18, -5, -4, 4
Put -2, 282, 4, 5, 3 in descending order.
282, 5, 4, 3, -2
Sort 0.15, 1/6, -22 in ascending order.
-22, 0.15, 1/6
Sort 0.3, 0.033, -1/4 in increasing order.
-1/4, 0.033, 0.3
Put 3, -13, -1, -201 in ascending order.
-201, -13, -1, 3
Sort -7, -0.3, -3/5, -5 in descending order.
-0.3, -3/5, -5, -7
Sort 8, -5, -11, 3, 15 in decreasing order.
15, 8, 3, -5, -11
Put -0.054, -1, 5 in increasing order.
-1, -0.054, 5
Put -0.4, 5, -19, -0.2, 12 in decreasing order.
12, 5, -0.2, -0.4, -19
Put 1, -50, -4, 5 in ascending order.
-50, -4, 1, 5
Put -1/3, -5/6, -3, -3/8 in ascending order.
-3, -5/6, -3/8, -1/3
Put 33, 1, 0.1 in decreasing order.
33, 1, 0.1
Sort 0, -4, -10, -3 in descending order.
0, -3, -4, -10
Sort -0.08, -0.1, 1, -11.
-11, -0.1, -0.08, 1
Put -10, 38/9, -2 in ascending order.
-10, -2, 38/9
Put -3/7, -66, 5, 4 in increasing order.
-66, -3/7, 4, 5
Put -28, 1.2, -3, -1/20 in descending order.
1.2, -1/20, -3, -28
Sort 3, 2, -54, 24, -5 in decreasing order.
24, 3, 2, -5, -54
Sort 3, -4, -5, -1.
-5, -4, -1, 3
Put -11, 5, -2, 0 in ascending order.
-11, -2, 0, 5
Sort 6/7, -12, 14.
-12, 6/7, 14
Put 9, 10, 4, -4 in decreasing order.
10, 9, 4, -4
Sort 10/11, -2/5, 0 in decreasing order.
10/11, 0, -2/5
Sort 49, -2, 2 in increasing order.
-2, 2, 49
Sort 4, -0.06, -4, 4/15 in ascending order.
-4, -0.06, 4/15, 4
Sort 2, -57, -12 in ascending order.
-57, -12, 2
Sort -4, -12, 4, 6 in descending order.
6, 4, -4, -12
Sort 95, -9, -3 in descending order.
95, -3, -9
Sort -0.5, 1, 0, 13.
-0.5, 0, 1, 13
Put -1, 2, 3 in descending order.
3, 2, -1
Sort 3/5, -3, -10, 2/15 in ascending order.
-10, -3, 2/15, 3/5
Sort 88, 2, 3.
2, 3, 88
Sort 5, -1/4, 0.13, -1/6 in increasing order.
-1/4, -1/6, 0.13, 5
Put 0, -19, -0.01 in descending order.
0, -0.01, -19
Sort 3/5, 2/13, 36 in descending order.
36, 3/5, 2/13
Sort -5, 123, -4, 0.
-5, -4, 0, 123
Put -1/2, -0.02, 5/4, 5, -1 in ascending order.
-1, -1/2, -0.02, 5/4, 5
Put -4, -19, 2, 5 in descending order.
5, 2, -4, -19
Sort -2, 113, 2 in descending order.
113, 2, -2
Put -4/5, -0.2, -0.002, 1, -1 in descending order.
1, -0.002, -0.2, -4/5, -1
Put 5, 38, 3 in increasing order.
3, 5, 38
Put -2, -3, 2, -1 in descending order.
2, -1, -2, -3
Put 0.1, 0.2, 0, -63 in descending order.
0.2, 0.1, 0, -63
Put -10, 28, -4, 3 in decreasing order.
28, 3, -4, -10
Sort 5, -2, -27, 2 in descending order.
5, 2, -2, -27
Sort -21.8, 0.1, -0.1, 0.4 in ascending order.
-21.8, -0.1, 0.1, 0.4
Sort -4, -3, 0, -116, -2 in ascending order.
-116, -4, -3, -2, 0
Sort 29, -5, 2/9, -4/5 in increasing order.
-5, -4/5, 2/9, 29
Put 3, 0, -61 in increasing order.
-61, 0, 3
Put -4, -5, 37, -2 in descending order.
37, -2, -4, -5
Sort -1/4, -4/5, -41.
-41, -4/5, -1/4
Sort 2, 300, 5 in decreasing order.
300, 5, 2
Sort -1/3, -5, 1.
-5, -1/3, 1
Put 0, 2, -50, -1 in decreasing order.
2, 0, -1, -50
Sort -13, -0.2, 0.24 in ascending order.
-13, -0.2, 0.24
Sort -1, -3, -9, 3, -17.
-17, -9, -3, -1, 3
Put 3/5, 1/9, 0.3, -12 in descending order.
3/5, 0.3, 1/9, -12
Sort -31, -2/5, 52, -0.5 in descending order.
52, -2/5, -0.5, -31
Sort 4, 2/9, -39.
-39, 2/9, 4
Sort 3, 0, -0.6, 229, -3.
-3, -0.6, 0, 3, 229
Sort 0, -2, 9, 1 in decreasing order.
9, 1, 0, -2
Put -0.03, -1, 2 in descending order.
2, -0.03, -1
Put -0.3, -0.02, -0.2, 11.2, 0 in decreasing order.
11.2, 0, -0.02, -0.2, -0.3
Sort -3, -57, 5, 0.3 in decreasing order.
5, 0.3, -3, -57
Sort 2, -0.1, 183 in ascending order.
-0.1, 2, 183
Sort -8, 2/3, 0.3 in increasing order.
-8, 0.3, 2/3
Put 0.3, 67, 49 in increasing order.
0.3, 49, 67
Put -2/5, -6, 0.2, -0.1 in ascending order.
-6, -2/5, -0.1, 0.2
Sort -228, 14, 5 in descending order.
14, 5, -228
Sort 5, -15, -11 in increasing order.
-15, -11, 5
Sort 5, -2, -7.
-7, -2, 5
Sort 4, -2, -20, -1 in descending order.
4, -1, -2, -20
Sort -15.2, 1, 5, -1.
-15.2, -1, 1, 5
Sort -5, -351, -3.
-351, -5, -3
Sort 0.5, 3, -0.11, 4 in ascending order.
-0.11, 0.5, 3, 4
Put 7, 5, -1/2, -10 in descending order.
7, 5, -1/2, -10
Put -7, 1, -4 in decreasing order.
1, -4, -7
Put 5, -19, 0, 4 in descending order.
5, 4, 0, -19
Sort 14/3, 0.1, 2, 0.2 in descending order.
14/3, 2, 0.2, 0.1
Put 81, 0.2, -3, 0.3 in decreasing order.
81, 0.3, 0.2, -3
Sort 11, -0.1, 5, -4.5, 2/3 in descendin

--------------------------------------------------

--------------------------------------------------

Our Team

Jeffrey Bolden, Chief Technical Architect and Managing Partner

Blue Lotus SIDC was founded on Bolden’s unique approach to and principles of product and project management, systems integration, and data conversion. Bolden responded thoughtfully and creatively to IT and personnel issues that arise in the current culture of business, developing and implementing new ideas that allow companies to evolve and thrive. His theories are also the basis for his forthcoming book, Project Shaping: The Blue Lotus Guide to Avoiding the Misconnections that Cause System Integration and Data Conversion Failures.

In addition to his successful career with large USA companies as a Systems Analyst, Technical Architect, Director of Development and then CIO, Jeff’s accomplishments include:

Joining legacy systems and data with cutting-edge technologies while preserving the business knowledge held within the code.

Designing and deploying a paraphrase engine – a system capable of determining whether two statements have the same meaning when the language used is very different.

Ian F. McGrady, Chief Marketing Officer

Mr. McGrady guides Blue Lotus’ strategic development, product development, sales and distribution channel management, public relations, advertising and promotions, pricing, customer service, and market research. He anticipates future trends in IT and business effects, staying aware of competitive insurgence, maintaining customer needs and satisfaction. McGrady is co-author with Bolden of the book, Project Shaping: The Blue Lotus Guide to Avoiding the Misconnections that Cause System Integration and Data Conversion Failures. Ian began his career in broadcast journalism at ABC News and wrote and produced nightly and weekend newscasts including 9/11 coverage for News 12 Networks. Mr. McGrady is a frequent public speaker about issues of leadership and motivation. He is also executive producer of a rock album.

Michael C. Mendelsohn, Interactive Designer

Mr. Mendelsohn is responsible for design and delivery of the look, feel and implementation of Blue Lotus’ interactive projects. He comes to Blue Lotus SIDC as a multimedia audio/video/desktop/web producer, designer and editor who has worked in industrial advertising, interactive media, television and music for more than a decade. His recent accomplishments include design and development of a highly-rated and well-reviewed iPhone application. He has worked with such notables as Chris Rock, Tom Stoppard, Debbie Harry, Mick Rock, and Wanda Sykes.

Zhenya Rozinskiy, Outsourcing and Foreign Development Specialist

Rozinskiy is a leader, adviser, and speaker focused on managing software development, with over 20 years of expertise in leading technology product development, building effective teams, and overseeing outsourcing projects. Rozinskiy’s passion is working with people and building effective teams, and he believes that his primary goal is to find the right spot for each person in an organization and always remains dedicated to delivering only the highest quality of projects.

Michael Kaplan, Director of Development

With experience in commercial product development, project management, business analysis, systems analysis, and software process improvement, Mr. Kaplan brings his diverse portfolio of skills and expertise in the software industry to Blue Lotus SIDC. He leads delivery efforts focusing on requirement facilitation, composition of requirement documentation, and the development and delivery of complex software systems including commercial software products. He advocates for best practices in professional software engineering, assisting client teams with: coding standards, code reviews, source control management, build processes, testing and agile methods, and acts as liaison with both technical and non-technical personnel at all levels of the organization.

--------------------------------------------------

--------------------------------------------------

Joan Sawicki

Joan Marie Sawicki (born September 18, 1945) is a former Canadian politician. She served as a NDP Member of the Legislative Assembly of British Columbia from 1991 to 2001, representing Burnaby-Willingdon. She served as Speaker of the Legislative Assembly from 1992 to 1994, and as Minister of Environment, Lands and Parks from 1999 to 2000.

Background
Sawicki was born in Burnaby, BC in 1945. She attended the University of Victoria earning a B.A. in Education in 1968. Sawicki was a secondary school teacher, a civil servant, and a land-use consultant prior to holding elected offices.

Political career
Sawicki was elected to the Burnaby City Council in 1987 and served one term. She chaired the environment and waste management committee and sat as a municipal representative on both the Greater Vancouver Regional District waste management committee and the Metropolitan Board of Health.

Sawicki was the NDP candidate in the riding of Burnaby-Willingdon in the 1986 provincial election but was defeated by Elwood Veitch, a minister in the Social Credit government. She was elected in the same riding in 1991, and re-elected in 1996.

Sawicki was elected Speaker of the Legislative Assembly in March 1992, serving for two years. She was forced to resign as Speaker by Premier Mike Harcourt in 1994. She then served as Parliamentary Secretary to the Minister of Municipal Affairs from April 1994 to May 1996, and to the Minister of Environment, Lands and Parks from June 1996 to January 1998. She resigned from her position over issues concerning a proposed land development project that was to take place on protected land under the Agricultural Land Reserve at Six Mile Ranch near Kamloops.

In July 1999, Glen Clark named Sawicki to cabinet as Minister of Environment, Lands, and Parks. She retained her portfolio when Ujjal Dosanjh became premier.  She announced in October 2000 that she would not seek re-election, and relinquished her portfolio on November 1, 2000.

References

Category:1945 births
Category:Living people
Category:British Columbia New Democratic Party MLAs
Category:Women government ministers of Canada
Category:Members of the Executive Council of British Columbia
Category:Speakers of the Legislative Assembly of British Columbia
Category:Women legislative speakers
Category:Women MLAs in British Columbia
Category:20th-century Canadian politicians
Category:20th-century Canadian women politicians

--------------------------------------------------

--------------------------------------------------

Elena Vukić

Elena Vukić (born 10 December 1991) is a Croatian volleyball player. She plays as outside hitter for Slovenian club OK Kamnik.

References

External links
Elena Vukić at CEV.eu

Category:1991 births
Category:Living people
Category:Croatian women's volleyball players
Category:Sportspeople from Split, Croatia
Category:Expatriate volleyball players in Slovenia

--------------------------------------------------

--------------------------------------------------

With the help of searchlights, rescuers, firefighters, policemen, soldiers and volunteers continue removing the rubble and debris from a flattened building late Monday in search of survivors after a powerful quake in Mexico City. More than 200 people were killed and dozens of buildings were collapsed by the earthquake.

Mario Vazquez/AFP/Getty Images

hide caption

toggle caption

Mario Vazquez/AFP/Getty Images

Updated at 3:30 a.m. ET Wednesday

The death toll continues to rise in Mexico after Tuesday’s earthquake. The country’s national civil defense agency confirmed the death toll stands at 248. Rescue teams are digging through the rubble to find survivors.

Updated at 2:00 a.m. ET Wednesday

Mexico’s civil defense agency has raised the death toll from Tuesday’s earthquake. Officials say 226 people have died — more than half in the capital Mexico City.

Updated at 11:10 p.m. ET

Thirty-two years to the day after an earthquake killed thousands of people in Mexico, a powerful quake rattled the country’s central region Tuesday. Buildings shivered in Mexico City, and dozens collapsed, sending clouds of dust skyward.

A woman is carried on a stretcher after being pulled from the debris of a collapsed building in Mexico City on Tuesday.

Ronaldo Schemidt/AFP/Getty Images

hide caption

toggle caption

Ronaldo Schemidt/AFP/Getty Images

“It was one of the worst feelings I’ve ever experienced in my life,” she said. “It’s a bit like being on top of a double-decker bus that’s trying to brake and you’re thinking you’re about to get thrown. And of course, you’re thinking, ‘Are things going to fall on top of me — is the building going to collapse?’ “

In its preliminary assessment, the U.S. Geological Survey said the magnitude 7.1 earthquake’s epicenter was just over 3 miles east-northeast of Raboso, in the state of Puebla, some 75 miles southeast of Mexico City.

In the neighboring state of Morelos, 54 people were killed, according to local officials and news reports. Alfredo Del Mazo, governor of the state of Mexico, tweeted that at least nine people have died in his state. And Puebla Gov. Tony Gali told an emergency meeting of local officials that at least 26 people had died there, several of whom were children.

Nationwide, at least 149 are reported dead, and it is expected that the death toll will continue to rise.

People remove the debris of a collapsed building as they look for possible victims after the 7.1 magnitude quake rattled Mexico City on Tuesday.

Omar Torres/AFP/Getty Images

hide caption

toggle caption

Omar Torres/AFP/Getty Images

“We don’t have an estimate yet from authorities of how many buildings — but just photos and videos from people in the street show there are many buildings collapsed so far,” reporter James Fredrick told NPR. “The civil protection agency of Mexico City has confirmed that they’re beginning excavation work for people trapped inside collapsed buildings.”

Another problem loosed by the quake: Gas leaks have been reported across the city, some of which have already resulted in fires, according to Fredrick.

“God bless the people of Mexico City,” President Trump tweeted Tuesday in the aftermath. “We are with you and will be there for you.”

Late Tuesday, State Department spokesperson Heather Nauert said “Our thoughts and prayers are with the people of Mexico affected by today’s 7.1 magnitude earthquake and other recent natural disasters. We stand ready to provide assistance should our neighbors request our help.”

The earthquake also comes less than two weeks after a massive temblor struck southern Mexico, killing dozens of people.

The 1985 earthquake that officials were marking Tuesday left thousands dead and parts of Mexico City in ruins. Univision’s Enrique Acevedo noted that a national earthquake drill was scheduled for 1 p.m. local time.

“It’s a law that all schools and public institutions have to do a safety drill on Sept. 19,” Greg Berger, a journalist and professor in Cuernavaca, in the state of Morelos, told NPR’s Adhiti Bandlamudi. His 10-year-old son had already taken part in a drill at school in the morning — “then it started shaking again, and my son told me that he thought it was another drill, but a high-tech drill. He thought it was kind of cool, because he thought they were making the floors move.”

The quake was not so gentle with the rest of Cuernavaca.

“This is an indigenous town, and a lot of the older walls made out of adobe are collapsed,” Berger said. “There’s debris in the street. There are a lot of people who are still afraid to go back to their houses.”

But, he added, the survivors have been supporting each other in the aftermath.

“I think there’s a long history in Mexico of the best in people getting brought out by these kinds of disasters, and I can see that in my neighborhood right now,” he said. “People are watching out for each other, and there’s going to be a lot more of that to come over the next few days.”

--------------------------------------------------

--------------------------------------------------

1. Field of the Invention
The present invention relates to a three-dimensional image capturing device by which a three-dimensional shape of a measurement subject, which is to be measured, can be captured by a time-of-flight measurement.
2. Description of the Related Art
A three-dimensional measurement using a three-dimensional image capturing device is classified as an active system, in which light, an electric wave or sound is radiated onto a measurement subject, and a passive system in which the light, electric wave or sound is not output. The active system comprises the time-of-flight measurement, a phase detection using a modulated light wave, a triangulation, a moirxc3xa9 topography, and so on, and the passive system comprises a stereo vision system, and so on.
An active system device is bulky in comparison with that of the passive system, since the device requires a laser beam output mechanism. However, the active system device is superior regarding a distance measurement resolution, a measuring time, a measuring range and so on, and thus, despite the bulkiness, the device is utilized in various fields. In a three-dimensional image capturing device, described in xe2x80x9cMeasurement Science and Technologyxe2x80x9d (S. Christies et al., vol.6, p.1301-1308, 1995), a pulse-modulated laser beam irradiates a measurement subject, and a reflected light beam, which is reflected by the measurement subject, is received by a two-dimensional CCD sensor to which an image intensifier is attached, so that an image signal, corresponding to the reflected light beam, is converted to an electric signal. ON-OFF control of the image intensifier is carried out by a gate pulse, which is synchronized with the pulse radiation of the laser beam. According to the device, since an amount of received light, based on the reflected light beam from the measurement subject, which is positioned far from the device, is less than that of received light based on a reflected light beam from a measurement subject, which is close to the measurement subject, an output corresponding to a distance between the measurement subject and the device can be obtained for each pixel of the CCD.
In a device disclosed in International Publication No. 97/01111, light, such as a laser beam, which is pulse-modulated, irradiates a measurement subject, and a reflected light beam, which is reflected by the measurement subject, is received by a two-dimensional CCD sensor which is assembled with a mechanical shutter or an electro-optical shutter formed by a liquid crystal display, so that an image signal corresponding to the reflected light beam is converted to an electric signal. The shutter is controlled at a timing which is different from that of the laser beam, so that distance information of the measurement subject is obtained for each pixel of the CCD.
In the conventional three-dimensional image capturing device of an active system described above, an optical shutter, such as a KDP element, is provided so that an electric charge accumulating operation in the CCD sensor is controlled. However, not only is the optical shutter bulky, but also an electric circuit, which outputs a high voltage to drive the optical shutter, should be provided, and thus the conventional device becomes and remains bulky.
On the other hand, in U.S. Pat. No. 5,081,530, a device, in which an electronic shutter is provided for controlling an electric charge accumulating operation of a CCD sensor, is disclosed. However, an output of the CCD sensor, which is obtained by a single operation of the electronic shutter, is not great enough to sense distance information of the measurement subject.
Therefore, an object of the present invention is to provide a miniaturized three-dimensional image capturing device, which operates without an optical shutter, and by which an output sufficient to acquire three-dimensional distance information of the measurement subject is obtainable.
According to the present invention, there is provided a three-dimensional image capturing device comprising a light source, a plurality of photoelectric conversion elements, a signal charge holding unit, an electric charge discharging processor, a signal charge transfer processor, a signal charge integrating processor and a signal level adjusting processor.
The light source radiates a distance measuring light beam irradiating a measurement subject, which reflects the distance measuring light beam to generate a reflected light beam. The plurality of photoelectric conversion elements receive the reflected light beam, so that electric charge corresponding to an amount of the received reflected light beam is accumulated in each of the photoelectric conversion elements. The signal charge holding unit is disposed adjacent to each of the photoelectric conversion elements. The electric charge discharging processor discharges unwanted charge accumulated in each of the photoelectric conversion elements, so that an accumulating operation of signal charge is started in each of the photoelectric conversion elements. The signal charge transfer processor transfers the signal charge accumulated in the photoelectric conversion elements to the signal charge holding unit. The signal charge integrating processor outputs control pulse signals to drive the electric charge discharging processor and the signal charge transfer processor alternately, in accordance with a number of the control pulse signals, for a predetermined period, so that the signal charge is integrated in the signal charge holding unit. The signal level adjusting processor controls the number of the control pulse signals to adjust a level of the signal charge.
Further, according to the present invention, there is provided a three-dimensional image capturing device comprising the light source, the plurality of photoelectric conversion elements, the signal charge holding unit, the electric charge discharging processor, the signal charge transfer processor, a signal charge integrating processor and a signal level adjusting processor.
The signal charge integrating processor drives the electric charge discharging processor and the signal charge transfer processor alternately, so that the signal charge is integrated in the signal charge holding unit. The signal level adjusting processor controls the number of operations by which the signal charge integrating processor drives the electric charge discharging processor and the signal charge transfer processor alternately, so that a level of the signal charge is adjusted.

--------------------------------------------------

--------------------------------------------------

If this is your first visit, be sure to
check out the FAQ by clicking the
link above. You may have to register
before you can post: click the register link above to proceed. To start viewing messages,
select the forum that you want to visit from the selection below.

Hey there everybody! I am new to beekeeping and I was wondering if I should use a shallow super with thin foundation for cut comb honey or go up to a medium super for this? Also...should I be using a queen excluder when I put the supers on? Thanks a lot!....TN

I only use the deep 9 5/8 inch for the brood nest and the 6 5/8 inch suppers for everything else extracting or cut comb. This way I only have to deal with 2 frame sizes. I usually do not use queen excluders at all. Most of my older hives are 3 9 5/8 bodys tall to start with before suppers are added and the queen rarely goes higher than 3 in my experience.
Clint

I would use the mediums also for the same reasons. Less different sizes. The shallow supers should sag less, but the difference is negligeble. Both the shallow and the mediums sag if you put them on too soon or let them set around outside on hot days. If you don't put the supers on until the bees are ready for them it should work fine. BTW when doing cut comb I buy the 7/11 foundation from Kelleys. It's half way between drone and worker size so the queen doesn't like to lay in it. I sometimes use queen excluders, but I prefer to just give he queen enough room and let the bees have free access.

[This message has been edited by Michael Bush (edited February 28, 2003).]

You'll get 100 different answers here and none are wrong. I use shallow boxes and 9 5/8 for supers and have used both for cut comb. So as you can see use what you want. Ask your self if you are in a good honey area. If you have a short flow and the girls can't draw and cap a deep for cut comb don't use them for that. Same with medium or shallow boxes. If I had to do it over I'd use the mediums but I inherited many shallow boxes (free) so I stuck with them so as not to have mixed frame sizings. As for the queen excluder, well it depends on how you manage the colony. If you cut down to a single...yes. If not you may not need to but if you want to play it safe sure. If using the excluder I would wait till the girls started drawning the foundation then slip them in. Some times bees will not push through them to get to foundation and could trigger swarming impulse. Other times some colonies will cross them like nothing is there.

Actually it depends on your whole plan for keeping bees. Do you want to run deeps for the hive boxes? Then you have to have some other size for the supers, and shallow or medium will work fine. Deeps for supers are just too heavy. When I raised just comb honey, I ran deeps for the brood and shallows for the honey. When I bought an extractor I went to deeps for brood and mediums for extracted honey, and since I'd like to standardize (after all the old mixed up equipment I have deterioates) I decided I'd just buy mediums for all my honey.

Then I found PermaComb, which is only available in medium and I found some hives of survivor feral bees, which were in mediums and I decided I'd just standardize on that. All in all, it really doesn't make that much difference except weight and standardization.

But if I was only rasing comb honey and I was using deeps for brood, I'd get shallows.

If I was extracting and doing comb honey and I really wanted to standardize, I'd go to all mediums for everything including brood.

If I was extracting and doing comb honey and I really wanted deeps for brood chambers, I'd go to deeps for brood and pick either mediums or shallows, one or the other, for everything else. But I'd try not to get all three just because it makes life simpler.

I'm one to talk. I have DE hives in mediums and deeps, and Lanstroths in shallow, medium and deep, so I have five different kinds of frames and five different sizes of foundation (not counting diferent KINDS of foundation e.g. drone, small cell, 7/11, surplus, medium brood, RiteCell, Pierco, etc.)

I mentioned this on a previous post but thought it would be helpful here also. If you have flat queen excluders, plastics or metal bound, place the queen excluder (when needed) at opposite direction than what you normally would lay them on. This will cause the excluder to hang out the hive an inch or so on two sides. The queen usually does not work the very edge of the frames and therefore doesn't make it around the end of the excluder. The workers still have an inch to the front and the back which inhibits them less. I also drill a hole in the super for the workers to have another free access point into the super. Plug with a cork when not needed. I like the flat excluders so there is no room for extra burr comb as with the standard wood bound excluders.

Re: Super Size?

I use the Medium frames for cut comb you can cut the square out of the middle of the frames and then use the piece of comb at the bottom of the frame for chunk honey in the jar so none of it goes to waste.

Re: Super Size?

I've made one deep and one nuc 11.5" deep, made my own frames, and will use regular deep foundation. Should be interesting to see how this works out compared to my standard deeps. I made narrow frames (1.25") as well, should give the queen lots of room in a single box if all works out well. I plan to use two mediums for stores, one under, one over and checkerboard in the late winter.

As far as cut comb goes, you should use whatever size box your bees will fill quickly if you use thin surplus foundation, as it will droop badly as soon as the weather gets hot if they don't draw it out soon after you put it on.

Re: Super Size?

We are digging up ten year old threads????? We have been hanging out here over ten years???? We have wasted how much time here???? We don't have anything better to do????? How old am I????
AAAAARRRRGGGGHHHHH!!!!!!!

Re: Super Size?

I have used a substantial amount of 11 1/4" deep frames since 1979 in both 16 1/4" and 19 7/8" wide boxes. I made 70 new frames Jumbo and 70 new deep this year. I like them for the large brood laying area the queen gets and the capability to run single brood chamber hives with enough room for laying and winter stores. The frames are available from Rossman and the foundation from Dadant. Recently I have been stacking old 5 3/8" and 5 1/4" deep foundation in a farme which overlap about 1/4". This old foundation pre-dates miticides and uses up supplies on hand, giving me more funds to pay for lunch.

--------------------------------------------------

--------------------------------------------------

Q:

Задача на нахождение числа, произведение цифр которого, равно другому числу C++

Условие задачи:

Найти наименьшее и наибольшее натуральные числа, произведение цифр в
которых равно заданному натуральному числу M или сообщить, что таких
чисел не существует. Для записи искомых чисел нельзя использовать
цифры 0 и 1.
Входные данные В единственной строке входного файла INPUT.TXT записано
натуральное число M (2 ≤ M ≤ 1000).
Выходные данные В единственную строку выходного файла OUTPUT.TXT нужно
вывести два натуральных числа в неубывающем порядке. Если таких чисел
не существует, то вывести -1 -1.

#include <bits/stdc++.h>
using namespace std;

bool check_prime(int n)
{
    for (int i = 2; i * i <= n; i++)
        if (n % i == 0)
            return false;
    return true;
}

int main()
{
    int n;
    cin >> n;
    for (size_t i = 11; i * i <= n; i += 2)
    {
        if (check_prime(i) && n % i == 0) //если существует простой делитель больше 9, то число непредставимо
        {
            cout << -1 << " " << -1;
            return 0;
        }
    }
    vector<int> a,b; //a - максимальное, b - минимальное 
    int m = n;
    for (size_t i = 2; i < 10 && n != 1; i++)
    {
        while (n % i == 0)
        {
            a.push_back(i);
            n /= i;
        }
    }
    for (size_t i = 9; i > 1 && m != 1; i--)
    {
        while (m % i == 0)
        {
            b.push_back(i);
            m /= i;
        }
    }
    for (auto i = b.rbegin(); i != b.rend(); i++)
    {
        cout << *i;
    }
    cout << " ";
    for (auto i = a.rbegin(); i != a.rend(); i++)
    {
        cout << *i;
    }
}

На одном из тестов неверный ответ. В чем может быть проблема?

A:

Давайте возьмем число... ну... 57 = 3*19, вот.
Пошла ваша проверка...
for (size_t i = 11; i * i <= n; i += 2)

Стоп-стоп! 11*11==121, явно больше 57 - значит, мы проскакиваем эту проверку вообще!
Досадно, но идем дальше, потому что еще не все потеряно...
for (size_t i = 2; i < 10 && n != 1; i++)
{
    while (n % i == 0)
    {
        a.push_back(i);
        n /= i;
    }
}

Вот здесь бы проверить, а не осталось ли n большим 1 (реально - большим 10), но раз мы этого не делаем - вот теперь уже да, таки все потеряно. Программа выведет 3 3, что, как вы понимаете, как ни множь - никак не даст 57...
Я бы вашу проверку с 11 (понимаете, в чем ее ошибка?...) убрал вообще и проверял бы число уже после разложения на простые однозначные.



--------------------------------------------------

--------------------------------------------------

Q:

What would happen if a rogue planet hit one of the planets in our Solar System?

As there are millions of rogue planets in the Milky Way, what would happen if one hit a planet in the Solar System. 
For example, if the rogue planet hit Pluto, would Pluto fall in to the Sun due to to its gravity? What kind of catastrophic damage could it do in the Solar System?

A:

It would depend entirely on the size, composition and trajectory of the two objects coming into the collision. They could annihilate each other leaving a mess of debris. Or one or both could survive the collisions in some form. And each of the surviving objects could be flung out of the solar system, flung into a spiral into the sun, flung into an elliptical orbit, or thrown into other objects. The space between planets is big so odds of direct and immediate collision of the "planets like billiard balls" variety you see on some sci-fi aren't likely. But anything the size of a planet would be seen well before any impact.



--------------------------------------------------

--------------------------------------------------

/**
 * TinyWeibo 微微博 
 * Copyright 2012 China ITElite Team
 * All Rights Reserved.
 * Created on 2012-12-20 23:53:32
 */
package cn.edu.csu.iteliter;

import java.util.Random;

import weibo4j.Place;
import weibo4j.Timeline;
import weibo4j.model.Paging;
import weibo4j.model.Status;
import weibo4j.model.StatusWapper;
import weibo4j.model.User;
import weibo4j.model.UserWapper;
import weibo4j.model.WeiboException;
import android.app.Activity;
import android.content.Context;
import android.content.Intent;
import android.location.Location;
import android.location.LocationManager;
import android.media.AudioManager;
import android.media.MediaPlayer;
import android.os.AsyncTask;
import android.os.Bundle;
import android.os.Handler;
import android.os.Message;
import android.os.Vibrator;
import android.view.View;
import android.view.View.OnClickListener;
import android.view.animation.Animation;
import android.view.animation.AnimationSet;
import android.view.animation.TranslateAnimation;
import android.widget.ImageView;
import android.widget.RelativeLayout;
import android.widget.TextView;
import cn.edu.csu.iteliter.listener.ShakeListener;
import cn.edu.csu.iteliter.listener.ShakeListener.OnShakeListener;
import cn.edu.csu.iteliter.model.UserData;
import cn.edu.csu.iteliter.model.WeiboImage;
import cn.edu.csu.iteliter.model.WeiboItem;
import cn.edu.csu.iteliter.util.CacheUtil;
import cn.edu.csu.iteliter.util.ConstantUtil;
import cn.edu.csu.iteliter.util.NetworkUtil;
import cn.edu.csu.iteliter.util.ToastUtil;
import cn.edu.csu.iteliter.util.WeiboUtil;

/**
 * @filename ShakeWeibo.java
 * @package cn.edu.csu.iteliter
 * @project TinyWeibo 微微博
 * @description 摇微博的界面
 * @author 胡家威
 * @team China ITElite Team
 * @email yinger090807@qq.com
 * @updatetime 2012-12-21 下午2:50:21
 * @version 1.0
 * 
 */
public class ShakeWeibo extends Activity {

	/** 最多显示的微博内容的长度 */
	private static final int MAX_CONTENT_LENGTH = 50;

	/** 监听手机晃动的接口 */
	private ShakeListener mShakeListener;

	/** 界面中央图片的上部分 */
	private RelativeLayout rl_shake_handup;

	/** 界面中央图片的下部分 */
	private RelativeLayout rl_shake_handdown;

	/** 摇出来的微博组件 */
	private RelativeLayout rl_shake_result;

	/** 寻找微博的加载部分组件 */
	private RelativeLayout rl_shake_loading;

	/** 摇微博界面的标题栏的标题 */
	private TextView tv_shake_title;

	/** 用户的昵称 */
	private TextView tv_shakeweiboitem_name;

	/** 微博的内容 */
	private TextView tv_shakeweiboitem_content;

	/** 用户的距离 */
	private TextView tv_shakeweiboitem_distance;

	/** 用户的性别 */
	private ImageView iv_shakeweiboitem_gender;

	/** 用户的头像 */
	private ImageView iv_shakeweiboitem_head;

	/** 摇微博的类型 */
	private int shaketype;// shake type

	/** 要摇的微博的类型 */
	private int weibotype;// weibo type

	/** 处理message的handler */
	private Handler shakeHandler;

	/** 微博 */
	private Status status;

	/** 用户 */
	private User user;

	/** 用户数据 */
	private UserData userData;

	/** 振动器 */
	private Vibrator mVibrator;

	/** 定位器 */
	private LocationManager locationManager;

	/** 网络提供定位 */
	private String network_provider;

	/** GPS提供定位 */
	private String gps_provider;

	/** 摇出来的结果值 */
	private int shake_result;

	/** 没有网络 */
	private final int NO_NETWORK = 0;

	/** 找不到位置 */
	private final int NO_LOCATION = 1;

	/** 没有找到 */
	private final int NO_MATCH = 2;

	/** 找到 */
	private final int MATCH = 3;

	/** 声音效果 */
	private int[] sounds = { R.raw.shake_sound, R.raw.shake_match, R.raw.shake_nomatch };

	/** 声效播放器 */
	private MediaPlayer[] soundPlayers;

	/*
	 * (non-Javadoc)创建界面的回调方法
	 * 
	 * @see android.app.Activity#onCreate(android.os.Bundle)
	 */
	@Override
	public void onCreate(Bundle savedInstanceState) {
		super.onCreate(savedInstanceState);
		setContentView(R.layout.shake_weibo);
		mVibrator = (Vibrator) getApplication().getSystemService(VIBRATOR_SERVICE);
		soundPlayers = new MediaPlayer[sounds.length];
		for (int i = 0; i < soundPlayers.length; i++) {
			soundPlayers[i] = MediaPlayer.create(this, sounds[i]);
			soundPlayers[i].setAudioStreamType(AudioManager.STREAM_MUSIC);
		}
		userData = MainWeibo.userData;
		locationManager = (LocationManager) getSystemService(Context.LOCATION_SERVICE);
		network_provider = LocationManager.NETWORK_PROVIDER;// use network to location
		gps_provider = LocationManager.GPS_PROVIDER;
		tv_shakeweiboitem_distance = (TextView) findViewById(R.id.tv_shakeweiboitem_distance);
		tv_shake_title = (TextView) findViewById(R.id.tv_shake_title);
		shaketype = getIntent().getIntExtra(ConstantUtil.SHAKE_TYPE, ConstantUtil.SHAKE_TYPE_NEARBYWEIBO);
		weibotype = getIntent().getIntExtra(ConstantUtil.WEIBO_TYPE, ConstantUtil.WEIBO_TYPE_PICTURE);
		switch (shaketype) {
		case ConstantUtil.SHAKE_TYPE_ADDFRIEND:
			tv_shake_title.setText("摇附近朋友");
			break;
		case ConstantUtil.SHAKE_TYPE_NEARBYWEIBO:
			tv_shake_title.setText("摇周边动态");
			break;
		case ConstantUtil.SHAKE_TYPE_MODEWEIBO:
			tv_shake_title.setText("摇心情微博");
			break;
		case ConstantUtil.SHAKE_TYPE_FEATUREWEIBO:
			tv_shake_title.setText("摇好友微博");
			tv_shakeweiboitem_distance.setVisibility(View.GONE);
			break;
		default:
			tv_shake_title.setText("摇周边动态");
			break;
		}

		rl_shake_result = (RelativeLayout) findViewById(R.id.rl_shake_result);
		rl_shake_result.setVisibility(View.GONE);
		rl_shake_loading = (RelativeLayout) findViewById(R.id.rl_shake_loading);
		rl_shake_loading.setVisibility(View.GONE);
		tv_shakeweiboitem_name = (TextView) findViewById(R.id.tv_shakeweiboitem_name);
		tv_shakeweiboitem_content = (TextView) findViewById(R.id.tv_shakeweiboitem_content);
		iv_shakeweiboitem_gender = (ImageView) findViewById(R.id.iv_shakeweiboitem_gender);
		iv_shakeweiboitem_head = (ImageView) findViewById(R.id.iv_shakeweiboitem_head);
		rl_shake_handup = (RelativeLayout) findViewById(R.id.rl_shake_handup);
		rl_shake_handdown = (RelativeLayout) findViewById(R.id.rl_shake_handdown);
		tv_shake_title = (TextView) findViewById(R.id.tv_shake_title);

		shakeHandler = new Handler() {
			public void handleMessage(Message message) {
				if (message.what == ConstantUtil.MESSAGE_TYPE_WEIBOIMAGE) {
					WeiboImage weiboImage = (WeiboImage) message.obj;
					weiboImage.imageView.setImageBitmap(weiboImage.bitmap);
				}
			}
		};

		mShakeListener = new ShakeListener(this);
		mShakeListener.setOnShakeListener(new OnShakeListener() {
			public void onShake() {// sensor senses shake event
				startVibrate();
				if (userData.isSoundPlay()) {
					soundPlayers[0].start();
				}
				if (rl_shake_result.getVisibility() != View.GONE) {
					TranslateAnimation downAnimation = new TranslateAnimation(Animation.RELATIVE_TO_SELF, 0f,
							Animation.RELATIVE_TO_SELF, 0f, Animation.RELATIVE_TO_SELF, 0f, Animation.RELATIVE_TO_SELF,
							+5f);// move it off
					downAnimation.setDuration(500);
					downAnimation.setFillAfter(true);
					rl_shake_result.startAnimation(downAnimation);
					rl_shake_result.setVisibility(View.GONE);// direct gone no use
				}
				startAnimation();
				mShakeListener.stop();
				rl_shake_loading.setVisibility(View.VISIBLE);
				new AsyncTask<Void, Void, Void>() {// AsyncTask:call from UI thread
					protected Void doInBackground(Void... params) {
						loadShakeResult();
						return null;
					}

					@Override
					protected void onPostExecute(Void result) {
						System.out.println("shake result = " + shake_result);
						rl_shake_loading.setVisibility(View.GONE);
						if (shake_result == NO_NETWORK) {
							if (userData.isSoundPlay()) {
								soundPlayers[2].start();
							}
							ToastUtil.showShortToast(getApplicationContext(), "您现在米有网络哟！");
						} else if (shake_result == NO_LOCATION) {
							if (userData.isSoundPlay()) {
								soundPlayers[2].start();
							}
							ToastUtil.showShortToast(getApplicationContext(), "无法获取您的位置！");
						} else if (shake_result == NO_MATCH) {
							if (userData.isSoundPlay()) {
								soundPlayers[2].start();
							}
							ToastUtil.showShortToast(getApplicationContext(), "米有摇到任何信息！");
						} else {
							if (status != null) {
								if (userData.isSoundPlay()) {
									soundPlayers[1].start();
								}
								if (shaketype == ConstantUtil.SHAKE_TYPE_NEARBYWEIBO) {
									postShakeNearbyWeibo();
								} else if (shaketype == ConstantUtil.SHAKE_TYPE_ADDFRIEND) {
									postShakeAddFriend();
								} else if (shaketype == ConstantUtil.SHAKE_TYPE_MODEWEIBO) {
									postShakeModeWeibo();
								} else if (shaketype == ConstantUtil.SHAKE_TYPE_FEATUREWEIBO) {
									postShakeFeatureWeibo();
								}
							}
						}
						mVibrator.cancel();
						mShakeListener.start();
					}
				}.execute();

			}
		});
	}

	/**
	 * 寻找摇微博的结果
	 */
	private void loadShakeResult() {
		status = null;
		user = null;
		shake_result = NO_MATCH;
		if (NetworkUtil.getNetworkState(getApplicationContext()) == NetworkUtil.NONE) {
			shake_result = NO_NETWORK;
			mVibrator.cancel();
			mShakeListener.start();
			return;
		}
		try {
			if (shaketype == ConstantUtil.SHAKE_TYPE_NEARBYWEIBO) {
				shakeNearbyWeibo();
			} else if (shaketype == ConstantUtil.SHAKE_TYPE_ADDFRIEND) {
				shakeAddFriend();
			} else if (shaketype == ConstantUtil.SHAKE_TYPE_MODEWEIBO) {
				shakeModeWeibo();
			} else if (shaketype == ConstantUtil.SHAKE_TYPE_FEATUREWEIBO) {
				shakeFeatureWeibo();
			}
		} catch (Exception e) {
			if (userData.isSoundPlay()) {
				soundPlayers[2].start();
			}
			shake_result = NO_MATCH;
			mVibrator.cancel();
			mShakeListener.start();
		}
	}

	/**
	 * 查找周边动态的微博
	 * 
	 * @throws WeiboException
	 *             微博异常
	 */
	private void shakeNearbyWeibo() throws WeiboException {
		Location location = locationManager.getLastKnownLocation(network_provider);// network
		if (location == null) {
			location = locationManager.getLastKnownLocation(gps_provider);// gps
		}
		shake_result = MATCH;
		Place place = new Place();
		place.client.setToken(userData.getToken());
		StatusWapper statusWapper;
		if (location != null) {
			statusWapper = place.nearbyTimeline(location.getLatitude(), location.getLongitude());//
		} else {
			statusWapper = place.nearbyTimeline(28.15675335, 112.934191);// my location
		}
		Random random = new Random();
		int randomint = random.nextInt(statusWapper.getStatuses().size());
		status = statusWapper.getStatuses().get(randomint);
		if (status == null) {
			shake_result = NO_MATCH;
		}
	}

	/**
	 * 得到周边动态的结果之后
	 */
	private void postShakeNearbyWeibo() {
		tv_shakeweiboitem_name.setText(status.getUser().getScreenName());
		tv_shakeweiboitem_distance.setText(status.getDistance() + " M");
		String content = status.getText();
		if (content.length() > MAX_CONTENT_LENGTH) {
			content = content.substring(0, MAX_CONTENT_LENGTH) + "...";
		}
		tv_shakeweiboitem_content.setText(content);
		User user = status.getUser();
		if (user.getGender().equalsIgnoreCase("f")) {// female
			iv_shakeweiboitem_gender.setVisibility(View.VISIBLE);
			iv_shakeweiboitem_gender.setImageResource(R.drawable.user_info_female);
		} else if (user.getGender().equalsIgnoreCase("m")) {// male
			iv_shakeweiboitem_gender.setVisibility(View.VISIBLE);
			iv_shakeweiboitem_gender.setImageResource(R.drawable.user_info_male);
		} else {// not know
			iv_shakeweiboitem_gender.setVisibility(View.GONE);
		}
		WeiboUtil.restoreBitmap(CacheUtil.PROFILE_CACHE_PATH, user.getProfileImageUrl(), shakeHandler,
				iv_shakeweiboitem_head, ConstantUtil.IMAGE_TYPE_PROFILE);
		TranslateAnimation downAnimation = new TranslateAnimation(Animation.RELATIVE_TO_SELF, 0f,
				Animation.RELATIVE_TO_SELF, 0f, Animation.RELATIVE_TO_SELF, -1.2f, Animation.RELATIVE_TO_SELF, 0f);
		downAnimation.setDuration(1000);
		downAnimation.setFillAfter(true);
		rl_shake_result.setVisibility(View.VISIBLE);
		rl_shake_result.startAnimation(downAnimation);

		rl_shake_result.setOnClickListener(new OnClickListener() {
			public void onClick(View v) {
				Intent intent = new Intent(ShakeWeibo.this, ViewWeiboItem.class);
				intent.putExtra("status", new WeiboItem(status));
				startActivity(intent);
			}
		});
	}

	/**
	 * 查找附近的好友
	 * 
	 * @throws WeiboException
	 *             微博异常
	 */
	private void shakeAddFriend() throws WeiboException {
		Location location = locationManager.getLastKnownLocation(network_provider);// network
		if (location == null) {
			location = locationManager.getLastKnownLocation(gps_provider);// gps
		}
		shake_result = MATCH;
		Place place = new Place();
		place.client.setToken(userData.getToken());
		UserWapper userWapper;
		if (location != null) {
			userWapper = place.nearbyUsers(location.getLatitude(), location.getLongitude());//
		} else {
			userWapper = place.nearbyUsers(28.15675335, 112.934191);// my location
		}
		Random random = new Random();
		int randomint = random.nextInt(userWapper.getUsers().size());
		user = userWapper.getUsers().get(randomint);
		status = user.getStatus();
		if (user == null || status == null) {
			shake_result = NO_MATCH;
		}
	}

	/**
	 * 查找完附近好友之后
	 */
	private void postShakeAddFriend() {
		tv_shakeweiboitem_name.setText(user.getScreenName());
		tv_shakeweiboitem_distance.setText(user.getDistance() + " M");
		String content = status.getText();
		if (content.length() > MAX_CONTENT_LENGTH) {
			content = content.substring(0, MAX_CONTENT_LENGTH) + "...";
		}
		tv_shakeweiboitem_content.setText(content);
		if (user.getGender().equalsIgnoreCase("f")) {// female
			iv_shakeweiboitem_gender.setVisibility(View.VISIBLE);
			iv_shakeweiboitem_gender.setImageResource(R.drawable.user_info_female);
		} else if (user.getGender().equalsIgnoreCase("m")) {// male
			iv_shakeweiboitem_gender.setVisibility(View.VISIBLE);
			iv_shakeweiboitem_gender.setImageResource(R.drawable.user_info_male);
		} else {// not know
			iv_shakeweiboitem_gender.setVisibility(View.GONE);
		}
		WeiboUtil.restoreBitmap(CacheUtil.PROFILE_CACHE_PATH, user.getProfileImageUrl(), shakeHandler,
				iv_shakeweiboitem_head, ConstantUtil.IMAGE_TYPE_PROFILE);
		TranslateAnimation downAnimation = new TranslateAnimation(Animation.RELATIVE_TO_SELF, 0f,
				Animation.RELATIVE_TO_SELF, 0f, Animation.RELATIVE_TO_SELF, -1.2f, Animation.RELATIVE_TO_SELF, 0f);
		downAnimation.setDuration(1000);
		downAnimation.setFillAfter(true);
		rl_shake_result.setVisibility(View.VISIBLE);
		rl_shake_result.startAnimation(downAnimation);
		final WeiboItem weiboItem = new WeiboItem(status.getId(), user.getId(), user.getScreenName(), user.getGender(),
				user.getProfileImageUrl(), user.getLocation(), status.getText(), status.getThumbnailPic(), "", "", "",
				status.getSource().getName(), WeiboUtil.formatWeiboDate(status.getCreatedAt()));
		rl_shake_result.setOnClickListener(new OnClickListener() {
			public void onClick(View v) {
				Intent intent = new Intent(ShakeWeibo.this, ViewWeiboItem.class);
				intent.putExtra("status", weiboItem);
				startActivity(intent);
			}
		});
	}

	/**
	 * 摇心情微博【此功能已经删除】
	 * 
	 * @throws WeiboException
	 *             微博异常
	 */
	private void shakeModeWeibo() throws WeiboException {
		shake_result = MATCH;
		status = null;
		user = null;
		Location location = locationManager.getLastKnownLocation(network_provider);// network
		if (location == null) {
			location = locationManager.getLastKnownLocation(gps_provider);// gps
		}
		Place place = new Place();
		place.client.setToken(userData.getToken());
		StatusWapper statusWapper;
		if (location != null) {
			statusWapper = place.nearbyTimeline(location.getLatitude(), location.getLongitude());//
		} else {
			statusWapper = place.nearbyTimeline(28.15675335, 112.934191);// my location
		}
		Random random = new Random();
		int randomint = random.nextInt(statusWapper.getStatuses().size());
		status = statusWapper.getStatuses().get(randomint);
		if (status == null) {
			shake_result = NO_MATCH;
		}
	}

	/**
	 * 摇出心情微博之后
	 */
	private void postShakeModeWeibo() {
		tv_shakeweiboitem_name.setText(status.getUser().getScreenName());
		tv_shakeweiboitem_distance.setText(status.getDistance() + " M");
		String content = status.getText();
		if (content.length() > MAX_CONTENT_LENGTH) {
			content = content.substring(0, MAX_CONTENT_LENGTH) + "...";
		}
		tv_shakeweiboitem_content.setText(content);
		User user = status.getUser();
		if (user.getGender().equalsIgnoreCase("f")) {// female
			iv_shakeweiboitem_gender.setVisibility(View.VISIBLE);
			iv_shakeweiboitem_gender.setImageResource(R.drawable.user_info_female);
		} else if (user.getGender().equalsIgnoreCase("m")) {// male
			iv_shakeweiboitem_gender.setVisibility(View.VISIBLE);
			iv_shakeweiboitem_gender.setImageResource(R.drawable.user_info_male);
		} else {// not know
			iv_shakeweiboitem_gender.setVisibility(View.GONE);
		}
		WeiboUtil.restoreBitmap(CacheUtil.PROFILE_CACHE_PATH, user.getProfileImageUrl(), shakeHandler,
				iv_shakeweiboitem_head, ConstantUtil.IMAGE_TYPE_PROFILE);
		TranslateAnimation downAnimation = new TranslateAnimation(Animation.RELATIVE_TO_SELF, 0f,
				Animation.RELATIVE_TO_SELF, 0f, Animation.RELATIVE_TO_SELF, -1.2f, Animation.RELATIVE_TO_SELF, 0f);
		downAnimation.setDuration(1000);
		downAnimation.setFillAfter(true);
		rl_shake_result.setVisibility(View.VISIBLE);
		rl_shake_result.startAnimation(downAnimation);

		rl_shake_result.setOnClickListener(new OnClickListener() {
			public void onClick(View v) {
				Intent intent = new Intent(ShakeWeibo.this, ViewWeiboItem.class);
				intent.putExtra("status", new WeiboItem(status));
				startActivity(intent);
			}
		});
	}

	/**
	 * 摇好友微博
	 * 
	 * @throws WeiboException
	 *             微博异常
	 */
	private void shakeFeatureWeibo() throws WeiboException {
		shake_result = MATCH;
		status = null;
		user = null;
		int baseAPP = 0;// default
		int feature = 0;
		if (weibotype == ConstantUtil.WEIBO_TYPE_PICTURE) {
			feature = 2;
		} else if (weibotype == ConstantUtil.WEIBO_TYPE_MUSIC) {
			feature = 4;
		} else if (weibotype == ConstantUtil.WEIBO_TYPE_VIDEO) {
			feature = 3;
		}
		Paging paging = new Paging();
		Timeline timeline = new Timeline();
		timeline.client.setToken(userData.getToken());
		StatusWapper statusWapper = timeline.getFriendsTimeline(baseAPP, feature, paging);
		Random random = new Random();
		int randomint = random.nextInt(statusWapper.getStatuses().size());
		status = statusWapper.getStatuses().get(randomint);
		if (status == null) {
			shake_result = NO_MATCH;
		}
	}

	/**
	 * 摇出好友微博之后
	 */
	private void postShakeFeatureWeibo() {
		tv_shakeweiboitem_name.setText(status.getUser().getScreenName());
		tv_shakeweiboitem_distance.setText(status.getDistance() + " M");
		String content = status.getText();
		if (content.length() > MAX_CONTENT_LENGTH) {
			content = content.substring(0, MAX_CONTENT_LENGTH) + "...";
		}
		tv_shakeweiboitem_content.setText(content);
		User user = status.getUser();
		if (user.getGender().equalsIgnoreCase("f")) {// female
			iv_shakeweiboitem_gender.setVisibility(View.VISIBLE);
			iv_shakeweiboitem_gender.setImageResource(R.drawable.user_info_female);
		} else if (user.getGender().equalsIgnoreCase("m")) {// male
			iv_shakeweiboitem_gender.setVisibility(View.VISIBLE);
			iv_shakeweiboitem_gender.setImageResource(R.drawable.user_info_male);
		} else {// not know
			iv_shakeweiboitem_gender.setVisibility(View.GONE);
		}
		WeiboUtil.restoreBitmap(CacheUtil.PROFILE_CACHE_PATH, user.getProfileImageUrl(), shakeHandler,
				iv_shakeweiboitem_head, ConstantUtil.IMAGE_TYPE_PROFILE);
		TranslateAnimation downAnimation = new TranslateAnimation(Animation.RELATIVE_TO_SELF, 0f,
				Animation.RELATIVE_TO_SELF, 0f, Animation.RELATIVE_TO_SELF, -1.2f, Animation.RELATIVE_TO_SELF, 0f);
		downAnimation.setDuration(1000);
		downAnimation.setFillAfter(true);
		rl_shake_result.setVisibility(View.VISIBLE);
		rl_shake_result.startAnimation(downAnimation);

		rl_shake_result.setOnClickListener(new OnClickListener() {
			public void onClick(View v) {
				Intent intent = new Intent(ShakeWeibo.this, ViewWeiboItem.class);
				intent.putExtra("status", new WeiboItem(status));
				startActivity(intent);
			}
		});
	}

	/**
	 * 开始显示动画
	 */
	public void startAnimation() {
		AnimationSet animup = new AnimationSet(true);
		TranslateAnimation mytranslateanimup0 = new TranslateAnimation(Animation.RELATIVE_TO_SELF, 0f,
				Animation.RELATIVE_TO_SELF, 0f, Animation.RELATIVE_TO_SELF, 0f, Animation.RELATIVE_TO_SELF, -0.5f);
		mytranslateanimup0.setDuration(1000);
		TranslateAnimation mytranslateanimup1 = new TranslateAnimation(Animation.RELATIVE_TO_SELF, 0f,
				Animation.RELATIVE_TO_SELF, 0f, Animation.RELATIVE_TO_SELF, 0f, Animation.RELATIVE_TO_SELF, +0.5f);
		mytranslateanimup1.setDuration(1000);
		mytranslateanimup1.setStartOffset(1000);
		animup.addAnimation(mytranslateanimup0);
		animup.addAnimation(mytranslateanimup1);
		rl_shake_handup.startAnimation(animup);

		AnimationSet animdn = new AnimationSet(true);
		TranslateAnimation mytranslateanimdn0 = new TranslateAnimation(Animation.RELATIVE_TO_SELF, 0f,
				Animation.RELATIVE_TO_SELF, 0f, Animation.RELATIVE_TO_SELF, 0f, Animation.RELATIVE_TO_SELF, +0.5f);
		mytranslateanimdn0.setDuration(1000);
		TranslateAnimation mytranslateanimdn1 = new TranslateAnimation(Animation.RELATIVE_TO_SELF, 0f,
				Animation.RELATIVE_TO_SELF, 0f, Animation.RELATIVE_TO_SELF, 0f, Animation.RELATIVE_TO_SELF, -0.5f);
		mytranslateanimdn1.setDuration(1000);
		mytranslateanimdn1.setStartOffset(1000);
		animdn.addAnimation(mytranslateanimdn0);
		animdn.addAnimation(mytranslateanimdn1);
		rl_shake_handdown.startAnimation(animdn);
	}

	/**
	 * 开始振动
	 */
	public void startVibrate() {
		mVibrator.vibrate(new long[] { 500, 1000, 500, 1000 }, -1);
	}

	/**
	 * 返回主界面
	 * 
	 * @param v
	 *            View组件
	 */
	public void backToMainWeibo(View v) {
		finish();
	}

	/*
	 * (non-Javadoc)界面销毁时回调方法
	 * 
	 * @see android.app.Activity#onDestroy()
	 */
	@Override
	protected void onDestroy() {
		super.onDestroy();
		for (MediaPlayer p : soundPlayers) {
			if (p.isPlaying()) {
				p.stop();
			}
			p.release();
		}
		if (mShakeListener != null) {
			mShakeListener.stop();
		}
	}
}


--------------------------------------------------

--------------------------------------------------

[Health state of Governmental Fire Fighting Service workers in North-East Regional Center of Ministry of Emergencies over 2003-2008].
The study was aimed at evaluation of health state in Governmental Fire Fighting Service workers in North-East Regional Center of Ministry of Emergencies over 2003-2008. Using medical statistic analysis, the authors determined levels and statistically significant tendencies in dynamics of general and primary morbidity, labour losses, disability and mortality, defined the most important social and epidemiologic classes of diseases in firemen.

--------------------------------------------------

--------------------------------------------------

Gadolinium DTPA-enhanced magnetic resonance imaging of cerebral contusions.
The morphological characteristics of cerebral contusions in head trauma patients suggest that an increase in cerebrovascular permeability is responsible for the contusion edema which develops within 1-3 days posttrauma. In the present study, 10 patients with cerebral contusions (mean age, 38 years old; 8 males and 2 females) were examined by gadolinium (Gd)-DTPA enhanced magnetic resonance imaging (MRI) at 1-2 days after trauma. Gd-DTPA (0.3 mmol/kg) was infused intravenously over a period of 30 min. MRIs were taken before, and at 2 and 4 hours after initiation of the Gd-DTPA administration. It was found that contusion edema areas were frequently enhanced by Gd-DTPA at 2 hours. The enhancement diminished at 4 hours. These findings appear to be inconsistent with the results of previously reported similar studies in which enhancement was detected at 6-9 days posttrauma but not during the period earlier than 6 days. This discrepancy may be attributable to the presence of a high blood concentration of Gd-DTPA for a longer period of time and a delay in the time at which MRIs were taken in the present study. The present data indicate that an increased cerebrovascular permeability occurs at as early as 1-2 days posttrauma, and suggest that contusion edema which progresses during the initial 1-3 days may be at least partially vasogenic in nature.

--------------------------------------------------

--------------------------------------------------

Fetishizing Military Gear

After seeing Gisele Bundchen’s latest Vogue shoot entitled “Call of Duty” in various military-inspired ensembles, my conflicted feelings about the sexifying of war gear swung hard and fast in the “that’s not cool” direction. Huffington Post presents these images with significantly less conflict: “let us know which is Gisele’s fiercest moment.” I should mention that this was shot for Vogue Korea no less — presumably South Korea, but a country locked in heated, no-end-in-sight military animosity with its former countrymen. (Insular, distinctly militaristic North Korea now has the highest percentage of military personnel per capita of any nation in the world with approximately 1 enlisted soldier for every 25 citizens.) I mean, I wonder if anyone involved in this Vogue fashion shoot experienced any irony whatsoever. Photographed by Nino Muñoz, clothes are from Balmain, Alexander Wang, Chloé and others in Call of Duty (in case you didn’t get the soldier reference from the images alone). Some choice selections follow.

Gisele is so parched from her desert swim that she must provocatively douse herself with her canteen:

The practical cargo shorts paired with the distinctly impractical shorty army-issued t-shirt and stiletto-heeled combat booties are almost laughable:

This one has clean lines and uniform (as opposed to combat) tailoring that generally appeal to me, but it’s still disturbingly devoid of irony or socio-political critique:

Now, shall we look at some historical moments when military uniforms crossed over into day wear? Frederick Law Olmsted (1822 – 1903) noted that after the Mexican War (1846 – 48) “a great deal of military clothing was sold at auction in New Orleans, and much of it was bought by planters at a low price, and given to their negroes, who were greatly pleased with it.” Not only did military uniforms carry the associations of literal warfare, but they had the compounded layer of becoming sloppy seconds for African American slaves. Later, the surplus army clothing of the Civil War (1861 – 65) was adopted by Western frontiersmen: functional heavy coats and trousers, double-breasted pullover shirts, boots, and individually crimped hats were appealing to those living a rugged civilian lifestyle. And many men who served in WWII found many articles of clothing designed for warfare (i.e. khaki pants) to be comfortable, practical, and even stylish. War generals Dwight D. Eisenhower, George Patton, and Douglas MacArthur became fashion icons of sorts, and the sensible “Eisenhower jacket” was adopted by men and women for its formal practicality:

In the years immediately following WWII, record numbers of veterans entered colleges (in 1946, 75% of entering Harvard students were former G.I.s), bringing with them the comfortable and practical khaki pants, fitted tailored shirts, and casual military jackets. With America’s current casual collegiate styles this might not seem noteworthy, but pre-WWII college students typically dressed in suits and ties, emulating the businessmen many aspired to become, and the casual military look was a sharp digression.

But the natural dissemination of actual army/navy clothes into regular society is a far cry from the fashion industry appropriating military as a trendy look (see Style.com “Marching Orders” trend). In one aberrant season of Rudi Gernreich (1922-1985), better known for his whimsical ’60s graphic mini dresses and topless swimsuit, his 1970 resort collection was distinctly military inspired. His muse and model Peggy Moffitt actually brandished a rifle in a different shot, as did the models on the live runway (and this is one of the tamer looks):

Generally embracing a mod-meets-hippie look, Gernreich showed this controversial collection just months after the Kent State shootings and during the dragging Vietnam War (1955 – 75). During a 1985 retrospective presentation at the Smithsonian Institute, Gernreich commented, “I did the military look in the late 1960s because some designers were making Scarlett O’Hara clothes, which I thought was an insult to women when they were becoming totally equal to men.” I’m the first to admit military-influenced styles of WWII acted as a gender equalizer (see my other posts on War), but Gernreich’s feminist message was lost and this is an inherent problem with glorifying military clothes: there is too much damn violence in the world for it ever to be appropriate without implied commentary (making it shorter/tighter/sexier does not count unless you’re trying to say “war is sexy”).

On the one hand, I have residual fondness for pairing fancy bling with camo — I think it can call attention to the inherent disconnect between wealth, individuality, style, and the conforming, functional purpose of military uniforms that are mostly worn by the young, underprivileged, and uneducated racial minorities. On the other hand, glamorizing the military — especially when one’s own country is in a dragging, controversial war — seems problematic. As a designer (or a photographer, or a model), how do you make this distinction? I am all about playful fun in fashion, but glamorizing bigotry and government-sanctioned violence is distasteful at best and irresponsible at worst. Practical innovations that have come from military issued uniforms should absolutely be adopted by the general public: deep cargo pockets and trench coats are utilitarian and stylish. But making sexually provocative military clothes is not conceptually provocative.

There is some interesting art incorporating fashion and the military. Peter Gronquist’s show entitled “Firearms and Fashion” included weapon objets d’artes with fashion house labels, alluding to a complicit (if vague) relationship between corporate fashion and violence. Below is a Burberry rifle from the collection:

Bringing back the Korean military thread, I saw a powerful piece last summer of Do-Ho Suh’s entitled “Uni-Forms: Self-Portrait/s: My 39 Years” from 2006:

This is a sartorial timeline of Suh’s mandatory life in the South Korean army, from the disturbingly tiny boy’s crested jacket to the full-grown man’s camo and khakis.

Martha Rosler is known for collaging images of the Vietnam battlefield and magazine clippings from the home front including fashion models, washing machines, living room sofas, Playboy nudes, etc. Here is a more recent 2006 work using Iraqi/Afghani footage with a superimposed fashion model who appears to be turning away from the confrontation:

Though the model doesn’t actually wear military gear, it does point to an irresponsible relationship between the fashion world (and the public that so eagerly consumes it) and concurrent warfare.

So readers, do you think it’s ever ok to sexify military wear, and if so, in what context?

Further Reading:

NYTimes article on “Houlihan” M*A*S*H cargo pants (especially funny, since M*A*S*H was a deeply anti-war film and TV series)

4 comments

I think it already started in WWII when the military in America recruited women for the WAC, WAVES, SPARS, WASP etc.! Recruitment campaigns tried to convince as many women as possible with posters, brochures, newspaper advertisements and even movies to join these services. Often they promoted an unrealistic, glamorous and in a way sexualized image of the female army member with a Hollywood-star make-up and style! In these times clothes, fabrics and make-up were rationed and the supplies where scarce. The army had the WAVES and SPARS uniform designed by a french designer to make it more appealing and this did attract recruits. The waves were considered the best-dressed women in america! Joining the army also meant that a woman was able to save money for other beauty items because she did not spend money on civilian clothes. In WWII Joining the armed forces meant new perspectives and possibilities especially for poorer women and it was also one step further to equal rights. Nevertheless these images paved the way for the further fetishizing of military gear like today!

I wouldn’t go so far as to say that the Gisele shoot is without commentary. It’s not insightful commentary, and it’s not in line with your more pacifist views. But isn’t propaganda its own form of commentary, lazy and shallow though it may be?

I’m all for a good cargo short, epaulet jacket, combat boot or cross-body bag, but such literal styling of military-inspired fashion definitely misses the point. Part of fashion is taking very didactic themes and making them work in a new context. When most of these pieces were shown on the runways, they were part of genre mixes that acknowledged the campiness and irony of it all–Burberry paired canvas army belts with frothy little dresses, Balmain with ridiculous over-the-top sparkles and distressing, and countless others adapted fatigue greens into silks, cargo pockets into feminine dresses. As someone in the business of trend forecasting, I can’t blame volume companies for wanting to maximize on a such a mainstream-accessible concept–Hollywood has been romanticizing war for decades. But the styling and direction of this Vogue shoot looks like college girls on Halloween trying to do “sexy soldier” or a pinup magazine for GIs to hang in their bunks. They’ve taken some great high-fashion military inspired pieces, stripped them of their irony and essentially degraded them into bad costume.

It’s very disturbing – without the wink or the nudge this looks like a glamorization of the military, which is like the police. The people in it are mainly good, some are very bad, and it would be a better world if we didn’t require their services.

--------------------------------------------------

--------------------------------------------------

All relevant data are within the paper and its Supporting Information files.

Introduction {#sec001}
============

Heat shock proteins (HSPs) are a class of functionally related molecular chaperones involved in numerous processes, such as protein folding, assembly and transport, peptide trafficking and antigen presentation \[[@pone.0169260.ref001]--[@pone.0169260.ref005]\]. The expression is increased when [cells](http://en.wikipedia.org/wiki/Cell_(biology)) are exposed to superphysiological temperatures or other stress including infection and inflammation \[[@pone.0169260.ref006]\].

gp96, also known as endoplasmin, grp94 and ERp99, is one of the endoplasmic reticulum HSPs that is encoded by the *HSP90B1* [gene](http://en.wikipedia.org/wiki/Gene) in humans \[[@pone.0169260.ref007]--[@pone.0169260.ref010]\]. gp96 shares \~50% homology at the amino acid level with its cytosolic [HSP90](http://en.wikipedia.org/wiki/Hsp90), with a similar domain organization consisting of an N-terminal ATP-binding domain, a charged middle domain and a C-terminal homodimerization domain \[[@pone.0169260.ref011]--[@pone.0169260.ref013]\]. gp96 is believed to be one of the key downstream chaperones that mediates the ER unfolded protein response (UPR), which is crucial for maintaining protein homeostatsis \[[@pone.0169260.ref011], [@pone.0169260.ref014]\]. UPR dysregulation has been implicated in a variety of diseases including obesity, diabetes and neurodegenerative diseases \[[@pone.0169260.ref015]\]. However, the role of gp96 remains unclear in these diseases due to incomplete knowledge of the gp96 interactors. Recent genetic studies demonstrated that gp96 is critical for post-translational folding and cell surface expression of two families of proteins: integrins and Toll-like receptors (TLRs) \[[@pone.0169260.ref016]--[@pone.0169260.ref021]\], suggesting that gp96 may play important roles in immune response. Earlier work suggest that other proteins, such as ErbB2, immunoglobulin heavy chain and light chain, and thyroglobulin are gp96 client proteins \[[@pone.0169260.ref011]\]. In the case of immunoglobulin folding, the role of gp96 was not substantiated by a genetic study \[[@pone.0169260.ref018]\]. Unlike its cytosolic counterpart HSP90 that chaperones up to 10% of cytosolic proteins, the known gp96 client proteins remain limited. Moreover, HSP90 has been found to work with a number of co-chaperones, including p50/Cdc37, p23, AHA1, Cpr6 and Cpr7 \[[@pone.0169260.ref022]--[@pone.0169260.ref025]\]. These cofactors help to link HSP90 to clients, stabilize the ATP bound status of HSP90, and enhance HSP90 ATPase activity. However, so far, only CNPY3, an ER protein, has been identified as a gp96 cofactor, which co-chaperones TLRs with gp96 \[[@pone.0169260.ref021]\].

We undertook an integrated, large-scale proteomic and genomic study in wild type and conditional knockout (KO) gp96 mice/cells aimed at comprehensively mapping the interactome of gp96. We combined four complementary experimental strategies. First, we use isotope-coded affinity tag (ICAT) technique to detect the reduced protein level in bone marrow derived macrophage (BMDM) from gp96 KO mice, comparing with BMDM from wild type (WT) mice. Second, we performed the comparative and quantitative 2-D gel electrophoresis, coupled with mass spectrometry, and demonstrated the reduction of proteins on the plasma membrane from gp96 KO BMDM. Third, we used mass spectrometry to quantitatively compare the protein expression level between WT and KO mice. The proteins with decreased levels in gp96 KO B cells, comparing as to gp96 WT B cells, are potential interactors of gp96. Lastly, we tagged gp96 and carried out immunoprecipitation (IP) by using Tag-specific antibodies. Gp96 and its associated proteins were then identified by mass spectrometry. Collectively, these efforts identified 511 proteins that are reduced in gp96 KO cells, many of which suggest possible links of gp96 with previously unknown roles in metabolic process, cytoskeleton, translation, transport and Wnt signaling.

Materials and Methods {#sec002}
=====================

Mice and genotyping {#sec003}
-------------------

Conditional gp96-deficient mice were described previously \[[@pone.0169260.ref017]\]. Genotyping was performed by polymerase chain reaction (PCR) amplification of mouse tail genomic DNA to differentiate *WT* (561 bp) from floxed HSP90b1 allele (638 bp) (forward primer: `5′-TGCCAGAGACTACAATTCCCAGCA-3′`; reverse primer: `5′-AAACACGAACT CACCAATCGTGCC-3′`), to determine whether floxed HSP90b1 underwent successful cre-mediated recombination (440 bp) (forward primer: `5′-AGCAAGGGCCAAGCTACGCAACTG-3′`; reverse primer: `5′-CAGGAAGGCTTCCC-CCGG-3′`), to identify CD19-cre (715 bp) (forward primer: `5′-AACCAGTCAACACCCTTCC-3′`; reverse primer: `5′-TCAGCTACAC CAGAGACGG-3′`), and to confirm the presence of *WT* CD19 locus (450 bp) (forward primer: `5′-AACCAGTCAACACCCTTCC-3′`; reverse primer: `5′-CCAGACTAGATACAGACCAG-3′`). LysM genotyping primers are `5'-CCC AGA AAT GCC AGA TTA CG-3', 5'-CTT GGG CTG CCA GAA TTT CTC-3’` and `5'-TTA CAG TCG GCC AGG CTG AC-3'`. LysM^Cre^ and CD19^cre^ mice were purchased from The Jackson Laboratory (Bar Harbor, ME).

Mice were bred, maintained and euthanized for bone marrow and B cell isolation according to the established guidelines for the care and use of laboratory animals of the National Institutes of Health and an approved protocol by Medical University of South Carolina Institutional Animal Care and Use Committee. No *in vivo* experiment was performed in this study.

Cell lines and plasmids {#sec004}
-----------------------

WT and gp96 mutant preB cell lines were obtained from Brian Seed (Boston, MA). gp96 constructs in MigR vector were previously described \[[@pone.0169260.ref017]\].

2-DE gel image quantitation and protein digestion for MS analysis {#sec005}
-----------------------------------------------------------------

For 2-DE analysis, triplicate gels from WT and KO group were run. Briefly, protein (50 μg) was loaded for the preparative gel, which was simultaneously run with the analytical gels under the same experimental conditions. The 2-DE gel was then fixed and stained with Sypro Ruby dye after gel electrophoresis. The scanned 2-DE gel images were imported into Decyder software version 6.5 for protein quantitation analysis. Protein spots showing 1.2-fold change or greater, either increase or decrease, and with a p value \< 0.05, (t-test) were selected. Differentially expressed protein spots were excised from the gel, digested with trypsin, and analyzed using MS for protein identification \[[@pone.0169260.ref026]\]. The obtained MS/MS data were subjected to database searches using the MASCOT program (Matrix Science Ltd., London, UK) with the following parameters: two missed cleavage sites and a peptide and MS/MS mass tolerance setting of ± 100 ppm and ± 0.3 Da, respectively, for MS/MS Ions Search. The database used for this search consisted of amino acid sequences of *Mus musculus* proteins, which were retrieved from a subset of the International Protein Index (IPI) database (var. 3.29) or the non-redundant protein database. Chemical modifications such as oxidation of Met, N-terminal acetylation (Protein) and propionamide of Cys were taken into consideration for the database searches.

Isotope-coded affinity-tag-based protein profiling {#sec006}
--------------------------------------------------

Proteins were labeled with isotopically light-(12C, for WT BMDMs) or heavy- (13C, for KO BMDMs) ICAT reagents following the manufacturer's protocol (Applied Biosystems, Foster City, CA). Corresponding isotopically light- and heavy-labeled samples were then combined and digested with trypsin (Promega, Madison, WI). The resulting peptides were separated by strong cation exchange chromatography, and affinity purified by avidin cartridges following the manufacturer's protocol (Applied Biosystems), through which the cysteine (Cys)-containing peptides were enriched. The Cys-containing peptides were then subjected to LC-MS/MS using an LCQ-DECA-XP ion-trap mass spectrometer.

LC-MS/MS analysis and protein identification {#sec007}
--------------------------------------------

Tryptic peptides from each of the gel slices were analyzed using an LTQ linear ion trap mass spectrometer (Thermo Finnigan, San Jose, CA), as described previously \[[@pone.0169260.ref027]\]. The solvent gradient of HPLC was linear from 100% solvent A (5% acetonitrile, 0.4% acetic acid, and 0.005% heptafluorobutyric acid) to 80% solvent B (100% acetonitrile, 0.4% acetic acid, and 0.005% heptafluorobutyric acid) for 78 minutes, with a 20-65- minute acquisition. For the ICAT samples, each full MS scan was followed by three MS/MS scans of the most intense ion with data-dependent selection using the dynamic exclusion option. Otherwise, each full MS scan was followed by five MS/MS scans. Mass spectrometry raw files were converted to .dat files using XCalibur software (Version 1.4 SR1). Dat files were then converted to mzXML using the conversion software dat2xml from the Institute for Systems Biology, Seattle, Washington. All mzXML files were searched against a local copy of the non-redundant mouse protein database (56,709 entries, November 30, 2014 release version) from the NCI, National Institutes of Health, Advanced Biomedical Computing Center using SEQUEST-PVM Version 27 \[[@pone.0169260.ref028]\]. Peak lists were generated automatically without smoothing and deisotoping, and charge states were assigned based on the MS and MS/MS scans \[[@pone.0169260.ref028]\]. SEQUEST search parameters were as follows: trypsin digestion; no filtering thresholds; mass tolerance of 3.0 Da for precursor ions and 0.0 for fragment ion tolerance; full tryptic constraint allowing one missed cleavage; differential modification of +16 allowed for methionine; static modification set to +227.13 for ICAT-labeled cysteine and +9 for heavy ICAT-labeled cysteine residues, with a maximum of 4 modified AAs per peptide. XPRESS was used to quantify ICAT peptides \[[@pone.0169260.ref029]\]. Briefly, XPRESS isolates light and heavy peptide elution profiles, determines the area of each peak and calculates the abundance ratio based on the areas. The list of matched light/heavy peptides was filtered by (a) presence of cysteine; (b) XCorr and dCn scores, as described below; and (c) heavy and light pairs exhibiting closely eluting peaks as determined by scan number. Search results were processed using INTERACT \[[@pone.0169260.ref029]\] and filtered using the following criteria: XCorr cutoff values of 1.9, 2.2 and 3.7 for 1+, 2+ and 3+ peptides, respectively; deltaCn cutoff value of 0.1; for ICAT data, partially isotope-labeled peptides were excluded, and matched light/heavy peptides were further filtered by (a) presence of cysteine and (b) heavy and light chain pairs exhibiting closely eluting peaks as determined by scan number. Three ICAT data sets, with identified protein numbers of 963, 236, and 190 were combined to form the final ICAT count of 1034. The largest data set (963) was re-searched against a combined forward/reverse mouse protein database (November 30, 2014 release; 56,709 fwd entries; 56,709 rvs entries added) to estimate the false discovery rate (FDR) \[[@pone.0169260.ref030]\]. FDR estimation verified a protein FDR \< 1% associated with the filtering criteria used. Peptides identified in the original search were re-searched against the Release 2013_08 Uniprot Knowledgebase (fasta format, 50821 entries) to update protein ids and obtain amino acid coverage. Where peptides map to multiple proteins or to multiple isoforms, that redundancy is noted in the peptide lists under the column labeled \'\#DupProt\' in ProteomicData.xlsx.

Plasma membrane preparation {#sec008}
---------------------------

Plasma membranes from bone marrow derived macrophages (BMDMs) and B cells of gp96 KO and WT littermates were isolated using plasma membrane protein extraction kit according to manufacturer's protocol (BioVision, Mountain View, CA). The plasma membrane fraction was dissolved in 0.5% Triton X-100 in PBS, and plasma membrane protein concentration was determined by Bradford assay.

Antibodies and western blotting {#sec009}
-------------------------------

Antibodies to CD180, WDR1 and CAPZB were from Abcam; to GANAB were from Proteintech; to gp96 (Clone 9G10, SPA-851) were from Enzo Life Science; to β-actin was from Sigma. Blotting used 30 μg of protein lysate. Essentially all procedures were performed as described previously \[[@pone.0169260.ref031], [@pone.0169260.ref032]\].

Immunoprecipitation {#sec010}
-------------------

PreB leukemia cells were transduced with HA-tagged gp96 retrovirus and selected with 5 μg/ml blasticidin to generate a stable gp96 overexpressing cell line. Cells were then lysed on ice in radioimmunoprecipitation assay (RIPA) lysis buffer plus protease inhibitor cocktail (Sigma-Aldrich). Five hundred μg of lysate was pre-incubated with 2 μg of normal IgG antibody-conjugated protein G beads for 1 hour at 4°C to eliminate non-specific binding on antibody and protein G beads. After spinning, the supernatant were transferred to a new tube that contained 2 μg of anti-HA antibody (Sigma-Aldrich, clone: HA-7)-conjugated protein G beads and incubated for another 3 hours at 4°C. After washing, proteins were eluted with 5X SDS loading sample buffer from the beads and loaded for a SDS PAGE, followed by protein identification by LC-MS/MS. The acquired MS/MS data were searched against the NCBInr mouse database (NCBInr 2015.03) with Mascot (v2.3.2, Matrix Science) using Mascot Distiller (2.3.2.0) as the data input filter to generate peak lists. Search parameters were set as follows: enzyme, trypsin; precursor ion mass tolerance, 10 ppm; fragment ion mass tolerance, 0.7 Da; maximum missed cleavages allowed 2; carbamidomethyl of cysteine residues for fixed modification; oxidation of methionine for variable modification. The criteria used to filter results included 1% false positive threshold and expect value of less than 0.05 for significant peptide matches. The expect score was calculated using the homology threshold or the significance threshold as per a standard Mascot protein family report. Proteins represented by less than two peptides, or present in less than two LC-MS/MS runs were excluded from further analysis. Proteins identified by a subset of peptides from other proteins were filtered out from the results, and those matching the same set of peptides were grouped together into clusters.

Gene ontology (GO) analysis {#sec011}
---------------------------

GO analysis was conducted using the Cytoscape Plugin (Bingo 2.44) tool to calculate enrichment of gene ontology \[[@pone.0169260.ref033]\], Analysis was done with default parameters and results corrected for multiple testing by the method of Benjamini and Hochberg \[[@pone.0169260.ref034]\].

Results {#sec012}
=======

Comparative protein profiling from WT and KO gp96 BMDM by ICAT {#sec013}
--------------------------------------------------------------

We focused on the quantification and identification of plasma membrane (PM) proteins from WT and gp96 KO cells, as we predict that proteins requiring the chaperoning function of gp96 for cell surface transport must have reduced expression level in gp96 KO cells. We used two approaches. The first approach was to phenotypically profile surface proteins using flow cytometry. We found that KO and WT cells expressed the same levels of cell surface MHC II, CD14, CD16/32, CD43, CD44, CD80 and CD86 on macrophages (Møs) \[[@pone.0169260.ref017]\], and CD5, CD23, CXCR4, CCR7 and CD62L on B cells \[[@pone.0169260.ref018]\]. However, surface expression of TLR2, TLR4, α4, β2, β7 and αL was either reduced or absent from KO cells \[[@pone.0169260.ref018]\]. Our second approach was based on covalent tagging of the proteins with isotope-coded affinity tag (ICAT) reagents followed by proteolysis of the combined labeled protein samples, isolation, identification, and quantification of the tagged peptides by multidimensional chromatography, automated tandem mass spectrometry (MS) and computational analysis of the obtained data ([Fig 1A](#pone.0169260.g001){ref-type="fig"}) \[[@pone.0169260.ref029], [@pone.0169260.ref035]\]. This method allowed us to identify and determine the ratios of abundance of each protein from KO vs. WT cells. We derived KO Møs from bone marrow of *LsyM*^*Cre*^*Hsp90b1*^*flox/ko*^ mice which had significant reduction of gp96 ([Fig 1B](#pone.0169260.g001){ref-type="fig"}). Flow cytometry confirmed the reduction of cell surface TLR2 and TLR4 on the KO cells ([Fig 1C](#pone.0169260.g001){ref-type="fig"}). Same quantities of PM proteins were then isolated from WT and KO cells ([Fig 1D](#pone.0169260.g001){ref-type="fig"}). By ICAT method, a total of 1,034 proteins were isolated and sequenced, 55 of which were reduced ([S1 Table](#pone.0169260.s001){ref-type="supplementary-material"}), and 49 of which were increased in KO BMDMs ([S2 Table](#pone.0169260.s002){ref-type="supplementary-material"}). [Table 1](#pone.0169260.t001){ref-type="table"} lists selective proteins (bolded) with reduced expression in KO cells, based on the fulfillment of all of the following criteria: (1) they are known plasma membrane proteins, (2) 3 or more peptides from the same protein were identified, (3) SD of the KO/WT ratio of multiple peptides was less than half of the mean. This method is reliable as the reduction of all of these proteins in KO cells has been confirmed by flow cytometry. β1 integrin is not a gp96-client, indicated by the KO/WT ratio of 1.09 from a total of 12 identified β1-derived peptides, which was confirmed by flow cytometry in multiple cell types. Meanwhile, we found that cytoskeleton-related proteins, such as radixin, Mikaa0051 and Wd-repeat protein1, were also decreased in gp96 KO BMDMs ([Table 1](#pone.0169260.t001){ref-type="table"}).

![Proteomic analysis of plasma membrane proteins of macrophages whose expression is dependent on gp96.\
A) Schematic of ICAT-based method. B) IB of gp96 andβ--actin from WT and KO Mø. Quantitated data were shown in the bar graph. \*p\<0.01. Data represent three western blot results. Error bars denote s.e.m. C) Flow cytometric analysis of cell surface TLRs and CD16 (WT: open; KO: filled dark). The dashed and light histograms represent isotype stains. D) SDS-PAGE and silver staining of membrane proteins. The plasma membrane protein, Na^+^K^+^ATPase α1, was immunoblotted as a loading control.](pone.0169260.g001){#pone.0169260.g001}

10.1371/journal.pone.0169260.t001

###### A selected list of reduced PM proteins in gp96 K BMDM.

![](pone.0169260.t001){#pone.0169260.t001g}

  Protein description                            Function               Heavy/Light ratio[\*](#t001fn001){ref-type="table-fn"}
  ---------------------------------------------- ---------------------- --------------------------------------------------------
  Exocyst complex component 8                    Exocytosis             0.66
  **Integrin alpha-4 precursor**                 **Cell adhesion**      **0.61**
  **Integrin alpha-l precursor**                 **Cell adhesion**      **0.5**
  **Integrin alpha-v precursor**                 **Cell adhesion**      **0.69**
  **Integrin beta-2 precursor**                  **Cell adhesion**      **0.7**
  **Integrin beta-5 precursor**                  **Cell adhesion**      **0.7**
  Lipoprotein receptor-related protein1 (CD91)   Lipid homeostasis      0.43
  Multidrug resistance-associated protein 5      Anion transporter      0.49
  Radixin                                        Cytoskeleton           0.7
  Transforming protein n-ras                     GTPase                 0.69
  Retinoic acid early inducible protein 1 beta   Cell death             0.59
  **Toll-like receptor 2 precursor**             **Immune response**    **0.51**
  **Toll-like receptor 4 precursor**             **Immune response**    **0.64**
  **Toll-like receptor 13 precursor**            **Immune response**    **0.49**
  Mkiaa0051 protein                              Cytoskeleton           0.65
  Polymeric immunoglobulin receptor 3            lgA and IgM receptor   0.63
  Phospholipase c, gamma 2                       Lipid degradation      0.64
  Wd-repeat protein 1                            Cytoskeleton           0.65

\*Plasma membrane proteins were selected in the ratio of heavy reagent-labeled (KO)/light reagent-labeled (WT) ≤ 0.7

Comparative and quantitative 2-D gel electrophoresis (2-DE), coupled with mass spectrometry, demonstrated the reduction of membrane proteins from gp96 KO BMDMs {#sec014}
---------------------------------------------------------------------------------------------------------------------------------------------------------------

To further probe the differences in PM proteins between WT and KO BMDMs, we performed 2-DE of WT and KO membrane proteins side by side. Proteins were detected by SPPRO Ruby staining. WT PM proteins were stained with Gy3 (Green), whereas KO PM proteins were labeled with Cy5 (Red). WT and KO gels were overlaid, and then 55 spots were picked for sequencing ([Fig 2A](#pone.0169260.g002){ref-type="fig"}). We found that 17 of the proteins were reduced, and 33 of the proteins were increased in gp96 KO cells ([S3 Table](#pone.0169260.s003){ref-type="supplementary-material"}), compared to WT cell levels ([Fig 2A](#pone.0169260.g002){ref-type="fig"}). 15 of these reduced proteins were potential new interactors of gp96, including Tln1 (spot \#1), LSP1 (spot \#29), CD91 (spot \#36), annexin A1 (spot \#38, 39), Capzb (spot \#46) and others ([Fig 2](#pone.0169260.g002){ref-type="fig"} and [S3 Table](#pone.0169260.s003){ref-type="supplementary-material"}). The reduction of CD91 in KO cells was particularly intriguing since CD91 has been implicated as a gp96 receptor \[[@pone.0169260.ref036]--[@pone.0169260.ref038]\] but was questioned by others \[[@pone.0169260.ref039]\]. By immunoblot, we found that CD91 was indeed reduced in both gp96 KO liver and Møs ([Fig 2B](#pone.0169260.g002){ref-type="fig"}).

![2-D electrophoresis identify CD91 as a novel interactor of gp96.\
A) Overlay of WT (green) and KO (red) plasma membrane proteins from macrophages after 2-D gel electrophoresis. 55 spots were analyzed, and reduced proteins in gp96 KO BMDMs were listed with the corresponding spot numbers. B) Proteins were extracted from both liver and Macrophage (Mø) of gp96 WT or KO mice. CD91, gp96 and β-actin were immunoblotted. β-actin was a loading control. Data are representative of three experiments.](pone.0169260.g002){#pone.0169260.g002}

Mapping gp96 network in B cells {#sec015}
-------------------------------

Gp96 has been shown to optimize B cell function via chaperoning TLRs and integrins \[[@pone.0169260.ref018]--[@pone.0169260.ref020]\], suggesting that gp96 plays important roles in B cell biology. To further define the gp96 interactome in B cells, we took advantage of the B cell-specific gp96 null mice \[[@pone.0169260.ref018]\]. We purified B cells using CD19 microbeads and confirmed that gp96 level was significantly reduced in KO B cells, compared to WT B cells ([Fig 3A](#pone.0169260.g003){ref-type="fig"}). The equal amount of proteins isolated from the plasma membrane of both WT and KO B cells was separated by SDS-PAGE, and then the gel was cut into ten pieces across the molecular weight spectrum for protein identification by using MS spectrometry ([Fig 3B](#pone.0169260.g003){ref-type="fig"}). Comparing to WT B cells, a total of 444 proteins were reduced ([S4 Table](#pone.0169260.s004){ref-type="supplementary-material"}), and 23 proteins were increased in KO B cells ([S5 Table](#pone.0169260.s005){ref-type="supplementary-material"}). Since gp96 is crucial for the folding of proteins in the secretory pathway, we collected the plasma membrane proteins that were dramatically reduced in KO B cells ([Table 2](#pone.0169260.t002){ref-type="table"}). Class II MHC and integrin β2 were confirmed, which were previously identified as gp96 clients \[[@pone.0169260.ref040], [@pone.0169260.ref041]\]. Lymphocyte-specific protein 1 (LPS1), a specific marker of leucocyte, is found in the wide range of lymphomas and leukemias, particularly of B cell origin \[[@pone.0169260.ref042]\]. This protein was also reduced significantly in gp96 KO B cells ([Table 2](#pone.0169260.t002){ref-type="table"}). Once again, cytoskeleton proteins (rho-associated protein kinase 2, radixin and wd-repeat protein) were found to be decreased in gp96 KO B cells, comparing with WT B cell levels.

![PM preparation from WT and gp96 KO B cells for protein profiling.\
A) Western blot of gp96 and β-action from gp96 WT and KO B cells. B) 50 μg of protein lysate was separated on SDS PAGE. The gel was stained by coomassie blue, and then cut into 12 pieces for protein identification.](pone.0169260.g003){#pone.0169260.g003}

10.1371/journal.pone.0169260.t002

###### A partial list of reduced PM proteins in in gp96 KO B cells.

![](pone.0169260.t002){#pone.0169260.t002g}

  Protein description                                       Function                                                KO/WT ratio[\*](#t002fn001){ref-type="table-fn"}
  --------------------------------------------------------- ------------------------------------------------------- --------------------------------------------------
  Beta-a-microglobulin precursor                            Peptide antigens presentation                           0.21
  Anion exchange protein 2                                  Anion exchange                                          0.50
  CD180 antigen precursor                                   Immune response                                         0.25
  Calpain-1 catalytic subunit                               Proteolysis                                             0.33
  Platelet glycoprotein 4 (CD36)                            Cell adhesion                                           0.50
  ADP-ribosyl cyclase 1 (cd38)                              Second Messenger                                        0.38
  CD97 antigen precurso(CD97)                               leukocyte migration                                     0.43
  Chloride intracellular channel protein 4                  Chloride ion transporter                                0.43
  Complement receptor type 2 precursor                      B lymphocyte activation                                 0.33
  Alpha-enolase                                             Glycolysis                                              0.25
  Immunoglobulin gamma Fc region receptor                   Immune response                                         0.33
  Growth factor receptor-bound protein 14                   Inhibition of Insulin pathway                           0.50
  Solute carrier family 2                                   Glucose transporter                                     0.50
  H-2 class I histocompatibility antigen                    Immune response                                         0.29
  Intercellular adhesion molecule 1 precursor               Cell adhesion                                           0.50
  cAMP-dependent protein kinase                             Protein phosphorylation                                 0.25
  Lymphocyte-specific protein 1 (LSP1)                      Neutrophil activation                                   0.40
  Radixin                                                   Cytoskeleton organization                               0.30
  Rho-associated protein kinase 2                           Cytoskeleton formation                                  0.20
  Synaptosomal-associated protein 23                        Vehicle trafficking                                     0.38
  Protein EFR3 homolog A OS                                 No information                                          0.50
  Talin-1                                                   Cytoskeleton                                            0.33
  Adaptin ear-binding coat-associated protein 2             Endocytosis                                             0.33
  Pleckstrin homology domain-containing family O member 1   Cytoskeleton                                            0.33
  Integrin beta-1 precursor                                 Cell adhesion                                           0.50
  Integrin beta-2 precursor                                 Cell adhesion                                           0.24
  Leukocyte surface antigen CD47 precursor                  Cell adhesion, T cell activation                        0.44
  Carboxypeptidase M precursor                              Control of peptide hormone and growth factor activity   0.14
  Chitinase-3-like protein 3 precursor                      Inflammation and allergy                                0.33

\*Plasma membrane proteins were selected in KO/WT ratio ≤ 0.5

gp96 interaction network in preB leukemia cells {#sec016}
-----------------------------------------------

To further expose the potential interactors of gp96 in cancer cells, we tagged gp96 with hemagglutinin (HA) epitope from the influenza virus and carried out immunoprecipitation using the anti-HA antibody. We pulled down gp96-associated proteins from gp96-HA overexpressing preB leukemia cells, followed by SDS-PAGE and protein identification by LC-MS/MS ([Fig 4A](#pone.0169260.g004){ref-type="fig"}). A total of 201 gp96-associated proteins were selected from 801 clean entries with expectation value smaller than 0.05 ([S6 Table](#pone.0169260.s006){ref-type="supplementary-material"}) (See detail in "[Materials and Method](#sec002){ref-type="sec"}" section). Using the Ingenuity Pathway Analysis (IPA) tool, 130 of them were found in the IPA database. The overall interactive character of gp96 network was created and evaluated by statistical analysis ([Fig 4B](#pone.0169260.g004){ref-type="fig"}). Most of these proteins did not show direct interaction with gp96 due to absence of literature support for client proteins and cofactors in the IPA database. However, these results suggested a number of potential interaction proteins and cofactors that are involved in many important biological processes, including MesD, an ER chaperone for Wnt co-receptor LRP5/6. We have previously shown that MesD functions as a co-chaperone of gp96 to fold LRP6 \[[@pone.0169260.ref043]\]. The connectivity of gp96 targets was further exploited by extracting from the global gp96 network and assigned to specific GO category subnetworks including metabolic process, protein folding, response to stress, cytoskeleton organization and cellular component biogenesis ([Fig 4C](#pone.0169260.g004){ref-type="fig"}).

![Mapping the gp96 interaction network.\
A) PreB cells infected with HA-gp96 retrovirus were selected with 5 μg/ml blasticidin for 5 days. HA-gp96 from the total cell lysates was immunoprecipitated with HA antibody. The eluate was resolved on SDS---PAGE and stained with Coomassie blue. The gel was cut into 14 pieces as indicated, trypsin-digested and sequenced by mass spectrometry. HC and LC represent Ig heavy chain and light chain, respectively. B) 130 putative gp96 interactors identified in PreB IP dataset were mapped into a network based on the literature available in the IPA database. Each direct or indirect interaction is supported by at least one piece of evidence from the scientific literature. Solid line showing direct interaction; dotted lines showing indirect or no interaction. C) Subnetwork of GO processes contained within the gp96 interaction network: metabolic process, protein folding, response to stress, cytoskeleton organization and cellular component biogenesis.](pone.0169260.g004){#pone.0169260.g004}

Overview of gp96 interactome {#sec017}
----------------------------

The combined four different methods resulted in the identification of a total of 589 proteins that were interaction proteins of gp96. Collectively, these data provide a comprehensive framework for understanding the relationships among the specific biochemical pathways linked to gp96. [Fig 5A](#pone.0169260.g005){ref-type="fig"} shows a list of selective gp96 interactors. We do not expect to see significant overlap of interactors discovered due to difference in methodology (IP vs. ICAT) and cells (B cells vs. macrophages). The proteins identified in preB cells (preB IP) using the IP method are more likely to represent direct interaction with gp96, whereas the proteins identified in B cells (BCell-Dn) using the LC-MS/MS method are the largest dataset that shows 444 of proteins reduced in gp96 KO B cells. These two datasets shared 14 proteins in common, including Ganab, Necap2, Rps3a, Gstp1, Rpsa, Adprh, Eef1d, Hnrnpa2b1, Npm1, Psmb3, Caprin1, dDx5, Plekho2 and Hnrnpk). Six of the proteins (Arhgef2, CD180, Def6, Fam49d, Fen1 and Wdr1) that shown in the BCell-Dn dataset also presented in BMDMICAT-Dn dataset. The BCell-dn dataset also share 5 proteins (Tln1, Lsp1, Gnb1, Hcls1 and CapzB) with the BMDM2D-Dn dataset. Overall, we expanded the potential gp96 interactome by probing multiple cell types with multiple complimentary approaches. The expected non-overlapping nature of many of the proteins indicates the limitation of each method on its own, and points out the dynamic and cell type-specific interaction between gp96 and its associated proteins.

![Overview of the gp96 proteomic data.\
A) A list of selected gp96 interactors discovered by multiple strategies in this study (see text for more details). B) Functional distribution of gp96-associated proteins using the DAVID database compared to the whole mouse genome. Colored symbols refer to statistical enrichment of certain types of genes in a given mapping method as compared to the whole mouse genome. All colored symbols indicate p\<0.05.](pone.0169260.g005){#pone.0169260.g005}

The interaction datasets were subsorted into functional categories using the Database for Annotation, Visualization and Integrated Discovery (DAVID) \[[@pone.0169260.ref044], [@pone.0169260.ref045]\]. Statistical enrichment (p\<0.01) within these categories was assessed. While the proteins obtained in each of the four mapping methods were distributed across all major functional categories, the gp96 interactors were specifically enriched in metabolic process, transport, macromolecule localization, translation, cellular component biogenesis, cytoskeleton organization and protein folding ([Fig 4B](#pone.0169260.g004){ref-type="fig"}).

Confirmation of reduced proteins in gp96 KO cells or tissues {#sec018}
------------------------------------------------------------

We have used four independent datasets by using physical (preB IP) and genetic methods (BCell-Dn, BMDMICAT-Dn and BMDM2D-Dn) to map gp96 interactome. To further validate that these proteins are regulated by gp96, we performed western blot and immunoprecipitation studies to determine if they can be associated with gp96. We knocked down (KD) gp96 in RAW264.7 macrophage (RAW) using an shRNA strategy, and found that the protein levels of CD180, WDR1, GANAB and CAPZB were concordantly decreased in gp96 KD RAW cells, comparing with levels in WT RAW cells ([Fig 6A](#pone.0169260.g006){ref-type="fig"}). This reduction was also observed in the whole spleen lysates of gp96 KO mice ([Fig 6B](#pone.0169260.g006){ref-type="fig"}). Furthermore, we found that GANAB and CAPZB could be co-immunoprecipitated with gp96, suggesting that they are newly discovered gp96 interactors ([Fig 6C](#pone.0169260.g006){ref-type="fig"}).

![Proteins reduced in gp96 KO cells or tissues.\
A and B) Protein levels of CD180, WDR1, GANAB, CAPZB and gp96 in WT and KO gp96 RAW cells (A) or spleen tissues (B) were measured by Western blot. β-actin was a loading control. C) Anti-gp96 precipitates were resolved by SDS PAGE, and GANAB, CAPZB and gp96 were immunoblotted. IgG is an isotype control for Immunoprecipitation. WCL: whole cell lysate input.](pone.0169260.g006){#pone.0169260.g006}

Discussion {#sec019}
==========

gp96 is a ubiquitously expressed and evolutionarily conserved ER-resident molecular chaperone belonging to the HSP90 family \[[@pone.0169260.ref011]\]. Genetic and biochemical approaches have demonstrated the pivotal role of gp96 in folding and maturation of a rather select group of clientele to date, namely integrins and TLRs \[[@pone.0169260.ref017], [@pone.0169260.ref019]\]. Additionally, as a canonical member of HSP family, gp96 is known to participate in variety of molecular and biochemical processes in the cellular response to stress, the unfolded protein response (UPR), and the interplay between gp96 and OS9 in the ER-degradation pathway \[[@pone.0169260.ref046]\]. Thus, the functional importance of a molecule such as gp96 in the ER is two-fold: 1) it participates in the folding/maturation of two very important classes of immunologically relevant molecules, and 2) serves a second perhaps more general house-keeping role in ER homeostasis.

We have performed four complementary biochemical and genetic methods to map the gp96 interactome in B cells and macrophages. The combination of four datasets, one based on physical interaction and three based on genetic comparison, provides for a unique perspective on the varied physiological roles of gp96. We believe that the use of multiple methodologies is necessary due to several considerations. First, 2D-PAGE analysis was accurate but not sensitive comparing with other methodologies (i.e., only 55 differently expressed proteins were identified). Second, whereas ICAT strategy focused on identifying protein with reduced expression level in gp96 KO cells, gp96 pull-down study required strong protein-protein interaction. Third, due to difference in protein expression level and pattern, multiple cell lines (BMDM, B cell and preB cell) are needed to map the complete gp96 interactome. Due to the last consideration, more future work needs to be done to identify gp96 interactors in other cell types during both physiological and pathological conditions. Nevertheless, our data collectively indicate that gp96 plays a central role in protein folding, stress response, metabolic process, cytoskeleton structure, transport and cellular component biogenesis.

Cells exercise control over the quality of secretory proteins both by promoting their proper folding and by detection and disposal of misfolded molecules. Gp96 is critical for folding the secretory proteins. From our three genetics proteomics approaches, we identified a number of reduced hits in KO cell line, which was much more than increased hits. This could be due to 1) Interaction proteins could not be transported to cell surface because they are immature in the absence of gp96; 2) Interactors underwent ER-associated degradation and caused reduction of total expression level when gp96 was deleted. Obviously, protein reduction often triggers compensatory increase of other proteins, such as upstream molecules. The increased proteins we identified might be important components in gp96-regulated secretory pathways. Further studies are needed to verify these regulators.

201 proteins were found to interact with gp96 in PreB IP dataset ([S6 Table](#pone.0169260.s006){ref-type="supplementary-material"}). These proteins could include client proteins, cochaperones and co-factors. We previously demonstrated that CNPY3 is a cochaperone of gp96, which specifically folds TLRs, but not integrins \[[@pone.0169260.ref021]\], suggesting that gp96 might require different cochaperones or cofactors to fold specific client proteins. Using immunoprecipitation method, we found that, besides CNPY3, the other two members of CNPY family, CNPY2 and CNPY4, also associated with gp96 ([Fig 4B](#pone.0169260.g004){ref-type="fig"}). Our unpublished data showed that shRNA to CNPY4 led to reduction in surface expression of integrins although CNPY4 had been previously shown, as a TLR4-associated protein, to regulate surface expression of TLR4 \[[@pone.0169260.ref047]\]. Other potential cochaperones or cofactors could be Hspa5, Dnajc3, Dnajc10, Ero1I, Erp44, Hspd1 and Npm1 ([S6 Table](#pone.0169260.s006){ref-type="supplementary-material"}). All of these proteins have ER localization, binding to gp96, response to stress or unfolded proteins, and are related to various cellular process. This raised a possibility that gp96 might chaperone client proteins together with different specific cochaperones or cofactors much like its cytosolic counterpart, HSP90, which has a number of defined cochaperones and cofactors \[[@pone.0169260.ref048]\].

We and others have shown that gp96 chaperones all of TLRs except for TLR3 \[[@pone.0169260.ref018], [@pone.0169260.ref019], [@pone.0169260.ref021]\]. TLRs share a common leucine-rich repeat (LRR) motif, which is a protein structural motif that forms an α/β horseshoe fold \[[@pone.0169260.ref049]\]. LRR motifs are frequently involved in the formation of protein-protein interactions \[[@pone.0169260.ref050]\], and have been identified in a large number of functionally unrelated proteins. Thus, gp96 might interact with TLRs through binding to the LRR motifs. Recently, we demonstrated that gp96 binds and folds three other LRR motif-containing proteins, gpIX, gpV and GARP \[[@pone.0169260.ref041], [@pone.0169260.ref051]\]. Furthermore, the best known LRR proteins, ribonuclease inhibitor (Rnh1) and Leucine-rich repeat-containing protein 59 (LRRC59), were also shown in the BCell-Dn dataset ([S4 Table](#pone.0169260.s004){ref-type="supplementary-material"}). These suggested that gp96 might chaperone a specific category of proteins that contain the LRR motif.

Consistent with the importance of gp96 protein in biology, loss of gp96 protein during development is embryonic lethal \[[@pone.0169260.ref052]\]. Our data showed that gp96 indeed regulates development of multiple organs, including brain, heart, lung, liver, intestine and muscle, through modification of multiple different proteins. Nine of proteins, including CD91, Mtx1, Itgb1, Mapk14, Gatad2a, Psmd12, Sp1, Crry, and Hba-a2, were decreased in expression in gp96 KO B cells or BMDMs. All of these proteins were previously shown to regulate embryonic development \[[@pone.0169260.ref053]--[@pone.0169260.ref059]\], suggesting that gp96 could potentially regulate embryonic development through the folding of these proteins. Interestingly, CD91, a receptor for extracellular gp96 \[[@pone.0169260.ref036]\], were also controlled by gp96 ([Fig 2B](#pone.0169260.g002){ref-type="fig"}, [Table 1](#pone.0169260.t001){ref-type="table"}), indicating that gp96 might perform self-control by adjusting the level of its receptor upon stimulation. This mechanism may be important for quality and safety control of gp96 action inside cells.

Previous studies demonstrated that gp96 is presented on the cell surface \[[@pone.0169260.ref060]\], in the Golgi apparatus \[[@pone.0169260.ref061]\], nucleus \[[@pone.0169260.ref062]\] and extracellular milieu \[[@pone.0169260.ref063]\], although it is mainly expressed in the ER. Gp96 can interact with apolipoprotein and BSDL outside the ER \[[@pone.0169260.ref064], [@pone.0169260.ref065]\]. We found here that the level of cytoskeleton-related proteins, WDR1 and CAPZB, were reduced in gp96 KO RAW macrophages and spleen tissue ([Fig 6A and 6B](#pone.0169260.g006){ref-type="fig"}). Moreover, CAPZB bound to gp96 ([Fig 6C](#pone.0169260.g006){ref-type="fig"}). Some other cytoskeleton proteins, including Actc1, Capza1, Npm1, Calr and Coro1a ([S6 Table](#pone.0169260.s006){ref-type="supplementary-material"}), Radixin and Rock2 ([Table 2](#pone.0169260.t002){ref-type="table"}) were also reduced in gp96 KO cells, suggesting that gp96 may play an important role in cytoskeleton organization outside the ER.

The function of gp96 suggests that it may also play important roles in cancer biology, such as breast cancer \[[@pone.0169260.ref066]\], lung cancer \[[@pone.0169260.ref067]\], colon cancer \[[@pone.0169260.ref068]\], and esophageal squamous cell carcinoma \[[@pone.0169260.ref069]\]. Higher gp96 level is usually correlated with higher pathological grade and worse clinical outcome. However, it remains unknown which client proteins of gp96 are involved with cancer. Recently, we demonstrated that GARP, a gp96 client, promotes oncogenesis and immune tolerance through regulation of T regulatory cells in breast cancer \[[@pone.0169260.ref070]\]. Our PreB leukemia dataset showed that a number of molecules, as interaction proteins of gp96, have been implicated in oncogenesis. For example, NPM1, a DNA and unfolding protein binding protein, has been shown to regulate ARF/p53 pathway and correlate with acute myeloid leukemia and liver cancer \[[@pone.0169260.ref071], [@pone.0169260.ref072]\]. Tubulin α4a (TUBA4A) is involved in a variety of tumors. Many modulators of tubulin are currently in clinical trials for cancer therapy. Other molecules, such as CP, CERLD2, CTSD, HSPA5, HTR3A and TUBB2C, are also frequently up-regulated in cancer. Thus, gp96 plays important roles in cancer biology, probably through modulation of these cancer-related proteins. Gp96 therefore will be an attractive drug target for cancer therapy.

In conclusion, our multiple complimentary strategies provided a comprehensive view of gp96 network that includes its potential client proteins and other interactors. Further studies are needed to verify these potential clients, cochaperones and co-factors that were hinted here in this investigation. Through chaperoning its clientele, gp96 appears to be strategically positioned in the secretory pathway to integrate innate immunity and organ development. This current study sheds light on understanding the physiological and pathological roles of gp96.

Supporting Information {#sec020}
======================

###### Reduced PM proteins in gp96 KO BMDMs.

1034 genes were obtained from BMDM ICAT protein profiling, and then selected with a heavy (KO)/light (WT) ratio less than 0.7. 55 selected genes were input into search engine for GO annotation enrichment.

(PDF)

###### 

Click here for additional data file.

###### Increased PM proteins in gp96 KO BMDMs.

1034 genes were obtained from BMDM ICAT protein profiling, and then selected with a heavy (KO)/light (WT) ratio more than 1.5. 49 selected genes were input into search engine for GO annotation enrichment.

(PDF)

###### 

Click here for additional data file.

###### Comparison of PM protein levels of gp96 WT and KO BMDMs.

2-DE imagine quantitation and MS/MS analysis was carried out as described in Methods. 55 spots were analyzed, and shown in blue with protein level of WT BMDMs greater than that of KO BMDMs (WT\>KO), otherwise, shown in red with KO\>WT.

(PDF)

###### 

Click here for additional data file.

###### The list of reduced proteins in gp96 KO B cells.

443 of proteins down-regulated in gp96 KO B cells were selected from 1425 probes based on MS/MS results. The selection cutoff was WT/KO larger or equal than 2. Enrichment GO annotation was done after.

(PDF)

###### 

Click here for additional data file.

###### Increased proteins in gp96 KO B cells.

23 of proteins up-regulated in gp96 KO B cells were selected from 1425 probes based on MS/MS results. The selection cutoff was WT/KO less or equal than 0.5.

(PDF)

###### 

Click here for additional data file.

###### gp96-associated proteins in preB cells.

811 clean entries were detected from Immunoprecipitation method. A total of 201 genes were selected from those 811 genes with expectation value small than 0.05.

(PDF)

###### 

Click here for additional data file.

We thank members in our laboratories for their input throughout the study. This work was supported by multiple NIH grants: CA186866, CA188419, AI070603 and AI077283 (to Z.L.), CA193939 (to B.L.), and the Hollings Cancer Center's American Cancer Society Institutional Research Grant (ACS-IRG-97-219-14) (to F.H.).

[^1]: **Competing Interests:**The authors have declared that no competing interests exist.

[^2]: **Conceptualization:** ZL BL.**Data curation:** FH DL.**Formal analysis:** DH FH HZ HH OO HU SM BL ZL.**Funding acquisition:** ZL BL FH.**Investigation:** FH BL SMR DL XH YK.**Methodology:** FH BL HU.**Project administration:** ZL.**Software:** SMR DL DH.**Supervision:** ZL BL.**Validation:** FH BL YK HH OO HU.**Visualization:** FH ZL.**Writing -- original draft:** FH.**Writing -- review & editing:** FH BL ZL.


--------------------------------------------------

--------------------------------------------------

Q:

How does cognitive science explain the origins of intuition and intelligence, that accurately describes the laws of nature?

What is the origin of non-incremental, revolutionary intuition and intelligence?
For example, a human mind like Albert Einstein's can "come up" with revolutionary ideas and theories that correctly adhere to the law of physics. On the other hand, another mind can't even understand this theory, let alone "create" or come up with one.
Where does this initial intelligence and intuition (accurately proven) come from? Or what are the means by which modern humans achieve "origins of" intelligent intuition that adhere to science or nature? (Not talking about prophecy.)            

A:

A couple of other interrelated perspectives are presented below.  
The first perspective comes from the article Artificial Intelligence, Logic of Discovery and Scientific Realism (Alai), where they state, using scientific discovery as an example (as per the example in the question), that

if the process of 
  discovery is rational, mustn’t it therefore follow rational criteria and rules, hence a 
  logic? On the other hand, it is well known that chance, luck, and insight often play an 
  important role in discovery.

Effectively, almost like a case of someone 'tripping over' the final piece of their theorem.  The author goes further, contending that if their were a rational set of steps, thus

if 
  discovery were just a matter of rule following, why couldn’t anyone learn the necessary rules and become a great scientist? Or why couldn’t the scientists themselves just follow 
  the logic of discovery and program in advance new discoveries, and rapidly achieve 
  such results as a cure for cancer, or the cold fusion of atom, which while sorely needed 
  still elude the efforts of researchers?

Meaning, according to this article's perspective, that luck, chance and insight play a major role.
The final factor, insight, is alluded to in the website Einstein's Pathway to Special Relativity (Norton), taking the example scientist from the question, Albert Einstein and how he developed, for example, the Theory of Special Relativity, which started when

he began to think about ether, electricity, magnetism and motion.

Essentially, he had insight by  

pondering these developments that led Einstein to discover the
  special theory of relativity in 1905. 

A key point made is that 

The discovery was not momentary.

This is crucial, the ideas didn't just 'pop' into his head, the theory was the outcome of having learned and developed an insight in the background information, latest developments in relevant disciplines and of course, 

in Einstein's own reckoning, seven and
  more years of work.

As an independent researcher, (and I am not comparing myself to Albert Einstein), the discoveries that I have found, have had successfully peer reviewed and have been published come from having some specific insight, through background reading, training, education etc, to topics and skills required relevant to the discovery, as well as a lot of work to bring these insights together with new observations to make a discovery.



--------------------------------------------------

--------------------------------------------------

framework module CocoaAsyncSocket {
  umbrella header "CocoaAsyncSocket-umbrella.h"

  export *
  module * { export * }
}


--------------------------------------------------

--------------------------------------------------

TCF-1-mediated Wnt signaling regulates Paneth cell innate immune defense effectors HD-5 and -6: implications for Crohn's disease.
Wnt signaling regulates small intestinal stem cell maintenance and Paneth cell differentiation. In patients with ileal Crohn's disease (CD), a decrease of Paneth cell α-defensins has been observed that is partially caused by impaired TCF-4 and LRP6 function. Here we show reduced expression of the Wnt signaling effector TCF-1 (also known as TCF-7) in patients with ileal CD. Reporter gene assays and in vitro promoter binding analysis revealed that TCF-1 activates α-defensin HD-5 and HD-6 transcription in cooperation with β-catenin and that activation is mediated by three distinct TCF binding sites. EMSA analysis showed binding of TCF-1 to the respective motifs. In ileal CD patients, TCF-1 mRNA expression levels were significantly reduced. Moreover, we found specifically reduced expression of active TCF-1 mRNA isoforms. Tcf-1 knockout mice exhibited reduced cryptdin expression in the jejunum, which was not consistently seen at other small intestinal locations. Our data provide evidence that TCF-1-mediated Wnt signaling is disturbed in small intestinal CD, which might contribute to the observed barrier dysfunction in the disease.

--------------------------------------------------

--------------------------------------------------

Q:

Good Heuristic for Connect-K AI

I'm writing a Connect-K simple AI (no pruning, 4-ply only). I was wondering what is the best heuristic that is fast to calculate.
Something better than what I have:
def eval(board, player)
    connections = 0
    magnitude = 0
    for x in range(0, self.boardW(board)):
        for y in range(0, self.boardH(board)):
            if(self.get_player(board, x, y) == player): #assuming x and y are in bounds
                temp = 1
                # keep checking in this direction to find the max temp can be
                if (magnitude < temp):
                    magnitude = temp
            if(self.get_player(board, x, y) == player):
                connection += 1
        ........
    return connection**2 + magnitude**2

Basically this is supposed to return the maximum connections any spot on the board has with its adjacent spots, plus how many consecutive items are in any of the 8 directions (up, down, left, right, top-left, down-left, ...)
My k will be larger than 4; thus I can't do an exhaustive tree search. 

A:

A min-max search could be useful in this scenario, possibly combined with a simplified MCTS. Basically, a deeper recursion would let you reach more end states of the game. By analyzing which player wins in each of these cases, you get a better understanding of the value of a certain move. 
The min-max method is quite useful for games between two players, and is widely used for board games such as this. MCTS might be a bit overkill, but the general idea there is to trade an extensive search for a random, deeper search. For example, instead of having a branching factor of 20, and only 5 levels of recursion (20^5 = 3.2 million), you could randomly choose 10 of the branches and have 6-7 recursion steps with the same amount of calculation. 
Something that has yielded good results in a similar project (an AI for checkers) was to decrease the branching factor further down in the recursion. By defining the max branching (the maximum number of branches to be explored in a recursion step), let this number be larger than the typical branching for the top level, and decrease further down the recursion to a much smaller number (5-10 quite soon, and 1-3 at the bottom). This way, you get the best of both worlds. You explore all imminent moves, but you also get a lot of information about how they affect the later parts of the game. 
A quick recap: Using MCTS and min-max, you can find a lot of end-states. If the opponent won, give it a large negative score. If you won, give it a large positive score If neither, you can give it a 0, or use the function you showed in your question. Let the score of a parent game state depend on the scores of their children by utilizing the min-max algorithm.



--------------------------------------------------

--------------------------------------------------

Determination of suvorexant in human plasma using 96-well liquid-liquid extraction and HPLC with tandem mass spectrometric detection.
A method, using liquid chromatography with tandem mass spectrometric detection (LC-MS/MS), was developed for the determination of suvorexant (MK-4305, Belsomra(®)), a selective dual orexin receptor antagonist for the treatment insomnia, in human plasma over the concentration range of 1-1000ng/mL. Stable isotope labeled (13)C(2)H3-suvorexant was used as an internal standard. The sample preparation procedure utilized liquid-liquid extraction, in the 96-well format, of a 100μL plasma sample with methyl t-butyl ether. The compounds were chromatographed under isocratic conditions on a Waters dC18 (50×2.1mm, 3μm) column with a mobile phase consisting of 30/70 (v/v %) 10mM ammonium formate, pH3/acetonitrile at a flow rate of 0.3mL/min. Multiple reaction monitoring of the precursor-to-product ion pairs for suvorexant (m/z 451→186) and (13)C(2)H3-suvorexant (m/z 455→190) on an Applied Biosystems API 4000 tandem mass spectrometer was used for quantitation. Intraday assay precision, assessed in six different lots of control plasma, was within 10% CV at all concentrations, while assay accuracy ranged from 95.6 to 105.0% of nominal. Quality control (QC) samples in plasma were stored at -20°C. Initial within day analysis of QCs after one freeze-thaw cycle showed accuracy within 9.5% of nominal with precision (CV) of 6.7% or less. The plasma QC samples were demonstrated to be stable for up to 25 months at -20°C. The method described has been used to support clinical studies during Phase I through III of clinical development.

--------------------------------------------------

--------------------------------------------------

Bela Padilla said her Tita BB Gandanghari is old enough to decide and subject himself under the knife, when she was asked about BB’s alleged sex change. Bela Padilla Says BB Gandanghari is Old Enough to Decide to Undergo Sex Change Operation Gandanghari is old enough to take care of herself, Bela added. Rustom Padilla…

--------------------------------------------------

--------------------------------------------------

Conventionally, in the case of performing access to a storage apparatus including a plurality of banks, there is a known technique of distributing data between the plurality of banks and alternately accessing different banks so as to conceal a switching time required for a row address change (for example, see Patent Reference 1).
The following describes an image decoding apparatus disclosed in Patent Reference 1.
FIG. 1 shows a mapping example of image data on a memory of the conventional image decoding apparatus, where an encoded data buffer area, a frame memory 1, a frame memory 2, and a frame memory 3 are each distributed between two banks of a bank 0 and a bank 1. Each of the frame memories is made up of an area for a luminance signal and an area for a chrominance signal.
FIG. 2 shows an operation transition pattern in a memory control method of the conventional image decoding apparatus. As shown in FIG. 2, access to the encoded data buffer area and the frame memories 1 to 3 is performed by alternately accessing the bank 0 and the bank 1. Meanwhile, a row address change is performed in such a manner that a row address for the bank 0 is changed during a time period of immediately preceding access to the bank 1. By doing so, a wait time associated with a row address change can be concealed.
For instance, such a memory control operation that alternately accesses different banks is carried out under management of a single master apparatus, and maintained even between different types of access such as (a) a display image data read, (b) a reference image data read, (c) an encoded data read, (d) an encoded data write, and (e) a decoded image data write. Patent Reference 1: Japanese Unexamined Patent Application Publication No. 08-65686

--------------------------------------------------

--------------------------------------------------

Passage Home

Passage Home is a 1955 British drama film directed by Roy Ward Baker.

Plot
Captain Lucky Ryland (Peter Finch) is about to retire. There is a flashback of several years to a voyage on a ship he was captaining from South America. He is forced to give a lift to a British governess, Ruth Elton (Diane Cilento), who is returning home. Both Ryland and his first mate, Vosper (Anthony Steel), fall for Ruth. Ryland proposes to Ruth and when she turns down his offer he tries to rape her in his cabin but she is rescued by Vosper. The ship, crew and Ruth survive a very severe storm in which Vosper
saves Ruth's life outside on deck after which Ruth and Vosper first realize that they are in love with each other.

After the voyage Ruth and Vosper are married and do not meet Ryland again until his Retirement Function. Ryland finally leaves
his Retirement Function in a Taxi. The film ends with Ruth looking at Ryland in tears because she still has feelings for Ryland after all of the years and despite him once trying to rape her.

There is a subplot about the dissatisfaction of the ship's crew with the supply of rotten potatoes which Ryland has bought cheaply simply to save money. The potatoes are dumped overboard and Ryland is determined to find out who is responsible by offering the crew £5 for any information as to who did it. It turns out this was done by Shorty (Bryan Forbes) but Ike the bosun (Geoffrey Keen), who later dies and is buried at sea, covers for him saying that he did it because
although always pretending to be a very hard bosun he actually cares very much about his crew.

Cast
 Anthony Steel as Second Mate Vosper 
 Peter Finch as Captain Lucky Ryland 
 Diane Cilento as Ruth Elton 
 Cyril Cusack as Bohannon the steward 
 Geoffrey Keen as Ike the bosun 
 Hugh Griffith as Pettigrew 
 Duncan Lamont as 1st Mate Llewellyn 
 Gordon Jackson as Ted Burns 
 Bryan Forbes as Shorty 
 Michael Craig as Burton 
 Robert Brown as Shane 
 Martin Benson as Gutierres 
 Patrick McGoohan as McIsaacs 
 Michael Bryant as Stebbings 
 Sam Kydd as Sheltia 
 Glyn Houston as Charley Boy
 Patrick Westwood as Oglethorpe
 George Woodbridge as Yorkie

Production
The film was shot at Pinewood Studios.

References

External links

Passage Home at Britmovie

Category:1955 films
Category:1950s mystery drama films
Category:British mystery drama films
Category:British films
Category:Films directed by Roy Ward Baker
Category:Films based on British novels
Category:Films shot at Pinewood Studios