text
stringlengths
0
3.78M
meta
dict
Lifting a glass to 44 years as a drayman A drayman who has clocked up hundreds of thousands of miles delivering beer for one of the West's most famous breweries has retired after 44 years in the job. Trevor Blackford has brought beer to Swindon-based Arkell's pubs across the West since 1969 but enjoyed a pint after delivering his last barrel yesterday. He was joined by Ron Harper, who has retired as Arkell's signwriter for the past 14 years. Mr Harper has passed on his skills to apprentice Sara Bromley.
{ "pile_set_name": "Pile-CC" }
Case: 15-10845 Date Filed: 06/14/2016 Page: 1 of 24 [PUBLISH] IN THE UNITED STATES COURT OF APPEALS FOR THE ELEVENTH CIRCUIT ________________________ No. 15-10845 ________________________ D.C. Docket No. 9:13-cv-80605-KLR TODD PIOCH, Plaintiff - Counter Defendant - Appellee Cross Appellant, versus IBEX ENGINEERING SERVICES, INC., a Florida profit corporation, Defendant - Counter Claimant - Appellant Cross Appellee. ________________________ Appeals from the United States District Court for the Southern District of Florida ________________________ (June 14, 2016) Before MARCUS, JORDAN, and WALKER, ∗ Circuit Judges. ∗ Honorable John M. Walker, Jr., Circuit Judge for the United States Court of Appeals for the Second Circuit, sitting by designation. Case: 15-10845 Date Filed: 06/14/2016 Page: 2 of 24 JORDAN, Circuit Judge: The Fair Labor Standards Act, 29 U.S.C. § 201 et seq., generally requires employers to pay minimum wages and overtime compensation to their employees, but some employees are exempt from its coverage. The exemption at issue in this appeal—the so-called computer employee exemption—provides that the FLSA does not cover an hourly computer software engineer who performs certain duties and who “is compensated at a rate of not less than $27.63 an hour.” 29 U.S.C. § 213(a)(17). The main question we address is whether an hourly computer employee who is otherwise exempt under § 213(a)(17) becomes “non-exempt” during his last three weeks of work if the employer withholds his final paycheck. We conclude that the answer to that question is no, and therefore affirm the district court’s dismissal of the employee’s FLSA claim. We also hold, however, that the district court erred in granting summary judgment to the employee on the employer’s state-law counterclaim for unjust enrichment. I For almost 10 years, Todd Pioch worked for IBEX Engineering Services as a computer software and hardware engineer. IBEX hired Mr. Pioch because of his extensive computer skills and software experience and paid him on an hourly basis at a starting rate of $50 and a final rate of $85.40 per hour. Like many hourly employees, Mr. Pioch’s hours varied from week to week. Mr. Pioch regularly 2 Case: 15-10845 Date Filed: 06/14/2016 Page: 3 of 24 worked over 40 hours in a workweek and was paid his regular hourly rate, but not overtime, for the extra hours. From 2003 to 2004, Mr. Pioch worked for IBEX in Nevada. During this time, Mr. Pioch lived with his girlfriend in a home on Bow Creek Court in Las Vegas. In early 2005, Mr. Pioch accepted an offer from IBEX to work with one of its clients, Florida Power and Light, in Juno Beach, Florida. The offer letter explained that Mr. Pioch would be eligible for a per diem allowance for travel to and from work. Significantly, however, IBEX’s per diem policy applied only to employees residing more than 50 miles from their workplace. After his transfer, Mr. Pioch purchased a home in West Palm Beach, Florida, and that home was within 50 miles of FPL’s Juno Beach facility. During his assignment with FPL in Florida, Mr. Pioch worked on 49 separate projects and his duties were similar for each of the projects—testing, verifying, and validating computer software and hardware for the company. Mr. Pioch received per diem payments from IBEX from the time of his 2005 transfer from Nevada through 2013. In 2012, FPL conducted an audit on several engineers, including Mr. Pioch, who were collecting per diem payments. The FPL audit raised concerns about Mr. Pioch’s per diem payments from 2005 through 2009—a four-year period for which 3 Case: 15-10845 Date Filed: 06/14/2016 Page: 4 of 24 Mr. Pioch admitted that he listed the Bow Creek Court home in Las Vegas (rather than his West Palm Beach home) as his permanent address.1 Following his resignation from IBEX in 2013, Mr. Pioch sued the company under the FLSA, asserting minimum wage and overtime claims. See 29 U.S.C. §§ 206, 207. IBEX admitted that it had withheld Mr. Pioch’s final three weeks of pay as a result of the FPL audit and its belief that Mr. Pioch had improperly collected $147,230 in per diem payments. In response to Mr. Pioch’s FLSA claims, IBEX raised as an affirmative defense that Mr. Pioch was an exempt employee under the Act. IBEX also asserted state-law counterclaims for fraud and unjust enrichment relating to the disputed per diem payments. Following discovery, IBEX moved for summary judgment on Mr. Pioch’s FLSA claims, arguing that he was an exempt hourly computer employee under 29 U.S.C. § 213(a)(17). Mr. Pioch opposed IBEX’s motion and moved for summary judgment himself on IBEX’s counterclaim for unjust enrichment and for partial summary judgment on the unpaid wages for his final three weeks of work, which totaled $13,367.20. The district court heard arguments on the parties’ cross-motions for summary judgment and ruled (1) that the undisputed facts established that Mr. 1 From 2009 to 2013, Mr. Pioch listed his West Palm Beach home as his permanent address, and worked in another facility in Port St. Lucie that was more than 50 miles from that home. That time period, therefore, is not relevant to IBEX’s counterclaim for unjust enrichment. 4 Case: 15-10845 Date Filed: 06/14/2016 Page: 5 of 24 Pioch was exempt from FLSA coverage as a matter of law under § 213(a)(17); and (2) that IBEX’s unjust enrichment counterclaim failed because Mr. Pioch’s per diem payments constituted wages that are not recoverable by an employee in an FLSA action.2 Both parties appealed. In its appeal, IBEX challenges the district court’s grant of summary judgment in favor of Mr. Pioch on its state-law counterclaim for unjust enrichment. IBEX maintains that its counterclaim is not barred by the FLSA, and that the district court should have at most declined to exercise supplemental jurisdiction. In his cross-appeal, Mr. Pioch argues that IBEX’s withholding of his final paycheck rendered him non-exempt during his last three weeks of work, thereby entitling him to $13,367.20 under the FLSA. II We conduct plenary review of a district court’s summary judgment order, viewing the record and drawing all factual inferences in the light most favorable to the non-moving party. See Mazzeo v. Color Resolutions Int’l, LLC, 746 F.3d 1264, 1266 (11th Cir. 2014). Summary judgment is appropriate when “there is no genuine dispute as to any material fact” and the moving party is entitled to judgment as a matter of law. See Fed. R. Civ. P. 56(a); Celotex Corp. v. Catrett, 2 Mr. Pioch did not move for summary judgment on IBEX’s fraud counterclaim. The district court ultimately granted Mr. Pioch’s motion to dismiss that counterclaim, declining to exercise supplemental jurisdiction under 28 U.S.C. § 1367(c). 5 Case: 15-10845 Date Filed: 06/14/2016 Page: 6 of 24 477 U.S. 317, 322 (1986). “If reasonable minds could differ on the inferences arising from undisputed facts, then a court should deny summary judgment.” Allen v. Tyson Foods, Inc., 121 F.3d 642, 646 (11th Cir. 1997) (internal quotation marks and citations omitted). III Congress enacted the FLSA in 1938 as a remedial scheme designed to address “labor conditions detrimental to the maintenance of the minimum standard of living necessary for health, efficiency, and general well-being of workers.” 29 U.S.C. § 202. As a part of President Roosevelt’s New Deal and its emphasis on economic recovery, the FLSA was designed to eliminate substandard labor conditions in part by imposing a minimum wage and requiring overtime pay for employees. See 29 U.S.C. §§ 206, 207; ELLEN C. KEARNS ET AL., THE FAIR LABOR STANDARDS ACT 1-12 (3d ed. 2015). “In other words, the [Act] was designed to aid the unprotected, unorganized, and lowest paid of the nation’s working population; that is, those employees who lacked sufficient bargaining power to secure for themselves a minimum subsistence wage.” Hogan v. Allstate Ins. Co., 361 F.3d 621, 625 (11th Cir. 2004) (internal quotation marks and citation omitted). The FLSA imposes a minimum wage for covered employees and requires employers to pay overtime of at least one and one-half times the regular rate to employees working more than 40 hours a week. See 29 U.S.C. §§ 206, 207(a)(1). 6 Case: 15-10845 Date Filed: 06/14/2016 Page: 7 of 24 Congress, however, removed certain employees from FLSA coverage. See generally 29 U.S.C. § 213. Whether an employee meets the criteria for an FLSA exemption, although based on the underlying facts, is ultimately a legal question. See Evans v. McClain of Ga., Inc., 131 F.3d 957, 965–66 (11th Cir. 1997). The employer bears the burden of establishing that an employee is exempt, and we construe exemptions narrowly against the employer. See id. at 965. The Supreme Court has cautioned that “extend[ing] an exemption to other than those plainly and unmistakably within its terms and spirit is to abuse the interpretative process and to frustrate the announced will of the people.” A.H. Phillips, Inc. v. Walling, 324 U.S. 490, 493 (1945). A We begin with the text of the FLSA and its corresponding regulations. Computer employees may be exempt from the minimum wage and overtime compensation requirements under two different provisions of the Act. See 29 C.F.R. § 541.400(a) (explaining eligibility for exemption under 29 U.S.C. § 213(a)(1) or 29 U.S.C. § 213(a)(17)). Originally, computer employees were analyzed generally under § 213(a)(1). But in 1996, Congress enacted a more specific exemption in § 213(a)(17) which clarified the “duties” requirements by codifying most of the regulatory language for computer employees. See Pub. L. 7 Case: 15-10845 Date Filed: 06/14/2016 Page: 8 of 24 No. 104-188, § 2105, 110 Stat. 1755, 1929 (1996); KEARNS ET AL., THE FAIR LABOR STANDARDS ACT, at 5-145. The more specific exemption applies to computer employees who perform certain duties, and “in the case of an employee who is compensated on an hourly basis, is compensated at a rate of not less than $27.63 an hour.” § 213(a)(17)(A)- (D). In 2004, the Department of Labor tried to simplify the exemptions for computer employees by placing them into one regulatory provision. See 29 C.F.R. § 541.400(b). See also Bergquist v. Fid. Info. Servs., Inc., 399 F. Supp. 2d 1320, 1329–30 (M.D. Fla. 2005) (providing an in-depth analysis of the pre-2004 and post-2004 regulations), aff’d, 197 F. App’x 813 (11th Cir. 2006). As revised, the regulations create an interesting scenario. Although a computer employee is evaluated under two different FLSA statutory exemptions, only one of those statutory provisions, § 213(a)(1), grants the Secretary of Labor authority to promulgate regulations on its application. As a result, we have little regulatory guidance for interpreting the more specific exemption for hourly employees under § 213(a)(17). See 69 Fed. Reg. 22,122, 22,159 (Apr. 23, 2004) (to be codified at 29 C.F.R. pt. 541 and recognizing that § 213(a)(17) has a “unique legislative and regulatory history”). In applying the FLSA’s computer employee exemption to Mr. Pioch, an hourly employee, the district court was presented with evidence establishing that 8 Case: 15-10845 Date Filed: 06/14/2016 Page: 9 of 24 he met the “duties” requirements under § 213(a)(17)(A)-(C). Though the parties dispute the legal significance of the evidence, they do not dispute the underlying facts that the district court used to determine that Mr. Pioch was exempt. Significantly, Mr. Pioch does not contest the district court’s ruling that he was exempt from FLSA coverage under § 213(a)(17) for the vast majority of his period of employment with IBEX. He argues only that he ceased being exempt during his final three weeks of work because IBEX failed to pay him for those weeks. In other words, Mr. Pioch asserts that even if he was exempt from the FLSA’s overtime compensation requirements, the § 213(a)(17) computer employee exemption does not prevent him from using the FLSA’s minimum wage provision to recover his final three weeks of pay—at his final hourly rate of $85.40 per hour—from IBEX. 3 B The narrow issue, then, is whether an employee—who is paid by the hour and who is generally exempt from the FLSA under the § 213(a)(17) computer employee exemption—can be considered non-exempt during a three-week period for which his employer withheld a final paycheck. This is an issue of first impression in our Circuit and, to our knowledge, in the country. 3 Mr. Pioch does not explain why, if he is seeking minimum wage recovery under the FLSA, he is entitled to recover his hourly rate, which far exceeds the minimum wage. 9 Case: 15-10845 Date Filed: 06/14/2016 Page: 10 of 24 Fortunately, we do not write on a completely blank slate. Three Circuits, including our own, have addressed whether the failure to pay an otherwise-exempt salaried employee during a period of time renders that employee non-exempt for FLSA claims during that time period. See Orton v. Johnny’s Lunch Franchise, LLC, 668 F.3d 843 (6th Cir. 2012); Nicholson v. World Bus. Network, Inc., 105 F.3d 1361 (11th Cir. 1997); Donovan v. Agnew, 712 F.2d 1509 (1st Cir. 1983). In Nicholson, we considered whether two managerial employees, whose employer had failed to pay them their negotiated salaries, could assert both an FLSA claim and a breach of contract claim. See 105 F.3d at 1362–63. In separate findings, the district court and a jury by special verdict had concluded that each employee met the criteria for exempt administrative employees under § 213(a)(1) of the Act. See id. The employees appealed, arguing that the exemption required a minimum weekly salary and that they could not have been exempt as a matter of law “because they never received a dime . . . .” Id. at 1362. As a practical matter, we considered this “an unusual interpretation of the FLSA, one that would convert an entire category of state contract law actions into federal labor suits.” Id. In determining whether the Nicholson employees were paid on a salary basis, as required under the § 213(a)(1) exemption, we looked to what an employee was promised rather than what he actually received. See id. at 1365. We first turned to the plain language of the Department of Labor regulation defining the 10 Case: 15-10845 Date Filed: 06/14/2016 Page: 11 of 24 salary-basis test which, at the time, stated “it must be that ‘under his employment agreement he regularly receives each pay period . . . a predetermined amount constituting all or part of his compensation, which amount is not subject to reduction’ . . . .” See id. (quoting 29 C.F.R. § 541.118(a) (1973)) (emphasis in original). Recognizing that the regulations at the time were “somewhat contradictory and opaque,” we then considered congressional intent. See id. We concluded that focusing on what was owed pursuant to an agreement also reflected “the protective stance toward poorer and powerless workers that Congress took in the FLSA.” Id. Using a hypothetical, we illustrated how following the Nicholson employees’ logic could allow an exempt chief executive officer to assert an FLSA claim—rather than a breach of contract claim—against an employer to recover an unpaid salary. See id. We therefore affirmed the findings that both employees were exempt, as a matter of law, as administrative employees. See id. at 1362. The First Circuit had taken a similar approach in Donovan, which was decided in 1983. In that case, the Secretary of Labor sued an employer for minimum wages and overtime payments under the FLSA on behalf of eight managerial employees. See 712 F.2d at 1510. The parties stipulated that the employees were exempt under § 213(a)(1) until their final two to three weeks. See id. at 1516. The district court considered whether the employees could invoke the FLSA’s minimum wage protections during the time period when their employer 11 Case: 15-10845 Date Filed: 06/14/2016 Page: 12 of 24 failed to pay their salaries (right before closing its plant). See id. at 1510. The district court held that the employer’s nonpayment did not affect the employees’ exempt status. See id. The First Circuit affirmed, reasoning that the employees were guaranteed at least $155 per week, the salary-level requirement at that time under 29 C.F.R. § 541.1(f) (1975), and that no precedent instructed that the FLSA should cover “exempt employees whose contractual salaries are not paid.” Id. at 1517. The rationale of Nicholson and Donovan, if carried over to exempt employees who are paid by the hour, supports the district court’s grant of summary judgment in favor of IBEX on Mr. Pioch’s FLSA minimum wage claim. But Mr. Pioch directs us to the Sixth Circuit’s opinion in Orton, which he says supports his position. In Orton, an executive vice-president sued his employer for wages under the FLSA for a five-month period during which he worked, but was not paid his $125,000 annual salary. See 668 F.3d at 845. The district court concluded that the employee was an exempt salaried employee under § 213(a)(1) who had “no claim under the FLSA for back wages.” Id. at 847. Applying the salary-basis test, the district court granted the employer’s motion to dismiss because the employee failed to establish that his “base salary was subject to reduction because of variations in the quality or quantity of the work performed [and] . . . [t]he 12 Case: 15-10845 Date Filed: 06/14/2016 Page: 13 of 24 withholding of compensation for several months, if true, would be insufficient . . . to convert a position from salary to hourly.” Id. at 846. The Sixth Circuit in Orton reversed the district court’s ruling for two reasons. First, the district court’s holding rested on outdated, pre-2004 Department of Labor regulations, and “employment agreements are no longer the relevant starting point for whether an employee is paid on a salary basis.” Id. at 848 (distinguishing our analysis in Nicholson by examining the revised regulations defining the salary-basis test). Second, the district court had improperly placed the burden on the employee, rather than the employer, to establish the exemption. See id. Notably, the Sixth Circuit clarified that it “review[ed] only the district court’s conclusions on the salary-basis test.” Id. at 847. Like Nicholson and Donovan, Orton dealt with employees paid on a salary basis. But Orton, as we explain, does not help Mr. Pioch here. We agree with the Sixth Circuit and Mr. Pioch that the removal of the phrase “under his employment agreement” in the revised Department of Labor regulations cuts against our interpretation of the salary-basis test in Nicholson and the First Circuit’s similar interpretation in Donovan. The salary-basis test, however, is just one of three tests for analyzing a salaried employee’s exempt status under § 213(a)(1). The current relevant Department of Labor regulations for this provision are found in 29 C.F.R. § 541.100 et seq., and each one requires (1) a salary-level 13 Case: 15-10845 Date Filed: 06/14/2016 Page: 14 of 24 test; (2) a salary-basis test; and (3) a “duties” test. See 29 C.F.R. §§ 541.600, 541.602, 541.700. “Such legislative regulations are given controlling weight unless they are arbitrary, capricious, or manifestly contrary to the statute.” Chevron, U.S.A., Inc. v. Natural Res. Def. Council, Inc., 467 U.S. 837, 844 (1984). Because there is no test like the salary-basis test for hourly computer employees under § 213(a)(17)—the exemption at issue here—Orton is of limited assistance. C For almost 10 years, Mr. Pioch’s hourly rate was higher—two to three times higher—than the $27.63 hourly rate required for exemption under § 213(a)(17)(D). Mr. Pioch nonetheless argues that he was not exempt during his final three weeks because he was not paid at all. We disagree. Outside of the salary-basis test context, Nicholson and Donovan provide some guidance for interpreting Congress’ intent for the FLSA and its exemptions for highly paid employees. Like the salaried employees in Donovan, Mr. Pioch has failed to provide us with a compelling reason to hold that his exempt status under the FLSA terminated during the three-week period that IBEX did not pay him. The FLSA, after all, is not a vehicle for litigating breach of contract disputes between employers and employees. See Donovan, 712 F.2d at 1517 (declining to extend Congress’ FLSA protection “to highly salaried employees whenever their employment contracts are breached”). And we do not think that Orton completely 14 Case: 15-10845 Date Filed: 06/14/2016 Page: 15 of 24 undermines our analysis of the FLSA in Nicholson. We continue to believe that “[t]o read the FLSA blindly, without appreciation for the social goals Congress sought, would also do violence to the FLSA’s spirit.” Nicholson, 105 F.3d at 1364. See also Gregory v. First Title Of Am., Inc., 555 F.3d 1300, 1307 (11th Cir. 2009) (applying the FLSA’s outside salesman exemption and recognizing the difficulty of “narrowly constru[ing] the exemption without diminishing the spirit of its parent legislation”). What Mr. Pioch is essentially trying to do is assert a state-law breach of contract claim, for his agreed-to hourly rate, through the FLSA. Another way of thinking about this scenario is to follow the lead of Orton and look only to what Mr. Pioch was paid until his final three weeks. During his employment with IBEX, Mr. Pioch’s starting rate was $50 per hour and his final rate was $85.40 per hour. Setting overtime considerations aside, Mr. Pioch’s final hourly rate amounted to $3,416 for a 40-hour work week. That weekly amount knocks the statutory minimum of $455 per week for salaried employees out of the park. See 29 C.F.R. § 541.400(b) (providing salary level for a § 213(a)(1) exempt employee). Moreover, it is three times higher than the $1,105.20 an exempt hourly computer employee would make working 40 hours while receiving the statutory minimum of $27.63 per hour. See § 213(a)(17)(D). Mr. Pioch presented evidence to the district court about his hourly earnings before his final three weeks with IBEX, and that evidence shows he made over 15 Case: 15-10845 Date Filed: 06/14/2016 Page: 16 of 24 $180,000 during his last year of work. We recognize that the FLSA is generally applied on a weekly basis, but the Department of Labor has discussed a benchmark for yearly salaries calculated for 40-hour workweeks. Salaried computer employees under the § 213(a)(1) exemption must make at least $23,660 per year. See 69 Fed. Reg. 22,122, 22,123 (Apr. 23, 2004) (to be codified at 29 C.F.R. pt. 541). Hourly computer employees under § 213(a)(17) working 40 hours will make at least $57,470 per year based on the statutory minimum. See id. at 22,164 n.12. Again, even without receiving his final three weeks of pay, Mr. Pioch’s earnings for his final year are well above the benchmark salaries contemplated for both salaried and hourly exempt computer employees under the FLSA. We find some support for our position in the Supreme Court’s decision in Christopher v. SmithKline Beecham Corp., 132 S. Ct. 2156 (2012). In Christopher, two pharmaceutical sales representatives sued under the FLSA for overtime compensation, and their employer argued that they were exempt as “outside salesmen” under § 213(a)(1). Id. at 2164. Like salaried computer employees, outside salesmen are grouped into the more general § 213(a)(1) exemption to the FLSA. Much of the Court’s rationale in Christopher is inapplicable here, but because computer employees are analyzed under both § 213(a)(1) and § 213(a)(17), we find the Christopher majority’s brief discussion of the purpose of the § 213(a)(1) exemption persuasive. See 132 S. Ct. at 2173. 16 Case: 15-10845 Date Filed: 06/14/2016 Page: 17 of 24 The Supreme Court recognized in Christopher that the § 213(a)(1) “exemption is premised on the belief that exempt employees ‘typically earned salaries well above the minimum wage’ and enjoyed other benefits that ‘se[t] them apart from the nonexempt workers entitled to overtime pay.’” Id. at 2173 (citing the Preamble to the Department of Labor’s pt. 541 regulations). The Court reasoned that the salaried employees in Christopher—“each of whom earned an average of more than $70,000 per year and spent between 10 and 20 hours outside normal business hours each week performing work related to . . . his assigned sales territory—[were] hardly the kind of employees that the FLSA was intended to protect.” Id. at 2173. IBEX paid Mr. Pioch hourly rates that were considerably higher than both the § 206(a)(1) minimum wage of $7.25 per hour and the hourly rate that Congress expressly requires under § 213(a)(17)(D) to qualify as exempt. See KEARNS ET AL., THE FAIR LABOR STANDARDS ACT, at 5-145 (noting that Congress froze the exemption hourly rate at $27.63 per hour in 1996). As the Supreme Court reasoned in Christopher (when it considered employees earning more than $70,000 per year), we do not believe that Mr. Pioch, a highly-paid hourly employee typically earning over six figures a year, is the type of employee that the FLSA’s wage requirements were designed to protect. Mr. Pioch therefore cannot use the FLSA as the vehicle for recovery of his hourly salary. We agree with the district 17 Case: 15-10845 Date Filed: 06/14/2016 Page: 18 of 24 court that an hourly computer employee’s exempt status under § 213(a)(17) does not evaporate simply because the employer withholds a final paycheck. IV Despite holding that Mr. Pioch was exempt under (and therefore not covered by) the FLSA, the district court ruled that IBEX’s unjust enrichment counterclaim failed on the merits as a matter of law because it was really a claim for wages that are not recoverable by an employer in an FLSA action. The district court acknowledged (and Mr. Pioch conceded) that IBEX presented evidence that Mr. Pioch improperly collected $147,230 in per diem payments by misleading IBEX for a number of years about the location of his permanent residence. This evidence would likely have been sufficient to get the unjust enrichment claim to a jury. See generally Porsche Cars N. Am., Inc. v. Diamond, 140 So. 3d 1090, 1100 (Fla. 3d DCA 2014) (“The elements of a claim for unjust enrichment are: (1) plaintiff conferred a benefit on the defendant; (2) defendant voluntarily accepts and retains the benefit conferred; and (3) the circumstances are such that it would be inequitable for the defendant to retain the benefit without paying the value thereof to the plaintiff.”). IBEX argues that, after concluding that Mr. Pioch was exempt from the FLSA, the district court should have (at most) dismissed its state-law counterclaim for unjust enrichment without prejudice under 28 U.S.C. § 1367(c). We agree with IBEX. 18 Case: 15-10845 Date Filed: 06/14/2016 Page: 19 of 24 A We start with the district court’s holding that Mr. Pioch’s per diem payments were “wages” that are not recoverable by an employer in an FLSA action. The district court first looked to whether the disputed per diem payments were wages by examining federal law and the facts presented by the parties at summary judgment. After ruling that Mr. Pioch’s per diem payments were indeed wages, the district court, relying on Gagnon v. United Technologies, Inc., 607 F.3d 1036 (5th Cir. 2010), reasoned that an employer is not permitted to assert counterclaims to recover “wages” from its employee in an FLSA case.4 As an initial matter, the district court did not account for the fact that Mr. Pioch no longer had viable claims under the FLSA. The district court ruled— correctly, as we now hold—that Mr. Pioch was exempt from the FLSA’s coverage. As IBEX aptly points out, Mr. Pioch was not entitled to FLSA wages paid “free and clear” because he was exempt. See Arriaga v. Fla. Pac. Farms, LLC, 305 F.3d 1228, 1235 (11th Cir. 2002) (explaining that FLSA wages must be paid “free and clear” of improper deductions under 29 C.F.R. § 531.35). And if Mr. Pioch was not entitled to recover anything under the FLSA, it is not clear to us why IBEX’s unjust enrichment counterclaim would be barred. 4 The district court did not rule, as Mr. Pioch had argued, that IBEX’s unjust enrichment counterclaim was barred by Florida’s two-year statute of limitations under Fla. Stat. § 95.11(4)(c). 19 Case: 15-10845 Date Filed: 06/14/2016 Page: 20 of 24 We recognize that some courts, including our own, have been hesitant to allow employers to assert state-law counterclaims against employees in FLSA cases. See, e.g., Martin v. PepsiAmericas, Inc., 628 F.3d 738, 743 (5th Cir. 2010); Donovan v. Pointon, 717 F.2d 1320, 1323 (10th Cir. 1983); Brennan v. Heard, 491 F.2d 1, 4 (5th Cir. 1974), abrogated on other grounds by McLaughlin v. Richland Shoe Co., 486 U.S. 128, 134 (1988). In Brennan, for example, the former Fifth Circuit reasoned that “[t]he only economic feud contemplated by the FLSA involves the employer’s obedience to minimum wage and overtime standards [and that] [t]o clutter [FLSA] proceedings with the minutiae of other employer- employee relationships would be antithetical to the purpose of the Act.” Brennan, 491 F.2d at 4. Similarly, the Tenth Circuit ruled in Pointon that an employer could not set-off its employee’s FLSA recovery through a counterclaim (though it could sue the employee in state court) because that would delay and interfere with the process of bringing the employer into compliance with the FLSA’s overtime requirements. See Pointon, 717 F.2d at 1323. The current Fifth Circuit later recognized an employer’s ability to set-off an employee’s recovery in FLSA cases, but narrowed set-off recovery to money “[that] can be considered wages that the employer pre-paid to the plaintiff- employee.” Martin, 628 F.3d at 742. Cf. Singer v. City of Waco, 324 F.3d 813, 828 n.9 (5th Cir. 2003) (interpreting Brennan and clarifying that an employer’s set- 20 Case: 15-10845 Date Filed: 06/14/2016 Page: 21 of 24 off recovery cannot cause an employee’s FLSA recovery to fall below the statutory minimum wage). It does not seem to us, however, that those concerns carry over to a situation like the one here where an employee is exempt from the FLSA’s coverage and therefore cannot recover anything under the Act. We also think that the district court’s reliance on the Fifth Circuit’s decision in Gagnon was misplaced, as that case is both factually distinguishable and legally insufficient to answer the question posed here. In Gagnon, a skilled aircraft painter was paid an hourly rate of $5.50 per hour, an overtime rate of $20 per hour, and a “per diem” rate of $12.50 per hour. See Gagnon, 607 F.3d at 1039. He sued his employer under the FLSA, alleging that the payment scheme reduced the amount of overtime compensation he should have received. See id. at 1040. The district court ruled in favor of the painter, concluding that the “per diem” should have been included in his regular rate of pay for purposes of calculating overtime compensation. See id. at 1040–41. The painter’s per diem payments were troubling because they were paid hourly, bore no rational relationship to living or travel expenses, and the combined regular rate and per diem payments was suspiciously close to the “prevailing wage for similarly skilled craftsmen.” See id. at 1039–41. The Fifth Circuit reasoned that the employer manipulated the overtime rate of the painter by designating a portion of his “wages as ‘straight time’ and a portion as ‘per diem.’” Id. at 1041. 21 Case: 15-10845 Date Filed: 06/14/2016 Page: 22 of 24 On those facts, the Fifth Circuit ruled that the employee’s hourly per diem payments were part of “his regular rate for the purpose of determining overtime pay due under the FLSA.” Id. at 1042. The employer in Gagnon asserted counterclaims for breach of contract and fraud against the employee and challenged the per diem it had paid “[because] he lived less than ten miles from the worksite.” Id. at 1041–42. Significantly, however, the district court in Gagnon did not address the employer’s state-law counterclaims. See id. at 1042–43. The Fifth Circuit affirmed the district court’s decision not to address the counterclaims, but it went a step further, stating that its conclusion that “the hourly per diem wages must be included in base pay would seem to eviscerate” the employer’s breach of contract and fraud counterclaims. Id. at 1042. This language in Gagnon does not mean that IBEX’s counterclaim was legally barred in a case where no FLSA claim remained. Unlike the painter in Gagnon, who had a viable FLSA overtime claim, Mr. Pioch was exempt from FLSA overtime protection and was paid a set daily amount (the per diem) that reflected his expected expenses for distant travel. Mr. Pioch’s per diem payments also did not change based on the hours he worked, and there is no concern here that IBEX used per diem payments to avoid paying overtime. Mr. Pioch fails to explain how, in light of these factual differences, Gagnon requires dismissal, on the merits, of IBEX’s unjust enrichment counterclaim. We therefore 22 Case: 15-10845 Date Filed: 06/14/2016 Page: 23 of 24 hold that, if an employee who sues under the FLSA is not covered by (or is exempt under) the Act, there is no bar to the employer asserting a state-law counterclaim against the employee. B If there is a valid merit-based ground for ruling in favor of Mr. Pioch on IBEX’s unjust enrichment counterclaim, we can of course affirm. See, e.g., Walden v. Ctrs. for Disease Control & Prevention, 669 F.3d 1277, 1283 (11th Cir. 2012) (noting that we can affirm a grant of summary judgment on any ground supported by the record, including grounds on which the district court did not rely). Mr. Pioch argues that, under Florida law, IBEX’s counterclaim was time-barred under Fla. Stat. § 95.11(4)(c) (imposing a two-year statute of limitations for actions “to recover wages or overtime or damages or penalties concerning payment of wages and overtime”). The district court acknowledged that Mr. Pioch had made this argument, but it did not base its summary-judgment ruling on statute of limitations grounds. We exercise our discretion and decline to decide whether IBEX sought to recover “wages” from Mr. Pioch as that term is defined under Florida law. On remand, we note that the district court has two options. The district court can decline to exercise supplemental jurisdiction over the unjust enrichment counterclaim (as it did with respect to IBEX’s fraud counterclaim). Or it can 23 Case: 15-10845 Date Filed: 06/14/2016 Page: 24 of 24 decide, in the first instance, whether IBEX’s attempt to recover per diem payments was unequivocally a claim to recover wages that is now time-barred under Florida law. 5 V We affirm the district court’s grant of summary judgment in favor of IBEX as to Mr. Pioch’s FLSA claim, and reverse the entry of summary judgment in favor of Mr. Pioch as to IBEX’s state-law counterclaim for unjust enrichment. The case is remanded to the district court for further proceedings consistent with this opinion. AFFIRMED IN PART, REVERSED IN PART, AND REMANDED. 5 Mr. Pioch contends that “any claim for wages—no matter the legal theory under which it is brought—is subject to the [two-year] statute of limitations under what is now [§] 95.11(4)(c).” Appellee’s Reply Br. at 4. But the two cases cited by Mr. Pioch in support of this argument involve an employee’s attempt to recover wages from an employer. See Blackburn v. Bartsocas, 978 So. 2d 820, 821–22 (Fla. 4th DCA 2008) (reversing jury verdict in favor of employee on unjust enrichment claim because it was actually a claim for wages); Ultimate Makeover Salon & Spa, Inc. v. DiFrancesco, 41 So. 3d 335, 337 (Fla. 4th DCA 2010) (discussing the trial court’s determination that the employee’s claims, including one for unjust enrichment, were wage claims). 24
{ "pile_set_name": "FreeLaw" }
Q: Ada Access to parameterless procedure "wrong convention" I have the following binding: function atexit(proc : access Procedure) return Integer with Import, Convention => C; As well as the procedure: procedure Exiting is begin Put_Line("Exiting"); end Exiting; When I try to call it like: I : Integer := atexit(Exiting'Access); it fails with subprogram "Exited" has wrong convention however providing my own (incompatable) atexit which accepts a parameter, and modifying Exiting to use that same parameter, allows passing the procedure just fine. So it seems like the issue is passing a parameterless procedure as an access type. I've tried giving a named access type like type Procedure_Access is access Procedure; But the result is exactly the same. How can I pass a parameterless procedure then? A: You might have forgotten the Convention aspects in the declarations of Exiting and Procedure_Access. The following works in GNAT CE 2018: foo.c int _atexit(void (*f)(void)) { (*f)(); return 0; } main.adb with Ada.Text_IO; use Ada.Text_IO; with Interfaces.C; use Interfaces.C; procedure Main is type proc_ptr is access procedure with Convention => C; function atexit(proc : proc_ptr) return int with Import, Convention => C, Link_Name => "_atexit"; procedure Exiting with Convention => C; procedure Exiting is begin Put_Line("Exiting"); end Exiting; I : Integer := Integer (atexit (Exiting'Access)); begin Put_Line("atexit returned " & I'Image); end Main; default.gpr project Default is for Source_Dirs use ("src"); for Object_Dir use "obj"; for Main use ("main.adb"); for Languages use ("Ada", "C"); end Default; output Exiting atexit returned 0
{ "pile_set_name": "StackExchange" }
Oral supplementation with Lactobacillus rhamnosus CGMCC 1.3724 prevents development of atopic dermatitis in NC/NgaTnd mice possibly by modulating local production of IFN-gamma. Prevalence of allergies has increased during the last two decades. Alteration of the gut microbiota composition is thought to play a crucial role in development of atopic diseases. Oral administration of probiotics has been reported to treat and/or prevent symptoms of atopic diseases in infants, but the results are still controversial. We investigated the potential efficacy of dietary interventions by a probiotic strain on prevention and treatment of atopic dermatitis (AD) in a human-like AD model, NC/NgaTnd mice by perinatal administration. Pregnant NC/NgaTnd mice were orally treated with the probiotic strain Lactobacillus rhamnosus CGMCC 1.3724 (LPR), which was followed by treatment of pups until 12 weeks of age. LPR-treated mice exhibited significant lower clinical symptoms of dermatitis, reduced scratching frequency, lower levels of plasma total Immunoglobulin E and higher levels of interferon-gamma in skin biopsies, compared with untreated mice. The protective effect was also observed when mice started to be treated at weaning time (5 weeks of age) even with limited supplementation period of 2 weeks. However, treatment of mice with the probiotic starting 1 week after the onset of the disease (8 weeks of age) had limited effects. The usefulness of LPR for primary prevention of AD was supported.
{ "pile_set_name": "PubMed Abstracts" }
[Spectral analysis of different boundary discharge domain in dielectric barrier discharge]. Different discharge modes in different boundary discharge domains at the same experimental condition are observed in argon/air mixture in a dielectric barrier discharge system with two large diameter water electrodes. Regular patterns and random filaments are formed in the closed square boundary and the semiopen domain respectively. It is found that the relatively intensity of the several higher excitation energy spectral lines such as 696.5, 727.3, 750.4 and 772.4 nm increases with the applied voltage in the closed boundary domain while decreases in the semiopen domain. Results show that the electron average energy in the closed boundary is higher than that in the semiopen domain and the difference of the electron average energy increases with the applied voltage. The results of molecular vibration temperature estimated by the second positive spectrum of N2 molecular indicate that the vibration temperature increases with the applied voltage in the closed boundary and decreases with the applied voltage in the semiopen boundary domain.
{ "pile_set_name": "PubMed Abstracts" }
McElhone McElhone is a surname. Notable people with the surname include: Eric McElhone (1887–1981), Australian cricketer Frank McElhone (1929–1982), Scottish politician Helen McElhone (1933–2013), Scottish politician Jack McElhone (born 1993), Scottish actor John McElhone (1833–1898), Australian politician Johnny McElhone (born 1963), Scottish guitarist and songwriter Natascha McElhone (born 1971), English actress
{ "pile_set_name": "Wikipedia (en)" }
FREE ONLINE TRAINING All through a divorce the parties normally try to divide all of their marital property and arrear in a way that is equal. The abuser has die out to kidnap our children. Authenticity in a relationship keeps it strong and healthy. Common Questions I think I have a common-law marriage. Do you want en route for know the secret of a mysterious Russian soul? There are so many issues involved at this juncture and your feelings are absolutely understandable. Find love later in life It will get better, you bidding move on and you bidding eventually come to a area of peace and closure. But the court finds that the payer could pay some before all of the amount owed, the payer can be held in contempt. You know altogether those rules of old-fashioned courtesy. Pros and cons of online dating Be concerned about talking with a lawyer a propos your rights and options constant if you decide not en route for hire one. Any advice at this juncture would be appreciated! I happened to find someone I actually love and want to be with for the rest of my life. Short on time? Get three quotes from qualified tradies now. This is the same as approaching a woman in a common or on the street, although all you need to accomplish is to write a accelerate line. If your aim is to create your own ancestor, you need to find the woman who is ready designed for a serious relationship too. The best way to meet after that date local ladies is trying online dating. There are two ways you can ask designed for your amount of child aid to be changed. Children basic to feel like they appear first. Something is wrong along with your submission. Show up an hour early, leave an hour late.
{ "pile_set_name": "Pile-CC" }
Abstracting meaning from complex information (gist reasoning) in adult traumatic brain injury. Gist reasoning (abstracting meaning from complex information) was compared between adults with moderate-to-severe traumatic brain injury (TBI, n = 30) at least one year post injury and healthy adults (n = 40). The study also examined the contribution of executive functions (working memory, inhibition, and switching) and memory (immediate recall and memory for facts) to gist reasoning. The correspondence between gist reasoning and daily function was also examined in the TBI group. Results indicated that the TBI group performed significantly lower than the control group on gist reasoning, even after adjusting for executive functions and memory. Executive function composite was positively associated with gist reasoning (p < .001). Additionally, performance on gist reasoning significantly predicted daily function in the TBI group beyond the predictive ability of executive function alone (p = .011). Synthesizing and abstracting meaning(s) from information (i.e., gist reasoning) could provide an informative index into higher order cognition and daily functionality.
{ "pile_set_name": "PubMed Abstracts" }
Randers-virksomheden Naturli' Foods har netop lanceret et plantebaseret alternativ til kyllingekød kaldet 'Pipfri'. Plantebaseret 'kød' ser ud til at være kommet for at blive. I hvert fald lancerer Naturli' Foods fra Randers nu endnu et produkt i kategorien - 'Pipfri', der er et plantebaseret alternativ til kylling. - Det er et alternativ til kylling, som er 100 procent plantebaseret. Det er baseret på ærter fra danske landmænd. Den er høj på protein og lav på fedt, og skal bare steges på panden som almindelig kylling, siger direktør hos Naturli' Foods, Henrik Lund, til TV2 ØSTJYLLAND. Han forventer, at der er et marked for det nye produkt. - Vi ved, at mere end halvdelen af de danske forbrugere har et ønske om at spise mindre kød. Det vil vi gerne hjælpe dem med, siger Henrik Lund. Sådan ser en pakke Pipfri ud. Foto: TV 2 ØSTJYLLAND Har taget godt imod det For et år siden kom virksomhedens plantebaserede 'hakkekød' på markedet, og nu er 'Pipfri' at finde i alle landets Rema 1000-butikker. Et af stederne er hos købmand Michael Gertsen i Risskov. Kunderne har taget godt imod produktet. Jeg tror, at det er en trend, der kommer mere og mere af. Michael Gertsen, Rema 1000 Risskov - Kunderne har taget godt imod produktet. Jeg tror, at det er en trend, siger han til TV2 ØSTJYLLAND og fortsætter: - Jeg tror, at vi kommer til at se meget mere af det især i storbyer som Aarhus, København og Aalborg. Michael Gertsen fortæller, at man i Rema 1000 i Risskov går meget op i alternativer til kød. Foto: TV 2 ØSTJYLLAND Nye forsyninger på vej I et års tid har Rema 1000 i Risskov solgt plantebaserede produkter, og her i begyndelsen af januar kom 'Pipfri' så i køledisken. - Mange er glade for det og har en kødfri dag. Flere og flere bliver jo også veganere, lyder det fra Michael Gertsen. Siden kyllingen baseret på ærter fra Naturli' kom i Remas butikker den 2. januar, har de ifølge direktøren solgt godt og er udsolgt mange steder. - Der er dog nye forsyninger på vej, lover Naturli' Foods-direktør Henrik Lund, der generelt glæder sig oer et stigende salg af de plantebaserede produkter Vi besøgte Naturli' Foods for et år siden, hvor de glædede de sig over succesen med salg af plantefars. Video: TV 2 Østjylland Har indtaget fem procent af kødmarkedet - Vi har opnået en markedsandel på cirka fem procent i forhold til det hakkede oksekød, der sælges i Salling Group, oplyser Henrik Lund til TV 2, der af konkurrencemæssige årsager ikke vil komme det nærmere end det. Under Salling Group - tidligere Dansk Supermarked - er produkterne til salg i butikker som Netto, Føtex og Bilka. Naturli' Foods eksporterer dog størstedelen af produkterne. I sommer landede firmaet en aftale med Storbritanniens næststørste supermarkedskæde, Sainsbury's, hvor produktet nu sælges i 400 butikker. Også her går salget "helt forrygende", siger Henrik Lund. Naturli's største eksportmarked er dog Australien, hvor virksomhedens produkter kan købes i kæden Woolworths. Det næste store mål er at indtage USA.
{ "pile_set_name": "OpenWebText2" }
Menu Tag Archives: sleepover This proves that I should always make “after the fact” posts, because despite being all geared up with my medical and workers comp projects, I ended up having Cassi come down and stay over last night… which was actually just the mental break that I needed from all of that stuff. 🙂 I mean, I did keep working on it as she was here, but with her as a distraction it kept it all from consuming my brain and occupying 100% of my thought cycles as I worked. 😳 But while she was here (among other progress) I got names, numbers, and addresses for every local doctor that may be accepting new patients, every local urgent care that appears to offer services greater than the “I skinned my knee” or “My butthole really itches” type stuff, and every oral surgeon in the area so I can get more serious about getting my remaining wisdom teefs cut out. 😬 I also got new info from BWC and my BWC Rx provider, so that stuff is in much better shape as well. And the pharmacy was also updated, so my meds might possibly, hopefully, maybe get filled in a more timely fashion. 🤨👨🏻‍⚕️ Now that I think about it, I probably got more done with her here than if she wasn’t. 🤨 And without getting twitchy. 🤷🏻‍♂️ She worked on several things that she needed to do as well, taking advantage of the relative peace and quiet here compared to her house full of family. 😌 Of course she gave her brain a break as well (the main point of her staying) by making and painting some picture frames, and catching up on the last few episodes of NCIS that she still had to watch on Netflix. 👱🏻‍♀️📺 I think Maven was even happy for the unexpected visit, ‘cuz she made up to Cassi way more than usual this time. 😸 We talked quite a bit about what’s going on with my health at the moment, along with all kinds of random thoughts that come along with that topic… so it was nice to be able to talk some of that stuff out with her. 👦🏻👱🏻‍♀️ I’m not exactly sure what the plan will be for tomorrow and Friday. 😐 Now that I’ve got all this info compiled I imagine I’ll start calling someone… meh… I’ll figure it out when that time gets here. I’m gonna stay in chill mode for the rest of the evening if possible. I took a couple of nights to myself after Genesee left the other day, and then apparently after subconsciously getting used to having someone here at the house – I decided to reach out to Cassi to see if she wanted to come stay for a night. (It actually ended up being two nights.) It had been a while since she had even been down here for a visit, let alone an overnighter, so she was more than happy to come on down. The first day and night were just lazy. 😏 Catching up with each other’s stuff, watching Netflix, and then her current passion/hobby is doing nails – so she brought all of her nail shit along with her to practice doing styles and designs as we sat there doing nothing. 💁🏻‍♀️🖐🏻🤚🏻 She even convinced me to give it a try myself, so I obliged and did the best that I could with my artwork. 🙄😅 (Shut up… I ain’t even embarrassed, but man was it tedious… lol) My “designs” even gave her some inspiration to work off of, so yay me. 😋 Like Genesee, Cassi is one of very few people that I can tolerate (and actually like having around) for extended periods of time, for whatever reason. Day two featured a quick run into town to get some pop and dinner, and we also stopped off at the thrift to grab a bag of clothes during their $5.00 sale. 😎 Day three, on the way to take Cassi back home, we had a short detour to go pick up Desiree and take her to the auto parts place. Someone put new brakes on her car but forgot a couple of bolts, so her car took a shit earlier that morning, requiring her to make a run for pieces parts. 😧😕 (I talked to her today though, and she said that it’s all better.) Even after hitting a couple more thrift stores in Columbus, I really didn’t come home with much of anything. A few shirts, some batteries, umm… 🤔 see… I can’t even remember if I got anything else, so it was obviously an unimpressive trip in that regard. I did get the new Samantha Fox autobiography, Forever, in the mail today when I woke up though, so I guess that’s my goody of the moment. (And proof that I eventually intend to make myself an effing book reader. 😄) So there ya have it. Basically a whole lot of nothin’ going on, but over the course of a few days there was just enough piddly shit that it seemed worthy of a blog entry. 🤷🏻‍♂️
{ "pile_set_name": "Pile-CC" }
<!-- Copyright (c) 2018 Oracle and/or its affiliates. All rights reserved. This program and the accompanying materials are made available under the terms of the Eclipse Public License v. 2.0, which is available at http://www.eclipse.org/legal/epl-2.0. This Source Code may also be made available under the following Secondary Licenses when the conditions for such availability set forth in the Eclipse Public License v. 2.0 are satisfied: GNU General Public License, version 2 with the GNU Classpath Exception, which is available at https://www.gnu.org/software/classpath/license.html. SPDX-License-Identifier: EPL-2.0 OR GPL-2.0 WITH Classpath-exception-2.0 --> <property name="module" value="ejb-ejb31-ejblite-javamodule"/> <property name="appname" value="${module}"/> <property name="jndiroot" value="${appname}-ejb"/> <property name="assemble" value="${build.classes.dir}/archive"/> <property name="se.client" value="com.acme.Client"/> <property name="contextroot" value="${module}"/>
{ "pile_set_name": "Github" }
Pod::Spec.new do |s| s.name = "GDPerformanceView" s.version = "1.3.1" s.summary = "Shows FPS, CPU usage, app and iOS versions above the status bar and report FPS and CPU usage via delegate." s.homepage = "https://github.com/dani-gavrilov/GDPerformanceView" s.license = { :type => "MIT", :file => "LICENSE" } s.author = { "Gavrilov Daniil" => "[email protected]" } s.platform = :ios, "8.0" s.ios.deployment_target = "8.0" s.source = { :git => "https://github.com/dani-gavrilov/GDPerformanceView.git", :tag => "1.3.1" } s.source_files = "GDPerformanceView/GDPerformanceMonitoring/*" s.frameworks = "UIKit", "Foundation", "QuartzCore" s.requires_arc = true end
{ "pile_set_name": "Github" }
In A.D. 143 or 144, when he was in his early 20s, the future Roman emperor Marcus Aurelius set out for the country estate of his adoptive father, Emperor Antoninus Pius. The property, Villa Magna (Great Estate), boasted hundreds of acres of wheat, grapes and other crops, a grand mansion, baths and temples, as well as rooms for the emperor and his entourage to retreat from the world or curl up with a good book. Which is just what young Marcus did, as he related in a letter written to his tutor, Fronto, during the excursion. He describes reading Cato’s De agri cultura, which was to the gentlemanly farmer of the Roman Empire what Henry David Thoreau’s Walden was to nature lovers in the 19th century. He hunted boar, without success (“We did hear that boars had been captured but saw nothing ourselves”), and climbed a hill. And since the emperor was also the head of the Roman religion, he helped his father with the daily sacrifices—a ritual that made offerings of bread, milk or a slaughtered animal. The father, son and the emperor’s retinue dined in a chamber adjacent to the pressing room—where grapes were crushed for making wine—and there enjoyed some kind of show, perhaps a dance performed by the peasant farmworkers or slaves as they stomped the grapes. We know what became of Marcus Aurelius—considered the last of the “Five Good Emperors.” He ruled for nearly two decades from A.D. 161 to his death in A.D. 180, a tenure marked by wars in Asia and what is now Germany. As for the Villa Magna, it faded into neglect. Documents from the Middle Ages and later mention a church “at Villa Magna” lying southeast of Rome near the town of Anagni, in the region of Lazio. There, on privately owned land, remains of Roman walls are partially covered by a 19th-century farmhouse and a long-ruined medieval monastery. Sections of the complex were half-heartedly excavated in the 18th century by the Scottish painter and amateur treasure hunter Gavin Hamilton, who failed to find marble statues or frescoed rooms and decided that the site held little interest. As a result, archaeologists mostly ignored the site for 200 years. Then, in 2006, archaeologist Elizabeth Fentress—working under the auspices of the University of Pennsylvania and the British School at Rome—got permission from the property owner and the Italian government to excavate the area and began to make some interesting discoveries. Most important, near the old farmhouse, her team—accompanied by Sandra Gatti from the Italian Archaeological Superintendency—found a marble-paved rectangular room. At one end was a raised platform, and there were circular indentations in the ground where large terra-cotta pots, or dolia, would have been set in an ancient Roman cella vinaria—a wine pressing room. The following summer, Fentress and a team discovered a chamber shaped like a semicircular auditorium attached to the pressing room. She was thrilled. Here was the dining area described by Marcus Aurelius where the imperial retinue watched the local workers stomp grapes and, presumably, dance and sing. “If there was any doubt about the villa,” says Fentress, “the discovery of the marble-paved cella vinaria and the banquet room looking into it sealed it.” In all, roman emperors constructed dozens of villas over the roughly 350-year span of imperial rule,from the rise of Augustus in 27 B.C. to the death of Constantine in A.D. 337. Since treasure hunters first discovered the villas in the 18th century (followed by archaeologists in the 19th and 20th), nearly 30 such properties have been documented in the Italian region of Lazio alone. Some, such as Hadrian’s, at Tivoli, have yielded marble statues, frescoes and ornate architecture, evidence of the luxuries enjoyed by wealthy, powerful men (and their wives and mistresses). As archaeological investigations continue at several sites throughout the Mediterranean, a more nuanced picture of these properties and the men who built them is emerging. “This idea that the villa is just about conspicuous consumption, that’s only the beginning,” says Columbia University archaeologist Marco Maiuro, who works with Fentress at Villa Magna. The villas also point up the sharp contrast between the emperors’ official and private lives. “In Rome,” says Steven Tuck, a classical art historian at Miami University of Ohio, “you constantly see them through their service to the state—dedications of buildings, triumphal columns and arches and monuments.” But battles and bureaucracy are left at the villa’s door. Tuck points to his favorite villa—that of Tiberius, Augustus’ stepson, son-in-law and successor. It lies at the end of a sandy beach near Sperlonga, a resort between Rome and Naples on the Mediterranean coast. Wedged between a twisting mountain road and crashing waves, the Villa Tiberio features a natural grotto fashioned into a banquet hall. When archaeologists discovered the grotto in the 1950s, the entrance was filled with thousands of marble fragments. Once the pieces were put together, they yielded some of the greatest sculptural groups ever created—enormous statues depicting the sea monster Scylla and the blinding of the Cyclops Polyphemus. Both are characters from Homer’s Odyssey as retold in Virgil’s Aeneid, itself a celebration of Rome’s mythic founding written just before Tiberius’ reign. Both also vividly illustrate man locked in epic battle with primal forces. “We don’t see this kind of thing in Rome,” says Tuck. It was evocative of a nymphaeum, a dark, primeval place supposedly inhabited by nymphs and beloved by the capricious sea god Neptune. Imagine dining here, with the sound of the sea and torchlight flickering off the fish tail of the monster Scylla as she tossed Odysseus’ shipmates into the ocean. If the imperial villa provided opportunities for Roman emperors to experiment with new images and ideas, then the one that Hadrian (A.D. 76-138) built at Tivoli in the first decades of the second century may be the ultimate in freewheeling expression. Occupying about 250 acres at the base of the Apennine Hills, Villa Adriana was originally a farm. When Hadrian became emperor in A.D. 117, he began renovating the existing structure into something extraordinary. The villa unfolded into a grand interlocking of halls, baths and gathering spaces designed to tantalize and amaze visitors. “This villa has been studied for five centuries, ever since its discovery during the Renaissance,” says Marina De Franceschini, an archaeologist working with the University of Trento. “And yet there’s still a lot to discover.” Franceschini is especially beguiled by the villa’s outlandish architecture. Take the so-called Maritime Theater, where Hadrian designed a villa within a villa. On an island ringed by a water channel, it is reached by a drawbridge and equipped with two sleeping areas, two bathrooms, a dining room, living room and a thermal bath. The circular design and forced perspective make it appear larger than it is. “The emperor was interested in experimental architecture,” says Franceschini. “It’s an extremely complicated place. Everything is curved. It’s unique.” What exact statement Hadrian wanted to make with his villa has been the subject of debate since the Renaissance, when the great artists of Italy—including Raphael and Michelangelo—studied it. Perhaps to a greater extent than any other emperor, Hadrian possessed an aesthetic sensibility, which found expression in the many beautiful statues discovered on the site, some of which now grace the halls of the Vatican museums and the National Museum of Rome, as well as the Metropolitan Museum of Art in New York City and the Louvre in Paris. Hadrian traveled frequently, and whenever he returned to Italy, Tivoli became his preferred residence, away from the imperial palace on the Palatine Hill. Part business, part pleasure, the villa contains many rooms designed to accommodate large gatherings. One of the most spacious is the canopus—a long structure marked by a reflecting pool said to symbolize a canal Hadrian visited in Alexandria, Egypt, in A.D. 130, where his lover Antinous drowned that same year. Ringing the pool was a colonnade connected by an elaborate architrave (carved marble connecting the top of each column). At the far end is a grotto, similar to that at Sperlonga but completely man-made, which scholars have named the Temple of Serapis, after a temple originally found at Alexandria. Today, the canopus and grotto may look austere, but with the emperor seated there with up to 100 other diners around the pool, it must have been something to see. A network of underground tunnels some three miles long trace a labyrinth beneath the villa, which allowed servants to appear, almost magically, to refill a glass or serve a plate of food. The pool on a warm summer night, reflecting the curvilinear architrave, was surely enchanting. Standing at the grotto today, one can barely see the line made by two small aqueducts running from a hillside behind the grotto to the top of this half-domed pavilion. Water would have entered a series of pipes at its height, run down into walls and eventually exploded from niches into a semi-circular pool and passed under the emperor. Franceschini believes the water was mostly decorative. “It reflected the buildings,” he says. “It also ran through fountains and grand waterworks. It was conceived to amaze the visitor. If you came to a banquet in the canopus and saw the water coming, that would have been really spectacular.” Hadrian was not the only emperor to prefer country life to Rome’s imperial palace. Several generations earlier, Tiberius had retired to villas constructed by his predecessor Augustus. Installing a regent in Rome, the gloomy and reclusive Tiberius walled himself off from the world at the Villa Jovis, which still stands on the island of Capri, near Neapolis (today’s Naples hills). Tiberius’ retreat from Rome bred rumor and suspicion. The historian Suetonius, in his epic work The Lives of the Twelve Caesars, would later accuse him of setting up a licentious colony where sadomasochism, pederasty and cruelty were practiced. (Most historians believe these accusations to be false.) “Tradition still associates the great villas of Capri with this negative image,” says Eduardo Federico, a historian at the University of Naples who grew up on the island. Excavated largely in the 1930s and boasting some of the most spectacular vistas of the Mediterranean Sea of any Roman estate, the Villa Jovis remains a popular tourist destination. “The legend of Tiberius as a tyrant still prevails,” says Federico. “Hostile history has made the Villa Jovis a place of cruelty and Tiberian lust.” Perhaps the best-known retirement villa belonged to the emperor Diocletian (A.D. 245-316), who ruled at the end of the third century and into the fourth. Besides his tireless persecution of Christians, Diocletian is known for ending a half-century of instability and consolidating the empire—before dividing it into eastern and western halves (thereby setting the stage for the rise of the Byzantine Empire). Much of this work involved quelling rebellions on the perimeter and keeping the ever-agitating senatorial class under control. By A.D. 305, at the age of 60, Diocletian had had enough. In a bold, unprecedented move—previous emperors had all died in office—he announced his retirement and sought refuge in a seaside villa on the coast of Dalmatia (today’s Croatia). Now called Diocletian’s Palace, the ten-acre complex includes a mausoleum, temples, a residential suite and a magnificent peristyle courtyard complete with a dais and throne. Even out of power, Diocletian remained a force in the empire, and when it fell into chaos in 309, various factions pleaded for him to take up rule again. Diocletian demurred, famously writing that if they could see the incredible cabbages he’d grown with his own hands, they wouldn’t ask him to trade the peace and happiness of his palace for the “storms of a never-satisfied greed,” as one historian put it. He died there seven years later. Located in the modern city of Split, Diocletian’s Palace is one of the most stunning ancient sites in the world. Most of its walls still stand; and although the villa has been looted for treasure, a surprising number of statues—mostly Egyptian, pillaged during a successful military campaign—still stand. The villa owes its excellent condition to local inhabitants, who moved into the sprawling residence not long after the fall of Rome and whose descendants live there to this day. “Everything is interwoven in Split,” says Josko Belamaric, an art historian with the Croatian Ministry of Culture who is responsible for conservation of the palace. “It’s so dense. You open a cupboard in someone’s apartment, and you’re looking at a 1,700-year-old wall.” Belamaric has been measuring and studying Diocletian’s Palace for more than a decade, aiming to strike a balance between its 2,000 residents and the needs of preservation. (Wiring high-speed Internet into an ancient villa, for instance, is not done with a staple gun.) Belamaric’s studies of the structure have yielded some surprises. Working with local architect Goran Niksic, the art historian realized that the aqueduct to the villa was large enough to supply water to 173,000 people (too big for a residence, but about right for a factory). The local water contains natural sulfur, which can be used to fix dyes. Belamaric concluded that Diocletian’s estate included some sort of manufacturing center—probably for textiles, as the surrounding hills were filled with sheep and the region was known for its fabrics. It’s long been thought that Diocletian built his villa here because of the accommodating harbor and beautiful seascape, not to mention his own humble roots in the region. But Belamaric speculates it was also an existing textile plant that drew the emperor here, “and it probably continued during his residence, generating valuable income.” In fact, most imperial Roman villas were likely working farms or factories beneficial to the economy of the empire. “The Roman world was an agriculturally based one,” says Fentress. “During the late republic we begin to see small farms replaced by larger villas.” Although fish and grains were important, the predominant crop was grapes, and the main product wine. By the first century B.C., wealthy landowners—the emperors among them—were bottling huge amounts of wine and shipping it throughout the Roman Empire. One of the first global export commodities was born. At Tiberius’ villa at Sperlonga, a series of rectangular pools, fed by the ocean nearby, lay in front of the grotto. At first they seem merely decorative. But upon closer inspection, one notices a series of terra-cotta-lined holes, each about six inches in diameter, set into the sides of the pools, just beneath the water’s surface. Their likely use? To provide a safe space in which fish could lay their eggs. The villa operated as a fish farm, producing enough fish, Tuck estimates, not only to feed the villa and its guests but also to supply markets in Rome. “It’s fantastic to see this dining space that also doubled as a fish farm,” says Tuck. “It emphasizes the practical workings of these places.” Maiuro believes that the economic power of the larger villas, which tended to expand as Rome grew more politically unstable, may even have contributed to the empire’s decline, by sucking economic—and eventually political—power away from Rome and concentrating it in the hands of wealthy landowners, precursors of the feudal lords who would dominate the medieval period. “Rome was never very well centralized,” says Maiuro, “and as the villas grow, Rome fades.” Paul Bennett lived in Italy for five years and has lectured widely on Roman history, archaeology and landscape design.
{ "pile_set_name": "OpenWebText2" }
Tags Share About the author Lady Jughead lives and writes in the city she loves and hates, Bombay. Without meaning to and harbouring mixed feelings about it (You’ll see the irony in just a bit), she’s forever wandering in the murkiness that exists between straight and gay, clear and clueless, butch and femme, cute and hot, and genius and insane. All of which leave her with a question that often occupies a significant portion of her cognitive capacity – is she Just Perfect or is she falling fast into the deep chasm of obscurity called Just Average? @S It’s never frightening for me. And it would be beautiful if that person ends up as yours. Not if you see them walking away into the sunset with someone else. Being in that place leaves me with so many feelings that after one point, I don’t know where one ends and the other begins. true true. But dear Lady J… think for a second like this: the very fact that someone had the ability to make you feel like this – that by itself is huge. Yes, it has its pain under the surface but see the immensity of the love for a moment – how rare and how wonderful for it to have come into your life even for as long as a heartbeat. No? Really? ok. Follow Gaysi Gaysi is a space where the Desi-Gay community comes together and shares personal stories, their triumphs and failures, their struggles and their dreams, their hopes and despair. And in doing so, gives other gaysis a sliver of hope too. More
{ "pile_set_name": "Pile-CC" }
George Baldwin (diplomat) George Baldwin was a British merchant, writer and diplomat of the late eighteenth and early nineteenth centuries whose career was principally based in Egypt, where he established valuable trade links for the East India Company and negotiated directly with the Ottoman governors. Despite repeated warnings of the importance of Egypt to links with British India, his advice was ignored and thus when Napoleon Bonaparte invaded Egypt in 1798 the British were ill-placed to respond directly. In 1801 he assisted the British counter-invasion of Egypt and later returned to Britain with his wife Jane Maltass, a famous society beauty. Although a highly successful merchant and diplomat, Baldwin found himself a subject of ridicule on his return to Britain for his belief in the healing power of magnets, then widely considered a pseudoscience. He retired to Earl's Court in London and died there in 1826. Early life George Baldwin was born in May 1744 (although some sources give 1743), the son of hop merchant William Baldwin of Borough, London. Aged 16 he was sent to join his brother in Cyprus, where he was consul-general and three years later was sent to Acre. Career During his trading operations in the Eastern Mediterranean, Baldwin became increasingly aware of the political and commercial structures of the Middle East, and in 1768, he traveled to Britain to seek permission to investigate the possibilities of trade running from British India across Egypt via the Red Sea. Although this route was nominally blocked off to non-Muslims, developing trade would be possible if it brought profit to the rulers of Egypt. On his brother's death, Baldwin returned to the Mediterranean and took up his post on Cyprus. In 1773, Mehmed Bey summoned him to Cairo and encouraged British shipping to use Suez, declaring that he would cut a canal from Suez to the Nile for ships to pass directly from the Red Sea to the Mediterranean. He was also well received in Constantinople. East India Company In 1774, Baldwin returned to Cairo and then back to England, where he learned that the East India Company had successfully begun a trade route between India and Suez. Offering his services to the Company, Baldwin was accepted and returned again to Egypt, where he was the only British merchant. With his knowledge of Arabic he was able to monopolise British trade caravans passing from Suez to the Nile, and ensured a fast, safe and efficient service. At some point between 1776 and 1778 he was reported to have climbed the Great Pyramid at Giza and drunk a mixture of waters from the Nile, Ganges and Thames, symbolically linking the trade routes he managed. By 1779, his trade was so successful that it began to impinge on that of the Ottoman Sultan and of the Cape of Good Hope, prompting protests and restrictions on his activities. In May, one of his caravans was attacked and looted, with some merchants taken hostage. Baldwin exchanged himself for the merchants and later escaped, reaching Izmir. An attempt to set up in India ended in failure when Baldwin was assaulted and robbed en route, and he and his wife returned to Britain, pausing in Vienna. Return to England While living in England, Baldwin wrote memoranda for the India Board of merchants, emphasising the importance of influence in Egypt to trade with India and the Middle East and the risk to British interests if France was allowed to dominate Egyptian trade. His advice was not taken up and no resources were deployed to the region until 1786, when a license was issued that allowed French merchants to make use of the Red Sea. In response, Baldwin was sent to negotiate similar licenses for British merchants and observe French activities. While there he deepened his interest in magnetic therapy, holding sessions with an Italian poet to investigate the effects of magnetism on the unconscious. When the French Revolutionary Wars broke out between Britain and France in 1793, Baldwin was able to forward the message to the British government in India, which could then take action against French territories there. In 1796, he investigated unsuccessful French efforts to persuade the Egyptian rulers to allow French armies safe passage through their territory on their way to India. Despite his efforts, the British government terminated his post in 1793, although the message did not reach him until 1796. Frustrated, Baldwin left Cairo and thus was not present during the Mediterranean campaign of 1798, when a British force under Sir Horatio Nelson was unable to gain audience with the Egyptian government to warn of the impending attack, as they had no ambassador. When the French invaded Egypt, Baldwin left the country and traveled to Europe before taking up residence in Florence. After the Battle of Marengo, he moved to Naples and from there assisted with the planning of the British counter-invasion of Egypt and travelled with the army as a logistical officer, witnessing the successful campaign and securing local sources of supplies from his contacts in the country. In May 1801, Baldwin returned to London and settled there, continuing his studies in magnetic theory, which by this time had been dismissed as pseudoscience. As a result, Baldwin was ridiculed and although he published a number of works on the subject in 1801 and 1802, he did not write again until 1811, when his research was privately printed. Personal life Shortly after one of his caravans in the Ottoman was attached in 1779 and he escaped to Izmir, he married Jane Maltass (1763–1839), the daughter of his agent and a famous society beauty. Although they had a daughter, the marriage was an unhappy one, punctuated by frequent arguments. While pausing in Vienna on their way to Britain, Jane was celebrated in society: a bust of her was made for Joseph II, Holy Roman Emperor by Cerroschi and Count Wenzel Anton Kaunitz-Rietberg commissioned a full-length portrait. In London, she was painted by Joshua Reynolds, William Pyne and Richard Cosway. Baldwin became popular in society and became an acquaintance of William Blake, who mentions him in one of his poems. It was his friendship with Cosway that led to his introduction into the field of magnetic therapy, the theory that magnetic force had healing powers. He died in 1826 in Earl's Court and his art collection was sold at Christie's in 1828. Notes References Category:1744 births Category:1826 deaths Category:British merchants Category:British consuls-general in Egypt
{ "pile_set_name": "Wikipedia (en)" }
RUN: llvm-objdump -r %p/Inputs/elf-reloc-no-sym.x86_64 \ RUN: | FileCheck %s ; CHECK: elf-reloc-no-sym.x86_64: file format ELF64-x86-64 ; CHECK-NOT: {{.}}
{ "pile_set_name": "Github" }
By calling out homophobia on the field, David Pocock was just enforcing the very principles the rugby world claims to uphold. Pity the sport's bosses don't share his approach, writes Tracey Holmes. "We take the issue of homophobia in sport seriously," says Australian Rugby Union CEO Bill Pulver. Why then is former Wallabies captain David Pocock - the player who reported the homophobic slur in a weekend Super 15 match - now being targeted? In an article in The Australian today by rugby writer Wayne Smith, there are claims that Pocock's "mere presence in the Wallabies now threatens to have a polarising effect". It goes on. "The problem is that the ARU could not take the risk that if it reinstated him as Wallabies captain that he wouldn't use his position as a soapbox for his personal beliefs." A soapbox? His "personal beliefs"? These are the very beliefs the ARU has inscribed in its player code of conduct. These are the beliefs that prompted the four codes of football and cricket to stand on a stage last year and declare they were united in their commitment to ending homophobia in sport. How serious are they then when NSW Waratahs player, Jacques Potgieter, uses a homophobic slur that most likely would have been ignored had Pocock not heard it and reported it to the referee? By reporting it to the referee it had to be investigated further. The referee-cam recorded the conversation. Well done, David Pocock. Well done, referee-cam. Others have bemoaned the fact there are so many microphones and cameras on the field now and that Pocock broke the age old rule that "what happens on the field stays on the field". But that doesn't apply any more. This is 2015. It is not OK to keep quiet about domestic violence in the home and it's not all right that bigoted athletes can get away with abusing others on the field. Don't sports bodies, like the ARU, keep telling us about the physical, mental and spiritual benefits that come from playing sport? A principled person who has a history of making his beliefs public and standing by them when the pressure is on should be the exact person they turn to to uphold what they claim are the very hot-button beliefs they stand for as a sport. Pulver said Potgieter's comments during the weekend match breached the players code of conduct that prohibited homophobic or racist comments. It's similar to comments he made when Queensland Reds player Karmichael Hunt admitted last month to using recreational drugs outside the football season when he wasn't yet signed to the code of rugby union. So let's look at how seriously the ARU takes these "code of conduct" breaches. The ARU fined Potgieter $20,000 - $10,000 of it suspended - and ordered him to undergo further education. The ARU suspended Hunt for six weeks and fined him $30,000. The ARU is not as serious about stamping out homophobia as it is about tackling a social drug issue that occurred outside its jurisdiction and for which Hunt had already been found guilty and fined in a court of law. As for Potgieter, he has given the apology you give when you are not sure you've done something wrong. "I'm very sorry for any offence caused by what I said on the field during a heated encounter. It was an offhand remark made without thought for the hurt it could cause to those around me," he said in a statement. First of all, he's sorry for any offence caused - not for what he said. Next, it was only an "offhand comment". Actually it wasn't, it broke the rules of the ARU code. Sports bodies have a history of ducking for cover whenever an athlete makes a stand. And yet, these same sports bodies are happy to take the credit when the benefit of time applauds these momentous occasions that alter the path of history. In 1968 Australian 200 metre runner Peter Norman supported John Carlos and Tommie Smith when they raised their fists to highlight the civil rights struggle in the US. Nelson Mandela used rugby itself to heal a post-apartheid South Africa when his nation hosted the 1995 World Cup. Apartheid's final collapse came partly at the hands of numerous sporting teams refusing to travel to, or play against, South Africa while the racist policies existed and determined who could play the game based on skin colour. Pocock joins an impressive list of athletes who are not afraid to take a stand - to uphold values that are bigger than the sport itself but are crucial in showing how sport can lead the way to a better society. Pity, it seems, sports bosses don't see it quite the same way. Wayne Smith's article in the Australian finishes with this: If Pocock wants to make political statements, one rugby official told me yesterday, he should stand for parliament. I hope he does. He'd get my vote. Mine too. It's just a shame that taking a stand against homophobia is seen as something that should be sidelined from sport, despite their claims, and assigned to the political domain. If Pocock's future is stymied because he continues to stand up for what is right then all of rugby's lofty claims will be shattered. The ARU's inclusion policy will be shown to be nothing more than another empty vessel sailing on the promotional sea of sport. Tracey Holmes has focussed her career in journalism on sport and its wider implications.
{ "pile_set_name": "OpenWebText2" }
Curtis Lundy Curtis Lundy (born October 1, 1955) is an American double bass player, composer, producer, choir director and arranger. Lundy is best known for his work as part of jazz vocalist Betty Carter's band. Discography As leader As sideman With Johnny Griffin Call It Whachawana (Galaxy, 1983) With John Hicks I'll Give You Something to Remember Me By (Limetree, 1987) Naima's Love Song (DIW, 1988) East Side Blues (DIW, 1988) In the Mix (Landmark, 1994) Piece for My Peace (Landmark, 1995) Sweet Love of Mine (HighNote, 2006) With Frank Morgan Bop! (Telarc, 1997) City Nights: Live at the Jazz Standard (HighNote, 2003 [2004]) Raising the Standard (HighNote, 2002 [2005]) A Night in the Life (HighNote, 2003 [2007]) With Pharoah Sanders Africa (Timeless, 1987) With Bobby Watson Love Remains (Red, 1986 [1988]) References External links Curtis Lundy official website Category:American jazz double-bassists Category:Male double-bassists Category:1956 births Category:Living people Category:21st-century double-bassists Category:21st-century American male musicians Category:Male jazz musicians Category:Justin Time Records artists
{ "pile_set_name": "Wikipedia (en)" }
Sake F‐T‐N, Wong K, Bartlett DJ, Saini B. Benzodiazepine usage and patient preference for alternative therapies: A descriptive study. Health Sci Rep. 2019;2:e116 10.1002/hsr2.116 1. INTRODUCTION {#hsr2116-sec-0005} =============== Benzodiazepines are widely prescribed for their hypnotic,[1](#hsr2116-bib-0001){ref-type="ref"} anxiolytic,[2](#hsr2116-bib-0002){ref-type="ref"} muscle relaxant, and antiepileptic indications.[3](#hsr2116-bib-0003){ref-type="ref"} Despite their common use, concerns remain over their long‐term safety. Pharmacoepidemiological data indicate that prolonged use of benzodiazepines is associated with an increased risk of falling,[4](#hsr2116-bib-0004){ref-type="ref"}, [5](#hsr2116-bib-0005){ref-type="ref"} therapeutic dose dependence,[6](#hsr2116-bib-0006){ref-type="ref"} and an increased incidence of dementia.[7](#hsr2116-bib-0007){ref-type="ref"} Benzodiazepine exposure is also associated with an increased risk of physical disability.[8](#hsr2116-bib-0008){ref-type="ref"} Recent cohort studies suggest an increased risk of exacerbations in benzodiazepine users with asthma and a higher likelihood of episodes of pneumonia and related mortality.[9](#hsr2116-bib-0009){ref-type="ref"}, [10](#hsr2116-bib-0010){ref-type="ref"} A recent systemic review also highlighted an overall increased risk of all‐cause mortality in benzodiazepine users.[11](#hsr2116-bib-0011){ref-type="ref"} Inappropriate use of benzodiazepines in Australia has been recently reported to lead to high costs of managing adverse events in residential aged care facilities.[12](#hsr2116-bib-0012){ref-type="ref"} In light of the well‐established side effect profile of benzodiazepines, prescribing guidelines do not recommend their prolonged use. The Royal Australian College of General Practitioners (RACGP) recommends that benzodiazepines should not be prescribed for longer than 4 weeks.[13](#hsr2116-bib-0013){ref-type="ref"} For patients requiring ongoing treatment, behavioural therapies such as cognitive behavioural therapy offer a promising alternative to the benzodiazepine for several conditions. For example, mounting evidence suggests that behavioural treatments produce comparable efficacy with benzodiazepines and have a longer‐lasting effect in patients with insomnia.[14](#hsr2116-bib-0014){ref-type="ref"}, [15](#hsr2116-bib-0015){ref-type="ref"}, [16](#hsr2116-bib-0016){ref-type="ref"} Similarly, research evidence highlights better or equivalent efficacy profiles for behavioural therapies over benzodiazepines for managing anxiety disorder, panic disorder, and dysthymia.[17](#hsr2116-bib-0017){ref-type="ref"} The benefits of de‐prescribing benzodiazepines have been highlighted in several studies. For example, in elderly nursing home residents, benzodiazepine withdrawal significantly improved memory and cognitive functioning compared with those who continued to take benzodiazepines; withdrawal did not give rise to anxiety, agitation, or sleeplessness.[18](#hsr2116-bib-0018){ref-type="ref"} Health care utilization and hospital admission costs resulting from traffic accidents and falls attributable to benzodiazepine use can be reduced through successful discontinuation[19](#hsr2116-bib-0019){ref-type="ref"}; thus, benzodiazepine discontinuation can also have an economic benefit. Despite the prescribing guidelines, the listed adverse effects of prolonged benzodiazepine use and robust evidence supporting behavioural therapies over benzodiazepines, the long‐term use of benzodiazepines remains high. While the pattern of benzodiazepine prescribing varies globally, prolonged use of benzodiazepines is a common phenomenon in the United Kingdom, Europe, and North America.[20](#hsr2116-bib-0020){ref-type="ref"} A US study reported that in 2008, approximately 5.2% of US adults (18‐80 years) had used benzodiazepines.[21](#hsr2116-bib-0021){ref-type="ref"} Reports comparing data on benzodiazepine use from the US National Health and Nutrition Examination Survey (NHANES) between 1999 and 2014 highlight significantly increased use (2.0% of respondents in 1999‐2000 to 4.2% in 2013‐2014), mostly driven by medium to long‐term users.[22](#hsr2116-bib-0022){ref-type="ref"} Although there has been a modest decline in the volume of benzodiazepine prescriptions dispensed annually, overall, there is still a high level of long‐term benzodiazepine use in Australia.[23](#hsr2116-bib-0023){ref-type="ref"}, [24](#hsr2116-bib-0024){ref-type="ref"}, [25](#hsr2116-bib-0025){ref-type="ref"} For example, in the case of insomnia, almost 80% of patient presentations result in a prescription for benzodiazepine derivatives (such as temazepam, oxazepam, diazepam, and nitrazepam), and this figure has remained stable over the past 10 years.[26](#hsr2116-bib-0026){ref-type="ref"}, [27](#hsr2116-bib-0027){ref-type="ref"} Both patient‐ and prescriber‐related factors appear to be linked with prolonged benzodiazepine use. Prescribers\' perceptions and attitudes have been reported to be a key factor leading to prolonged benzodiazepine use.[28](#hsr2116-bib-0028){ref-type="ref"} Recently, an Australian study highlighted that physicians often believe that patients taking benzodiazepines are unlikely to be willing to withdraw their medication and, thus, renew prescriptions without offering discontinuation or withdrawal plans.[29](#hsr2116-bib-0029){ref-type="ref"} Individual patient factors can also affect the length of benzodiazepine use; data indicate that being older, lonely, less educated, as well as having a poorer mental health profile and lower perceived general health status are associated with prolonged benzodiazepine use.[30](#hsr2116-bib-0030){ref-type="ref"}, [31](#hsr2116-bib-0031){ref-type="ref"} Other patient‐related factors that can influence ongoing use of benzodiazepines include beliefs and attitudes of the users towards their medication.[32](#hsr2116-bib-0032){ref-type="ref"} This has been proposed based on the well‐known Health Belief Model (HBM), which suggests that patients\' beliefs about their health issues, perceived benefits of and barriers to action, and self‐efficacy explain engagement in health‐promoting behaviours while the actual action is triggered by cues.[33](#hsr2116-bib-0033){ref-type="ref"} In fact, instruments such as the Beliefs about Medicines Questionnaire‐specific version (BMQ‐specific) have been designed and validated to assess patients\' beliefs and attitudes about their medications.[34](#hsr2116-bib-0034){ref-type="ref"} The BMQ‐specific consists of two 5‐item scales themed as (1) *necessity* and (2) *concerns*. While the necessity theme assesses individuals\' beliefs about the necessity of using their medication, the concerns theme evaluates their concerns about the medication (eg, side effects, fear of dependence, and among others). Thus, in the case of benzodiazepine use, it may be hypothesised that the balance between the concerns about the risk related to continued use of benzodiazepines versus the beliefs about the necessity of the medication may dictate a patients\' past, current, and future decisions related to their medications, eg, attempting withdrawal, seeking safer alternatives, or continuing use. Gauging the patients\' position on these opposing belief sets (necessity vs concerns) can allow health professionals to employ targeted information provision or counselling to enhance effective withdrawal. Where medication discontinuation is desirable, based on the reasoning behind the BMQ‐specific, beliefs that foster medication discontinuation (higher‐risk perception about the medication and a lesser perceived necessity for use) could serve as a triggering point at which patients can be empowered and pragmatic strategies offered to facilitate withdrawal. In support of this notion, a qualitative study in patients with anxiety indicated that strong beliefs around the necessity of using benzodiazepines and a lower level of concern about long‐term use were associated with resistance to benzodiazepine discontinuation.[35](#hsr2116-bib-0035){ref-type="ref"} Similarly, another qualitative study reported that individuals with higher concerns about the risk of taking benzodiazepines were more likely to attempt ceasing the medication of their own volition and were often more interested in trying behavioural interventions.[36](#hsr2116-bib-0036){ref-type="ref"} Exploratory work mapping such beliefs about benzodiazepines and intention to continue use is clearly required for successful discontinuation trials. Although there has been considerable research to characterize such individual sociodemographic and belief factors, there are, to date, few real‐life studies available on patients\' perceptions around benzodiazepine use and withdrawal. Minimal attention has been paid to the complexity of factors affecting the decision making involved in withdrawing benzodiazepines. Successful and sustained withdrawal behaviours require a prior intention, and past behaviour may contribute to this future intention.[37](#hsr2116-bib-0037){ref-type="ref"} In most research reporting trials of benzodiazepine weaning off, the patients\' willingness to withdraw benzodiazepines and intention or readiness to adopt alternative therapies are assumed but not explored.[38](#hsr2116-bib-0038){ref-type="ref"}, [39](#hsr2116-bib-0039){ref-type="ref"}, [40](#hsr2116-bib-0040){ref-type="ref"} It is not surprising that in many of these reported trials, benzodiazepine discontinuation rates remain less than 65%, with low‐response and high‐dropout rates.[38](#hsr2116-bib-0038){ref-type="ref"}, [39](#hsr2116-bib-0039){ref-type="ref"}, [40](#hsr2116-bib-0040){ref-type="ref"} Patients\' willingness to stop the medication and try behavioural therapies might be a key factor that affects successful discontinuation. Therefore, the present study primarily aimed to investigate the association of participants\' sociodemographic variables and beliefs about the benzodiazepine, with their benzodiazepine use behaviours, including ***past*** (previous benzodiazepine withdrawal attempts), ***current*** (long‐term benzodiazepine use, ie, using benzodiazepines for at least 1 year), as well as ***future*** behaviours (willingness to trial behavioural substitutes in the future). Additionally, the study aimed to explore the patients\' source preference for information about alternative behavioural therapies. The findings of this study will potentially inform effective, patient‐centred, and evidence‐based interventions for reducing long‐term benzodiazepine use and disseminating behavioural therapies with greater scope and sustainability. 2. METHODS {#hsr2116-sec-0006} ========== 2.1. Study design {#hsr2116-sec-0007} ----------------- Given that this study aimed to explore real‐life behaviour, a point of purchase survey of benzodiazepine consumers was used. This method allows researchers to study consumer behaviour for informing interventions and policy development.[41](#hsr2116-bib-0041){ref-type="ref"}, [42](#hsr2116-bib-0042){ref-type="ref"} The survey questionnaire was developed by reviewing relevant literature,[35](#hsr2116-bib-0035){ref-type="ref"}, [43](#hsr2116-bib-0043){ref-type="ref"}, [44](#hsr2116-bib-0044){ref-type="ref"} and the survey items included questions related to participants\' demographic characteristics as well as their perspectives about the chronic use of benzodiazepines and alternative therapies. The developed questionnaire was reviewed by psychology, pharmacy practice, and sleep researchers for relevance and wording of the questionnaire items. A validated 10‐item BMQ‐specific was also used to assess participants\' personal views about their benzodiazepines (Figure [1](#hsr2116-fig-0001){ref-type="fig"}).[34](#hsr2116-bib-0034){ref-type="ref"} Figure [2](#hsr2116-fig-0002){ref-type="fig"} outlines the diagrammatic representation and flow of questions used in the survey. This study was approved by The University of Sydney Human Research Ethics Committee (HREC: 2014/1020). ![Beliefs about Medicines Questionnaire‐specific (BMQ‐specific)[34](#hsr2116-bib-0034){ref-type="ref"} questionnaire items and scoring](HSR2-2-e116-g001){#hsr2116-fig-0001} ![Diagrammatic representation and flow of questions](HSR2-2-e116-g002){#hsr2116-fig-0002} 2.2. Participants {#hsr2116-sec-0008} ----------------- Pharmacies throughout the Australian state of New South Wales (NSW) were invited to participate utilizing a convenience sampling approach (ie, pharmacies known to the research team). The surveys were conducted from November 2016 to July 2017. Consent for a researcher (FTNS) to be present in a pharmacy was obtained from pharmacy owners. Potential participants included adult (18 years old and above) patients who were supplied benzodiazepines upon prescription on the day of the survey. The Anatomical Therapeutic Chemical (ATC) Classification System[45](#hsr2116-bib-0045){ref-type="ref"} was used for the classification of drugs of interest, ie, N03AE (antiepileptics, benzodiazepine derivatives), N05BA (anxiolytics, benzodiazepine derivatives), and N05CD (hypnotics, benzodiazepine derivatives). N05CF (benzodiazepine‐related drugs, Z‐drugs) were not included in this study. After providing informed consent, participants filled out the survey questionnaire (participants had the option to ask questions to the pharmacist or research team member for unclear items), placed the completed survey in a sealable prestamped envelope, and handed this over to the research team member (FTNS) or mailed the completed survey back to the researchers. Participants were given the option to complete the survey questionnaire either at the pharmacy or at home. The time that it would take participants to complete the survey was tested by the researchers and estimated to be between 15 and 20 minutes. 2.3. Analysis {#hsr2116-sec-0009} ------------- Completed survey questionnaires were assigned a code before initiating the analysis. Data were entered into the IBM SPSS Statistics package for Windows, Version 22.0 (Released 2013, Armonk, New York: IBM Corp), and entered data were checked for normality using the Kolmogorov‐Smirnov (K‐S) test[46](#hsr2116-bib-0046){ref-type="ref"} as well as through visual inspection of histograms.[47](#hsr2116-bib-0047){ref-type="ref"} Descriptive analyses were conducted to examine the demographic characteristics of participants. Correlation coefficients (Spearman\'s correlation coefficient or Phi coefficient for two binary variables) were used to describe (1) associations between current long‐term benzodiazepine use (using benzodiazepines for at least 1 year) and the following variables: age, sex, level of education, benzodiazepines being used, length of action of the benzodiazepine, and reason for taking the benzodiazepine; (2) associations between the BMQ score (concerns and necessity themes) and long‐term benzodiazepine use (current behaviours), benzodiazepine withdrawal attempt (past behaviours), and preference for behavioural therapies (future behaviours); and (3) associations between past, current, and future intended behaviours. Finally, binary logistic regression was conducted to determine whether past benzodiazepine withdrawal attempts and future preference for behavioural therapies differed with demographic or beliefs‐related variables that were significant in the correlation analysis or previous literature.[48](#hsr2116-bib-0048){ref-type="ref"}, [49](#hsr2116-bib-0049){ref-type="ref"}, [50](#hsr2116-bib-0050){ref-type="ref"}, [51](#hsr2116-bib-0051){ref-type="ref"} All tests were two‐sided with a significance level of 0.05. 3. RESULTS {#hsr2116-sec-0010} ========== The results are outlined with reference to our study\'s stated aims; these included exploring the association of participant\'s benzodiazepine usage behaviours with their sociodemographic characteristics and medication‐related beliefs. A secondary aim of the study was to confirm participants\' preferences for information sources on alternative behavioural techniques. Accordingly, in the results section, firstly participants\' demographics and then their scores on the BMQ‐specific questionnaire[34](#hsr2116-bib-0034){ref-type="ref"} are presented. This is followed by presenting associations between the sociodemographics and BMQ scores with participants\' benzodiazepine usage behaviours, which are presented in sequence: ***past** (previous withdrawal attempt)*, ***current** (long‐term use of benzodiazepine),* and ***future*** *(intention to try behavioural alternatives)* behaviours. Finally, participants\' preferred sources of information for behavioural therapies are descriptively reported. A total of 75 participants (67% female) out of 107 approached (70% response rate) were recruited for this study from 12 different pharmacies across NSW. Of these 12 pharmacies, 10 were medium‐sized (150‐350 m^2^ floor space) and two were large‐sized (350‐500 m^2^ floor space) pharmacies; eight were independently owned; 10 were from metropolitan, and two were from regional areas. All the participants completed the survey questionnaire at the pharmacy, even though the option to complete at home and mail back was available. The mean (±SD) age of the participants was 54.3 (±16.7), with a range of 23 to 86 years. Seventy‐one percent of the participants had at least high school level education. Sixty‐seven percent of the participants had been taking benzodiazepines for at least 1 year. The reported reasons for benzodiazepine use were sleep disorders (59%), psychiatric disorders (31%), pain management (7%), and other problems (4%). For the BMQ scale, the mean score (±SD) calculated for the necessity theme was 17.7 (±5.6), and the concerns theme was 13.6 (±4.7). While 65% of the sample had strong beliefs in the necessity of their benzodiazepine use as indicated by a BMQ‐specific score of greater than 15, only 40% reported strong concerns about the potential adverse effects of the medication (BMQ‐specific scores greater than 15). Descriptive statistics for the participants are shown in Table [1](#hsr2116-tbl-0001){ref-type="table"}. ###### Descriptive statistics for demographic characteristics of the participants (*n* = 75) Demographic Variables Number (%) ----------------------------------------------------- ------------ Females 50 (67) Level of education No education 1 (1) Primary school education 21 (28) High school education 23 (31) Vocational education 11 (15) Tertiary education (graduate or postgraduate level) 19 (25) Benzodiazepines purchased on the day of the survey Diazepam 43 (57) Temazepam 28 (37) Oxazepam 4 (5) Using benzodiazepines for at least 1 year 50 (67) Reason for benzodiazepine use Using benzodiazepine for sleep disorders 44 (59) Using benzodiazepine for psychiatric disorders 23 (31) Using benzodiazepine for pain 5 (7) Using benzodiazepine for other problems 3 (4) 3.1. *Past* benzodiazepine use behaviours (withdrawal attempts) {#hsr2116-sec-0011} --------------------------------------------------------------- In the sample, 47% (*n* = 35) of the participants had attempted to withdraw the benzodiazepine, and in these cases, sudden cessation of the benzodiazepine was the most commonly reported strategy applied to withdraw the medication. The reported reasons for attempting benzodiazepine withdrawal included concerns about health (49%), fear of developing dependence (40%), doctors\' suggestion (37%), and other reasons (17%). Details about the reasons and strategies for withdrawing the benzodiazepine are presented in Table [2](#hsr2116-tbl-0002){ref-type="table"}. ###### Reasons and strategies for attempting benzodiazepine withdrawal (*n* = 35) Reasons and Strategies for Attempting to Discontinue Benzodiazepines Number (%) ---------------------------------------------------------------------- ------------ Reasons for attempted benzodiazepine withdrawal Concerns about health 17 (49) Fear of developing dependence 14 (40) Doctors\' suggestion 13 (37) Other reason 6 (17) Strategies applied to withdraw benzodiazepines Stopping the benzodiazepine 15 (20) Reducing the dose 5 (7) Exercise 3 (4) Taking alcohol 2 (3) Trying sleep hygiene 2 (3) Using a herbal product 2 (3) Changing lifestyle 2 (3) Trying an antidepressant 1 (1) Trying behavioural strategies 1 (1) Following pharmacists\' advice 1 (1) Taking the benzodiazepine when needed 1 (1) Reasons for attempted benzodiazepine withdrawal were derived by having participants choose from multiple choice options presented to them with the questions. Strategies used for withdrawing the benzodiazepines were derived by having participants write open‐ended answers in space provided after the questions. The variables presented in the table are thematically collated. In a binary logistic regression analysis, none of the variables evaluated (age, sex, level of education, benzodiazepines being used, length of action of the benzodiazepine, and reason for taking the benzodiazepine) were significantly associated with a benzodiazepine withdrawal attempt. There was no significant correlation between the BMQ themes and past withdrawal attempts. 3.2. *Current* long‐term benzodiazepine use {#hsr2116-sec-0012} ------------------------------------------- There was a moderately strong negative correlation (*r* ~s~ \[75\] = −0.390, *p* = 0.001) between current chronic benzodiazepine use and participants\' level of education. The correlation between current long‐term use of benzodiazepines in the sample with either of the BMQ‐specific themes was only moderately strong. There was a positive (*r* ~s~ \[75\] = 0.316, *p* = 0.006) correlation of the scores from the BMQ‐specific theme around necessity and a negative (*r* ~s~ \[75\] = −0.338, *p* = 0.003) correlation of the scores from the concerns theme with current long‐term use of benzodiazepines. Details about the correlations between current long‐term benzodiazepine use, level of education, BMQ themes as well as past and future behaviours are presented in Table [3](#hsr2116-tbl-0003){ref-type="table"}. ###### Correlation coefficients and *p* values between current long‐term use, past use behaviour, future use behaviour, BMQ subscales, and sociodemographics Dependent Variable Independent Variable *N* Correlation Coefficient *P* Value ------------------------------------------------------------------------------------------ ---------------------- -------- ------------------------- ----------- ***Past benzodiazepine use behaviours (withdrawal attempt)*** Level of education 75 0.141 0.228 Concerns score from BMQ‐specific 75 0.166 0.155 Necessity score from BMQ‐specific 75 −0.016 0.891 ***Current*** benzodiazepine use behaviour (use \>1 year) 75 −0.076 0.513 ***Future*** benzodiazepine use behaviour 75 0.078 0.506 ***Current long‐term benzodiazepine use (use \> 1 year)*** Level of education 75 −0.390 0.001 Concerns score from BMQ‐specific 75 −0.338 0.003 Necessity score from BMQ‐specific 75 0.316 0.006 ***Future*** benzodiazepine use behaviour 75 −0.236 0.041 ***Future benzodiazepine use behaviours (willingness to try behavioural alternatives)*** Level of education 75 0.220 0.058 Concerns score from BMQ‐specific 75 0.297 0.010 Necessity score from BMQ‐specific 75 −0.127 0.278 Abbreviation: BMQ‐specific, Beliefs about Medicines Questionnaire‐specific. We observed no significant correlation between participants\' age, sex, benzodiazepines being used, duration of action of the benzodiazepine, or their reason for taking the benzodiazepine with current long‐term benzodiazepine use. 3.3. *Future* benzodiazepine use behaviours {#hsr2116-sec-0013} ------------------------------------------- In the sample, about two thirds (*n* = 48) of the participants were not willing to consider behavioural therapies as a substitution for their benzodiazepines (only 27/75 participants were interested in behavioural therapies). In these cases, participants\' lack of confidence about the efficacy of behavioural therapies and their lack of time to try behavioural therapies were the main two reasons for not considering behavioural therapies. The reported reasons for not considering behavioural therapies are highlighted in Table [4](#hsr2116-tbl-0004){ref-type="table"}. ###### Reported reasons for not preferring behavioural therapies (*n* = 48) Reasons for Not Preferring Behavioural Therapies Number (%) ----------------------------------------------------------------------------------------- ------------ Lack of confidence about behavioural therapies 18 (38) Lack of time 16 (33) Dependency on sleeping pill 15 (31) Participants\' perception that behavioural therapies take longer time to produce effect 11 (23) Participants\' perception that seeing a psychologist is costly 9 (19) Other reason 5 (10) Reasons for not preferring behavioural therapies were derived by having participants choose from multiple choice options presented to them with the questions. We observed no statistically significant association between past benzodiazepine use behaviours (withdrawal attempts) and the future intentions of trialling behavioural therapies (Table [3](#hsr2116-tbl-0003){ref-type="table"}). There was a weak (*r* ~s~ \[75\] = 0.297, *p* = 0.010) relationship between the BMQ concerns theme and future preference for behavioural therapies (Table [3](#hsr2116-tbl-0003){ref-type="table"}). Interestingly, binary logistic regression revealed that participants using benzodiazepines for sleep disorders were more likely to be in the "interested in behavioural therapies" group (odds ratio \[OR\] = 3.138; 95% confidence interval \[CI\], 1.037‐9.492) (Table [5](#hsr2116-tbl-0005){ref-type="table"}). Indeed, of the 27 participants who were interested to consider behavioural therapies, 20 participants were those who reported using the benzodiazepine for managing sleep disorders. ###### Logistic regression model predicting preference for behavioural therapies based on demographic variables Factor OR 95% CI *P* Value ------------------------------------------- ------- --------------- ----------- Age 0.979 (0.947‐1.011) 0.199 Sex 0.711 (0.245‐2.064) 0.530 Using benzodiazepines for sleep 3.138 (1.037‐9.492) 0.043 Using benzodiazepines for at least 1 year 0.496 (0.169‐1.456) 0.202 The dependent variable in this analysis is future preference for behavioural therapies coded as 0 = *not interested in behavioural therapies* and 1 = *interested in behavioural therapies* (target group). Abbreviations: CI, confidence interval; OR: odds ratio. 3.4. Source preference for information about alternative behavioural therapies {#hsr2116-sec-0014} ------------------------------------------------------------------------------ Doctors were rated as the most preferred source of information for learning more about behavioural therapies (76%, *n* = 57). Following doctors, most of the participants preferred pharmacists as the second (53%, *n* = 40), internet as the third (41%, *n* = 31), and psychologists as the fourth choice (37%, *n* = 28) to consult about behavioural therapies. 4. DISCUSSION {#hsr2116-sec-0015} ============= To our knowledge, this is the first study exploring the actual beliefs of benzodiazepine users about their medication, their willingness to withdraw or discontinue the benzodiazepine, and future preferences for alternative behavioural therapies. The present study highlights the divergence between Australian benzodiazepine prescribing guidelines and current practice in Australian primary care, where two thirds of our primary care‐based sample participants reported long‐term use (ie, using benzodiazepines for at least 1 year). A few participants had tried different strategies to withdraw from benzodiazepines. Many of these strategies (such as sudden cessation of the benzodiazepine and consuming alcohol and herbal products instead of the medication) were inappropriate. Participants\' lower level of education and their beliefs (low concerns and high necessity) appeared to contribute to the current high rate of long‐term benzodiazepine use in this Australian sample. Participants\' beliefs appeared not to be associated with their past withdrawal attempts; however, the item used in our questionnaire simply probed whether participants had made any attempt to withdraw their benzodiazepine, not the actual number of attempts made, which may have been a variable associated with the patients concerns about use. We observed, however, an association between concerns about use and future intention to try behavioural alternatives. Using the benzodiazepine for sleep‐related problems was a predictor for willingness to consider alternative behavioural therapies. Only a third of participants expressed an interest in considering behavioural therapies as an alternative to the use of benzodiazepines. Doctors and pharmacists were the two main health professionals of choice with whom benzodiazepine users wanted to discuss potential behavioural therapies. Therefore, it is clear that a collaborative effort in primary care between doctors and pharmacists may help to ensure quality use of benzodiazepines. Based on the study findings, strategies for shifting from ongoing benzodiazepine use to considering behavioural therapies should include counselling patients about the balance between the necessity of using benzodiazepines and the risks associated with ongoing use in the primary care settings. The observed negative association between the participants\' level of education and the current chronic use of benzodiazepines suggests that individuals with a lower level of education perhaps require particular review and targeted information provision. While past withdrawal attempts do indicate previous positive inclination to cease benzodiazepine use, failure at these attempts perhaps reinforces the necessity of continuing the medication as well as reduces the user\'s perception of their ability to be able to cease use. Therefore, based on theories such as those around planned behaviour[52](#hsr2116-bib-0052){ref-type="ref"}, [53](#hsr2116-bib-0053){ref-type="ref"} as well as our study results, counselling directed at current use and future intention to use is perhaps a more judicious use of clinical time when attempting de‐prescribing of benzodiazepines, rather than focussing on past withdrawal attempts. The observed positive relationship of the necessity theme and the negative relationship of the concerns theme with actual long‐term benzodiazepine use (*current* behaviour) highlights that the decision to continue benzodiazepines reflected the balance between these two opposing belief sets. However, we observed that future intentions around continued benzodiazepine use (eg, voiced preference for behavioural therapies in the *future*) were only related with the concerns theme, highlighting that if targeted information provision can help build realistic concerns about ongoing use, benzodiazepine users may be swayed to discontinue and switch to behavioural alternatives in the future. The results of this study, therefore, suggest that the BMQ could be a useful instrument to elicit medication beliefs and increase health care professionals\' understanding of patients\' attitudes towards the medication, which can, in turn, potentially facilitate the de‐prescribing process. Martin et al describe the use of the BMQ‐specific questionnaire to compare patients\' beliefs about their benzodiazepines before and after an educational program designed to facilitate decisions about discontinuing benzodiazepines; they report a significantly lower‐necessity score and higher‐concerns score after the intervention.[54](#hsr2116-bib-0054){ref-type="ref"} In our study, the results indicate that concerns about the medication are related to both lower current long‐term use and higher preference for future behavioural alternatives. In fact, health concerns and the fear of being addicted were the most commonly reported reasons for a benzodiazepine withdrawal attempt, as shown in other studies as well.[55](#hsr2116-bib-0055){ref-type="ref"} Therefore, discussing concerns in an individualised manner to the patient may be effective in helping patients decide to discontinue long‐term benzodiazepine use. Since there is considerable evidence around applying patients\' beliefs about medication to explore or improve their adherence to a set treatment plan,[56](#hsr2116-bib-0056){ref-type="ref"}, [57](#hsr2116-bib-0057){ref-type="ref"} it can be suggested that patients\' beliefs about their benzodiazepine can also be used to predict adherence to a set treatment withdrawal plan. Sudden cessation of benzodiazepines was the most commonly used strategy for withdrawing the benzodiazepine, and this approach is a distinct departure from clinical guidelines recommending gradual dose reduction for patients on benzodiazepines for longer than 3 to 4 weeks to minimise or avoid withdrawal symptoms.[58](#hsr2116-bib-0058){ref-type="ref"}, [59](#hsr2116-bib-0059){ref-type="ref"} Sudden cessation of benzodiazepines in long‐term users may result in life‐threatening seizures.[58](#hsr2116-bib-0058){ref-type="ref"} These disparities between the guidelines and current withdrawal strategies may reflect that either participant opted to self‐withdraw without health professional advice, or participants possibly received only ad‐hoc advice from their GPs (or primary care physicians or family physicians) or dispensing pharmacists to withdraw the benzodiazepine. In the latter instance, a clear step‐by‐step plan may not have been offered during the GP or pharmacist consultation, given that these health professionals would be well aware of the pharmacological consequences of sudden cessation and would be able to refer to published guidelines on how to help patients discontinue benzodiazepines in a tapered manner.[60](#hsr2116-bib-0060){ref-type="ref"}, [61](#hsr2116-bib-0061){ref-type="ref"}, [62](#hsr2116-bib-0062){ref-type="ref"} Given that even minimal interventions by primary health care professionals can be effective,[63](#hsr2116-bib-0063){ref-type="ref"} primary care professionals should be upskilled and upresourced so as to be able to provide concrete direction when recommending discontinuation of benzodiazepines. A meta‐analysis suggests that gradual dose reduction combined with psychological interventions has better outcomes compared with a gradual dose reduction alone.[64](#hsr2116-bib-0064){ref-type="ref"} Appropriate de‐prescribing plans, adjunctive psychotherapy, and careful monitoring (eg, using withdrawal assessment tools) should be key elements in the benzodiazepine discontinuation process initiated by GPs, who are the main prescribers of benzodiazepines.[58](#hsr2116-bib-0058){ref-type="ref"}, [65](#hsr2116-bib-0065){ref-type="ref"}, [66](#hsr2116-bib-0066){ref-type="ref"} Evidence‐based pragmatic guidelines for de‐prescribing benzodiazepines and practice toolkits may be required to facilitate this. A majority of the participants were not interested in behavioural therapies, contrary to previous studies generally demonstrating that patients favour non‐pharmacological therapies over pharmacotherapies.[67](#hsr2116-bib-0067){ref-type="ref"}, [68](#hsr2116-bib-0068){ref-type="ref"} This inconsistency relative to other studies may be due to small sample size and selection bias in our study. The inconsistency might also be related to the fact that the participants may not have been experienced or informed about behavioural treatments earlier.[67](#hsr2116-bib-0067){ref-type="ref"}, [69](#hsr2116-bib-0069){ref-type="ref"} Greater public awareness about the efficacy of behavioural therapies may be a prudent step for addressing this issue, eg, through public health campaigns given that benzodiazepines have been implicated in vehicle accidents.[70](#hsr2116-bib-0070){ref-type="ref"}, [71](#hsr2116-bib-0071){ref-type="ref"} Another strategy to improve the uptake of behavioural therapies could be to introduce internet‐delivered behavioural therapy services. Studies suggest that internet‐based behavioural therapies have the potential to be time‐efficient and cost‐effective as well as quite acceptable for patients.[72](#hsr2116-bib-0072){ref-type="ref"}, [73](#hsr2116-bib-0073){ref-type="ref"} Interestingly, participants with sleep problems in this study were more likely to prefer behavioural treatment, which supports and further extends previous research.[74](#hsr2116-bib-0074){ref-type="ref"}, [75](#hsr2116-bib-0075){ref-type="ref"} These patients can be specifically targeted for behavioural intervention in primary care settings. Since a majority of the participants identified doctors as their first choice for learning more about behavioural therapies, GPs need to take the initiative to make patients familiar with the behavioural therapies. However, physicians cite time paucity, high workload, lack of skills in behavioural treatment, and limited accessibility to behavioural therapy providers as the barriers to reduce benzodiazepine use and introduce behavioural interventions in general practice setting.[76](#hsr2116-bib-0076){ref-type="ref"}, [77](#hsr2116-bib-0077){ref-type="ref"} Introducing other health care professionals co‐located within GP practice centres to support GPs for educating patients about behavioural therapies may help to overcome some of these issues.[29](#hsr2116-bib-0029){ref-type="ref"} In a qualitative Australian study, GPs acknowledged the role of other health professionals in facilitating successful benzodiazepine cessation.[44](#hsr2116-bib-0044){ref-type="ref"} In the current study, following GPs, pharmacists were the second preferred source of information for behavioural therapies. Thus, a collaborative approach with pharmacists could be an option where they can support GPs in withdrawing benzodiazepines and providing behavioural therapies.[78](#hsr2116-bib-0078){ref-type="ref"} Community pharmacists also have the opportunity to counsel patients at the point of purchase; in the case of patients with repeat prescriptions, community pharmacists see benzodiazepine users even more frequently. At these opportunities, pharmacists can discuss the potential risks of long‐term ongoing use, provide information about alternatives, and refer patients to their doctor for a withdrawal or discontinuation plan. Once patients have a plan, in an interdisciplinary model, pharmacists should be apprised of the plan (which could be written out as a prescription) for further facilitating patient adherence to the plan with supportive advice. Indeed, data suggest that community pharmacists do frequently encounter chronic benzodiazepine use in practice, but fewer than half converse with the patient about ongoing use.[79](#hsr2116-bib-0079){ref-type="ref"}, [80](#hsr2116-bib-0080){ref-type="ref"} On the other hand, a recent study in Australia highlighted that pharmacists could be successfully trained to deliver behavioural interventions with positive sleep health outcomes in patients with insomnia,[81](#hsr2116-bib-0081){ref-type="ref"} suggesting the benefit of developing pharmacist roles in this area. Despite the potential to play key roles in benzodiazepine deprescribing,[82](#hsr2116-bib-0082){ref-type="ref"}, [83](#hsr2116-bib-0083){ref-type="ref"} pharmacists, especially community pharmacists, are currently underutilised.[79](#hsr2116-bib-0079){ref-type="ref"} 4.1. Strengths and limitations {#hsr2116-sec-0016} ------------------------------ The small sample size may be a limitation of this study. For moderate strength correlations (eg, 0.30‐0.40), a sample of 75 may be sufficient to demonstrate significance at a 0.05 significance level with 75% power.[84](#hsr2116-bib-0084){ref-type="ref"} However, the study may have been underpowered to demonstrate lower‐strength correlation at the same significance level and power. There is a possibility of selection bias, as individuals who have successfully withdrawn their benzodiazepines were not recruited for this study. Further, the questions used in this study to explore participants\' willingness to withdraw and preferences for behavioural therapies were customised for this study. However, the questionnaire was developed by reviewing the previous literature and was face‐validated by psychology, sleep, and pharmacy practice researchers. Given this part of the questionnaire measured a set of diverse issues (past behaviour of withdrawing, actual daily use of benzodiazepine, and future intentions to try alternatives to benzodiazepine use), internal consistency was not measured, as behaviour and intention constructs are in themselves quite different and these questions also had different response items. Past behaviours appeared less important based on our data, and current behaviours are verifiable through pharmacy prescription records. Therefore, it may be suggested that a fuller set of items with comparable response sets around intended future behaviours with respect to benzodiazepines should be constructed and tested psychometrically. This would be useful for future research and is certainly a limitation in our study. The questionnaire did not ask explicitly about participants\' readiness or current intention to withdraw from the benzodiazepine. Exploring participants\' belief was limited to BMQ‐specific rather than using the more comprehensive exploration of belief sets, for example, using variables included in models such as the HBM. Lastly, there is a possibility for response bias (eg, strong beliefs about the necessity of benzodiazepines, low concerns, and social desirability). 5. CONCLUSION {#hsr2116-sec-0017} ============= Specific characteristics of benzodiazepine users and their beliefs about taking the benzodiazepine can inform the provision of individualised interventions by GPs to help switch patients currently on long‐term benzodiazepines to alternative behavioural therapies. This study highlights the significance of informing patients about the balance between the necessity of use versus the concerns that long‐term use of benzodiazepines raises. Given that GPs are very time pressured, introducing practice pharmacists within general practices could be time efficient and enhance GPs\' capacity for providing behavioural therapies, and this area of collaborative care in de‐prescribing unwarranted use of high‐risk medications warrants future research. FUNDING INFORMATION {#hsr2116-sec-0020} =================== This research did not receive any specific grant from funding agencies in the public commercial or not‐for‐profit sectors. However, the authors acknowledge the PhD scholarship support received by the first author from NeuroSleep, a Centre of Research Excellence supported by a grant from the Australian National Health and Medical Research Council. The funding sources were not involved in study design; collection, analysis, or interpretation of data; writing of the report; or the decision to submit the report for publication. CONFLICTS OF INTEREST {#hsr2116-sec-0019} ===================== None. AUTHOR CONTRIBUTIONS {#hsr2116-sec-0021} ==================== Conceptualization: Fatema‐Tun‐Naher Sake, Keith Wong, Bandana Saini Formal Analysis: Fatema‐Tun‐Naher Sake, Keith Wong, Bandana Saini Writing (original draft): Fatema‐Tun‐Naher Sake Writing (review and editing): Fatema‐Tun‐Naher Sake, Keith Wong, Delwyn Bartlett, Bandana Saini All authors have read and approved the final version of the manuscript. Fatema‐Tun‐Naher Sake had full access to all of the data in this study and takes complete responsibility for the integrity of the data and the accuracy of the data analysis. All participating benzodiazepine users are acknowledged for their valuable time in completing the survey questionnaire.
{ "pile_set_name": "PubMed Central" }
MY 600 LB LIFE Gideon Yeakley shines with a brand new body–and a new baby girl Gideon Yeakley came to My 600 Lb Life in desperate straits. A guilt-wracked childhood, stemming from having to choose between his divorcing parents as a boy, led him to a weight of over 400 pounds at his high school graduation. The emotional eating that defined Gideon’s life only got worse following his mother’s death a few years later; by the time the My 600 Lb Life Giden Yeakley episode aired, Gideon weighed about 650 pounds. As viewers will recall, Gideon actually sunk into a *worse* depression following his successful bypass surgery: he was having no trouble sticking to his diet, but the greatly reduced caloric intake meant he was too lethargic and withdrawn to go out and about and look for work, as he’d intended to do. The strain on Gideon’s wife Kayleigh, and his seven-year-old son Jonathan, was palpable–and made worse by the fact that the family had uprooted from Oklahoma for the surgery: However, Gideon was down to 429 pounds by the end of the My 600 Lb Life Gideon Yeakley episode–meaning that, despite endless obstacles, he’d managed to lose a truly impressive 221 pounds, or 34% of his initial body weight. Since his episode aired last February, things have only continued to improve for Gideon. For one thing, he’s now small enough around for a child-sized Easter bunny to give him a wrap: In fact, per his last tweet–which was actually over a year ago–Gideon’s weight has continued to fall. At the time, he had lost approximately “half [his] starting weight”–or well over 300 pounds! (We should point out that although the My 600 Lb Life Gideon Yeakley episode listed his starting weight as 650 pounds, Gideon himself said it was actually 640, so there’s a little bit of a discrepancy. Still, it’s an incredible achievement, whether Gideon has lost 320 or 325 pounds!) And you’ve got to figure that Gideon would drop even farther if he chopped off his facial hair. Not that we’re suggesting he do so–Starcasm respects and appreciates a strong beard game: In even more exciting news, we’re happy to confirm that there is a new member of the Yeakley family! This past September, Gideon’s wife Kayleigh gave birth to the couple’s second child, a daughter named Frankie. We couldn’t find an exact birthday for Frankie, but Kayleigh shared this photo of her baby girl on September 27th, so the delivery likely happened sometime at the end of the month: Similarly, here’s a family photo that Kayleigh shared on September 10th. The image is notable for being one of the few Gideon Yeakley before-and-after photos that shows the My 600 Lb Life participant standing and offering a clear perspective on just how much weight he’s lost: Finally, we couldn’t resist this last embed. Here’s Gideon and Kayleigh’s birth announcement, featuring a smiling Jonathan, which they revealed last April: You can revisit the My 600 Lb Life Gideon Yeakley episode here. There’s no word yet on whether Gideon will be featured in the next batch of Where Are They Now? episodes, which currently expected to air in early 2019.
{ "pile_set_name": "Pile-CC" }
Rick Santorum raised eyebrows last week for making claims that he has been making for years, including his criticism of public schools. As the Los Angeles Times reported, Santorum called public schools “anachronistic” and compared them to factories: In his remarks to the Ohio Christian Alliance, however, Santorum went further, seeming to attack the very idea of public education. In the nation’s past, he said, “Most presidents homeschooled their children in the White House.… Parents educated their children because it was their responsibility.” “Yes, the government can help,” he continued, “but the idea that the federal government should be running schools, frankly much less that the state government should be running schools, is anachronistic.” He said it is an artifact of the Industrial Revolution, “when people came off the farms where they did homeschool or had a little neighborhood school, and into these big factories … called public schools.” While industry has evolved, public schools remain stuck in the factory era, he said, “back in the age of Henry Ford. You get what we give you. One color, two models. It wouldn’t work for Henry Ford today, and it won’t work for America today. Santorum has long opposed public education and in his 2005 book It Takes a Family marveled how “so many kids turn out to be fairly normal, considering the weird socialization they get in public schools.” In fact, public schools are consistently in the crosshairs of Religious Right activists, as seen in this anti-public education film made by Truth in Action Ministries: While Santorum is an unapologetic opponent of public schools, or as he calls them, “government-run schools,” he has no problem making taxpayers cover the tab for his homeschooling. While a U.S. Senator, Santorum moved his family to Virginia but still stuck Pennsylvania taxpayers with the bill for his decision to have his children attend a cyber-school:
{ "pile_set_name": "OpenWebText2" }
Acrylamide polymerization: new method for determining the oxygen content in blood. A new principle for determining the oxygen content of 0.1-milliliter blood samples has been developed, based on measurement of the delay in gelation during copolymerization of acrylamide and bisacrylamide initiated by free radicals. The logarithm of this time interval is linearly proportional to the oxygen content of the blood sample over the range 0 to 22 milliliters of oxygen per 100 milliliters of whole blood. Physiological variations of pH and pCO(2) do not affect the sensitivity of the assay.
{ "pile_set_name": "PubMed Abstracts" }
Esau Esau (; , ISO 259-3 ʕeśaw; Ēsaû; ; ‘Īsaw; meaning "hairy" or "rough"), in the Hebrew Bible, is the older son of Isaac. He is mentioned in the Book of Genesis, and by the prophets Obadiah and Malachi. The New Testament alludes to him in the Epistle to the Romans and in the Epistle to the Hebrews. According to the Hebrew Bible, Esau is the progenitor of the Edomites and the elder brother of Jacob, the patriarch of the Israelites. Esau and Jacob were the sons of Isaac and Rebekah, and the grandsons of Abraham and Sarah. Of the twins, Esau was the first to be born with Jacob following, holding his heel. Isaac was sixty years old when the boys were born. Esau, a "man of the field", became a hunter who had "rough" qualities that distinguished him from his twin brother. Among these qualities were his red hair and noticeable hairiness. Jacob was a shy or simple man, depending on the translation of the Hebrew word tam (which also means "relatively perfect man"). Throughout Genesis, Esau is frequently shown as being supplanted by his younger twin, Jacob (Israel). In Genesis Birth Genesis 25:25 narrates Esau's birth, "Now the first came forth red, all over like a hairy garment; and they named him Esau." The meaning of the word esau is disputed. It could be related to the Arabic root ġšw, meaning "to cover". Others have noted the similarity to Arabic ’athaa (عثا) meaning "hirsute". In Hebrew, the word "hairy" (Heb: se’ir) is a wordplay on Seir, the region in which he settled after being 40 years of age. The name Edom is also attributed to Esau, meaning "red" (Heb: `admoni); the same color used to describe Esau's skin tone. Genesis parallels his redness to the "red lentil pottage" that he sold his birthright for. Esau became the progenitor of the Edomites in Seir. Birthright In Genesis, Esau returned to his twin brother Jacob, famished from the fields. He begs Jacob to give him some "red pottage" (a play on his nickname, `Edom, meaning "red".) This refers to his red hair. Jacob offers Esau a bowl of lentil stew in exchange for Esau's birthright ( bəḵōrāh, the right to be recognized as firstborn son with authority over the family), and Esau agrees. Thus Jacob acquires Esau's birthright. This is the origin of the English phrase "for a mess of pottage". In , Jacob uses deception, motivated by his mother Rebecca, to lay claim to his blind father Isaac's blessing that was inherently due to the firstborn, Esau. In , Rebecca is listening while Isaac speaks to his son Esau. When Esau goes to the field to hunt for venison to bring home, Rebekah says to her son Jacob, "Behold, I heard thy father speak to thy brother Esau, saying: 'Bring me venison and prepare a savoury food, that I may eat, and bless thee before the Lord before my death.'" Rebecca then instructs Jacob in an elaborate deception through which Jacob pretends to be Esau, in order to steal from Esau his blessing from Isaac and his inheritance—which in theory Esau had already agreed to give to Jacob. Jacob follows through with the plan to steal his brother's birthright by bringing the meal his father Isaac requested and pretending to be Esau. Jacob pulled off his disguise by covering himself in hairy lamb skin so that when his blind father went to touch him, his smooth skin did not give him away as an imposter of his hairy brother. Jacob successfully received his father Isaac's blessing. As a result, Jacob becomes the spiritual leader of the family after Isaac's death and the heir of the promises of Abraham (). When Esau learns of his brother's thievery, he is livid and begs his father to undo the blessing. Isaac responds to his eldest son's plea by saying that he only had one blessing to give and that he could not reverse the sacred blessing. Esau is furious and vows to kill Jacob (). Once again Rebecca intervenes to save her younger son from being murdered by his elder twin brother, Esau. Therefore, at Rebecca's urging, Jacob flees to a distant land to work for his uncle Laban (). Jacob does not immediately receive his father's inheritance after the impersonation aimed at taking it from Esau. Having fled for his life, Jacob has left the wealth of Isaac's flocks, land and tents in Esau's hands. Jacob is forced to sleep out on the open ground and then work for wages as a servant in Laban's household. Jacob, who had deceived and cheated his brother, is in turn deceived and cheated by his uncle. Jacob asks to marry Laban's daughter Rachel, whom he has met at the well, and Laban agrees, if Jacob will give him seven years of service. Jacob does so, but after the wedding finds that beneath the veil is not Rachel but Leah, Laban's elder daughter. He agrees to work another seven years and Jacob and Rachel are finally wed. However, despite Laban, Jacob eventually becomes so rich as to incite the envy of Laban and Laban's sons. tells of Jacob's and Esau's eventual reconciliation. Jacob sends multiple waves of gifts to Esau as they approach each other, hoping that Esau will spare his life. Esau refuses the gifts, as he is now very wealthy and does not need them. Jacob never apologizes to Esau for his actions; Jacob nevertheless bows down before Esau and insists on his receiving the gifts. Esau shows forgiveness in spite of this bitter conflict. (After this, God confirms his renaming of Jacob as "Israel".) Jacob's deception Genesis Chapter 27 verse 16 of the King James Version Bible: "And she put the skins of the kids of the goats upon his hands and upon the smooth of his neck:" Verse 19: "And Jacob said unto his father, I am Esau thy firstborn; I have done according as thou badest me: arise, I pray thee, sit and eat of my venison, that thy soul may bless me." Verse 22-23: "And Jacob went near unto Isaac his father; and he felt him, and said, The voice is Jacob's voice, but the hands are the hands of Esau. And he discerned him not, because his hands were hairy, as his brother Esau's hands: so he blessed him." Family describes Esau's marriage at the age of forty to two Canaanite women: Judith the daughter of Beeri the Hittite, and Basemath the daughter of Elon the Hittite. This arrangement grieved his parents. Upon seeing that his brother was blessed and that their father rejected Esau's union to Canaanites, Esau went to the house of his uncle Ishmael and married his cousin, Mahalath the daughter of Ishmael, and sister of Nebajoth. Esau's family is again revisited in , this passage names two Canaanite wives; Adah, the daughter of Elon the Hittite, and Aholibamah, the daughter of Anah, daughter of Zibeon the Hivite, and a third: Bashemath, Ishmael's daughter, sister of Nebajoth. Some scholars equate the three wives mentioned in Genesis 26 and 28 with those in Genesis 36. Casting his lot with the Ishmaelites, he was able to drive the Horites out of Mount Seir to settle in that region. According to some views Esau is considered to be the progenitor not only of the Edomites but of the Kenizzites and the Amalekites as well. Esau had five sons: By Adah: Eliphaz By Aholibamah: Jeush, Jaalam, Korah By Bashemath: Reuel Family tree Other references Minor prophet references Esau was also known as Edom, the progenitor of the Edomites who were established to the south of the Israelites. They were an enemy nation of Israel. The minor prophets, such as Obadiah, claim that the Edomites participated in the destruction of the First Temple by Nebuchadnezzar in 587 BC. Exactly how the Edomites participated is not clear. Psalm 137 ("By the waters of Babylon") suggests merely that Edom had encouraged the Babylonians: The Lord is asked to "remember against the Edomites the day of Jerusalem, how they said 'raze it, raze it to its foundations'". But the prophecy of Obadiah insists on the literal "violence done" by Esau "unto your brother Jacob" when the Edomites "entered the gate of my people..., looted his goods..., stood at the parting of the ways to cut off the fugitive,... delivered up his survivors on his day of distress". By the intertestamental period, Edom had replaced Babylon as the nation that actually burned the Temple ("Thou hast also vowed to build thy temple, which the Edomites burned when Judah was laid waste by the Chaldees" ). New Testament references depicts Esau as unspiritual for thoughtlessly throwing away his birthright. states "Jacob I loved, but Esau I hated," based upon although this passage goes on to depict the nations of Israel (Jacob) and Edom (Esau). Rabbinic Jewish sources The Targum Pseudo-Jonathan connects the name Esau to the Hebrew asah, stating, "because he was born fully completed, with hair of the head, beard, teeth, and molars." Other traditional sources connect the word with the Hebrew šāv` () meaning "worthless." Jewish commentaries have shed a negative view on Esau because of his rivalry with Jacob. The Midrash says that during Rebekah's pregnancy whenever she would pass a house of Torah study, Jacob would struggle to come out; whenever she would pass a house of idolatry, Esau would agitate to come out. He is considered to be a rebellious son who kept a double life until he was 15, when he sold his birthright to Jacob. According to the Talmud, the sale of the birthright took place immediately after Abraham died. The Talmudic dating would give both Esau and Jacob an age of 15 at the time. The lentils Jacob was cooking were meant for his father Isaac, because lentils are the traditional mourner's meal for Jews. On that day before returning, in a rage over the death of Abraham, Esau committed five sins; he raped a betrothed young woman, he committed murder (Nimrod), he denied God, he denied the resurrection of the dead, and he spurned his birthright. Haman's lineage is given in the Targum Sheni as follows: "Haman the son of Hammedatha the Agagite, son of Srach, son of Buza, son of Iphlotas, son of Dyosef, son of Dyosim, son of Prome, son of Ma'dei, son of Bla'akan, son of Intimros, son of Haridom, son of Sh'gar, son of Nigar, son of Farmashta, son of Vayezatha, (son of Agag, son of Sumkei,) son of Amalek, son of the concubine of Eliphaz, firstborn son of Esau". According to Rashi, Isaac, when blessing Jacob in Esau's place, smelled the heavenly scent of Gan Eden (Paradise) when Jacob entered his room and, in contrast, perceived Gehenna opening beneath Esau when the latter entered the room, showing him that he had been deceived all along by Esau's show of piety. Death According to the Babylonian Talmud, Esau was killed by Hushim, son of Dan, son of Jacob, because Esau obstructed the burial of Jacob into the cave of Machpelah. When Jacob was brought to be buried in the cave, Esau prevented the burial, claiming he had the right to be buried in the cave; after some negotiation Naphtali was sent to Egypt to retrieve the document stating Esau sold his part in the cave to Jacob. Hushim (who was hard of hearing) did not understand what was going on, and why his grandfather was not being buried, so he asked for an explanation; after being given one he became angry and said: "Is my grandfather to lie there in contempt until Naphtali returns from the land of Egypt?" He then took a club and killed Esau, and Esau's head rolled into the cave. This means that the head of Esau is also buried in the cave. Jewish sources state that Esau sold his right to be buried in the cave. According to Shemot Rabbah, Jacob gave all his possessions to acquire a tomb in the Cave of the Patriarchs. He put a large pile of gold and silver before Esau and asked, “My brother, do you prefer your portion of this cave, or all this gold and silver?” Esau's selling to Jacob his right to be buried in the Cave of the Patriarchs is also recorded in Sefer HaYashar. Jubilees In the Book of Jubilees, Esau's father, Isaac, compels Esau to swear not to attack or kill Jacob after Isaac has died. However, after the death of Isaac, the sons of Esau convince their father to lead them, and hired mercenaries, against Jacob in order to kill Jacob and his family and seize their wealth (especially the portion of Isaac's wealth that Isaac had left to Jacob upon his death). "Then Ya'aqov bent his bow and sent forth the arrow and struck Esau, his brother on his right breast and slew him (Jubilees 38:2) . . . Ya'aqov buried his brother on the hill which is in Aduram, and he returned to his house (Jubilees 38:9b)." Reputed grave on the West Bank South of the Palestinian town of Sa'ir on the West Bank there is a tomb reputed to be that of Esau – El 'Ais in his Arab name. The Palestine Exploration Fund's Survey of Western Palestine (SWP), wrote that: "The tomb is in a chamber 37 feet east and west by 20 feet north and south, with a Mihrab on the south wall. The tomb is 12 feet long, 3 1/2 feet broad, 5 feet high, covered with a dark green cloth and a canopy above. An ostrich egg is hung near. North of the chamber is a vaulted room of equal size, and to the east is an open court with a fig-tree, and a second cenotaph rudely plastered, said to be that of Esau's slave. Rock-cut tombs exist south-west of this place." The SWP stated this identification was false and that Esau's tomb was in the Biblical Mount Seir. Gallery Notes References Bibliography External links Esau at the Jewish Encyclopedia Category:Edom Category:Jacob Category:Biblical twins Category:Book of Genesis people Category:Nimrod
{ "pile_set_name": "Wikipedia (en)" }
Washington, DC — A New Jersey Congressman has proposed a bill in the House of Representatives to designate February 12th as national Darwin Day. Representative Rush Holt, a Democrat and a professing Quaker, recently submitted the proposal to Congress as a way to honor Darwin, who he calls “an amazingly creative man.” “Charles Darwin’s theory of evolution by the mechanism of natural selection, together with the monumental amount of scientific evidence he compiled to support it, provides humanity with a logical and intellectually compelling explanation for the diversity of life on Earth,” he wrote in the text of the bill. “[T]he validity of Darwin’s theory of evolution by natural selection is further strongly supported by the modern understanding of the science of genetics.” “[I]t has been the human curiosity and ingenuity exemplified by Darwin that has promoted new scientific discoveries that have helped humanity solve many problems and improve living conditions,” he continued. “[T]he advancement of science must be protected from those unconcerned with the adverse impacts of global warming and climate change.” Holt then takes aim at Biblical creation as he outlines his belief that “the teaching of creationism in some public schools compromises the scientific and academic integrity of the United States education systems.” “Charles Darwin is a worthy symbol of scientific advancement on which to focus and around which to build a global celebration of science and humanity intended to promote a common bond among all of Earth’s peoples,” he said. “Whereas February 12, 2013, is the anniversary of the birth of Charles Darwin in 1809 and would be an appropriate date to designate as Darwin Day, now, therefore, be it resolved that the House of Representatives (1) supports the designation of Darwin Day; and (2) recognizes Charles Darwin as a worthy symbol on which to celebrate the achievements of reason, science, and the advancement of human knowledge.” The bill was referred to the Congressional Committee on Science, Space and Technology for consideration. Connect with Christian News Follow @4christiannews In speaking with the New York Times about the matter, Holt stated that he would like for evolution to play a greater role in Congress. “I hope we can hold hearings,” Holt told the publication, “where people can hear about Darwin and science and the jobs it creates, the lives it saves–everything.” Holt takes a very different stance than that of United States Representative Paul Broun of Georgia, a medical doctor and member of the federal Science and Technology Committee, who, as previously reported, called evolution and the big bang theory “lies straight from the pit of Hell.” “God’s word is true. I’ve come to understand that. All that stuff I was taught about evolution, embryology, the big bang theory–all of that is lies straight from the pit of Hell,” Broun stated at a sportsman’s event held at a local church last year. “And it’s lies to keep me and all the folks who are taught that from understanding that they need a Savior. You see, there’s a lot of scientific data that I’ve found as a scientist that this really is a young earth. I don’t believe that the earth is but about 9,000 years old. I believe it was made in six days as we know them. That’s what the Bible tells us.” According to historical documentation, during the 1860 Oxford evolution debate, Admiral Robert FitzRoy, who had once served as the captain for Darwin’s voyage to the Galapagos Islands and played a significant role in the development of the Origin of Species, repented of his participation. He walked to the front of the room, “lifting an immense Bible, first with both and afterwards with one hand over his head, [and] solemnly implored the audience to believe God rather than man.”
{ "pile_set_name": "OpenWebText2" }
Tenemos algo para ofrecerte Con nuestra suscripción digital disfrutás de más de 300 artículos exclusivos por mes y navegás sin límites nuestros sitios. Tenemos newsletters premium, una comunidad exclusiva para vos, descuentos con Club La Voz y más. Quiero suscribirme desde $30 A las 6.20, el gobernador de Córdoba José Manuel de la Sota informó que 52 personas fueron detenidas durante la noche. Se espera que a las 7 los policías acuartelados den una respuesta a la última oferta de la Provincia. Esta madrugada los uniformados fueron intimados por la Justicia para que retornen a sus funciones. Las postales fueron desoladoras. Vecinos desprotegidos, estudiantes en vela en Nueva Córdoba, barricadas para defender la propiedad y la seguridad, mientras miles de policías reclaman un aumento salarial y mejoras laborales. Se vivieron escenas de violencia en diferentes puntos de la ciudad. Supermercados y locales comerciales fueron saqueados y atacados por delincuentes y vecinos actuaron por mano propia para detener a los malvivientes. Corridas, disparos y miedo fueron los relatos comunes durante una madrugada en la que pocos pudieron dormir. Publicidad Numerosos supermercados y locales comerciales sufrieron saqueos y robos a partir de las 16 del martes y durante toda la noche, mientras Córdoba veía reducida la presencia policial en las calles a raíz de una protesta que mantienen los efectivos en reclamo de mejoras salariales y en las condiciones de trabajo. Vecinos desprotegidos, algunos portando armas de fuego sobre los techos de sus locales para defenderse, agresiones de la gente a delicuentes que atacaron comercios, balaceras en diferentes barrios de la ciudad, supermercados desvalijados, puestos de vigilancia incendiados y un descontrol generalizado marcaban los hechos de violencia minutos antes durante esta madrugada. Hoy no habrá transporte, escuelas ni bancos en la ciudad de Córdoba. Muy pocos comercios abrirán sus puertas. A las 11, el gobernador De la Sota convocó a una reunión con representantes de partidos políticos, legisladores, empresarios y gremios para analizar la situación de violencia, al tiempo que exigió que los policías acuartelados vuelvan a sus funciones. La Justicia también los intimó a regresar a sus puestos. Cronología de robos y saqueos Publicidad En la ciudad de Córdoba y alrededores se registraron saqueos, intentos de saqueo o robos a mano armada en los siguientes locales comerciales. De los últimos 25, no hay precisión de la hora en que ocurrieron, pero fueron entre la madrugada y la mañana del miércoles. • Planta de Manfrey. Circunvalación entre Pilar y ruta 9. Ingresaron unas 200 personas. Esta mañana mientras De la Sota daba el discurso. • Pinturería en Argüello. En la mañana del miércoles la robaron y la prendieron fuego. Está ubicada en avenida Donato Álvarez al 4800. Publicidad • Empresa de transporte Lancioni. En barrio Los bulevares. Está ubicada en Los catalanes 4475. • Mueblería desvalijada. En Monseñor Pablo Cabrera y Nieto. • Local de ropa en Recta Martinoli 7900. Gongo, local de indumentaria. Rompieron puerta de vidrio y robaron ropas y zapatillas. • Hiper Libertad Rodriguez del Bustos. En la sucursal de Rodríguez del Busto entraron a saquear y hubo empleados encerrados en una oficina del comercio, informó a este diario la empleada de un call center que funciona en la planta alta de ese hipermercado. • Zapatería Peppers. En Mariano Fragueiro 3849. Saqueo total. • Feria La Toscana. En Juan B Justo 4521. • Mini Libertad de calle Alem. Totalmente saqueado. • Tarquino de Juan B. Justo 2828. Saqueo total. • Car Music. En avenida Alem. • Supermercado Vea de barrio General Paz. Está ubicado en General Deheza y Buchardo. • Hipermercado Libertad de Barrio General Paz. • Ferniplast del Centro. En avenida San Martín. • Supermercado Vea del Centro. En avenida Colón. • Movistar del Centro. En calle Tucumán y 9 de Julio, rompieron la vidriera de un local de la firma Movistar y se llevaron celulares. Este mediodía, cuatro comerciantes del área y un vecino permanecían en esa esquina, custodiando la zona. • Disco del Centro. En Vélez Sarsfield 132. • Belgrano y Achaval Rodríguez. Varios locales fueron saqueados, a partir de la rotura delas vidrieras. • Avenida Sabattini y Sargento Cabral. Múltiples barricadas en las esquinas del área. Hubo muchos intentos de saqueo. No todos prosperaron. Comerciantes armados custodiando muchos de los negocios. • Vélez Sarsfield al 3600. Locales atacados. • Mariano Max de barrio Las Flores. En el Hipermercado Mariano Max, de Vélez Sarsfield al 4051, hubo intentos de saqueos. El helicóptero de la Policía sobrevoló durante la mañana la zona. • Avenida Vélez Sarsfield al 6000. Varios locales saqueados, incluidas algunas casas de familia que compartían el mismo domicilio. • Cordiez de barrio Empalme. Usuario de Facebook reporta saqueo al supermercado de avenida Sabattini 4417 y Rayo Cortado. • Pollería asaltada. Usuario de Facebook reporta robo a una pollería en Sabattini y Carnerillo. • Tiny Baby. En avenida Colón y Sagrada familia. • Cordiez de Alto Alberdi. En Colón 3.200. • Zárate. Hubo un intento de saqueo en el local ubicado en Colón al 4.500. El local sufrió la rotura de escaparates. • Illia e Ituzaingó. Grupo comando en moto robó un local de ropa. • Donato Álvarez, zona oeste. Sujetos no identificados atacaban locales en avenida Donato Álvarez al 7.200, ingresando a diferentes negocios como mercerías y outlets para llevarse mercaderías en camionetas y motos, a las 4.30. • Carrefour, avenida Colón. Delincuentes intentaron ingresar al hipermercado ubicado en avenida Colón, barrio Villa Urquiza. La Policía intentaba dispersar a las personas encapuchadas, minutos antes de las 4 de la mañana. Había disparos, piedras y enfrentamientos. • Saturno Hogar. En avenida Colón casi esquina Domingo Zípoli, y otro en Colón y Sagrada familia. A las 3.30 se informó que la casa de electrodomésticos sufrió el robo de aires acondicionados, televisores y minicomponentes, según denunció el gerente del local. "Esto no fue un saqueo, no se roba por hambre", dijo el representante de la firma. • Supermercado Vea barrio Maipú. En avenida Sabattini. La sucursal del supermercado había quedado a merced de delincuentes que robaban mercaderías pasada la 1 de esta madrugada, informó Cadena 3. • Nueva Córdoba. A las 12.27 comerciantes de Nueva Córdoba salieron a las calles para defender sus locales, según informaron usuarios de la red social Twitter, en la esquina de calles Estrada y Buenos Aires. • Claro, avenida Colón. Cerca de la medianoche, delincuentes ingresaron a las oficinas de atención al cliente de la empresa de telefonía móvil ubicada en avenida Colón. Se llevaron equipos mientras los uniformados presentes en el lugar intentaban reprimir los robos con balas de goma. • Súper Vea, barrio Las Palmas. Personas ingresaron a la sucursal ubicada en avenida Colón y robaron electrodomésticos y mercadería y luego fueron repelidos por policías que se hicieron presentes en el lugar. • Vea, barrio San Vicente. Una sucursal del supermercado ubicada frente a la plaza Mariano Moreno (plaza del Mercado) había sido saqueada, informó un periodista de este diario desde el lugar. • Ferniplast, barrio San Vicente. El local de la juguetería ubicado en calle San Jerónimo de barrio San Vicente también sufrió ataques durante la noche. • Makro, avenida Colón. A las 22.30, el hipermercado mayorista de avenida Colón también sufría ataques vandálicos y el robo de mercaderías, como colchones y electrodomésticos, según testigos y medios periodísticos presentes en el lugar. • Hiper Libertad, Rodríguez del Busto. En la sucursal de Rodríguez del Busto entraron a saquear y hay empleados encerrados en una oficina del comercio, informó a este diario la empleada de un call center que funciona en la planta alta de ese hipermercado. • Cordiez, Los Paraísos. Rompieron las persianas del local ubicado en la calle Cornelio Saavedra y en la noche intentaban entrar al comercio. • Ruta 20. Se registraron robos en numerosos comercios ubicados en avenida Fuerza Aérea y a autos estacionados en las calles, según confirmaron fuentes policiales. • Monseñor Pablo Cabrera al 5500. Un grupo de personas entró a un local de electrodomésticos. • Mariano Max, barrio Los Plátanos. Un saqueo se registró en el comercio ubicado entre calles Félix Paz y Santa Ana. • Mariano Max, barrio Los Gigantes. El local ubicado en la calle Carlos Jimenez también fue saqueado. • Supermercado Vea, avenida Santa Ana. A las 21, un grupo de al menos 30 personas logró ingresar a la sucursal ubicada en avenida Santa Ana esquina García Martínez, en la zona sur de la ciudad. Rompieron las rejas e irrumpieron en el local que se encontraba cerrado. Se llevaron heladeras y mercaderías. Efectivos policiales intentaron despejar el área arrojando balas de goma, informó un móvil de Cadena 3 apostado en el lugar. “Corrían con carros que tenían televisores LCD, aires acondicionados y ventiladores. También había otro grupo que intentaba entrar con motos y armas", dijo un vecino que comunicación con este diario. • Cordiez, barrio SEP. Un grupo de unas 50 personas saqueó en dos oportunidades la sucursal ubicada en avenida Ricchieri al 4200, a escasas cuadras del lugar donde policías mantienen un acuartelamiento. Los vecinos se llevaron bebidas y mercadería. “Han sacado mercadería, no hay lesionados. Se han llevado mucha bebida alcohólica y también mercadería. Los empleados no han sido golpeados”, dijo un efectivo policial a Cadena 3. Una hora más tarde, otro grupo de personas volvió a ingresar al local y huyeron luego de que tres policías que se presentaron en un móvil efectuaran disparos "al aire". El primer saqueo ocurrió a las 16 y una más tarde volvieron a ingresar. Cerca de las 18.30, efectivos del Eter llegaron para custodiar la sucursal. • Cordiez, barrio Ituzaingó. Diego Brasca, de la sucursal de Cordiez de barrio Ituzaingó, dijo esta tarde a Mitre Córdoba que un grupo de personas ingresó en dos oportunidades al local y se llevó mercadería. Brasca no pudo precisar cuántas personas fueron las que participaron del saqueo en avenida Vucetich esquina Graham y adelantó que han pedido a otras sucursales un cierre preventivo para evitar más robos. "Hemos bajado la orden en algunas sucursales para hacer el cierre para evitar cualquier tipo de inconvenientes de esta naturaleza", dijo. • Cordiez,Villa Allende. Hubo rotura de vidrios en avenida Goicoechea en un intento de saqueo. La Policía y los guardias lograron evitarlo, según reportes periodísticos. • Súper chino, barrio Jardín del Sur. Pasadas las 20, se produjeron saqueos en un supermercado chino ubicado en Soconcho y Celso Barrios, en la zona sur de la ciudad, informaron vecinos de la zona a una periodista de este diario. • Chango Más, Ruta 20. El local ubicado frente al CPC de ruta 20 fue saqueado, según reportó un movilero de Cadena 3. Hasta las 21.45, la Policía lo tenía registrado como un intento de saqueo. • Mariano Max, barrio Yofre. Otro robo se produjo en un supermercado Mariano Max de la calle Saavedra Lamas. Allí un grupo de sujetos sustrajo bebidas alcohólicas y una moto, según pudo presenciar un periodista de este diario. • Dexter Shop, Fuerza Aérea. Un grupo de entre 10 y 15 jóvenes entraron al local de ropa deportiva Dexter shop. Allí un móvil del Eter logró detener a dos menores, según informaron en Cadena 3. • Súper chino, barrio Jardín. Delincuentes se llevaron mercaderías y dinero en un supermercado chino ubicado en avenida Richieri 2792, de barrio Jardín, según denunció uno de los empleados del lugar en declaraciones a Cadena 3. "Estaban armados y entraron con violencia", dijo el hombre, que atiende la carnicería. El hombre descartó que se haya tratado de un saqueo. "Esto no es por hambre, fue un robo", indicó. • Disco, Plaza de las Américas. También se produjo un robo en un supermercado Disco situado en cercanías de la Plaza de las Américas, donde el vicepresidente de la Cámara de Supermercados Benjamín Blanch dijo que unas 15 personas ingresaron y robaron cerca de siete televisores. • Talleres Sur. Una carnicería y una panadería que comparten un local en barrios Talleres Sur fueron asaltados por un grupo de hombres en motos, indicaron voceros policiales. SÍNTESIS POLÍTICA Información exclusiva y el mejor análisis, los lunes en tu correo. Ingresá tu correo electrónico Enviar ¡Gracias por suscribirte! Ha ocurrido un error, por favor intente nuevamente más tarde.
{ "pile_set_name": "OpenWebText2" }
Q: Apache Lucene: Creating an index between strings and doing intelligent searching My problem is as follows: Let's say I have three files. A, B, and C. Each of these files contains 100-150M strings (one per line). Each string is in the format of a hierarchical path like /e/d/f. For example: File A (RTL): /arbiter/par0/unit1/sigA /arbiter/par0/unit1/sigB ... /arbiter/par0/unit2/sigA File B (SCH) /arbiter_sch/par0/unit1/sigA /arbiter_sch/par0/unit1/sigB ... /arbiter_sch/par0/unit2/sigA File C (Layout) /top/arbiter/par0/unit1/sigA /top/arbiter/par0/unit1/sigB ... /top/arbiter/par0/unit2/sigA We can think of file A corresponding to circuit signals in a hardware modeling language. File B corresponding to circuit signals in a schematic netlist. File C corresponding to circuit signals in a layout (for manufacturing). Now a signal will have a mapping between File A <-> File B <-> File C. For example in this case, /arbiter/par0/unit1/sigA == /arbiter_sch/par0/unit1/sigA == /top/arbiter/par0/unit1/sigA. Of course, this association (equivalence) is established by me, and I don't expect the matcher to figure this out for me. Now say, I give '/arbiter/par0/unit1/sigA'. In this case, the matcher should return a direct match from file A since it is found. For file B/C a direct match is not possible. So it should return the best possible matches (i.e., edit distance?) So in this example, it can give /arbiter_sch/par0/unit1/sigA from file B and /top/arbiter/par0/unit1/sigA from file C. Instead of giving a full string search, I could also give something like *par0*unit1*sigA and it should give me all the possible matches from fileA/B/C. I am looking for solutions, and came across Apache Lucene. However, I am not totally sure if this would work. I am going through the docs to get some idea. My main requirements are the following: There will be 3 text files with full path to signals. (I can adjust the format to make it more compact if it helps building the indexer more quickly). Building the index should be fairly fast (take a couple of hours). The files above are static (no modifications). Searching should be comprehensive. It is OK if it takes ~1s / search but the matching should support direct match, regex match, and edit distance matching. The main challenge is each file can have 100-150 million signals. Can someone tell me if such a use case can be easily addressed by Lucene? What would be the correct way to go about building a index and doing quick/fast searching? I would like to write some proof-of-concept code and test the performance. Thanks. A: i think based on your requirements the best solution would be a PoC with a given test set of entries. Based on this it should be possible to evaluate the target indexing time you like to achieve. Because you only use static informations it's easier, because do don't have to care about topics like NRT (near-real-time searches). Personally i never used lucene for such a big information set but i think lucene is able to handle this. How i would do it: Read tutorials and best practices about lucene, indexing, searching and understand how it works Define an data set for indexing lets say 1000 lines for each file Define your lucene document structure this is really important because based on this you will apply your searches. take care about analyzer tasks like tokanization if needed and how. If you need fulltext search care about a TextField. Write code for simple indexing Run small tests with indexing and inspect your index with Luke Write code for simple searching Define queries and your expected results. execute searches and check results. Try to structure your code. separate indexing and searching -> it will be easier to refactor.
{ "pile_set_name": "StackExchange" }
Most people don’t know it but there are over 700 different species of ants in the United Sates alone. One other crazy ant fact is that if you took the weight of all the ants in the world they would be more than all the weight of the humans in the world. Ants even...
{ "pile_set_name": "Pile-CC" }
GLACIERCOUNTRY.CO.NZThe official visitor guide for Fox Glacier, Franz Josef, Okarito and surrounds. Information to help you plan your visit to this UNESCO World Heritage Area in South West NZ. Listings for all types of accommodation from budget to luxury, visitor attractions, activities, guided walks, glacier tours, cafes & restaurants. Daily glacier updates and live weather cameras.
{ "pile_set_name": "Pile-CC" }
Q: Python find value of view state given source I am trying to write a program to decode view state given a url. I know similar programs exist but this is more of an excursive than a project. Given the html source of a page, how can I get the value of the view state form element. I started by doing this: def get_viewstate(html): i = html.index('id="__VIEWSTATE" value="') somedata = html[i+len('id="__VIEWSTATE" value="'):] But I couldn't figure out an efficient way to only retrieve the value of the element up to the end tag. What is the most efficient way to retrieve the value of this form element? A: Using lxml with css selector: import lxml.html root = lxml.html.fromstring(html) matched = root.cssselect('#__VIEWSTATE') if matched: value = matched[0].get('value') Using BeautifulSoup: from bs4 import BeautifulSoup soup = BeautifulSoup(html) matched = soup.select('#__VIEWSTATE') if matched: value = matched[0].get('value')
{ "pile_set_name": "StackExchange" }
Q: ASP.NET MVC jQuery UI Checkboxradio tick disapear after checked I'm doing an ASP.NET MVC website. Which needs a feature let admin set if the membership of each clubs member joined are valid still. After a bit survey, I figure jQuery UI Checkboxradio quite fit my demand. When I check the checkbox it seems fine, ticked and the background becomes blue. However, when I move the mouse out the tick disappears while the background remains blue. Then if I move the mouse over it, the tick will show up again but only when the cursor remains on the widget. I check the post value of viewmodel which is correct and if I comment //$("input[type=checkbox]").checkboxradio(); The original checkboxes work as expected.(tick won't disapear) So I think it should be a frontend problem. Here is the part of my View <div class="form-group"> @Html.LabelFor(model => model.ClubMultiChosen.Clubs, new { @class = "control-label col-md-2" }) <div class="col-md-10"> @for (int i = 0; i < Model.ClubMultiChosen.SelectedClubs.Count; i++) { var memberships = Model.ClubMultiChosen.SelectedClubs; @Html.Label(@memberships[i].Club.Abbr, new { @for = $"cbxClub{i}" }) @Html.CheckBox($"ClubMultiChosen.SelectedClubs[{i}].IsActive", @memberships[i].IsActive, new { id = $"cbxClub{i}" }); } </div> </div> At the same page I have included bootstrap 3.3.7 bootstrap-chosen 1.0.0 jQuery 3.1.1 jQuery UI 1.12.1 And My mvc version is 5.2.3.0 Not sure if I provided enough info. Any suggestion or question will be appreciated! A: I figured it out myself. For some reason when it is checked(class=ui-state-active). It uses ui-icons_ffffff_256x240.png as background which is white yet the background of checkbox(span) is white as well, so it looks like the tick was disappeared. After I override it with #form1 .ui-state-active .ui-icon, #form1 .ui-button:active .ui-icon { background-image: url("/Content/themes/base/images/ui-icons_555555_256x240.png"); } It works as I expected.
{ "pile_set_name": "StackExchange" }
Q: Purchasing a Domain from a Domain Squatter A few years ago, I purchased a .org domain. Presumably, the .com version was taken by a domain squatter because it was registered the day after I registered it and it only hosts one of those typical ad pages. I recently decided that I want the .com version as well if it's cheap, and I'd like to know: What price do they typically charge, and are there any ways to get them to lower this price? A: If you're visiting the domain you want to buy, and it's hosting ads. IMMEDIATELY STOP VISITING IT. Domain squatters are able to determine value based on traffic. If the site is getting zero traffic and you come in and say you want to build a website about your pet cat on that domain, odds are good they'd be willing to sell it cheap to recoup the registration fee they paid for it. However if they are getting even a few clicks on the ads, showing regular traffic from you visiting it, and you make the mistake of saying you're going to build some huge awesome website that will make you millions, good luck getting it for anything less than $500. Keep in mind, the squatter is always willing to wait longer than you are for the deal to go through. Also odds are high about you being ripped off if not using a 3rd party to verify the transfer. If you're the unfortunately soul that purchased your domain through goDaddy and noticed your .com version is being squatted, odds are it's the goDaddy squatter team and you're in for a very very expensive situation to get it from them. I would just give up and look for a new domain unless you have some deep pockets. A: The price would depend on the greed of the domain owner and perceived value of the domain. I've seen instances in the past where domain squatters have demanded anything from £1,000 to £10,000 for a .co.uk domain (they cost £6 for two years). Needless to say we have found alternative domains. If you can prove a trademark on company name/product/brand it does change the game a little since you can legally take back a domain name that infringes on a trademark. However in practical terms it would cost a lot of time and money to release a domain that you felt was being held unethically by using your company name/branding in order to sell. If you care to read more search for "trademarks and domain names". Practical advice: it is likely the person holding the domain will demand an unrealistic price initially to test the water. Have a maximum price in mind before hand and never go over this value. Wait for the initial price demand from the domain owner and if it is in excess of your figure (almost certain to be), make your offer and wait a while. If they have no other offers on the table their greed may get the better of them and they may come back and accept the offer. Otherwise, get another domain name. It would be great to see domain squatters stopped, but unfortunately this is unlikely to happen any time soon.
{ "pile_set_name": "StackExchange" }
/* * This file is part of the SDWebImage package. * (c) Olivier Poitrey <[email protected]> * * For the full copyright and license information, please view the LICENSE * file that was distributed with this source code. */ #import <Foundation/Foundation.h> #import "SDWebImageCompat.h" #import "SDWebImageOperation.h" typedef NS_OPTIONS(NSUInteger, SDWebImageDownloaderOptions) { /** * Put the download in the low queue priority and task priority. */ SDWebImageDownloaderLowPriority = 1 << 0, /** * This flag enables progressive download, the image is displayed progressively during download as a browser would do. */ SDWebImageDownloaderProgressiveDownload = 1 << 1, /** * By default, request prevent the use of NSURLCache. With this flag, NSURLCache * is used with default policies. */ SDWebImageDownloaderUseNSURLCache = 1 << 2, /** * Call completion block with nil image/imageData if the image was read from NSURLCache * (to be combined with `SDWebImageDownloaderUseNSURLCache`). */ SDWebImageDownloaderIgnoreCachedResponse = 1 << 3, /** * In iOS 4+, continue the download of the image if the app goes to background. This is achieved by asking the system for * extra time in background to let the request finish. If the background task expires the operation will be cancelled. */ SDWebImageDownloaderContinueInBackground = 1 << 4, /** * Handles cookies stored in NSHTTPCookieStore by setting * NSMutableURLRequest.HTTPShouldHandleCookies = YES; */ SDWebImageDownloaderHandleCookies = 1 << 5, /** * Enable to allow untrusted SSL certificates. * Useful for testing purposes. Use with caution in production. */ SDWebImageDownloaderAllowInvalidSSLCertificates = 1 << 6, /** * Put the download in the high queue priority and task priority. */ SDWebImageDownloaderHighPriority = 1 << 7, /** * Scale down the image */ SDWebImageDownloaderScaleDownLargeImages = 1 << 8, }; typedef NS_ENUM(NSInteger, SDWebImageDownloaderExecutionOrder) { /** * Default value. All download operations will execute in queue style (first-in-first-out). */ SDWebImageDownloaderFIFOExecutionOrder, /** * All download operations will execute in stack style (last-in-first-out). */ SDWebImageDownloaderLIFOExecutionOrder }; FOUNDATION_EXPORT NSString * _Nonnull const SDWebImageDownloadStartNotification; FOUNDATION_EXPORT NSString * _Nonnull const SDWebImageDownloadStopNotification; typedef void(^SDWebImageDownloaderProgressBlock)(NSInteger receivedSize, NSInteger expectedSize, NSURL * _Nullable targetURL); typedef void(^SDWebImageDownloaderCompletedBlock)(UIImage * _Nullable image, NSData * _Nullable data, NSError * _Nullable error, BOOL finished); typedef NSDictionary<NSString *, NSString *> SDHTTPHeadersDictionary; typedef NSMutableDictionary<NSString *, NSString *> SDHTTPHeadersMutableDictionary; typedef SDHTTPHeadersDictionary * _Nullable (^SDWebImageDownloaderHeadersFilterBlock)(NSURL * _Nullable url, SDHTTPHeadersDictionary * _Nullable headers); /** * A token associated with each download. Can be used to cancel a download */ @interface SDWebImageDownloadToken : NSObject <SDWebImageOperation> /** The download's URL. This should be readonly and you should not modify */ @property (nonatomic, strong, nullable) NSURL *url; /** The cancel token taken from `addHandlersForProgress:completed`. This should be readonly and you should not modify @note use `-[SDWebImageDownloadToken cancel]` to cancel the token */ @property (nonatomic, strong, nullable) id downloadOperationCancelToken; @end /** * Asynchronous downloader dedicated and optimized for image loading. */ @interface SDWebImageDownloader : NSObject /** * Decompressing images that are downloaded and cached can improve performance but can consume lot of memory. * Defaults to YES. Set this to NO if you are experiencing a crash due to excessive memory consumption. */ @property (assign, nonatomic) BOOL shouldDecompressImages; /** * The maximum number of concurrent downloads */ @property (assign, nonatomic) NSInteger maxConcurrentDownloads; /** * Shows the current amount of downloads that still need to be downloaded */ @property (readonly, nonatomic) NSUInteger currentDownloadCount; /** * The timeout value (in seconds) for the download operation. Default: 15.0. */ @property (assign, nonatomic) NSTimeInterval downloadTimeout; /** * The configuration in use by the internal NSURLSession. * Mutating this object directly has no effect. * * @see createNewSessionWithConfiguration: */ @property (readonly, nonatomic, nonnull) NSURLSessionConfiguration *sessionConfiguration; /** * Changes download operations execution order. Default value is `SDWebImageDownloaderFIFOExecutionOrder`. */ @property (assign, nonatomic) SDWebImageDownloaderExecutionOrder executionOrder; /** * Singleton method, returns the shared instance * * @return global shared instance of downloader class */ + (nonnull instancetype)sharedDownloader; /** * Set the default URL credential to be set for request operations. */ @property (strong, nonatomic, nullable) NSURLCredential *urlCredential; /** * Set username */ @property (strong, nonatomic, nullable) NSString *username; /** * Set password */ @property (strong, nonatomic, nullable) NSString *password; /** * Set filter to pick headers for downloading image HTTP request. * * This block will be invoked for each downloading image request, returned * NSDictionary will be used as headers in corresponding HTTP request. */ @property (nonatomic, copy, nullable) SDWebImageDownloaderHeadersFilterBlock headersFilter; /** * Creates an instance of a downloader with specified session configuration. * @note `timeoutIntervalForRequest` is going to be overwritten. * @return new instance of downloader class */ - (nonnull instancetype)initWithSessionConfiguration:(nullable NSURLSessionConfiguration *)sessionConfiguration NS_DESIGNATED_INITIALIZER; /** * Set a value for a HTTP header to be appended to each download HTTP request. * * @param value The value for the header field. Use `nil` value to remove the header. * @param field The name of the header field to set. */ - (void)setValue:(nullable NSString *)value forHTTPHeaderField:(nullable NSString *)field; /** * Returns the value of the specified HTTP header field. * * @return The value associated with the header field field, or `nil` if there is no corresponding header field. */ - (nullable NSString *)valueForHTTPHeaderField:(nullable NSString *)field; /** * Sets a subclass of `SDWebImageDownloaderOperation` as the default * `NSOperation` to be used each time SDWebImage constructs a request * operation to download an image. * * @param operationClass The subclass of `SDWebImageDownloaderOperation` to set * as default. Passing `nil` will revert to `SDWebImageDownloaderOperation`. */ - (void)setOperationClass:(nullable Class)operationClass; /** * Creates a SDWebImageDownloader async downloader instance with a given URL * * The delegate will be informed when the image is finish downloaded or an error has happen. * * @see SDWebImageDownloaderDelegate * * @param url The URL to the image to download * @param options The options to be used for this download * @param progressBlock A block called repeatedly while the image is downloading * @note the progress block is executed on a background queue * @param completedBlock A block called once the download is completed. * If the download succeeded, the image parameter is set, in case of error, * error parameter is set with the error. The last parameter is always YES * if SDWebImageDownloaderProgressiveDownload isn't use. With the * SDWebImageDownloaderProgressiveDownload option, this block is called * repeatedly with the partial image object and the finished argument set to NO * before to be called a last time with the full image and finished argument * set to YES. In case of error, the finished argument is always YES. * * @return A token (SDWebImageDownloadToken) that can be passed to -cancel: to cancel this operation */ - (nullable SDWebImageDownloadToken *)downloadImageWithURL:(nullable NSURL *)url options:(SDWebImageDownloaderOptions)options progress:(nullable SDWebImageDownloaderProgressBlock)progressBlock completed:(nullable SDWebImageDownloaderCompletedBlock)completedBlock; /** * Cancels a download that was previously queued using -downloadImageWithURL:options:progress:completed: * * @param token The token received from -downloadImageWithURL:options:progress:completed: that should be canceled. */ - (void)cancel:(nullable SDWebImageDownloadToken *)token; /** * Sets the download queue suspension state */ - (void)setSuspended:(BOOL)suspended; /** * Cancels all download operations in the queue */ - (void)cancelAllDownloads; /** * Forces SDWebImageDownloader to create and use a new NSURLSession that is * initialized with the given configuration. * @note All existing download operations in the queue will be cancelled. * @note `timeoutIntervalForRequest` is going to be overwritten. * * @param sessionConfiguration The configuration to use for the new NSURLSession */ - (void)createNewSessionWithConfiguration:(nonnull NSURLSessionConfiguration *)sessionConfiguration; /** * Invalidates the managed session, optionally canceling pending operations. * @note If you use custom downloader instead of the shared downloader, you need call this method when you do not use it to avoid memory leak * @param cancelPendingOperations Whether or not to cancel pending operations. * @note Calling this method on the shared downloader has no effect. */ - (void)invalidateSessionAndCancel:(BOOL)cancelPendingOperations; @end
{ "pile_set_name": "Github" }
Q: How to put texts in image via WordCloud in Jupyter Notebook I have a problem about showing texts put in image via WordCloud in Jupyter Notebook. Here is my image shown below. The output of figure is based on the results of text in rectangle not showing in defined text in image. Here is the output How can I fix it? Here is my code snippet defined below. plt.figure(figsize=[15,15]) char_mask = np.array(Image.open("images/netflix.png")) image_colors = ImageColorGenerator(char_mask) wordcloud = WordCloud(stopwords=STOPWORDS,background_color = 'white', width = 1000, height = 1000, max_words =300, mask=char_mask).generate(' '.join(netflix_df['title'])) wordcloud.recolor(color_func=image_colors) plt.imshow(wordcloud, interpolation='bilinear') plt.axis('off') plt.title('Most Popular Words in Title',fontsize = 30) plt.show() A: If you want to put result inside word NETFLIX then create black NETFLIX on white background. It is easier to do it in any photo editor (like GIMP or Photoshop) (BTW: I added contour_width= and contour_color= to see if code found NETFLIX on image) Image: Result: Code: import matplotlib.pyplot as plt import numpy as np import pandas as pd from PIL import Image, ImageOps from wordcloud import WordCloud, STOPWORDS, ImageColorGenerator netflix_df = pd.DataFrame({'title': ['King Kong', 'Rambo', 'Rambo II', 'Rambo III', 'James Bond',]}) text = ' '.join(netflix_df['title'] char_mask = np.array(Image.open("netflix.png")) # black NETFLIX on white background wordcloud = WordCloud(stopwords=STOPWORDS, background_color='white', #width=1000, #height=1000, max_words=300, mask=char_mask, contour_width=3, contour_color='steelblue', ).generate(text)) #image_colors = ImageColorGenerator(np.array(image)) #wordcloud.recolor(color_func=image_colors) plt.figure(figsize=[15, 15]) plt.imshow(wordcloud, interpolation='bilinear') plt.axis('off') plt.title('Most Popular Words in Title', fontsize=30) plt.show() Documentation: Masked wordcloud With your original image (red NETFLIX on black bacground) you can try to convert to grayscale and invert it. from PIL import Image, ImageOps image = Image.open("netflix.jpg") # red NETFLIX on white background image_gray = image.convert('L') image_invert = ImageOps.invert(image_gray) #image_invert.show() # it shows result char_mask = np.array(image_invert) #im = Image.fromarray(char_mask) #im.show() But original jpg image has many different values for red color and mask is not perfect. It needs more work - ie. filter colors in ranges. char_mask[ char_mask < 200 ] = 0 char_mask[ char_mask > 200 ] = 255 Result: Code: import matplotlib.pyplot as plt import numpy as np import pandas as pd from PIL import Image, ImageOps from wordcloud import WordCloud, STOPWORDS, ImageColorGenerator netflix_df = pd.DataFrame({'title': ['King Kong', 'Rambo', 'Rambo II', 'Rambo III', 'James Bond',]}) text = ' '.join(netflix_df['title'] image = Image.open("netflix.jpg") # red NETFLIX on black background image_gray = image.convert('L') image_invert = ImageOps.invert(image_gray) #image_invert.show() char_mask = np.array(image_invert) char_mask[ char_mask < 200 ] = 0 char_mask[ char_mask > 200 ] = 255 #print(char_mask) #im = Image.fromarray(char_mask) #im.show() wordcloud = WordCloud(stopwords=STOPWORDS, background_color='white', #width=1000, #height=1000, max_words=300, mask=char_mask, contour_width=3, contour_color='steelblue', ).generate(text)) image_colors = ImageColorGenerator(np.array(image)) wordcloud.recolor(color_func=image_colors) plt.figure(figsize=[15,15]) plt.imshow(wordcloud, interpolation='bilinear') plt.axis('off') plt.title('Most Popular Words in Title',fontsize = 30) plt.show() BTW: if you create white NETFLIX on black background Then you can get Code: import matplotlib.pyplot as plt import numpy as np import pandas as pd from PIL import Image, ImageOps from wordcloud import WordCloud, STOPWORDS, ImageColorGenerator netflix_df = pd.DataFrame({'title': ['King Kong', 'Rambo', 'Rambo II', 'Rambo III', 'James Bond',]}) text = ' '.join(netflix_df['title'] image = Image.open("netflix.jpg") # red NETFLIX on black background image_gray = image.convert('L') #image_gray.show() char_mask = np.array(image_gray) char_mask[ char_mask < 50 ] = 0 char_mask[ char_mask > 50 ] = 255 print(char_mask) #im = Image.fromarray(char_mask) #im.show() wordcloud = WordCloud(stopwords=STOPWORDS, background_color='white', #width=1000, #height=1000, max_words=300, mask=char_mask, contour_width=3, contour_color='steelblue', ).generate(text)) image_colors = ImageColorGenerator(np.array(image)) wordcloud.recolor(color_func=image_colors) plt.figure(figsize=[15,15]) plt.imshow(wordcloud, interpolation='bilinear') plt.axis('off') plt.title('Most Popular Words in Title',fontsize = 30) plt.show() BTW: to invert gray scale image you can also use char_mask = ~char_mask # invert gray scale
{ "pile_set_name": "StackExchange" }
As a freelance composer, I am constantly striving to improve my work flow. Work flow is the order or method used to complete a project. While each artist will have their own workflow, it can change depending on the project. Here are some tips on organizing, optimizing and implementing your workflow for whatever project you’re working on: Break the project into smaller parts by mapping it out While this might seem like an obvious starting point, have you ever taken the time to map out every conceivable aspect of your project? Have you researched the work flow of other people in your field? You’d be surprised at how complex a project truly is once you map it out. You may even discover a new aspect to add to it that you hadn’t considered before! You can use this flowchart maker to create a template for use on your projects. You can also create a simple list using evernote to accomplish this. Take a half hour to write out every possible aspect of your project that you can think of, research how other people map out their projects and then create your own project map. The path of least resistance Now that you have your chart ready, you can decide where you want to start. Look through your map and assess which steps are going to be the easiest versus the more difficult ones. Start with the easier ones. Who cares if you’re doing easy work first, you’ve got to get it done eventually, right? Once this is finished, move on to the next easiest item on the map. Sometimes you have to do some of the tough work before you can get to the easier work; maybe you need to have a solid story line established before you can get into the character designs and mechanics. The unavoidable aspect of the path of least resistance is that it will always lead you to more difficult tasks. It is here that we find ourselves getting stuck or unmotivated. Check out my blog post on motivation for what to do if you’re not feeling motivated. For times when we feel stuck or intimidated by one of the tougher tasks, I like to implement the rule of three. The rule of three The most difficult tasks seem to be the ones that we feel the weakest on or have the least experience with. It’s while working on these tasks that I often implement the rule of three. The rule of three is the principle that you will always make at least three different versions of what you’re working on to give you different options to work with. Let’s say that you’re not sure what your character will look like, instead of doubling down on the first draft that you’re not too thrilled on, make two more different versions. Strive to make each version as unique from the others as possible. This will more than likely cause a breakthrough. If you still aren’t making anything that you’re happy with after following the rule of three, follow the rule of three again! If you don’t use these ideas on your current project, you can always save them and use them for something else! Following the rule of three might seem like it’s slowing you down but the benefits are worth the effort. Not only are you giving yourself perspective on what you’re working on, you’re literally sharpening your creativity by giving yourself extra repetitions. It actually gives you more freedom because you know that you have multiple tries to get something right as opposed to being crushed by the pressure if trying to get something right on the first try. The rule of three can be used in any aspect of your project, from what your character’s arms are going to look like to figuring out what type of game you want to make. You can think of the rule of three as a way to implement the path of least resistance on a difficult task. Detachment Developing a game, writing music or creating art tends cause us to focus in like a microscope lens. Its easy to lose perspective on what you’re doing after you’ve put in 3 continuous hours or work a day for several weeks. It’s critical that you learn how to detach from what you’re focused on so that you can gain a wider perspective on things. Perhaps the purest form of detachment is meditation. I simply think of meditation as sitting quietly for a few minutes while gently pushing thoughts away as they try to creep into my mind. You can use meditation virtually at any time and any place. Another form of detachment is getting feedback from someone you trust and respect. Reach out to someone to give you feedback on what you’ve made and try to take in as much advice as you can. If you really want some perspective, you’ll seek advice from several people at once so that you can see the contrasts or consistencies in the feedback! Don’t be afraid to ask for critiques, most people love giving constructive criticism and find it flattering that you would seek their expertise. Another way to detach is to defer to the path of least resistance. Temporarily move on to another aspect of your project in order to give yourself something else to think about (preferably something that contrasts with what you were working on). Mapping your project out, following the path of least resistance, implementing the rule of three and learning how to detach are great ways to keep your workflow moving and will give you options when you are starting to feel stagnant or burned out. Thank you for reading! Good luck on your projects!
{ "pile_set_name": "OpenWebText2" }
Misdiagnosis of atrial fibrillation and its clinical consequences. Computer algorithms are often used for cardiac rhythm interpretation and are subsequently corrected by an overreading physician. The purpose of this study was to assess the incidence and clinical consequences of misdiagnosis of atrial fibrillation based on a 12-lead electrocardiogram (ECG). We retrieved 2298 ECGs with the computerized interpretation of atrial fibrillation from 1085 patients. The ECGs were reinterpreted to determine the accuracy of the interpretation. In patients in whom the interpretation was incorrect, we reviewed the medical records to assess the clinical consequences resulting from misdiagnosis. We found that 442 ECGs (19%) from 382 (35%) of the 1085 patients had been incorrectly interpreted as atrial fibrillation by the computer algorithm. In 92 patients (24%), the physician ordering the ECG had failed to correct the inaccurate interpretation, resulting in change in management and initiation of inappropriate treatment, including antiarrhythmic medications and anticoagulation in 39 patients (10%), as well as unnecessary additional diagnostic testing in 90 patients (24%). A final diagnosis of paroxysmal atrial fibrillation based on the initial incorrect interpretation of the ECGs was generated in 43 patients (11%). Incorrect computerized interpretation of atrial fibrillation, combined with the failure of the ordering physician to correct the erroneous interpretation, can result in the initiation of unnecessary, potentially harmful medical treatment as well as inappropriate use of medical resources. Greater efforts should be directed toward educating physicians about the electrocardiographic appearance of atrial dysrhythmias and in the recognition of confounding artifacts.
{ "pile_set_name": "PubMed Abstracts" }
Q: How can I merge and process multiple rows from a file to produce a report using perl I am new perl just tried with little messy code. cat input1.txt ##gff-version 2 ##source-version geneious 5.6.4 Xm_ABL1 Geneious CDS 1 168 . + . Name=Xm_ABL1;created by=User;modified by=User;ID=w0IVHutPuN4H4FVDCg4sFVRaJjQ.1340919460469.4 Xm_ABL1 Geneious CDS 169 334 . + . Name=Xm_ABL1;created by=User;modified by=User;ID=w0IVHutPuN4H4FVDCg4sFVRaJjQ.1340919460469.4 Xm_ABL1 Geneious CDS 335 628 . + . Name=Xm_ABL1;created by=User;modified by=User;ID=w0IVHutPuN4H4FVDCg4sFVRaJjQ.1340919460469.4 Xm_ABL1 Geneious CDS 629 901 . + . Name=Xm_ABL1;created by=User;modified by=User;ID=w0IVHutPuN4H4FVDCg4sFVRaJjQ.1340919460469.4 Xm_ABL1 Geneious CDS 902 985 . + . Name=Xm_ABL1;created by=User;modified by=User;ID=w0IVHutPuN4H4FVDCg4sFVRaJjQ.1340919460469.4 Xm_ABL1 Geneious CDS 986 1165 . + . Name=Xm_ABL1;created by=User;modified by=User;ID=w0IVHutPuN4H4FVDCg4sFVRaJjQ.1340919460469.4 Xm_ABL1 Geneious CDS 1166 1350 . + . Name=Xm_ABL1;created by=User;modified by=User;ID=w0IVHutPuN4H4FVDCg4sFVRaJjQ.1340919460469.4 Xm_ABL1 Geneious CDS 1351 1504 . + . Name=Xm_ABL1;created by=User;modified by=User;ID=w0IVHutPuN4H4FVDCg4sFVRaJjQ.1340919460469.4 Xm_ABL1 Geneious BLAST Hit 169 334 . + . Xm_ABL1 Geneious extracted region 1 168 . + . Name=Extracted region from gi|371443098|gb|JH556762.1|;Extracted interval="351297 -> 351464" Xm_ABL1 Geneious extracted region 169 334 . + . Name=Extracted region from gi|371443098|gb|JH556762.1|;Extracted interval="371785 -> 371950" Xm_ABL1 Geneious extracted region 335 628 . + . Name=Extracted region from gi|371443098|gb|JH556762.1|;Extracted interval="372554 -> 372847" Xm_ABL1 Geneious extracted region 629 901 . + . Name=Extracted region from gi|371443098|gb|JH556762.1|;Extracted interval="374760 -> 375032" Xm_ABL1 Geneious extracted region 902 985 . + . Name=Extracted region from gi|371443098|gb|JH556762.1|;Extracted interval="375230 -> 375313" Xm_ABL1 Geneious extracted region 986 1165 . + . Name=Extracted region from gi|371443098|gb|JH556762.1|;Extracted interval="375992 -> 376171" Xm_ABL1 Geneious extracted region 1166 1350 . + . Name=Extracted region from gi|371443098|gb|JH556762.1|;Extracted interval="376575 -> 376759" Xm_ABL1 Geneious extracted region 1351 1504 . + . Name=Extracted region from gi|371443098|gb|JH556762.1|;Extracted interval="376914 -> 377067" If input file containg (->) forward arrow.I want output like if($array[7]=~/.*interval=\"\d+ -> \d+\"$/gm){ $array[5]="+"; } cat output1.txt gi_371443098_gb_JH556762.1 gene 351297 377067 . + . Name=Xm_ABL1;created by=User;modified by=User;ID=w0IVHutPuN4H4FVDCg4sFVRaJjQ.1340919460469.4 gi_371443098_gb_JH556762.1 CDS 351297 351464 . + . Name=Xm_ABL1;created by=User;modified by=User;ID=w0IVHutPuN4H4FVDCg4sFVRaJjQ.1340919460469.4 gi_371443098_gb_JH556762.1 CDS 371785 371950 . + . Name=Xm_ABL1;created by=User;modified by=User;ID=w0IVHutPuN4H4FVDCg4sFVRaJjQ.1340919460469.4 gi_371443098_gb_JH556762.1 CDS 372554 372847 . + . Name=Xm_ABL1;created by=User;modified by=User;ID=w0IVHutPuN4H4FVDCg4sFVRaJjQ.1340919460469.4 gi_371443098_gb_JH556762.1 CDS 374760 375032 . + . Name=Xm_ABL1;created by=User;modified by=User;ID=w0IVHutPuN4H4FVDCg4sFVRaJjQ.1340919460469.4 gi_371443098_gb_JH556762.1 CDS 375230 375313 . + . Name=Xm_ABL1;created by=User;modified by=User;ID=w0IVHutPuN4H4FVDCg4sFVRaJjQ.1340919460469.4 gi_371443098_gb_JH556762.1 CDS 375992 376171 . + . Name=Xm_ABL1;created by=User;modified by=User;ID=w0IVHutPuN4H4FVDCg4sFVRaJjQ.1340919460469.4 gi_371443098_gb_JH556762.1 CDS 376575 376759 . + . Name=Xm_ABL1;created by=User;modified by=User;ID=w0IVHutPuN4H4FVDCg4sFVRaJjQ.1340919460469.4 gi_371443098_gb_JH556762.1 CDS 376914 377067 . + . Name=Xm_ABL1;created by=User;modified by=User;ID=w0IVHutPuN4H4FVDCg4sFVRaJjQ.1340919460469.4 ### cat output1.txt If input file containg (<-) reverse arrow. if($array[7]=~/.*interval=\"\d+ <- \d+\"$/gm){ $array[5]="-"; } gi_371443098_gb_JH556762.1 gene 351297 377067 . - . Name=Xm_ABL1;created by=User;modified by=User;ID=w0IVHutPuN4H4FVDCg4sFVRaJjQ.1340919460469.4 gi_371443098_gb_JH556762.1 CDS 351297 351464 . - . Name=Xm_ABL1;created by=User;modified by=User;ID=w0IVHutPuN4H4FVDCg4sFVRaJjQ.1340919460469.4 gi_371443098_gb_JH556762.1 CDS 371785 371950 . - . Name=Xm_ABL1;created by=User;modified by=User;ID=w0IVHutPuN4H4FVDCg4sFVRaJjQ.1340919460469.4 gi_371443098_gb_JH556762.1 CDS 372554 372847 . - . Name=Xm_ABL1;created by=User;modified by=User;ID=w0IVHutPuN4H4FVDCg4sFVRaJjQ.1340919460469.4 gi_371443098_gb_JH556762.1 CDS 374760 375032 . - . Name=Xm_ABL1;created by=User;modified by=User;ID=w0IVHutPuN4H4FVDCg4sFVRaJjQ.1340919460469.4 gi_371443098_gb_JH556762.1 CDS 375230 375313 . - . Name=Xm_ABL1;created by=User;modified by=User;ID=w0IVHutPuN4H4FVDCg4sFVRaJjQ.1340919460469.4 gi_371443098_gb_JH556762.1 CDS 375992 376171 . - . Name=Xm_ABL1;created by=User;modified by=User;ID=w0IVHutPuN4H4FVDCg4sFVRaJjQ.1340919460469.4 gi_371443098_gb_JH556762.1 CDS 376575 376759 . - . Name=Xm_ABL1;created by=User;modified by=User;ID=w0IVHutPuN4H4FVDCg4sFVRaJjQ.1340919460469.4 gi_371443098_gb_JH556762.1 CDS 376914 377067 . - . Name=Xm_ABL1;created by=User;modified by=User;ID=w0IVHutPuN4H4FVDCg4sFVRaJjQ.1340919460469.4 ### I have tried with little messy code, as I am beginner. #usr/bin/perl; use strict; open(FH,"$ARGV[0]"); while(<FH>){ chomp $_; my @array=split("\t"); my $key="$array[2]-$array[0]-$array[1]-$array[2]-$array[3]"; if($array[1] eq "CDS"){ $cds_cnt{$key}++; $cds{$key}="$array[4]\t$array[5]\t$array[6]\t$array[7]"; } if($array[1] eq "extracted region"){ (my $pos1,my $pos2)=($array[7]=~/.*interval=\"(\d+) -> (\d+)\"$/gm); $extract_cnt{$key}++; $extract{$key}="$pos1\t$pos2"; } } foreach $i ( sort {$a<=>$b} keys %cds){ my $a=$i; #print "$i\n"; $a=~s/CDS/extracted region/g; if($cds_cnt{$i} == $extract_cnt{$a}){ #print "$i\t$cds{$i}\n$a\t$extract{$a}\n"; my @array=split /\-/,$i; my @pos=split "\t",$extract{$a}; print "$array[1]\t$array[2]\t$pos[0]\t$pos[1]\t$cds{$i}\n"; } } print "###"; Update What I need to modify in my code 1.To get value from the row of extracted region, (i.e array[7]=/gi|371443098|gb|JH556762.1|/) it can be any value, add underscore to it (i.e gi_371443098_gb_JH556762.1) and print in array[0] in the output1.txt as shown. 2.Add new line as first row while printing (gi_371443098_gb_JH556762.1 gene), in column 3 get starting value of CDS (i.e 351297) and get ending value of CDS in column 4 (i.e 377067) and print as in the first row as shown in ouput1.txt 3.If /extracted region/ block-all rows for.e.g.Extracted interval="351297 -> 351464" (i.e forward arrow) print array[5] as "+" symbol including gene header in the output. if e.g.Extracted interval="351297 <- 351464" (reverse arrow) print array[5] as "-" symbol including gene header in the output. A: It looks like what you're trying to achieve is to merge the details from the line labelled CDS with the matching line labelled extracted region, and then print the merged results with a leading summary header, based on some minimum and maximum values, grouped by Name. Is that correct? I'm going to assume that what you call $array[0] (Xm_ABL1 Geneious) and $array[2] (169, 335 etc) is sufficient to marry them together, but that's not very clear in your example. Your first question is just a regexp, which I think you've got the general hang of. I think the issue is how you've gone about capturing your data. To do the second thing you ask, capture the hi and lo values in your first pass, and store them. I wasn't planning on writing a complete solution, yet here it is... use strict; use warnings; my $metadata = {}; # hashref to store CDS info in.. my $group = {}; # hashref to store summary/detail in.. my $arrow = { "->" => '+', "<-" => '-' }; # decode arrow to pos/neg open(FH,"$ARGV[0]"); while(<FH>){ chomp; next if /^#/; my @array=split("\t"); my $key = join(":", $array[0], $array[2]); if ($array[1] =~ /CDS/){ $metadata->{$key} = $array[7]; } if ($array[1] =~ /extracted region/){ #assert CDS already processed.. die "No CDS record for $key!\n" unless $metadata->{$key}; (my $label = $array[7]) =~ s/.*region from (.*)\|;.*/$1/; $label =~ s/\|/_/g; $group->{$label} ||= { #seed summary if not exists pos1 => 1e10, pos2 => 0, metadata => $metadata->{$key}, sequences => [], }; (my $pos1, my $arr, my $pos2) = ($array[7]=~/.*interval=\"(\d+) (<?->?) (\d+)\"$/gm); # capture hi/lo values for group $group->{$label}->{pos1} = $pos1 if $pos1 < $group->{$label}->{pos1}; $group->{$label}->{pos2} = $pos2 if $pos2 > $group->{$label}->{pos2}; # push this sequence onto the group's array push(@{ $group->{$label}->{sequences} }, [ $pos1, $pos2, $arrow->{$arr} ]); } } for my $gene (sort keys %{ $group }){ #write out header printf "%s\t%s\t%d\t%d\t.\t%s\t.\t%s\n", $gene, 'gene', $group->{$gene}->{pos1}, $group->{$gene}->{pos2}, $group->{$gene}->{sequences}->[0]->[2], $group->{$gene}->{metadata}; foreach my $sequence ( @{ $group->{$gene}->{sequences} } ){ # write out details printf "%s\t%s\t%d\t%d\t.\t%s\t.\t%s\n", $gene, 'CDS', $sequence->[0], $sequence->[1], $sequence->[2], $group->{$gene}->{metadata}; } } print "###\n"; I hope that's sufficiently commented to make sense. Written like this, it will be a lot easier to maintain if you have to come back and modify it after six months has passed. UPDATE I've modified this code following the 4th comment. The $array[7] regexp block now captures the value of $array[5] and stores it in the sequence arrayref. UPDATE #2 Note use of $arrow hashref to decode -> and <- to the symbols you require. (line 6) Gene header shows + or - based on value in 3rd field of first sequence. There's an assumption that all sequences for a gene have the same direction. (11 lines from end) I think we've strayed off the Q&A highway and into the Free Software Development Bureau now. What I've written is not complex code, it has comments and structure. It's time for you to come to grips with the logic of it. And up-vote my answer.
{ "pile_set_name": "StackExchange" }
The oligodendrocyte-specific antibody 'CC1' binds Quaking 7. The mouse monoclonal antibody marketed as anti-adenomatous polyposis coli clone CC1, often referred to as CC1, is the antibody most commonly used to specifically label mature oligodendrocytes without labeling myelin. Previous studies have shown that despite being raised against adenomatous polyposis coli, this antibody binds another unknown antigen. We show that the CC1 antibody binds Quaking 7, an RNA-binding protein that is highly up-regulated in myelinating oligodendrocytes in the central nervous system. The monoclonal antibody anti-adenomatous polyposis coli (APC) clone CC1, is the antibody most commonly used to specifically label the cell bodies of mature oligodendrocytes. Despite being raised against APC, previous studies showed this antibody binds another unknown antigen. We show that the CC1 antibody binds Quaking (QKI) 7, an RNA-binding protein which is highly up-regulated in myelinating oligodendrocytes.
{ "pile_set_name": "PubMed Abstracts" }
Cancer Stem Cells, Epithelial to Mesenchymal Markers, and Circulating Tumor Cells in Small Cell Lung Cancer. Small cell lung cancer (SCLC) has a poor prognosis, and even with localized (limited) disease, the 5-year survival has only been around 20%. Elevated levels of circulating tumor cells (CTCs) have been associated with a worse prognosis, and markers of cancer stem cells (CSCs) and epithelial to mesenchymal transition have been associated with increased chemoresistance and metastatic spread in SCLC. The biopsy specimens of 38 SCLC patients were used for marker evaluation by immunohistochemistry. The markers for CSCs were CD44 and SOX2. The markers for epithelial to mesenchymal transition were E-cadherin, epithelial cell adhesion molecule, cytokeratins 8, 18, and 19, vimentin, and c-MET. Staining was scored as low (weak) or high (strong) intensity for SOX2, epithelial cell adhesion molecule, cytokeratins 8, 18, and 19, and c-MET and using the immunoreactive score for CD44, E-cadherin, and vimentin, expressed as low or high expression. High expression of c-MET (c-METH) and low expression of E-cadherin (E-cadL) showed a trend toward a better prognosis (P = .07 and P = .09, respectively). The combination of c-METH and E-cadL resulted in significantly better survival (P = .007). The tested markers were not associated with CTCs, although a trend was seen for c-METHE-cadL (P = .09) with low CTCs. The CSC markers SOX2 and CD44 were not associated with overall survival in this patient cohort. SCLC with a mesenchymal-like phenotype (c-METHE-cadL) is associated with longer survival and showed a trend toward lower CTCs.
{ "pile_set_name": "PubMed Abstracts" }
Chapter 590: Visiting Ling-Bao Hall Translator: Rain Editor: ChrissyLet alone how powerful Ye Nantian, the Great General was, the House of Ye had the power to wipe out Second Prince’s family in one day and their man could throw Second Prince down off the tower and defeat two great martial artists. Royal House didn’t have the capability to mess with them at all! If the king decided to turn against the House of Ye, he would certainly lose and be laughed at! … Ling-Bao Hall. Ye Xiao was lying on the bed after dealing with some small business. He was thinking of the day when Xiu of the Heavens would bring him more materials. He thought of the nine thousand more meteoric iron, and was filled with happiness… Suddenly… "The king is coming!" It was reported to the entire Ling-Bao Hall! Wan Zhenghao was shouting as loudly as he could. "Sweep the floor! Hurry! Damn it!" "This way! Here…" "There… There!" "You… Hey! Go get on that thing…" "You, you and you…" "Guards, marshals!" "Hurry up! For god’s sake! You assassins get the hell back to your rooms and sleep through it… You will be doomed if you got caught by the royal guards…" "Oh for fxck’s sake! I know you are assassins. You can pretend not, can’t you…" "Hurry! Red carpets…" "Clean it, you fool! Fxck! The front hall is still making deals… I will be damned…" Wan Zhenghao jumped up and down, busy like hell. He was a rich man. He was the richest man in the world! But apparently, he had never met a king so closely! He had received a king before, but it was in the auction. There were so many treasures on sale. The king came to the auction because he should, but he didn’t even say a word to Wan Zhenghao. Now, however, was different. The king came to his place on purpose. That was something he had never experienced before. Boss Wan really hadn’t seen a king so close before. This was record breaking. That was why he was particularly thrilled! It was like there was a clockwork in his butt, making him jump up and down in excitement. His fat face was all red. Wan Zhenghao was definitely better than any king in Land of Han-Yang on wealth, experience, knowledge and age. He could see a king with disdainfulness if he wanted, however, he was just too low. He wasn’t like the richest man in the world at all. He just heard that the king was coming for a visit, and he was so flattered, ready to suck up to the king. That was so low… After that, his excitement was forcibly suppressed down by somebody else. "What is it?" Feng Monarch frowned as he showed a dark face. He showed up at the stairs, looking down at those who were busy doing things with dissatisfaction. "Wan Zhenghao, what the hell are you doing? Are you insane?" Wan rushed over with excitement, talking incoherently, "Monarch, his majesty, his majesty is… is coming…" "So what? Is he an old friend to you whom you haven’t met in bed for a long time?" Feng Monarch looked down at him. "Urh…" Wan Zhenghao felt like he was thrown cold water on. He faltered. "No… I am not that kind." "No… Then why are you acting like you are sexually aroused?" Feng Monarch looked at him with disappointment. "As the boss of Ling-Bao Hall, you should be more sober and steady-going! Understand?" Boss Wan stared at him. He couldn’t believe it. "Monarch, that is the king we are talking about…" He thought maybe Feng Monarch mistook it. He kept emphasizing it, "The king! It’s the king of the Kingdom of Chen… Ahhh…" Feng Monarch took a long breath out and sighed. He looked at Wan Zhenghao with many emotions in the eyes such as ‘mud can never hold the wall’, ’this is so shameful’ and ‘how do I end up having you as my understrapper’. He sighed and said, "I know he is the king. He is the owner of this land. So what? What? Is he going to crown you or something?" Wan Zhenghao was shocked. "No." "Or maybe you want him to give you a chance to be an official?" "Urhh… Maybe he wants to, but I really don’t like it." "Or maybe he will give you money?" "Urh… It is always me giving him money. The kingdom is never going to give us money." "Is he going to swear brotherhood with you?" "Hmm… Maybe he wants to, but I don’t like it either." "Can he give you a wife?" "Maybe he can and he plans to, but I still don’t like it. I don’t need a wife. I don’t need it!" "Will he kill you if he feels offended by you?" "Not really. Even though he may want to, but he wouldn’t dare." "He is going to give you anything you need? What he can offer are things you don’t like. Then why are you so excited?" Ye Xiao looked at him and disappointedly said, "Look at your spiritless face! What the hell did you learn during all the years you have lived?" Wan Zhenghao was enlightened. He was shocked. He felt ashamed! He then gradually realized it. [That’s right. The king comes, so he does. It has nothing good to do to me. Why am I excited? What for?] "Wan Zhenghao, you are the boss of Ling-Bao Hall. You have lived over three thousand years! You are the richest man in the world. You have a group of assassins under your command, including the three top assassins in the league. Ling-Bao Hall has just posted the reward warrant with the biggest bounty in the history! You should stay higher than any king in this world! You must be sober! You must stay firm! You must be stable! Calm down! You are a great figure! Understand?" Feng Monarch was giving him a lesson. Wan Zhenghao was ashamed. He could only agree. "However, things should be done to greet our guest after all. You just need to pay attention to your self-status." Ye Xiao solemnly spoke, "A powerful man’s heart will not be influenced by anybody!" "Thanks for your guidance, Monarch!" Wan Zhenghao was convinced. … The king and his people finally arrived. The first feeling he had was, [Great Ling-Bao Hall indeed!] [So unique!] [The legendary place indeed!] Ling-Bao Hall was quiet and clean. Red carpets were on the floor, and business was paused for the visit. However, the people in it were all steady and calm. They were polite. But they didn’t seem thrilled at all, even when the king arrived! He couldn’t feel any greasiness at all. Only respect, but it stayed within the boundary of respect. The king praised in his mind. [This may be the only group of people I have ever seen who are so polite but not flattering in my country…] He looked over and suddenly got astonished by what he saw! He saw a giant fat guy stepping out from inside the hall. There should be a poem for this unbelievably fat guy. Realms In The Firmament is a Fantasy novels, some original, some translated from Chinese. Themes of heroism, of valor, of ascending to Immortality, of combat, of magic, of Eastern mythology and legends. Updated with awesome new content daily. Come join us for a relaxing read that will take you to brave new worlds! A paradise for readers!
{ "pile_set_name": "Pile-CC" }
Q: Strict convex function? I try to prove that $g(x)= K |x|^2/2 + z(x)$ is strictly convex, given that $z(x) \geq - m(1 + |x|^p)$ with $m \geq 0$, $0 \leq p \leq 2$, forall $x \in \mathbb{R}^n$, provided $K$ is sufficiently large. How to show that? A: The conclusion is false. For example, let $n=1$ and $z(x)=x^2(1+\sin x)\ge 0$. Then no matter how large $K$ is, $f''((2k+\frac{1}{2})\pi)<0$ when $k\in\mathbb{N}$ is large.
{ "pile_set_name": "StackExchange" }
greatest common factor of u and x? 11 Let o = -53 + 56. Suppose -15 = -o*d - 4*q + 25, 4*d + q - 49 = 0. What is the greatest common factor of 156 and d? 12 Let i be -5*36/30 + 46. Calculate the highest common divisor of i and 180. 20 Let y = 12 - 9. Let n = 27 - 18. Calculate the highest common divisor of y and n. 3 Let t be 0/2 + 4 + 34. Let g be (t + 0 - 2)*1. Suppose 0 = -0*o + 2*o - p - 12, 0 = 4*o + 4*p. Calculate the highest common divisor of o and g. 4 Suppose 0 = -0*g + 7*g - 28. Suppose -g*u - 10 = 50. Let n be (9/(-27))/(1/u). Calculate the greatest common divisor of n and 10. 5 Suppose 2*x + 714 = 7*t - 3*t, -2*x = t - 186. Calculate the greatest common factor of 225 and t. 45 Suppose 396 = 3*n - 36. What is the highest common factor of 64 and n? 16 Let s(t) = -7*t + 206. Let p be s(29). What is the greatest common divisor of p and 327? 3 Let p(d) = -d**2 - 16*d + 1. Let o be p(-12). Suppose 0*s - 1 = -3*s - f, -2*s - 2 = -2*f. Suppose s*j = j - o. What is the highest common divisor of j and 7? 7 Let h(y) = -y**3 + 8*y**2 + 32*y + 26. Let g be h(11). Calculate the greatest common factor of 585 and g. 15 Let w be 77/4 - (-49)/(-196). Calculate the greatest common factor of 608 and w. 19 Let a = -100 + 201. Let b be (-10)/15 - (-1 + a/(-3)). What is the highest common factor of b and 102? 34 Let z(j) = -j + 14. Let o be -1 - (-3)/3 - -4. Suppose 2*f + o = -4*a, 5 = -5*f - a + 4. Let x be z(f). What is the greatest common divisor of x and 28? 14 Let h be (-24 - (-1 - -4))/(-2 - -1). Let j = h - 13. What is the highest common factor of 7 and j? 7 Suppose -5*b = 2*w - 5*w - 12, -1 = -2*b + 5*w. What is the highest common factor of 2 and b? 1 Let m(x) = -3*x**2 - 19*x - 6. Let s be m(-7). Suppose 2*r - 6*r - 20 = 0. Let q be s/(-50) + (-28)/r. What is the greatest common factor of q and 30? 6 Let i(v) = 2*v**3 - 2*v**2 + 68*v - 291. Let a be i(4). Calculate the highest common divisor of a and 187. 11 Let y = -18 - -29. Let j be (-3 + -3)*((-15)/50 + (-7)/210). What is the highest common divisor of y and j? 1 Suppose -12 = -2*g + 204. Suppose 5*c + 4*h = -g, -4*c - 45 = -h + 54. Let k = 82 + c. What is the highest common divisor of 145 and k? 29 Suppose -20*g = -3153 - 3567. What is the highest common divisor of g and 16? 16 Suppose 3*n - 19 = 116. Let p = -11 - -19. Suppose -3*x - 5*s = -p*s - 87, -5*x + 3*s + 147 = 0. What is the greatest common factor of x and n? 15 Suppose 956 - 236 = 40*n. What is the highest common divisor of n and 675? 9 Suppose -7*q + 3*q + 108 = 0. Let w be 774/(-4)*2/(-3). Suppose 4*z = 3*f - 223, -2*z + 124 = 3*f - w. What is the highest common factor of f and q? 27 Let p(t) = 8*t**2 - 4*t + 96. Let a be p(-12). What is the highest common divisor of 27 and a? 27 Let h(w) = w + 31. Let d be h(-11). What is the highest common factor of 190 and d? 10 Suppose g - 3 + 0 = 0. Suppose -w - 2 - 1 = -2*x, 2*x = -5*w + 21. Let p(i) = i**2 - 4*i + 9. Let o be p(w). What is the highest common divisor of g and o? 3 Suppose 2*h = -5*x - 10, 2*x - 3*h - 15 = 6*x. Suppose 4*z - 256 = -x*z. Suppose -z = 3*i - 7*i. What is the highest common divisor of 80 and i? 16 Let b = 24 - 32. Let n be b/60 + 17/15. Suppose l = -2*l - 5*q - n, -4*l - 3*q = -6. Calculate the highest common divisor of l and 27. 3 Let m(t) be the second derivative of t**4/12 + 5*t**3/6 + t**2/2 - 16*t. Let c be m(-7). Calculate the greatest common factor of 5 and c. 5 Let f be ((-72)/(-40))/((-2)/(-30)). Suppose 3*w + 287 = 935. Calculate the highest common factor of w and f. 27 Let b = -1271 + 1391. Calculate the greatest common factor of b and 300. 60 Suppose -4*v + 393 = -287. What is the greatest common factor of 51 and v? 17 Let a be (38/12)/((-17)/(-102)). What is the greatest common factor of 2 and a? 1 Suppose 221 = 2*f - 37. What is the highest common factor of 86 and f? 43 Suppose 8*s - 4*s + 136 = 0. Let p = -3 - s. Let k be p + 2*(-6)/(-3). What is the greatest common factor of k and 14? 7 Suppose -5*i = -54 - 6. Let q be (-108)/30 + (-6)/(-10). Let l = 6 + q. What is the highest common factor of l and i? 3 Let m(l) = -l**2 - 5. Let o(z) = z**2 - z + 4. Let h(b) = 3*m(b) + 4*o(b). Let g be h(-4). What is the highest common divisor of 11 and g? 11 Suppose 4*o = -d + 193, d + d - 3*o = 375. What is the greatest common factor of 21 and d? 21 Let l = -708 + 723. Calculate the highest common factor of l and 9. 3 Let n(r) = r**2 + 21*r + 117. Let u be n(-7). What is the highest common factor of 95 and u? 19 Let g(f) = -f - 21*f**3 + f - 1. Let w be g(-1). Let h be (-8 + 4)*30/8*-2. Calculate the greatest common factor of w and h. 10 Let v be 26/(-1)*(-77)/22. Let n = -1 + 14. What is the highest common factor of n and v? 13 Suppose z - 52 = -2*a, 4*a = 2*z - 137 + 33. What is the highest common divisor of z and 91? 13 Let v be 376/(-11)*-1 + (-2)/11. What is the greatest common factor of v and 85? 17 Suppose -2*a + 3*j + 17 = 0, -12 = -2*j - 2*j. Suppose -146 - 205 = -a*i. What is the greatest common divisor of i and 243? 27 Suppose 6258 = 20*f + 1498. Calculate the greatest common divisor of 85 and f. 17 Let n = 104 - 16. Suppose 5*h - n = -33. Calculate the greatest common factor of 33 and h. 11 Let m be (89/(-2))/((-1)/2). Suppose -54 = 3*b - b - 5*r, r - m = 5*b. Let v = b - -18. What is the greatest common divisor of 3 and v? 1 Suppose 0 = 2*b - 5*g + 37, 3*b + 21 = 2*b + 5*g. Suppose -3*p = -5*p + 60. Let j = p + b. Calculate the highest common factor of j and 21. 7 Suppose 2*g = -2*g + 5*x + 102, -4*g = -x - 94. Suppose s + g = 44. What is the highest common factor of 189 and s? 21 Suppose 234 = 3*b - 27. Let g be b + 1*(-4 + 7). Calculate the highest common divisor of 10 and g. 10 Suppose -2*z = 6, 2*l = -z + 31 - 2. Suppose l*d = 15*d + 18. Calculate the greatest common factor of 90 and d. 18 Suppose 0 = 4*b + 5*n - 102 - 8, 3*n - 84 = -3*b. What is the greatest common factor of b and 378? 6 Let x be (-3 - (-33)/15)/((-5)/175). What is the highest common factor of 161 and x? 7 Suppose -3*o - 2 = w - 47, 47 = 4*o - 3*w. Suppose -o + 338 = 4*a. Calculate the highest common divisor of 9 and a. 9 Suppose -6 - 94 = -4*n. Suppose 5*f - n = 4*f. Let t(w) = -6*w + 175. Let m be t(25). Calculate the greatest common factor of f and m. 25 Let n = 138 - 106. What is the greatest common factor of n and 8? 8 Let a(r) = r + 35. Let d be a(-9). Suppose 3*l - 266 = -32. What is the highest common divisor of d and l? 26 Let u = 0 + 1. Let z(s) = s**2 - 84*s + 1051. Let q be z(69). Calculate the greatest common factor of q and u. 1 Suppose 5*y - 690 = -5*l, -20*y + 6 = -23*y. Let a(k) = -57*k**3 - 1. Let g be a(-1). What is the greatest common divisor of l and g? 28 Suppose 18 = y + 5*r - 453, 5*r = y - 431. Calculate the highest common divisor of y and 22. 11 Let h(k) = -37*k**3 + 2*k + 1. Let b be h(-1). Let y = -119 - -209. What is the greatest common factor of b and y? 18 Let q be (-393)/(-6) + 6/(-12). Suppose -68*t = -q*t - 42. What is the highest common divisor of 35 and t? 7 Let s be (-3)/(((-90)/(-312))/(-5)). Calculate the greatest common divisor of s and 28. 4 Let s = 0 + 12. Let p be (1/(-2) + 1)/(14/84). What is the highest common factor of p and s? 3 Suppose 3*w = -2*w - 30. Let h be (-72)/3*w/8. Calculate the highest common factor of 6 and h. 6 Suppose -41*u + 895 + 1032 = 0. Let i be -2 + 1 - 96/(-2). What is the highest common divisor of u and i? 47 Let k be ((-2)/(-4))/((-2)/(-20)). Let q = 8 - k. Let g(b) = -b**2 - 25*b - 82. Let c be g(-21). Calculate the greatest common factor of c and q. 1 Suppose 11*n - 368 = 94. What is the greatest common factor of 14 and n? 14 Suppose -2*q - 45 = -7*q. Let v(o) = -o**2 + 12*o - 9. Let z be v(q). Suppose -7*k + 90 = -6*k. Calculate the greatest common divisor of z and k. 18 Let z(r) = -59*r + 6. Let w be (-42)/18 - (-2)/(-3). Let p be z(w). Let q = 303 - p. Calculate the highest common factor of 48 and q. 24 Let j(q) = 155*q**2 + 21*q + 19. Let r be j(-1). Calculate the greatest common factor of 36 and r. 9 Let d be (50/(-15))/((-4)/6). Let j(v) = 0*v - 4*v - d - 1. Let z be j(-7). What is the greatest common factor of 55 and z? 11 Let p(t) = -3*t**2 - t - 9. Let u be p(-4). Let g = u - -58. Calculat
{ "pile_set_name": "DM Mathematics" }
We aspire to nurture artistic ability in people of all ages. We create a supportive, non-competitive, community-based environment in which all can strive for creative excellence. The Valhalla Fine Arts Society is a registered charitable organization . Educate We offer summer and after-school programs in music, theatre and dance to students of all ages, led by high quality instructors. Support Our bursary programs assist young people with the cost of studying music privately or taking part in our programming. Present We present performances throughout the year by youth, program alumni and professionals. Where we play . . . . . . . Connector. Beauty Overlooked by mountains on all sides, just far enough off the beaten path to remain relatively undiscovered, the little villages of New Denver and Silverton boast million-dollar views. Connector. Health Clean air, clean water, and a slower pace of life. You can breathe deeply here.
{ "pile_set_name": "Pile-CC" }
Tag Archives: Covid-19 It is generally acknowledged that New Zealand’s Covid-19 Strategy has been one of the most successful throughout the world in tackling the virus. Jacinda Ardern, the Prime Minister of New Zealand (pictured above), announced this week that the country’s health … Continue reading → All the flights and flight-inclusive holidays on this website are financially protected by the ATOL scheme under Silver Fern Holidays ATOL number 5305. When you pay you will be supplied with an ATOL Certificate. Please ask for it and check to ensure that everything you booked (flights, hotels and other services) is listed on it. Please see our booking conditions for further information or for more information about financial protection and the ATOL Certificate go to: www.atol.org.uk/ATOLCertificate.
{ "pile_set_name": "Pile-CC" }
Q: Crypto++ and garbage at end of string after performing AES decryption I am integrating Crypto++ into my C++ app and so far it's working, almost. The encryption works perfect. The output matches what I would expect it to. However, when I go to decrypt, it's adding square characters on the end. Here is my Encrypt function: string Encryption::EncryptAES(const string &text, const string &key) { string cipher; AES::Encryption aes((byte *) key.c_str(), 32); ECB_Mode_ExternalCipher::Encryption ecb(aes); StreamTransformationFilter encrypt(ecb, new StringSink(cipher), StreamTransformationFilter::ZEROS_PADDING); encrypt.Put(reinterpret_cast<const unsigned char *>( text.c_str()), text.length() + 1); encrypt.MessageEnd(); return Base64::Encode(cipher); } Here is my Decrypt function: string Encryption::DecryptAES(const string &text, const string &key) { string decoded; Base64::Decode(text, decoded); string decrypted; AES::Decryption aes((byte *) key.c_str(), 32); ECB_Mode_ExternalCipher::Decryption ecb(aes); StreamTransformationFilter decrypt(ecb, new StringSink(decrypted), StreamTransformationFilter::ZEROS_PADDING); decrypt.Put(reinterpret_cast<const unsigned char *>( decoded.c_str()), decoded.length()); decrypt.MessageEnd(); return decrypted; } I'm using the following for the Base64 Encode/Decode: Base64 Encode/Decode Here is the code I call to encrypt/decrypt: string encryptedPass = EncryptAES(value, key); cout << "Encrypted Text: " << encryptedPass << endl; string decryptedPass = DecryptAES(encryptedPass, key); cout << "Decryped Text: " << decryptedPass << endl; Here is the output: When I copy and past the output into Notepad++, it's a bunch of spaces. I have a feeling it deals with the ZEROS_PADDING, but I need that in there to match our other applications that we are using. I'm not sure how to actually try to fix this. Thoughts? A: Based on the comments I was able to figure out what was at the end of the string. I knew it had to deal with zero padding, but due to being new at C++, I didn't fully understand what was going on. I ran this to get the ascii value of the character: for(char& c : s){ cout << "Char:" << (int)c << endl; } This resulted in the following at the end of the string: Char:0 Char:0 Char:0 Char:0 Char:0 Char:0 And according to the ASCII table it's NUL So, the simple solution for this is to do this: std::string(value.c_str());
{ "pile_set_name": "StackExchange" }
Understanding how memory develops in the immune system is an important issue in basic science and in clinical medicine, both in terms of promoting an immune response and, conversely, in blocking the pathway that leads to an overactive state (allergy, autoimmunity). However, the mechanisms underlying the generation of memory lymphocytes are poorly understood. This proposal is aimed at answering the important question of whether the generation of memory T cells is associated with a stable alteration of cytokine expression. We focus here on the generation of mouse CD4+ memory T cells that help B cell antibody responses (memory helper T cells) in relation to attainment of the capacity to secrete IL- 4. We wish to distinguish whether there are pre-existing CD4+ subsets committed to this IL-4 potential, or instead whether such subsets are generated de novo by a maturation process following antigenic stimulation. We will examine TCR-V gene usage of CD4+ subsets by establishing T hybrids from a 2B4 TCR Vbeta (or Valpha) transgenic mouse to determine whether the cell subsets capable of rapid IL-4 secretion ("IL-4+") show restricted TCR V-gene usage, evidence for antigenic selection. Then we will attempt a direct demonstration of IL-4- naive cell transition to IL-4+ cells at the single cell level. Finally, we will examine whether memory T helper cells are already committed to a specific cytokine potential or not. If we can demonstrate that IL-4+ cells are produced during the process of memory T cell generation, then this provides an important concept of lymphocyte maturation; that is, specialization of effector function similar to memory B cell generation characterized by immunoglobulin isotype switch. These studies will provide greater understanding of the generation and function of memory cells in the immune system, both in normal and diseased states.
{ "pile_set_name": "NIH ExPorter" }
Q: Update Data Source and DataSet reference for SSRS 2012 Deployment from C# EDIT: I think I can simplify this question a bit to ask for only what is needed to know: I am working with C# using the SSRS 2010 Web Service: 'ReportService2010.asmx' http://technet.microsoft.com/en-us/library/ee640743.aspx I can use the method 'CreateDataSource' to create a Datasource on an instance of an SSRS Server http:// (servername)/ReportServer. I can also use the method 'CreateCatalogItem' to create a report on a server from referencing a project's RDL local file to serialize it to a byte array and then pass that as a 'Definition' to the method to create it on the server. Now everything I do works with a caveat, and a major one. I can only deploy everything to the same folder. If I deploy a Data Source to say the 'Data Sources' folder and then a report to say: 'Test Reports', the report does not know it has a shared data source to reference at a different location. So I dug a little at the technet articles and have tried to 'GetItemDataSources' method but it only gives a name and a type for the ReportingService2010.DataSource return type. Does anyone know the method to link up a 'Report' or 'Dataset's CatalogItem property of 'DataSource', so it points to a reference in a different folder on the SSRS Server when deploying? There has to be a way to do it as I know I can deploy from Business Intelligence Development Studio and it can do this. A: I've had similar issues when deploying report files; when deploying through rs.exe or code you run into these issues where reports lose their link to a Data Source. We solved this by explicitly pointing the report to the server-side Data Source immediately after being deployed by our application; is this similar to what you're trying to do? Anyway, here's the slightly adapted code we use in our report deployment application: static void SetReportDataSource(string reportPath) { string dsPath = CombinePath(DataSourcePath, DataSourceFolder, DataSourceName); DataSourceReference dsRef = new DataSourceReference() { Reference = dsPath }; DataSource ds = new DataSource(); ds.Item = dsRef as DataSourceDefinitionOrReference; ds.Name = DataSourceName; var rptDataSources = Server.GetItemDataSources(reportPath); foreach (var rptDs in rptDataSources) { Server.SetItemDataSources(filePath, new DataSource[] { ds }); } } So, basically we have variables that define information like the Data Source name, Data Source location on server, and the same for a report. They can be in different folders. Based on this, we create a new reference to a Data Source and then repoint the report to this using SetItemDataSources. This sorted out the Data Source issue for me, anyway. Not sure about Shared Datasets and how they handle all of this, but hopefully this will be of some help. Also, just thought that this would be using the ReportService2005 endpoint, but it's probably not too different for ReportService2010. Edit: For the paths mentioned here, these are relative to the server, e.g. /Reports/. You don't need the fully qualified name as you define the Url property of the ReportService2010 object which contains the destination.
{ "pile_set_name": "StackExchange" }
Q: Codeginiter: Get the a URI segment of a page and add it to the URL of its redirect page So I have these 2 pages IF the URL of page1 is: http://localhost/project/page1/page1/5 And there's a link in that page that redirects to page2 with the URL: http://localhost/project/page2/page2/2 (its 3rd segment - 2 is from dropdown value selected) Is it possible to make the redirected page - page2 with a URL like this: http://localhost/project/page2/page2/5/2 -so that I could do something with page1's value, like querying dynamically in the database. VIEW in page1: <div class="form-group form-inline"> <select id="p2_val"> <?php foreach($v_p2 as $row) { ?> <option value="<?php echo base_url('page2/page2/').$row->p2_val;?>"> <?php echo $row->p2_num; ?> </option> <?php } ?> </select> <input class="SubmitButton" type="submit" name="SUBMITBUTTON" value="Submit" /> </div> Controller in page1: class Page1 extends CI_Controller{ public function __construct() { parent::__construct(); $this->load->model('page1_model'); } public function page1(){ if($this->session->userdata('logged')){ $this->load->model('page1_model'); $data["v_p2"] = $this->page1_model->v_p2($this->session->userdata('user_id')); $this->load->view('pages/page1', $data); $this->load->view('templates/footer'); } } Controller of page2: class Page2 extends CI_Controller{ public function __construct() { parent::__construct(); $this->load->model('page2_model'); } public function page2(){ if($this->session->userdata('logged')){ $this->load->model('page2_model'); $data["get_p2"] = $this->page2_model->get_p2($this->session->userdata('user_id')); $this->load->view('pages/page2', $data); $this->load->view('templates/footer'); } } A: I changed view of page1 into: <option value="<?php echo base_url('page2/page2/').$row->p1_val.'/'.$row->p2_val;?>"> <?php echo $row->p2_num; ?> </option> No change in the controllers, just worked around with models by using: $this->uri->segment(); - Most changes were then in the db queries I made. - Since I added additional segment in page2, I added " ../ " to the paths of the assets. sample - model for page2: function v_p2($data){ $p1_val = $this->uri->segment(3); $p2_val = $this->uri->segment(4); //DO smth with $p1_val & $p2_val //These values were used for querying }
{ "pile_set_name": "StackExchange" }
Thomas Shanks (Virginia politician) Thomas Shanks (July 15, 1796– May 7, 1849) was an American slave owner and politician who won three elections to represent Botetourt County in the Virginia House of Delegates. Early and family life Born near what would become Amsterdam, Virginia, Thomas Shanks was the son of the former Hannah Morrison and her husband David Shanks. Thomas Shanks survived two wives. He married Grace Metcalfe Thomas (1795-1833) in 1825, and she bore two daughters and a son who survived their parents. Five years after her death, Thomas Shanks married widow Mary T. Harvey Kyle (1797-1845) in June 16, 1838, but had no further children in the seven years before her death. Career Botetourt County voters first elected Shanks to represent them (part-time) as one of Botetourt County's two representatives in the Virginia House of Delegates in 1829. He temporarily unseated veteran politician and lawyer Fleming B. Miller and served alongside lawyer and manufacturer John T. Anderson, who would become a veteran legislator. Nearly a decade later, in 1837, Botetourt County voters elected Shanks once again as one of their delegates, this time alongside Whig and fellow slaveowner William M. Peyton, and re-elected both men that fall, although the following year a census realignment cut the county's representation to just one man, Joseph Hannah. Thomas Shanks may have been a merchant (or even a slave trader), for the New and Comprehensive Gazetteer of Virginia published by Joseph Martin in 1835 described six mercantile establishments in Fincastle, as well as 3 churches and 260 homes. One of the general stores was run by Kyles, another by Utz and Hannah, and another by Shanks and Anderson. However, Thomas Shanks' name does not appear in the 1830 U.S. federal census (the enumerator found only David, Christian and Lewis Shanks in Botetourt County). In the 1840 U.S. Federal census, the last before his death as well as the last before listing occupations, Thomas Shanks appears on both the Fincastle page (as head of a household consisting of 4 free white persons and 11 slaves, mostly female), as well as on the general Botetourt County census enumeration (as owning 36 enslaved males). Death Thomas Shanks died on May 7, 1849 (aged 52) and is buried at the Fincastle Presbyterian Church cemetery. His son, Rev. David William Shanks (1830-1894), would receive a degree from Washington College, become a minister in Rockbridge County and later in Danville, survive the American Civil War and likewise marry twice. Thomas Shanks' two daughters who survived him were: Grace Ellen Shanks Glasgow (1826-1897) (second wife of William A. Glasgow and both of whose sons would graduate from Washington and Lee University and become lawyers) and Eliza Cassandra Shanks McPheeters (1827-1872). Rev. D.W. Shanks neither owned slaves nor enlisted in the military, and in addition to his sons Lewis and David Shanks, had three long-lived but unmarried daughters: Margaret Cabell Shanks (1867–1935), Eliza McPheeters Shanks (1868–1938) and Juliet Irvine Shanks (1869–1958). References Category:1796 births Category:1849 deaths Category:People from Fincastle, Virginia Category:Members of the Virginia House of Delegates Category:19th-century American politicians
{ "pile_set_name": "Wikipedia (en)" }
Facebook is facing an existential crisis and moral reckoning. Last week, Mark Zuckerberg Mark Elliot Zuckerberg2.5 million US users register to vote using Facebook, Instagram, Messenger Hillicon Valley: Trump's ban on TikTok, WeChat in spotlight | NASA targeted by foreign hackers | Instagram accused of spying in lawsuit The Hill's Morning Report - Sponsored by The Air Line Pilots Association - Trump contradicts CDC director on vaccine, masks MORE, Facebook’s chief executive, finally broke his deafening silence to apologize for the stunning misuse of 50 million Americans’ personal data by Cambridge Analytica to sow chaos online and “fight a culture war in America.” ADVERTISEMENT In the wake of these reports, Facebook has hemorrhaged investors and advertisers, losing more market value in several days than Uber’s entire estimated worth. Even more importantly, it has lost Americans’ confidence that Facebook is not merely an engine of corporate surveillance more interested in turning a quick advertising buck than protecting our privacy and democracy. This latest crisis of public confidence has been years in the making. In 2010, Facebook responded to widespread concerns about its opaque data policies by promising to make its privacy settings easier, and promised consumers that “[w]e don’t share your information with advertisers. Our targeting is anonymous. We don’t identify or share names. Period.” This was, of course, not true. Facebook did sell Americans' personal data to advertisers without consent. Later that year, another report confirmed that Facebook shared the data of tens of millions users—including friends of friends and “people who set their profiles to Facebook’s strictest privacy settings”—despite making assurances that it would fix this problem through tighter control over data used by third-party apps. And in 2011, Facebook settled charges brought by the Federal Trade Commission (FTC) that it “deceived consumers by telling them they could keep their information on Facebook.” Even though this settlement barred Facebook from misrepresenting consumers’ privacy or security on Facebook, you guessed it: this was yet another broken promise. Professor Tim Wu of Columbia Law School attributes Facebook’s pattern of recidivism and unwillingness to address systemic abuse on its platform to its core business model as a surveillance machine: “They get as much data as they can, and they promise advertisers that they’re able to manipulate us, and that is at the core.” But this is just the tip of the iceberg. Despite its pledge to work with Congress and security researchers to investigate election interference, Facebook has instead attempted to elude congressional oversight of this matter while preventing researchers from analyzing the extent of misinformation and propaganda on Facebook. Facebook funneling Americans’ access to quality journalism and trustworthy sources of information threatens the very existence of the free and diverse press, a lynchpin of our constitutional democracy that is key to rooting out corruption and holding the government and powerful corporations accountable. Internationally, human rights experts say that Facebook has played a “determining role” in ethnic violence in Myanmar, similar to the role of extremist radio in enabling unimaginable violence and death in Rwanda. Facebook has also been outright blocked in other countries due to its role in spreading and amplifying hate speech. Taken together, this string of broken promises and patterns of abuse illustrate why we need more than empty assurances from Facebook. Americans expect more from Facebook than the same empty promises from before. And they expect more from Congress than non-public briefings conducted by Facebook’s lobbyists and mid-level staff. That’s why Mark Zuckerberg must appear before Congress to be held to account for Facebook’s moral failure. Cicilline represents Rhode Island’s 1st District and is ranking member of the Judiciary Committee’s Antitrust Subcommittee.
{ "pile_set_name": "OpenWebText2" }
Q: How to provide reasonable default bounds for Google Places API's getAutocompletePredictions() method? I am using this method: Places.GeoDataApi.getAutocompletePredictions(googleApiClient, query, bounds, AutocompleteFilter.create(null)) It requires a LatLntBounds object with a northeast and a southwest LatLng points as the bounds of the query, but I dont want to provide any. Tried with null, but got a null pointer exception Tried with: LatLng southWest = new LatLng(85, -180); LatLng northEast = new LatLng(-85, 180); LatLngBounds bounds = new LatLngBounds(southWest, northEast); but got IllegalArgumentException: southern latitude exceeds northern latitude (85.0 > -85.0) So how do I: a) get the current user location's reasonable bounds b) get the world bounds so that I can kickstart this API A: It requires the bounds to work. Just create them. import com.google.maps.android.SphericalUtil; final double HEADING_NORTH_EAST = 45; final double HEADING_SOUTH_WEST = 215; final double diagonalBoundsSize = 1000; // 1km LatLng centre = new LatLng(85, -180); LatLng northEast = SphericalUtil.computeOffset(centre, diagonalBoundsSize / 2, HEADING_NORTH_EAST); LatLng southWest = SphericalUtil.computeOffset(centre, diagonalBoundsSize / 2, HEADING_SOUTH_WEST); LatLngBounds bounds = new LatLngBounds(southWest, northEast);
{ "pile_set_name": "StackExchange" }
Q: Can micronaut work with gateways like zuul or spring cloud gateway? The main issue is the compatibility of the registry. If not, how to deal with gateway issues? A: Depends what you mean. You can use Zuul or Spring Cloud Gateway as your gateway solution in front of a Micronaut application. Ultimately a Micronaut application will register itself with Eureka or Consul and then Zuul or SCG will discovery the service via service discovery and route requests to the Micronaut app over HTTP.
{ "pile_set_name": "StackExchange" }
Regional Winners 2015 Commonwealth Short Story Prize 30-Apr-2015 Commonwealth Writers announced the regional winners of the 2015 Commonwealth Short Story Prize on 28th April, 2015. The Prize provides a platform for writers from the 53 countries of the Commonwealth to inspire others by bringing compelling short stories to a wider audience. This year unpublished stories were entered by 4,000 writers from the five regions of the Commonwealth. The international judges reflect these regions: Leila Aboulela, (Africa), Bina Shah (Asia), Marina Endicott (Canada and Europe), Fred D’Aguiar (the Caribbean) and Witi Ihimaera (the Pacific). This year’s Chair, Romesh Gunesekera, said of the winning stories: ‘We had a strong short-list of stories from around the world that excited the judges and provoked a lively, stimulating set of discussions. The judges were looking for well-crafted stories that were compelling and original. The standards were high. We wanted stories that would engage us and make us rethink our notions of form, language and what mattered. The winning stories did all of that and more. Thank you writers.’ From the exuberant tone of ‘King of Settlement 4’, rooted in the language and place of Trinidad, to the beautifully written and evocative ‘Famished Eels’ set in Fiji but which crosses continents, these best of the prize entries show the diversity and range of stories across the Commonwealth. Events to celebrate the regional winners will be held in local venues and locations, relevant to the individual authors, across the world, including a Chinese restaurant in London, a book store in New Delhi and a literary centre in Minneapolis, USA. The regional winners will compete with each other to become the overall winner, which will be announced in London on 8 September. Further details of the authors and links to their winning stories can be found on the regional winners page. www.commonwealthwriters.org/2015-commonwealth-short-story-prize-regional-winners Commonwealth Writers has a partnership with Granta magazine which each year publishes some of the regional winners on Granta online. The 2015 Commonwealth Short Story Prize is part funded by the Sigrid Rausing Trust. Commonwealth Writers also has an association with the London-based literary and media agency Blake Friedmann, which will work with selected writers identified through the Prize.
{ "pile_set_name": "Pile-CC" }
var addSorting = (function () { "use strict"; var cols, currentSort = { index: 0, desc: false }; // returns the summary table element function getTable() { return document.querySelector('.coverage-summary table'); } // returns the thead element of the summary table function getTableHeader() { return getTable().querySelector('thead tr'); } // returns the tbody element of the summary table function getTableBody() { return getTable().querySelector('tbody'); } // returns the th element for nth column function getNthColumn(n) { return getTableHeader().querySelectorAll('th')[n]; } // loads all columns function loadColumns() { var colNodes = getTableHeader().querySelectorAll('th'), colNode, cols = [], col, i; for (i = 0; i < colNodes.length; i += 1) { colNode = colNodes[i]; col = { key: colNode.getAttribute('data-col'), sortable: !colNode.getAttribute('data-nosort'), type: colNode.getAttribute('data-type') || 'string' }; cols.push(col); if (col.sortable) { col.defaultDescSort = col.type === 'number'; colNode.innerHTML = colNode.innerHTML + '<span class="sorter"></span>'; } } return cols; } // attaches a data attribute to every tr element with an object // of data values keyed by column name function loadRowData(tableRow) { var tableCols = tableRow.querySelectorAll('td'), colNode, col, data = {}, i, val; for (i = 0; i < tableCols.length; i += 1) { colNode = tableCols[i]; col = cols[i]; val = colNode.getAttribute('data-value'); if (col.type === 'number') { val = Number(val); } data[col.key] = val; } return data; } // loads all row data function loadData() { var rows = getTableBody().querySelectorAll('tr'), i; for (i = 0; i < rows.length; i += 1) { rows[i].data = loadRowData(rows[i]); } } // sorts the table using the data for the ith column function sortByIndex(index, desc) { var key = cols[index].key, sorter = function (a, b) { a = a.data[key]; b = b.data[key]; return a < b ? -1 : a > b ? 1 : 0; }, finalSorter = sorter, tableBody = document.querySelector('.coverage-summary tbody'), rowNodes = tableBody.querySelectorAll('tr'), rows = [], i; if (desc) { finalSorter = function (a, b) { return -1 * sorter(a, b); }; } for (i = 0; i < rowNodes.length; i += 1) { rows.push(rowNodes[i]); tableBody.removeChild(rowNodes[i]); } rows.sort(finalSorter); for (i = 0; i < rows.length; i += 1) { tableBody.appendChild(rows[i]); } } // removes sort indicators for current column being sorted function removeSortIndicators() { var col = getNthColumn(currentSort.index), cls = col.className; cls = cls.replace(/ sorted$/, '').replace(/ sorted-desc$/, ''); col.className = cls; } // adds sort indicators for current column being sorted function addSortIndicators() { getNthColumn(currentSort.index).className += currentSort.desc ? ' sorted-desc' : ' sorted'; } // adds event listeners for all sorter widgets function enableUI() { var i, el, ithSorter = function ithSorter(i) { var col = cols[i]; return function () { var desc = col.defaultDescSort; if (currentSort.index === i) { desc = !currentSort.desc; } sortByIndex(i, desc); removeSortIndicators(); currentSort.index = i; currentSort.desc = desc; addSortIndicators(); }; }; for (i =0 ; i < cols.length; i += 1) { if (cols[i].sortable) { el = getNthColumn(i).querySelector('.sorter'); if (el.addEventListener) { el.addEventListener('click', ithSorter(i)); } else { el.attachEvent('onclick', ithSorter(i)); } } } } // adds sorting functionality to the UI return function () { if (!getTable()) { return; } cols = loadColumns(); loadData(cols); addSortIndicators(); enableUI(); }; })(); window.addEventListener('load', addSorting);
{ "pile_set_name": "Github" }
Factor VIII procoagulant protein interacts with phospholipid vesicles via its 80 kDa light chain. In a previous report, we detailed fractionation of polyclonal human anti-Factor VIII:C into a component directed exclusively against the phospholipid-binding site on Factor VIII (PL-site antibody) and another directed at other sites (non-PL-site antibody). The location on the F.VIII molecule of its PL-binding site has now been studied by two different methods using this fractionated 125I-labelled anti-F.VIII:C Fab'. The first method was modified from that of Weinstein et al. (Proc Natl Acad Sci USA 1981; 78: 5137-41), involving electrophoresis of F.VIII peptide-125I-Fab' A/F.VIII immunocomplexes in SDS-polyacrylamide gels. PL-site antibody reacted with F.VIII peptides of apparent Mr approximately 80 kDa and sometimes 160 kDa in plasma and concentrate, but not with larger peptides. Non-PL-site antibody, however, reacted with a range of peptides of apparent Mr 90 kDa to 280 kDa. In addition, when purified F.VIII containing heavy and light chains (HC + LC), and isolated LC peptides were analysed, PL-site antibody bound to LC peptides whereas non-PL-site antibody did not. The second method used the antibody pools in immunoradiometric assays (IRMA's) of purified F.VIII peptides. Both labels measured similar amounts of F.VIII:Ag in a sample of purified F.VIII containing both HC and LC; on assaying an HC preparation, however, PL-site label measured only 2% of F.VIII:Ag found by non-PL-site label, indicating that PL-binding sites are absent in HC preparations. These results indicate that F.VIII binds to PL via its 80 kDa light chain.
{ "pile_set_name": "PubMed Abstracts" }
Nowmaleh-ye Sofla Nowmaleh-ye Sofla (, also Romanized as Nowmāleh-ye Soflá; also known as Nīm Allāh, Noh Māleh, and Now Māleh) is a village in Qaedrahmat Rural District, Zagheh District, Khorramabad County, Lorestan Province, Iran. At the 2006 census, its population was 39, in 7 families. References Category:Towns and villages in Khorramabad County
{ "pile_set_name": "Wikipedia (en)" }
/* * Copyright 2016 Facebook, Inc. * * Licensed under the Apache License, Version 2.0 (the "License"); * you may not use this file except in compliance with the License. * You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * See the License for the specific language governing permissions and * limitations under the License. */ #include <folly/portability/SysUio.h> #include <errno.h> #include <stdio.h> #include <folly/ScopeGuard.h> #include <folly/portability/SysFile.h> #include <folly/portability/Unistd.h> template <class F, class... Args> static int wrapPositional(F f, int fd, off_t offset, Args... args) { off_t origLoc = lseek(fd, 0, SEEK_CUR); if (origLoc == off_t(-1)) { return -1; } if (lseek(fd, offset, SEEK_SET) == off_t(-1)) { return -1; } int res = (int)f(fd, args...); int curErrNo = errno; if (lseek(fd, origLoc, SEEK_SET) == off_t(-1)) { if (res == -1) { errno = curErrNo; } return -1; } errno = curErrNo; return res; } #if !FOLLY_HAVE_PREADV extern "C" ssize_t preadv(int fd, const iovec* iov, int count, off_t offset) { return wrapPositional(readv, fd, offset, iov, count); } #endif #if !FOLLY_HAVE_PWRITEV extern "C" ssize_t pwritev(int fd, const iovec* iov, int count, off_t offset) { return wrapPositional(writev, fd, offset, iov, count); } #endif #ifdef _WIN32 template <bool isRead> static ssize_t doVecOperation(int fd, const iovec* iov, int count) { if (!count) { return 0; } if (count < 0 || count > folly::kIovMax) { errno = EINVAL; return -1; } if (lockf(fd, F_LOCK, 0) == -1) { return -1; } SCOPE_EXIT { lockf(fd, F_ULOCK, 0); }; ssize_t bytesProcessed = 0; int curIov = 0; void* curBase = iov[0].iov_base; size_t curLen = iov[0].iov_len; while (curIov < count) { int res = 0; if (isRead) { res = read(fd, curBase, (unsigned int)curLen); if (res == 0 && curLen != 0) { break; // End of File } } else { res = write(fd, curBase, (unsigned int)curLen); // Write of zero bytes is fine. } if (res == -1) { return -1; } if (res == curLen) { curIov++; if (curIov < count) { curBase = iov[curIov].iov_base; curLen = iov[curIov].iov_len; } } else { curBase = (void*)((char*)curBase + res); curLen -= res; } if (bytesProcessed + res < 0) { // Overflow errno = EINVAL; return -1; } bytesProcessed += res; } return bytesProcessed; } extern "C" ssize_t readv(int fd, const iovec* iov, int count) { return doVecOperation<true>(fd, iov, count); } extern "C" ssize_t writev(int fd, const iovec* iov, int count) { return doVecOperation<false>(fd, iov, count); } #endif
{ "pile_set_name": "Github" }
INTRODUCTION ============ The great benefits of using nanomaterials in modern technologies are no longer questioned. However, the potential negative effects associated with the propagation and accumulation of nanomaterial components, such as nano-particles and nanofibers in the environment, require further study \[[@R1], [@R2]\]. Plants are the major components of ecosystems; subsequently, significant attention should be paid to the effects of various technogenical materials upon them \[3--[@R5]\]. Carbon nanomaterials (CNM), such as fullerenes, multi-walled carbon nanotubes (MWNTs), and single-walled carbon nanotubes (CWNTs), are a matter of special interest, as their industrial production is rapidly developing. Since nanotubes have a fibrillar form, they are compared with asbestos \[[@R6]\]. In light of such an analogy, potential adverse effects on living organisms can be anticipated \[[@R7]\]. Preliminary studies have provided evidence that MWNTs and SWNTs are pathogenic to animals \[[@R8]\], yet they have different effects on plants. MWNTs were shown to considerably increase the growth rate of tomato seedlings \[[@R9]\], have no effect on the growth parameters of wheat \[[@R10]\], and inhibit the growth of rice seedlings \[[@R11]\]. SWNTs have been shown to suppress the growth of tomato roots, but stimulate the root growth of onion and cucumber \[[@R12]\]. In contrast, MWNTs have a toxic effect on *Arabidopsis* cultured cells. \[[@R13]\]. High adsorption of MWNT/SWNT on the roots of seedlings was observed in all the experiments conducted. However, the penetration, uptake and accumulation of MWNTs/SWNTs in plant cells and tissues are not well documented . Furthermore, the mechanism of the development of the physiological changes caused by the exposure of plants to nanotubes also remains unclear. The present work was aimed at studying the effect of the industrial nanomaterial Taunit, containing MWNTs, on *O. arenaria* seedlings, and the ability of MWNTs to penetrate and accumulate in plant cells and tissues. EXPERIMENTAL PART ================= **Object of the study** The object of the present study is industrial CNM Taunit (NanoTechCenter Ltd., Tambov, Russia). This material is a loose black powder, composed of grainy agglomerates with a size of several micrometers. Agglomerates mostly consist of entangled MWNT bundles. MWNTs have a hollow cylindrical structure; at least 2 µm long, with an external diameter of 20--70 nm and an internal diameter of 5--10 nm. Taunit is produced by chemical vapor deposition; its purity is above 98% \[[@R14]\]. **Seed germination and morphometric assessment** The seeds of *Onobrychis arenaria* were germinated in a medium containing a colloidal aqueous solution of CNM Taunit with a concentration of 100 or 1,000 mg/l. Prior to use, CNM was dispersed in distilled water by ultrasonic treatment . Distilled water was used to prepare the control medium. The seeds (50 seeds per dish) were grown for 10 days on filter paper in glass Petri dishes (diameter of 90 mm) with 5 ml of a CNM suspension added. 200 seeds were used in each experiment. The growth conditions followed the requirements of the State Standard procedure GOST 12038-84 (Agricultural seeds. Methods for evaluation of germination ). The effect of CNM on esparcet seedlings was estimated on the basis of the following parameters: the rate of seed germination (%), the energy of germination (%), and the length of the roots and stems . The energy of germination and the rate of germination were determined as the ratio between the number of germinated seeds and the number of plated seeds by day 5 and day 10, respectively (%, in accordance with the State Standard). **Extraction of soluble peroxidases and determination of their activity** The weighed samples (2 g) of *O. arenaria* seedlings tissues were placed into 5 ml of a cold phosphate/citrate buffer (1 M solution of citric acid + 1 M NaH ~2~ PO ~4~ , two solutions combined to achieve pH 5.5) and ground in a porcelain mortar at 4°С \[[@R15]\]. The homogenate was centrifugated at 3,000 g for 15 min. The cleared supernatant was used to determine the activity of soluble peroxidases on the basis of the change rate (time, s) of the optical density at a wavelength of 580 nm in the reaction mixture containing 0.5 ml of 0.1 M solution of the phosphate/citrate buffer (pH 5.5), 0.5 ml of 0.3% Н ~2~ О ~2~ , 0.5 ml of 0.05% guaiacol (Sigma, USA), and 0.5 ml of the sample. Peroxidase activity was measured at 25 ^о^ С immediately after the enzymes were extracted from the samples. Enzymatic activity was calculated by Boyarkin's method \[[@R16]\] and expressed in arbitrary units of activity per gram of fresh tissue weight per second, according to the following formula: *А* = (ε × α × β × γ)/( *d* × *t* ), where ε is the extinction coefficient, α is the ratio between the amount of buffer taken for extract preparation (ml) to fresh tissue weight (g), β is the degree of additional dilution of the extract in the reaction mixture, γ is the degree of constant dilution of the extract in the reaction mixture, *d* is the thickness of the absorbing layer (mm); and *t* is the reaction time (s). **Light and electron microscopy** The bottom of a plastic box (approximate dimensions 40 × 40 × 7 cm) was covered with four gauze layers moistened with a CNM solution or water (in the control sample). 100 *O. arenaria* seeds were placed on the gauze and exposed either to the CNM solution at the concentration 300 mg/l or water without CNM. After 5 and 10 days of exposure to CNM, the seedlings were fixed for light and electron microscopic studies . For light microscopy, the seedlings were fixed in a 3:1 mixture of 96% ethanol and acetic acid for 16 h. After fixation, the plant samples were put into 70% ethanol. The plant parts under study (roots, leaves, coleoptiles) were then placed onto a glass slide into a drop of 45% acetic acid. The preparations of whole mount plant parts were made according to the standard procedure \[[@R17]\]. The preparations were analyzed using a Leica DM1000 light microscope (objectives ×10, ×20, ×40, and ×100). The images were recorded with a Leica DFC 295 digital camera (sensor size 3 × 10 ^6^ pixels). For transmission electron microscopy (TEM), the seedlings were fixed with 2.5% glutaraldehyde on a 0.1 M Na-K-phosphate buffer (pH 7.2) supplemented with sucrose (15 mg/ml). The samples were then dehydrated in a series of solutions of increasing ethanol concentrations and embedded in Epon 812, according to the standard procedure. For optimization of MWNTs detection within plant tissues, we opted not to use additional fixation with OsO ~4~ and staining with uranyl acetate and lead citrate. The sample of pure CNM was prepared for TEM as follows: 25 mg of Taunit was placed onto the surface of unpolymerized resin (Epon 812), poured into a tube. Then, the sample was centrifugated for 3 min at 6,000 g and polymerized, according to the standard procedure. ![*.* The effect of different concentrations of CNM on the viability, morphological and biochemical parameters of *O. arenaria* seedlings.](AN20758251-08-099-g001){#F1} Ultrathin sections of the samples embedded into Epon were investigated by TEM and SAED (selected area electron diffraction) using transmission electron microscopes JEM-1011 (JEOL) equipped with a GATAN ES500W digital camera, and LEO 912АВ (Carl Zeiss). RESULTS AND DISCUSSION ====================== **Effect of Taunit on the morphometric and biochemical characteristics of** *O. arenaria* **seedlings** In order to characterize the phytotoxicity of CNM, we used seed germination tests, in which the germination energy, germination rate, length of roots and stems, and peroxidase activity were estimated \[[@R18]\]. The germination of *O. arenaria* seeds in the presence of the colloidal solution of CNM Taunit increased the germination energy by 14% as compared with the control sample. CNM with a concentration of 100 and 1,000 mg/l increased the seeds germination rate by 2 and 7%, respectively ( *[Fig. 1](#F1){ref-type="fig"}a* ). Taunit also stimulated the growth of roots and stems of seedlings . At CNM concentrations of 100 and 1,000 mg/l, the root length increased by 55 and 73%, respectively; the length of seedling stems increased by 84 and 82%, as compared with the control sample ( *[Fig. 1](#F1){ref-type="fig"}b* ). Thus, CNM Taunit slightly increased the germination rate and the germination energy of seeds and considerably increased the length of roots and stems of seedlings . Taunit at the concentrations of 100 and 1,000 mg/l also enhanced peroxidase activity in *O. arenaria* seedlings, respectively, to 0.31 ± 0.01 and 0.19 ± 0.02 au/g fresh weight, which is significantly higher than the control value (0.12 ± 0.01) ( *[Fig. 1](#F1){ref-type="fig"}c* ). It is well-known that plants respond to mechanical stress and injury by changing their morphology or growth rate. This phenomenon has become known as thigmomorphogenesis. Thigmomorphogenetic changes are regarded as the adaptation process to stress in plants, and plant hormones play an important role in this process \[[@R19]\]. Under mechanical stress or after injury, the activity of the plants stress hormone, jasmonic acid, increases, whereas the activity of auxin , which controls the processes of morphogenesis and plant growth, decreases. These changes of plant hormone levels may be associated with the increase of peroxidase activity \[[@R20]-[@R22]\]. Peroxidases are involved in a number of biological processes, such as photosynthesis, respiration, and protein metabolism. It is an antioxidant enzyme with high sensitivity towards external factors, and this allows using peroxidase activitiy assay for testing of the physiological state of plants. In most cases, a high level of peroxidase activity demonstrates the initiation of the mechanism of a nonspecific response of the plant to stress \[[@R23]\]. It can be assumed that increase in peroxidase activity is associated with the oxidative stress caused by CNM. It has been shown that MWNTs, accumulated at the root surface, often pierce cell walls of epidermal cells \[[@R10]\]. Such interaction can be considered as a mechanical injury and thus elevate the level of peroxidase activity. Our results confirmed that the level of peroxidase activity decreases with an increase in CNM concentration. This observation could be explained by the inactivation of peroxidase molecules by nanotubes due to sorption or other chemical interactions. Our studies demonstrated that, along with an increase in the level of peroxidase activity, exposure to CNM stimulated the growth of roots and stems of plants . Further research is needed to explain the mechanisms of the enhanced growth of plants in the presence of CNM. **Analysis of CNM Taunit in** ![Not stained and not contrasted preparation of a squashed esparcet root. *a* -- areas of CNM accumulation in the root are shown by rectangles. CNM decorates root cap, region of maturation and vascular tissues. Scale 50 μm. *b* -- inclusions of CNM located in the maturation region. Scale 20 μm. *c* -- large accumulations of CNM in the apoplast (arrow) and in the cell (triangular arrow). Scale 10 μm.](AN20758251-08-099-g002){#F2} ![Not stained and not contrasted preparation of a squashed esparcet leaf. *a* -- CNM decorates vascular tissue (triangular arrow). Scale 50 μm. *b* -- CNM stains vascular strands and localizes in stomata (arrows). Scale 20 μm. *c* -- CNM in stomata guard cells and epidermal cells (arrows). Scale 10 μm.](AN20758251-08-099-g003){#F3} *O. arenaria* **seedlings using light and electron microscopy** Upon germination of *O. arenaria* in the presence of CNM Taunit, the roots, stems, and leaves of seedlings acquire a characteristic dark gray color. Analysis of whole mount preparations showed that dark gray and black agglomerates are localized on the surface of seedling roots and within particular tissues and cells of the roots, stems, and leaves ( *Figs. 2a-c, 3a-c* ). Ultrathin sections prepared from the plant organs containing aggregations of CNM were analyzed by TEM. Prior to studies of plant material, we had analyzed a pure CNM sample. TEM demonstrated that CNM Taunit ( *[Fig. 4](#F4){ref-type="fig"}a, b* ) contains mostly agglomerates of MWNTs and some inclusions of a nanodispersed electron-dense material (presumably, graphitized carbon). The characteristic features of MWNTs are presented in *[Fig. 4](#F4){ref-type="fig"}b* . The MWNTs without a small amount of inclusions ( *[Fig. 4](#F4){ref-type="fig"}c* ) were characterized by the SAED method . As shown in *[Fig. 4](#F4){ref-type="fig"}d* , due to the regular periodical packing of carbon atoms, MWNTs have an electron diffraction pattern typical for polycrystalline structures. This diffraction pattern was used as a reference sample for the identification of MWNTs in biological material. ![TEM analysis of CNM Taunin sample. *a, b* -- ultrathin section of CNM sample; *c* -- accumulation of SNM analyzed with SAED; *d* -- the diffraction pattern of CNM shown in *c* .](AN20758251-08-099-g004){#F4} The analysis of ultrathin sections of roots and leaves showed that CNM is present on the surface and inside the seedling organs. The adsorption of MWNTs on the root surface ( *[Fig. 5](#F5){ref-type="fig"}a* ) has also been reported by other researchers \[[@R3], [@R10], [@R11]\]. Furthermore, agglomerates and single MWNT of different lengths are detected in root ( *Figs. 5b,c* ) and leaf cells ( *Figs. 6a-c* ). Thus the MWNTs are unmistakably identified by TEM. However, if MWNTs are located transversely or at some angle to the section plane, it is difficult to distinguish the MWNT fragments from different electron-dense endogenous inclusions. The method SAED can be used to identify MWNT in plant tissues ( *Figs. 5d, 6d* ). Superposition of electron diffraction patterns of MWNTs found in biological samples ( *[Fig. 5](#F5){ref-type="fig"}e, 6e* ) with the reference electron diffraction pattern ( *[Fig. 4](#F4){ref-type="fig"}d* ) confirms the presence of MWNTs in plant cells. Additional diffraction spots on the electron diffraction pattern are accounted for by the presence of endogenous crystalline inclusions in plant tissues. The accumulation of MWNTs on the root surface was reported by many authors \[3, 9--[@R11]\] and it has been suggested that interaction of MWNTs with plant organs affects plant growth and development \[[@R13]\]. Adsorption of a large amount of MWNTs on the root surface may suppress the water flux and uptake of nutrients, thus inhibiting plant growth \[[@R11]\]. Conversely, the stimulation of seed germination may be associated with the fact that nanotubes (SWNTs) pierce the seed cover and increase water uptake, facilitating seed germination and plant growth \[[@R9]\]. However, SWNTs not only pierce the cell wall , but also penetrate inside the cells; this phenomenon was demonstrated using FITC-labeled SWNTs (SWNT/FITC) \[[@R24]\]. Insertion of MWNT into the wall of epidermal cells and root hairs up to 4 µm was observed in wheat seedlings using two-photon excitation microscopy; however, penetration of whole MWNTs into the cytoplasm was not noted \[[@R10]\]. The authors assumed that penetration, uptake and accumulation of MWNTs are less evident due to the larger nanotube diameter as compared with that of SWNT \[[@R10]\]. CONCLUSIONS =========== ![*O. arenaria* seedling grown in the presence of CNM, ultrathin sections of root. *a* -- accumulation of CNM on the root surface is shown with arrow; *b* -- accumulations of CNM on the root surface and within the root cells; *c* -- aggregates of CNM found in the cells containing nanotubes (thin arrow) and finely dispersed electron-dense material (thick arrow); *d* -- the area of the root with CNM selected for analysis with SAED; *e* -- diffraction pattern of the area shown in *d* ; *f* -- superimposed image of pure CNM diffraction pattern ( *Fig* .  *4d* ) and inverted image of the diffraction pattern of CNM found in the root cell ( *Fig.*   *5e* ). The overlapping diffraction spots are white; non-overlapping -- black.](AN20758251-08-099-g005){#F5} We demonstrated that MWNTs penetrate cell walls, accumulate in the cells and tissues, and most likely are transported via a plant's vascular system from roots to stems and the leaves of *O. arenaria* seedlings. We argue that the stimulation of *O. arenaria* roots and stems growth and the increase in peroxidase activity were induced by the oxidative stress which develops due to the accumulation of MWNTs in plant cells and tissues. ![*O. arenaria* seedling grown in the presence of CNM, ultrathin sections of leaf. *a* -- the leaf area containing two aggregates of CNM. Framed area is magnified and shown in *b* and *c;* *b, c* -- CNM contains nanotubes and finely dispersed electron dense inclusions; *d* -- the area of the leaf with CNM selected for analysis with SAED; *e* -- diffraction pattern of the area shown in *d* ; *f* -- superimposed image of the pure CNM diffraction pattern ( *Fig* . *4d* ) and inverted image of the the diffraction pattern of CNM found in the leaf cell ( *Fig.*   *6e* ). The overlapping diffraction spots are white; nonoverlapping -- black.](AN20758251-08-099-g006){#F6} The authors are grateful to S.S. Abramchuk (Belozersky Institute of Physico-chemical Biology) for assistance with this study. This work was supported by the Federal Program "Scientific and Scientific-Pedagogical Personnel of Innovative Russia" (Government contracts P 208 dated April 23, 2010 and 16.740.11.01-94 dated September 24, 2010) and Government contract №01.648.11.3003.
{ "pile_set_name": "PubMed Central" }
Q: Transfer function of boost converter When I have gone through some books I have found the expression of the DC Gain of the the boost converter in current mode is given by H0=(RL/Ri)*1/(2*M+(RL*Tsw)/(L*M^2)*(1/2+Sa/Sn)) But I did not find out what is the expression of the M, please can you give me the expression of this M and from where does it come?? Here is attached the final expression given by OnSemiconductor A: The answer of Verbal Kint makes most sense. If you multiply the DC gain on slide 35 by \$ \frac{R_L}{R_L} \$ $$H_0 = \frac{k_0-k_i}{g_f - (g_0+g_i) - g_r - \frac{1}{R_L} } \frac{R_L}{R_L} $$ and substitute the equations given in slide 27 into the term \$k_0-k_i\$, then \$H_0\$ evaluates to $$H_0 = R_L \frac{\frac{1-D}{R_i}}{g_f R_L - (g_0+g_i) R_L - g_r R_L - 1 } = \frac{R_L}{R_i} \frac{1-D}{g_f R_L - (g_0+g_i) R_L - g_r R_L - 1 } $$ Using \$M=\frac{1}{1-D}\$ it looks more and more to the DC gain \$H_0\$ given on slide 50: $$H_0 = \frac{R_L}{R_i} \frac{1}{M (g_f R_L - (g_0+g_i) R_L - g_r R_L - 1) } $$
{ "pile_set_name": "StackExchange" }
Cost-effectiveness analysis of treatments involving radioembolization in intermediate-stage hepatocellular carcinoma. We evaluated two treatment sequences, transarterial radioembolization followed by transarterial chemoembolization and possibly sorafenib (=TTS) versus transarterial radioembolization followed by sorafenib alone (=TS), to identify the most cost-effective pathway to treat intermediate-stage hepatocellular carcinoma from the Italian healthcare system perspective. A Markov model was developed to project costs and health outcomes for TTS and TS over a lifetime horizon. Data available at three hospitals in Italy were collected. Healthcare resource utilization was derived from standard clinical protocols. Costs were obtained from official regional tariffs. Taking into consideration 16 patients for TTS and 22 patients for TS pathways, the TTS sequence provided a dominant strategy in comparison to TS. Further evidence is desirable to confirm these results.
{ "pile_set_name": "PubMed Abstracts" }
--- abstract: | Let $\phi(z)=(\phi_1(z), \ldots,\phi_n(z))$ be a holomorphic self-map of $U^n$ and $\psi(z)$ a holomorphic function on $U^n,$ where $U^n$ is the unit polydisk of $\mbox{\Bbb C}^n.$ Let $p\geq 0,$ $q\geq 0$, this paper gives some necessary and sufficient conditions for the weighted composition operator $W_{\psi,\phi}$ induced by $\psi$ and $\phi$ to be bounded and compact between $p$-Bloch space ${\cal B}^p(U^n)$ and $q$-Bloch space ${\cal B}^q(U^n).$ author: - | [Zehua ZhouRenyu Chen]{}\ Department of Mathematics, Tianjin University\ Tianjin 300072, P. R. China\ E-mail: [email protected] title: ' Weighted Composition Operators between different Bloch-type Spaces in Polydisk ' --- 140 mm [^1] Bloch-type space, Weighted composition operator, Composition operator. 2000Mathematics Subject Classification 47B38, 47B33, 32A37, 32A30 Introduction ============ Let $\Omega$ be a bounded homogeneous domain in $\mbox{\Bbb C}^{n}.$ The class of all holomorphic functions with domain $\Omega$ will be denoted by $H(\Omega).$ Let $\phi $ be a holomorphic self-map of $\Omega,$ the composition operator $C_{\phi}$ induced by $\phi$ is defined by $$(C_{\phi}f)(z)=f(\phi(z)),$$ for $z$ in $\Omega$ and $f\in H(\Omega)$. If, in addition, $\psi$ is a holomorphic function defined on $\Omega,$ the multiplication operator induced by $\psi$ is defined by $$M_{\psi}f(z)=\psi(z)f(z),$$ and weighted composition operators $W_{\psi,\phi}$ induced by $\psi$ and $\phi$ is defined by $$\left(W_{\psi,\phi}f\right)(z)=\psi(z)f(\phi(z))$$ for $z$ in $\Omega$ and $f\in H(\Omega).$ If let $\psi\equiv 1,$ then $W_{\psi,\phi}=C_{\phi},$ if let $\phi=Id$, then $W_{\psi,\phi}=M_{\psi}.$ So we can regard weighted composition operator as a generalization of a multiplication operator and a composition operator. Let $K(z,z)$ be the Bergman kernel function of $\Omega$, the Bergman metric $H_{z}(u,u)$ in $\Omega$ is defined by $$H_{z}(u,u)=\displaystyle\frac{1}{2} \sum\limits^{n}_{j,k=1} \displaystyle\frac{\partial^{2}\log K(z,z)}{\partial z_{j} \partial {\overline {z}}_{k}}u_{j}{\overline u}_{k},$$ where $z\in\Omega$ and $u=(u_{1},\ldots,u_{n})\in \mbox{\Bbb C}^{n}.$ Following Timoney \[1\], we say that $f\in H(\Omega)$ is in the Bloch space ${\cal B}(\Omega),$ if $$\|f\|_{{\cal B}(\Omega)}=\sup\limits_{z\in \Omega}Q_{f}(z)<\infty,$$ where $$Q_{f}(z)=\sup\left\{\displaystyle\frac {|\bigtriangledown f(z)u|}{H^{\frac{1}{2}}_{z}(u,u)}: u\in \mbox{\Bbb C}^{n}-\{0\}\right\},$$ and $\bigtriangledown f(z) =\left(\frac{\partial f(z)}{\partial z_{1}}, \ldots, \frac{\partial f(z)}{\partial z_{n}} \right), \bigtriangledown f(z)u =\sum\limits^{n}_{l=1}\frac{\partial f(z)}{\partial z_{l}}u_{l}.$ The little Bloch space ${\cal B}_0(\Omega)$ is the closure in the Banach space ${\cal B}(\Omega)$ of the polynomial functions. Let $\partial\Omega$ denote the boundary of $\Omega$. Following Timoney \[2\], for $\Omega=B_n$ the unit ball of $\mbox{\Bbb C}^n$, ${\cal B}_0(B_n)=\left\{f\in{\cal B}(B_n): Q_f(z)\to 0, \mbox{as}\hspace*{2mm}z\to\partial B_n \right\};$ for $\Omega=\cal D$ the bounded symmetric domain other than $B_n$, $\left\{ f\in{\cal B}({\cal D}): Q_f(z)\to 0, \mbox{as}\hspace*{2mm} z\to\partial{\cal D}\right\}$ is the set of constant functions on $\cal D.$ So if $\cal D$ is a bounded symmetric domain other than the ball, we denote the ${\cal B}_{0*}({\cal D})= \left\{f\in{\cal B}({\cal D}): Q_f(z)\to 0, \mbox{as}\hspace*{2mm} z\to\partial^*{\cal D}\right\}$ and also call it little Bloch space, here $\partial^*{\cal D}$ means the distinguished boundary of $\cal D$. The unit ball is the only bounded symmetric domain $\cal D$ with the property that $\partial^*{\cal D}=\partial{\cal D}.$ Let $U^n$ be the unit polydisk of $\mbox{\Bbb C}^n.$ Timony \[1\] shows that $f\in(U^n)$ if and only if $$\|f\|_=|f(0)|+\sup\limits_{z\in U^n}\sum\limits^n_{k=1} \left|\displaystyle\frac{\partial f} {\partial z_k}(z)\right|\left(1- |z_k|^2\right)<+\infty.$$ This equality was the starting point for introducing the $p$-Bloch spaces. Let $p\geq 0,$ a function $f\in H(U^n)$ is said to belong to the $p$-Bloch space ${\cal B} ^p(U^n)$ if $$\|f\|_p=|f(0)|+\sup\limits_{z\in U^n}\sum\limits^n_{k=1} \left|\frac{\partial f} {\partial z_k}(z)\right|\left(1- |z_k|^2\right)^p<+\infty.$$ It is easy to show that ${\cal B}^p(U^n)$ is a Banach space with the norm $\|\cdot\|_p.$ It is easy to see that if $$\lim_{z\to\partial U^n}\sum\limits^n_{k=1}\left|\frac{\partial f}{\partial z_k}(z)\right|(1- |z_k|^2)^p=0,$$ then $f$ must be a constant. So, there is no sense to introduce the corresponding little $p$-Bolch space in this way. We will say that the little $p$-Bolch space ${\cal B}_0^p(U^n)$ is the closure of the polynomials in the $p$-Bolch space. In the recent years, there have been many papers focused on studying the composition operators in function spaces (say, for 1-dimensional case see \[3-8\], for n-dimensional case see \[9-12\]). More recently, S.Ohno, K. Stroethoff and R.H.Zhao in \[8\] discuss the weighted composition operators between-type spaces for 1-dimensional case. In this paper, we discuss the boundedness and compactness of the weighted composition operators between $p$-Bloch space and $q$-Bloch space in polydisk, some new methods and techniques have been used because of the difference between topology boundary $\partial U^n$ and distinguished boundary $\partial^* U^n$ of $U^n$, where $n>1$, especially in the proof of Theorems 2 and 3 (need to be discussed according to the properties of the boundary). The results in this paper will extend corresponding results on the Bloch spaces (see \[4-11\]). Our main results are the following: Let $\phi=(\phi_1, \ldots, \phi_n)$ be a holomorphic self-map of $U^n$ and $\psi(z)$ a holomorphic function of $U^n,$ $p\geq 0,$ $q\geq 0.$\ (i) If $p=1$, then $W_{\psi,\phi}: {\cal B}^p(U^n)\longrightarrow {\cal B}^q(U^n) $ is bounded if and only if $$\sum\limits^n_{k,l=1}\left|\displaystyle\frac{\partial \psi} {\partial z_k}(z)\right|\left(1-|z_k|^2\right)^{q}\ln \displaystyle\frac{4}{1-|\phi_l(z)|^2}=O(1) \hspace*{6mm}(z\in U^n )\label{1}$$ and $$|\psi(z)|\sum\limits^n_{k,l=1}\left|\displaystyle\frac{\partial \phi_{l}} {\partial z_k}(z)\right|\displaystyle\frac{\left(1-|z_k|^2\right)^{q}}{1-|\phi_l(z)|^2}=O(1) \hspace*{6mm}( z\in U^n ).\label{2}$$ (ii) If $0\leq p<1$, then $W_{\psi,\phi}: {\cal B}^p(U^n)\longrightarrow {\cal B}^q(U^n) $ is bounded if and only if $$\psi\in {\cal B}^q(U^n)\label{3}$$ and $$|\psi(z)|\sum\limits^n_{k,l=1}\left|\displaystyle\frac{\partial \phi_{l}} {\partial z_k}(z)\right|\displaystyle\frac{\left(1-|z_k|^2\right)^{q}}{\left(1-|\phi_l(z)|^2\right)^{p}}=O(1) \hspace*{6mm}( z\in U^n ).\label{4}$$ (iii) If $p>1$, then $W_{\psi,\phi}: {\cal B}^p(U^n)\longrightarrow {\cal B}^q(U^n) $ is bounded if and only if $$\sum\limits^n_{k,l=1}\left|\displaystyle\frac{\partial \psi} {\partial z_k}(z)\right|\displaystyle\frac{\left(1-|z_k|^2\right)^{q}}{\left(1-|\phi_l(z)|^2\right)^{p-1}} =O(1) \hspace*{6mm}( z\in U^n)\label{5}$$ and $$|\psi(z)|\sum\limits^n_{k,l=1}\left|\displaystyle\frac{\partial \phi_{l}} {\partial z_k}(z)\right|\displaystyle\frac{\left(1-|z_k|^2\right)^{q}}{\left(1-|\phi_l(z)|^2\right)^{p}}=O(1) \hspace*{6mm}( z\in U^n ).\label{6}$$ Let $\phi=(\phi_1, \ldots, \phi_n)$ be a holomorphic self-map of $U^n$ and $\psi(z)$ a holomorphic function of $U^n$,$p\geq 0, q\geq 0.$\ (i) If $p=1$, then $W_{\psi,\phi}: {\cal B}^p(U^n)\longrightarrow {\cal B}^q(U^n) $ is compact if and only if $W_{\psi,\phi}: {\cal B}^p(U^n)\longrightarrow {\cal B}^q(U^n)$ is bounded and $$\sum\limits^n_{k,l=1}\left|\displaystyle\frac{\partial \psi} {\partial z_k}(z)\right|\left(1-|z_k|^2\right)^{q}\ln \displaystyle\frac{4}{1-|\phi_l(z)|^2}=o(1) \hspace*{6mm}(\phi(z)\to\partial U^n),\label{7}$$ and$$|\psi(z)|\sum\limits^n_{k,l=1}\left|\displaystyle\frac{\partial \phi_{l}} {\partial z_k}(z)\right|\displaystyle\frac{\left(1-|z_k|^2\right)^{q}}{1-|\phi_l(z)|^2} =o(1)\hspace*{6mm}(\phi(z)\to\partial U^n).\label{8}$$ (ii) If $p>1$, then $W_{\psi,\phi}: {\cal B}^p(U^n)\longrightarrow {\cal B}^q(U^n) $ is compact if and only if $W_{\psi,\phi}: {\cal B}^p(U^n)\longrightarrow {\cal B}^q(U^n)$ is bounded and $$\sum\limits^n_{k,l=1}\left|\displaystyle\frac{\partial \psi} {\partial z_k}(z)\right|\displaystyle\frac{\left(1-|z_k|^2\right)^{q}}{\left(1-|\phi_l(z)|^2\right)^{p-1}} =o(1)\hspace*{6mm}(\phi(z)\to\partial U^n),\label{9}$$ and $$|\psi(z)|\sum\limits^n_{k,l=1}\left|\displaystyle\frac{\partial \phi_{l}} {\partial z_k}(z)\right|\displaystyle\frac{\left(1-|z_k|^2\right)^{q}}{\left(1-|\phi_l(z)|^2\right)^{p}} =o(1)\hspace*{6mm}(\phi(z)\to\partial U^n).\label{10}$$ [**Remark 1**]{} It is easy to show that if (1) or (5) or (7) or (9) holds, then $\psi\in{\cal B}^q(U^n)$ and $$\sum\limits^n_{k=1}\left|\displaystyle\frac{\partial \psi(z)} {\partial z_k}(z)\right|\left(1-|z_k|^2\right)^{q} =o(1)\hspace*{6mm}( \phi(z)\to\partial U^n).\label{11}$$ In fact, (1) implies that $$\sum\limits^n_{k}\left|\displaystyle\frac{\partial \psi} {\partial z_k}(z)\right|\left(1-|z_k|^2\right)^{q}\sum\limits^n_{l=1}\ln \displaystyle\frac{4}{1-|\phi_l(z)|^2}\leq C$$ for all $z\in\mbox{\Bbb C}^n.$ The same reason for others. Let $\phi=(\phi_1, \ldots, \phi_n)$ be a holomorphic self-map of $U^n$ and $\psi(z)$ a holomorphic function of $U^n$, $0\leq p<1,$ $q\geq 0.$ Then $W_{\psi,\phi}: {\cal B}^p(U^n)\longrightarrow {\cal B}^q(U^n) $ is compact if and only if $W_{\psi,\phi}: {\cal B}^p(U^n)\longrightarrow {\cal B}^q(U^n) $ is bounded and $$\lim\limits_{|\phi_l(z)|\to 1}\sum\limits^n_{k=1}\left|\frac{\partial \phi_{l}} {\partial z_k}(z)\right|\frac{(1-|z_k|^2)^q}{(1-|\phi_l(z)|^2)^p}=0\label{12}$$ for each $l\in\{1,...,n\}$ with $|\phi_l(z)|\to 1.$ Let $\phi=(\phi_1,...,\phi_n)$ be a holomorphic self-map of $U^n$, $p,q\geq 0.$ Then $C_{\phi}:{\cal B} ^p(U^n)\to {\cal B} ^q(U^n)$ is bounded if and only if there exists a constant $C$ such that $$\sum\limits^n_{k,l=1}\left|\frac{\partial \phi_{l}} {\partial z_k}(z)\right|\frac{(1-|z_k|^2)^q} {(1-|\phi_l(z)|^2)^p}\leq C ,$$ for all $z\in U^n.$ [**Proof**]{}Let $\psi(z)\equiv 1, z\in U^n$, then $\displaystyle\frac{\partial \psi} {\partial z_k}(z)=0$ for all $k\in\{1,2,\cdots,n\}.$ It is clear that condition (\[1\]) in Theorem 1, condition (\[7\]) in Theorem 2 and condition (\[9\]) in Theorem 3 hold, note that $W_{\psi,\phi}=C_{\phi}$, the Corollary follows by combining the above Theorems. Similar to Corollary 1, the following Corollary follows. Let $\phi=(\phi_1,...,\phi_n)$ be a holomorphic self-map of $U^n.$ If $p\geq 1$ and $q\geq 0,$ then $C_{\phi}:{\cal B} ^p(U^n)\to {\cal B} ^q(U^n)$ is compact if and only if $$\sum\limits^n_{k,l=1}\left|\frac{\partial \phi_{l}} {\partial z_k}(z)\right|\frac{(1-|z_k|^2)^q} {(1-|\phi_l(z)|^2)^p}\leq C ,$$ for all $z\in U^n,$ and $$\sum\limits^n_{k,l=1}\left|\frac{\partial \phi_{l}} {\partial z_k}(z)\right|\frac{(1-|z_k|^2)^q}{(1-|\phi_l(z)|^2)^p} =o(1)\quad ( \phi(z)\to \partial U^n ).$$ If $0\leq p<1)$ and $q\geq 0,$ Then $C_{\phi}: {\cal B} ^p(U^n)\to {\cal B} ^q(U^n)$ is compact if and only if $$\sum\limits^n_{k,l=1}\left|\frac{\partial \phi_{l}} {\partial z_k}(z)\right|\frac{(1-|z_k|^2)^q} {(1-|\phi_l(z)|^2)^p}\leq C ,$$ for all $z\in U^n,$ and $$\lim\limits_{|\phi_l(z)|\to 1}\sum\limits^n_{k=1}\left|\frac{\partial \phi_{l}} {\partial z_k}(z)\right|\frac{(1-|z_k|^2)^q}{(1-|\phi_l(z)|^2)^p}=0$$for each $l\in\{1,...,n\}$ with $\phi_l(z)|\to 1.$ [**Remark 2**]{} If let $\phi=id: U^n\longrightarrow U^n,$ then we can obtain the corresponding results about multiplication operator$M_{\psi}:{\cal B} ^p(U^n)\to {\cal B}^q(U^n).$ Throughout the remainder of this paper $C$ will denote a positive constant, the exact value of which will vary from one appearance to the next. Some Lemmas =========== Let $f\in {\cal B}^p(U^n),$ \(i) If $p=1,$ then $|f(z)|\leq \left(\displaystyle\frac{1}{2}+\displaystyle\frac{1}{2n\ln 2}\right)\left(\sum\limits^n_{l=1}\ln\displaystyle\frac{4}{1-|z_l|^2}\right)\|f\|_{p};$ \(ii) If $0\leq p<1,$ then $|f(z)|\leq \left(1+\displaystyle\frac{1}{1-p}\right)\|f\|_{p};$ \(iii) If $p>1$, then $|f(z)|\leq \left(\displaystyle\frac{1}{n}+\displaystyle\frac{2^{p-1}}{p-1}\right)\left(\sum\limits^n_{l=1} \displaystyle\frac{1}{(1-|z_l|^2)^{p-1}}\right) \|f\|_{p}.$ [**Proof**]{} This Lemma can be proved by some integral estimates (if necessary, the proof can be omitted). By the definition of $\|.\|_{p}$, $$|f(0)|\leq \|f\|_{p},\hspace*{4mm}\left|\displaystyle\frac{\partial f(z) }{\partial z_l}\right|\leq \displaystyle\frac{\|f\|_{p}}{(1-|z_l|^2)^p} \hspace*{4mm}(l\in\{1,2,\cdots,n\})$$ and $$\begin{aligned} &&f(z)-f(0)= \int^1_0 \displaystyle\frac{d f(tz)}{d t}dt=\sum\limits^n_{l=1}\int^1_0 z_l\displaystyle\frac{\partial f}{\partial\zeta_l}(tz)dt,\end{aligned}$$ So$$\begin{aligned} &&|f(z)|\leq |f(0)|+\sum\limits^n_{l=1}|z_l|\int^1_0\displaystyle\frac{\|f\|_p}{\left(1-t^2|z_l|^2\right)^p}dt \nonumber\\ &&\leq \|f\|_p+\|f\|_p\sum\limits^n_{l=1}\int^{|z_l|}_0\displaystyle\frac{1}{\left(1-t^2\right)^p}dt.\label{13}\end{aligned}$$ If $p=1,$ $$\int^{|z_l|}_0\displaystyle\frac{1}{\left(1-t^2\right)^p}dt=\displaystyle\frac{1}{2} \ln\displaystyle\frac{1+|z_l|}{1-|z_l|}\leq \displaystyle\frac{1}{2} \ln\displaystyle\frac{4}{1-|z_l|^2}.\label{14}$$ It is clear that $\ln\displaystyle\frac{4}{1-|z_l|^2}>\ln 4=2\ln 2,$ so$$1\leq \displaystyle\frac{1}{2\ln 2} \ln\displaystyle\frac{4}{1-|z_l|^2}\leq \displaystyle\frac{1}{2n\ln 2} \sum\limits^n_{l=1}\ln\displaystyle\frac{4}{1-|z_l|^2}.\label{15}$$ Combining (\[13\]),(\[14\]) and (\[15\]), we get $$|f(z)|\leq \left(\displaystyle\frac{1}{2}+\displaystyle\frac{1}{2n\ln 2}\right)\left(\sum\limits^n_{l=1}\ln\displaystyle\frac{4}{1-|z_l|^2}\right)\|f\|_p.$$ If $p\neq 1,$ $$\begin{aligned} &&\int^{|z_l|}_0\displaystyle\frac{1}{\left(1-t^2\right)^p}dt =\int^{|z_l|}_0\displaystyle\frac{1}{(1-t)^p}\cdot \displaystyle\frac{1}{(1+t)^p}dt\nonumber\\ &&\leq \int^{|z_l|}_0\displaystyle\frac{1}{(1-t)^p}dt=\displaystyle\frac{1-(1-|z_l|)^{-p+1}}{1-p}.\label{16}\end{aligned}$$ If $0\leq p<1,$ (\[16\]) gives that $\int^{|z_l|}_0\displaystyle\frac{1}{\left(1-t^2\right)^p}dt\leq\displaystyle\frac{1}{1-p},$ it follows from (\[13\]) that $|f(z)|\leq\left(1+\displaystyle\frac{n}{1-p}\right)\|f\|_p.$ If $p>1,$ (\[16\]) gives that $$\int^{|z_l|}_0\displaystyle\frac{1}{\left(1-t^2\right)^p}dt\leq \displaystyle\frac{1-(1-|z_l|^{p-1})}{(p-1)(1-|z_l|)^{p-1}} \leq\displaystyle\frac{2^{p-1}}{(p-1)(1-|z_l^2|)^{p-1}},$$ it follows from (\[13\]) that $$\begin{aligned} |f(z)|&\leq&\|f\|_p+\displaystyle\frac{2^{p-1}}{p-1}\left(\sum\limits^n_{l=1} \displaystyle\frac{1}{(1-|z_l|^2)^{p-1}}\right)\|f\|_p\\ &\leq& \left(\displaystyle\frac{1}{n}+\displaystyle\frac{2^{p-1}}{p-1}\right)\left(\sum\limits^n_{l=1} \displaystyle\frac{1}{(1-|z_l|^2)^{p-1}}\right) \|f\|_{p}.\end{aligned}$$Now the Lemma is proved. Let $\phi$ be a holomorphic self-map of $U^n$ and $\psi(z)$ a holomorphic function on $U^n,$ then $W_{\psi,\phi}:{\cal B} ^p(U^n)\to {\cal B} ^q(U^n)$ is compact if and only if for any bounded sequence $\{f_j\}$ in ${\cal B} ^p(U^n)$ which converges to zero uniformly on compact subsets of $U^n$, we have $\|W_{\psi,\phi}f_j\|_q\to 0,$ as $j\to\infty.$ [**Proof**]{} Assume that $W_{\psi,\phi}$ is compact and suppose $\{f_j\}$ is a sequence in ${\cal B} ^p(U^n)$ with $\sup\limits_{j\in {\bf N}}\|f_j\|_p<\infty$ and $f_j\to 0$ uniformly on compact subsets of $U^n.$ By the compactness of $W_{\psi,\phi}$ we have that $W_{\psi,\phi}(f_j)=\psi f_j\circ\phi$ has a subsequence $\psi f_{j_m}\circ\phi$ which converges in ${\cal B}^q,$ say, to $g.$ By Lemma 1 we have that for any compact $K\subset U^n$ there is a positive constant $C_K$ independent of $f$ such that $$|\psi(z)f_{j_m}(\phi(z))-g(z)|\leq C_K\|\psi f_{j_m}\circ \phi-g\|_q$$ for all $z\in K$. This implies that $\psi(z)f_{j_m}(\phi(z))-g(z)\to 0$ uniformly on compacts of $U^n.$ Since $K$ is a compact subset of $U^n,$ $|\psi(z)|\leq C$ for all $z\in K$ and $\phi(K)$ is also a compact subset of $U^n,$ by the hypothesis, $\left|\psi(z)f_{j_m}(\phi(z))\right|\leq C\left|f_{j_m}(\phi(z))\right|$ converges to zero uniformly on $K$. It follows from the arbitrary of $K$ that the limit function $g$ is equal to $0.$ Since it is true for arbitrary subsequence of $\{f_j\}$ we see that $W_{\psi,\phi}f_j\to 0$ in ${\cal B}^q.$ Conversely, $\{g_j\}$ be any sequence in the ball ${\cal K}_M=B_{{\cal B} ^p}(0,M)$ of the space ${\cal B} ^p(U^n).$ Since $\|g_j\|_p\leq M<\infty,$ by Lemma 1, $\{g_j\}$ is uniformly bounded on compact subsets of $U^n$ and hence normal by Montel’s theorem. Hence we may extract a subsequence $\{g_{j_m}\}$ which converges uniformly on compact subsets of $U^n$ to some $g\in H(U^n).$ It follows that $\frac{{\partial g}_{j_m}}{\partial z_l}\to \frac{\partial g}{\partial z_l}$ uniformly on compacts, for each $l\in\{1,...,n\},$ which implies $g\in {\cal B} ^p(U^n)$ and $\|g\|_p\leq M.$ Hence the sequence $\{g_{j_m}-g\}$ is such that $\|g_{j_m}-g\|_p\leq 2M<\infty,$ and converges to $0$ on compact subsets of $U^n,$ by the hypothesis and Lemma 2, we have that $\psi g_{j_m}\circ\phi\to\psi g\circ\phi$ in ${\cal B}^q.$ Thus the set $W_{\psi,\phi}({\cal K}_M)$ is relatively compact, finishing the proof. Let $0\leq p<1.$ If $f\in{\cal B} ^p(U^n)$, then $$|f(z)-f(w)|\leq \displaystyle\frac{2}{1-p}\|f\|_p\sum\limits^n_{k=1}|z_k-w_k|^{1-p}, \quad z,w\in U^n.$$ [**Proof**]{} For any $z=(z_1,z_2,\cdots,z_n),$ $w=(w_1,w_2,\cdots,w_n)\in U^n,$ then $$tz+(1-t)w\in U^n$$ for $t\in [0,1].$ Denote $F(t)=f\left(tz+(1-t)w\right),$ then $$\begin{aligned} &&f(z)-f(w)=F(1)-F(0)=\int^1_0 F'(t)dt=\int^1_0\displaystyle\frac{d}{dt}\left(f(tz+(1-t)w\right)dt \nonumber\\ &&=\sum\limits^n_{k=1}(z_k-w_k)\int^1_0\displaystyle\frac{\partial f} {\partial \zeta_k}\left(tz+(1-t)w\right)dt.\label{17}\end{aligned}$$ $f\in {\cal B} ^p(U^n),$ so for $k\in\{1,2,\cdots,n\}$ $$(1-|\zeta_k|^2)^p\left|\displaystyle\frac{\partial f} {\partial \zeta_k}(\zeta)\right|\leq \|f\|_p$$ $$\left|\displaystyle\frac{\partial f} {\partial \zeta_k}\right|\leq \|f\|_p(1-|\zeta_k|^2)^{-p}\leq \|f\|_p(1-|\zeta_k|)^{-p}.$$ Let $\zeta_k=tz_k+(1-t)w_k=w_k+t(z_k-w_k),$ note that if $|a|<1,|b|<1$ and $|a+b|<1$ then $|a|+|b|+|a+b|<2,$ so $1-|\zeta_k|=1-|w_k+t(z_k-w_k)|\geq \left|1-|w_k|-t|z_k-w_k|\right|,$ $$\left|\displaystyle\frac{\partial f} {\partial \zeta_k}(tz+(1-t)w)\right|\leq \|f\|_p(1-|\zeta_k|^2)^{-p}\leq \|f\|_p\left|1-|w_k|-t|z_k-w_k|\right|^{-p}.\label{18}$$ It follows from (\[17\]) and (\[18\]) that $$\begin{aligned} &&|f(z)-f(w)|\leq \|f\|_p\sum\limits^n_{k=1}|z_k-w_k|\int^1_0\left|1-|w_k|-t|z_k-w_k|\right|^{-p}dt\nonumber\\ &&=\|f\|_p\sum\limits^n_{k=1}\int^{|z_k-w_k|}_0\left|1-|w_k|-t\right|^{-p}dt.\label{a}\end{aligned}$$ If $1-|w_k|\leq |z_k-w_k|,$ then $$\begin{aligned} &&\int^{|z_k-w_k|}_0\left|1-|w_k|-t\right|^{-p}dt\nonumber\\ &&=\int^{1-|w_k|}_0(1-|w_k|-t)^{-p}dt+\int^{|z_k-w_k|}_{1-|w_k|}\left(t-(1-|w_k|)\right)^{-p}dt\nonumber\\ &&=\displaystyle\frac{1}{1-p}\left((1-|w_k|)^{1-p}+(|z_k-w_k|-(1-|w_k|))^{1-p}\right)\nonumber\\ &&\leq \displaystyle\frac{2}{1-p}(|z_k-w_k|)^{1-p}.\label{b}\end{aligned}$$ If $1-|w_k|>|z_k-w_k|,$ let $a=1-|w_k|, b=|z_k-w_k|, a>b$ and note that the fundamental inequality $a^{1-p}<(a-b)^{1-p}+b^{1-p},$ where $0\leq p<1,$ so $$\begin{aligned} &&\int^{|z_k-w_k|}_0\left|1-|w_k|-t\right|^{-p}dt=\int^{|z_k-w_k|}_0\left(1-|w_k|-t\right)^{-p}dt\nonumber\\ &&=\displaystyle\frac{1}{1-p}\left((1-|w_k|)^{1-p}-(1-|w_k|-|z_k-w_k|)^{1-p}\right)\nonumber\\ &&<\displaystyle\frac{1}{1-p}|z_k-w_k|^{1-p}.\label{c}\end{aligned}$$ Combining $(\ref{b}),(\ref{c})$ and $(\ref{a})$, this Lemma is proved. Let $0\leq p<1.$ Every norm-bounded sequence in ${\cal B} ^p(U^n)$ has a subsequence that converges uniformly on $\overline{U^n}$. [**Proof**]{} Let $\{f_j\}$ be a sequence in ${\cal B}^p(U^n),$ and $\|f_j\|_p\leq C $ for $j=1,2,\cdots.$ It follows from Lemma 3 that $|f_j(z)-f_j(w)|\leq C\sum\limits^n_{k=1}|z_k-w_k|^{1-p}$ for $z,w\in U^n.$ Thus the family $\{f_j: n=1,2,\cdots\}$ is equicontinuous. By Lemma 1, $|f_j(z)|\leq C\|f_j\|_p\leq C, $ the family $\{f_j: n=1,2,\cdots\}$ is bounded uniformly on $\overline{U^n}$. The statement of the lemma now follows from the Arzela-Ascoli Theorem. Let $p\in [0,1)$ and $\{f_j\}$ be a norm bounded sequence in ${\cal B} ^p(U^n)$ which converges to zero uniformly on compacts of $U^n.$ Then it converges to zero uniformly on $\overline{U^n}.$ [**Proof**]{} Let $\varepsilon\in (0,1),$ $r\in (1-\varepsilon,1),$ and $w\in rU^n,$ then from Lemma 3 we have $$\begin{aligned} &&|f_j(z)|\leq |f_j(w)|+C\|f_j\|_p\sum\limits^n_{k=1}|z_k-w_k|^{1-p}\\ &&\leq |f_j(w)| +C\sum\limits^n_{k=1}|z_k-w_k|^{1-p}, \hspace*{4mm} z\in U^n.\end{aligned}$$ Since $\sup\limits_{w\in rU^n}|f_j(w)|\to 0$ and since for each $z\in \overline{U^n}\setminus{rU^n},$ $1-\varepsilon<r\leq |z_k|\leq 1,$ there exists $\eta$ such that $$1-\varepsilon<\eta<r\leq |z_k|\leq 1.$$ Choosing $w_z=(\eta z_1,\eta z_2,\cdots,\eta z_n),$ then $w_z\in {rU^n}$ and $$|z_k-(w_z)_k|^{1-p}=|z_k-\eta z_k|^{1-p}=(1-\eta)^{1-p}|z_k|<\varepsilon^{1-p}\leq\varepsilon.$$ So $\lim\limits_{k\to\infty}\sup_{z\in \overline{U^n}}|f_j(z)|\leq C\varepsilon,$ from which the result follows. Combining Lemma 2 and Lemma 5, we can obtain the following Lemma at once. Let $\phi$ be a holomorphic self-map of $U^n$ and $\psi(z)$ a holomorphic function on $U^n.$ Let $0\leq p<1$ and $q\geq 0,$ then $W_{\psi,\phi}:{\cal B}^p(U^n)\to {\cal B} ^q(U^n)$ is compact if and only if for any bounded sequence $\{f_j\}$ in ${\cal B} ^p(U^n)$ which converges to zero uniformly on $\overline{U^n}$ we have $\|W_{\psi,\phi}f_j\|_q\to 0,$ as $j\to\infty.$ The Proof of Theorem 1 ====================== First shows the sufficiency. If $f\in {\cal B}^p(U^n),$ a direct calculation gives $$\begin{aligned} &&\sum\limits^n_{k=1}\left|\displaystyle\frac{\partial \left(W_{\psi,\phi}f(z)\right)} {\partial z_k}\right| (1-|z_k|^2)^{q}\nonumber\\ &&=\sum\limits^n_{k=1}\left|\displaystyle\frac{\partial \psi(z)}{\partial z_k}f(\phi(z))+\psi(z)\sum\limits^n_{l=1}\displaystyle\frac{\partial f}{\partial w_l}(\phi(z)) \displaystyle\frac{\partial \phi_l}{\partial z_k}(z)\right|(1-|z_k|^2)^{q}\label{19}\\ &&\leq \sum\limits^n_{k=1}\left|\displaystyle\frac{\partial \psi(z)}{\partial z_k}\right||f(\phi(z))|(1-|z_k|^2)^{q}\nonumber\\ && +|\psi(z)|\sum\limits^n_{k, l=1}\left|\displaystyle\frac{\partial f}{\partial w_l}(\phi(z)) \displaystyle\frac{\partial \phi_l}{\partial z_k}(z)\right|(1-|z_k|^2)^{q}.\label{20}\end{aligned}$$ By Lemma 1, if $p=1$, (\[19\]) gives that $$\begin{aligned} &&\sum\limits^n_{k=1}\left|\displaystyle\frac{\partial \left(W_{\psi,\phi}f(z)\right)} {\partial z_k}\right| (1-|z_k|^2)^{q}\nonumber\\ &&\leq C\left(\sum\limits^n_{k,l=1}\left|\displaystyle\frac{\partial \psi} {\partial z_k}(z)\right|\left(1-|z_k|^2\right)^{q}\ln \displaystyle\frac{4}{1-|\phi_l(z)|^2}\right.\nonumber\\ &&\left.+|\psi(z)|\sum\limits^n_{k,l=1}\left|\displaystyle\frac{\partial \phi_{l}} {\partial z_k}(z)\right|\displaystyle\frac{\left(1-|z_k|^2\right)^{q}}{1-|\phi_l(z)|^2} \right)\|f\|_{p}.\label{21}\end{aligned}$$ Combining (\[1\]), (\[2\]) and (\[21\]), we know $W_{\psi,\phi}: {\cal B}^p(U^n)\longrightarrow {\cal B}^q(U^n) $ is bounded. If $0\leq p<1$, by Lemma 1, (\[20\]) gives that $$\begin{aligned} &&\sum\limits^n_{k=1}\left|\displaystyle\frac{\partial \left(W_{\psi,\phi}f(z)\right)} {\partial z_k}\right| (1-|z_k|^2)^{q}\nonumber\\ &&\leq C\left(\sum\limits^n_{k,l=1}\left|\displaystyle\frac{\partial \psi} {\partial z_k}(z)\right|\left(1-|z_k|^2\right)^{q}\right.\nonumber\\ &&\left.+|\psi(z)|\sum\limits^n_{k,l=1}\left|\displaystyle\frac{\partial \phi_{l}} {\partial z_k}(z)\right|\displaystyle\frac{\left(1-|z_k|^2\right)^{q}}{\left(1-|\phi_l(z)|^2\right)^{p}} \right)\|f\|_{p}.\label{22}\end{aligned}$$ Combining (\[3\]), (\[4\]), Lemma 1 and (\[22\]), we know $W_{\psi,\phi}: {\cal B}^p(U^n)\longrightarrow {\cal B}^q(U^n) $ is bounded. If $p>1,$by Lemma 1, (\[20\]) gives that $$\begin{aligned} &&\sum\limits^n_{k=1}\left|\displaystyle\frac{\partial \left(W_{\psi,\phi}f(z)\right)} {\partial z_k}\right| (1-|z_k|^2)^{q}\nonumber\\ &&\leq C\left(\sum\limits^n_{k,l=1}\left|\displaystyle\frac{\partial \psi} {\partial z_k}(z)\right|\displaystyle\frac{\left(1-|z_k|^2\right)^{q}}{\left(1-|\phi_l(z)|^2\right)^{p-1}}\right.\nonumber\\ &&\left.+|\psi(z)|\sum\limits^n_{k,l=1}\left|\displaystyle\frac{\partial \phi_{l}} {\partial z_k}(z)\right|\displaystyle\frac{\left(1-|z_k|^2\right)^{q}}{\left(1-|\phi_l(z)|^2\right)^{p}} \right)\|f\|_{p}.\label{23}\end{aligned}$$ Combining (\[5\]), (\[6\]) and (\[23\]), we know $W_{\psi,\phi}: {\cal B}^p(U^n)\longrightarrow {\cal B}^q(U^n) $ is bounded. To show the necessity, assume that $W_{\psi,\phi}: {\cal B}^p(U^n)\longrightarrow {\cal B}^q(U^n) $ is bounded, with $$\|W_{\psi,\phi}f\|_{q}\leq C\|f\|_{p}\label{24}$$ for all $f\in {\cal B}^p(U^n).$ It is clear that $\psi\in{\cal B}^q(U^n),$ that is, (\[3\]) holds. If $p=1$, For fixed $l (1\leq l\leq n),$ we will make use of a family of test functions $\{f_{w}: w\in\mbox{\Bbb C}, |w|<1\}$ in ${\cal B}^p(U^n)$ defined as follows: let $$f_w(z)=\displaystyle\frac{z_l}{1-\overline {w}z_l},$$ then $\displaystyle\frac{\partial f_w(z) }{\partial z_l}=\displaystyle\frac{1}{(1-\overline {w}z_l)^2},\hspace{4mm}\displaystyle\frac{\partial f_w(z) }{\partial z_k}=0 \hspace*{4mm}(k\neq l)$, $\|f_w\|_p\leq \displaystyle\frac{4}{1-|w|^2}.$ It follows from (\[19\]) and (\[24\]) that $$\sum\limits^n_{k=1}\left|\displaystyle\frac{\partial \psi(z)}{\partial z_k}\displaystyle\frac{\phi_l(z)}{1-\overline {w}\phi_l(z)}+\psi(z)\displaystyle\frac{1}{(1-\overline {w}\phi_l(z))^2}\displaystyle\frac{\partial \phi_l}{\partial z_k}(z)\right|(1-|z_k|^2)^{q}\leq C \displaystyle\frac{1}{1-|w|^2},$$let $w=\phi_l(z),$ then $$|\psi(z)|\sum\limits^n_{k=1}\left|\displaystyle\frac{\partial \phi_{l}} {\partial z_k}(z)\right|\displaystyle\frac{\left(1-|z_k|^2\right)^{q}}{1-|\phi_l(z)|^2}\leq C+\|\psi\|_q\leq C.\label{25}$$ So for any $z\in U^n$, $$|\psi(z)|\sum\limits^n_{k,l=1}\left|\displaystyle\frac{\partial \phi_{l}} {\partial z_k}(z)\right|\displaystyle\frac{\left(1-|z_k|^2\right)^{q}}{1-|\phi_l(z)|^2}\leq C,$$ that is, (\[2\]) is valid. If we set $$g_w(z)=\ln\displaystyle\frac{4}{1-\overline {w}z_l},$$ then $\displaystyle\frac{\partial g_w(z) }{\partial z_l}=\displaystyle\frac{\overline w}{1-\overline {w}z_l},\hspace{4mm}\displaystyle\frac{\partial g_w(z) }{\partial z_k}=0 \hspace*{4mm}(k\neq l)$, $\|g_w\|_p\leq 2+\ln 4 .$ It follows from (\[19\]) and (\[24\]) that $$\sum\limits^n_{k=1}\left|\displaystyle\frac{\partial \psi(z)}{\partial z_k}\ln\displaystyle\frac{4}{1-\overline {w}\phi_l(z)}+\psi(z)\displaystyle\frac{\overline w}{1-\overline{w}\phi_l(z)}\displaystyle\frac{\partial \phi_l}{\partial z_k}(z)\right|(1-|z_k|^2)^{q}\leq C,$$ let $w=\phi_l(z)$, (\[1\]) is valid. If $0\leq p<1$, $\psi=W_{\psi,\phi}1\in{\cal B}^q(U^n),$ (3) is valid. For fixed $l (1\leq l\leq n),$ we will make use of a family of test functions $\{f_{w}: w\in\mbox{\Bbb C}-\{0\}, |w|<1\}$ in ${\cal B} ^p(U^n$ defined as follows: set $$f_w(z)=\int^{z_l}_0\left(1-\displaystyle\frac{\overline w^2}{|w|^2}z_l^2 \right)^{-p}dz_l$$ with $f_w(0)=0.$ Since for $w\neq 0,$ $$\displaystyle\frac{\partial f_w}{\partial z_l} =\left(1-\displaystyle\frac{\overline w^2}{|w|^2}z_l^2\right)^{-p}, \hspace*{4mm} \displaystyle\frac{\partial f_w}{\partial z_i}=0, \hspace*{4mm}(i\neq l),$$ it is easy to show $\|f_w\|_{\alpha}=1.$ Lemma 1 gives $|f_w(z)|\leq 1+\displaystyle\frac{n}{1-p},$ so by (\[3\]), $$\sum\limits^n_{k=1}\left|\displaystyle\frac{\partial \psi}{\partial z_k}(z)f_w(\phi(z)) (1-|z_k|^2)^q\right| \leq C\sum\limits^n_{k=1} \left|\displaystyle\frac{\partial \psi}{\partial z_k}(z)\right|\left(1-|z_k|^2 \right)^q\leq C.\label{26}$$ For $z\in U^n,$ it follows from (\[19\]) and (\[24\]) that $$\sum\limits^n_{k=1}\left|\displaystyle\frac{\partial \psi}{\partial z_k}(z)f_w(\phi(z)) +\psi(z)\sum\limits^n_{l=1}\displaystyle\frac{\partial f_w(\phi(z))}{\partial \phi_l} \displaystyle\frac{\partial \phi_l}{\partial z_k}(z)\right|(1-|z_k|^2)^q\leq C,$$ combining (\[26\]), we get $$\sum\limits^n_{k=1}\left|\psi(z) \displaystyle\frac{\partial f_w(\phi(z))}{\partial \phi_l} \displaystyle\frac{\partial \phi_l}{\partial z_k}(z)\right|(1-|z_k|^2)^q\leq C.$$ For an arbitrary $z\in U^n$ with $\phi_l(z)\neq 0$ and set $w=\phi_l(z)$ in the above inequality to obtain $$|\psi(z)|\sum\limits^n_{k=1}\left|\displaystyle\frac{\partial \phi_{l}} {\partial z_k}(z)\right| \displaystyle\frac{\left(1-|z_k|^2\right)^q}{\left(1-|\phi_l(z)|^2\right)^p} \leq C.$$ If $\phi_l(z)=0,$ let $f(z)=z_l,$ it follows from (\[19\]) and (\[24\]) that $$|\psi(z)|\left|\displaystyle\frac{\partial \phi_{l}} {\partial z_k}(z)\right| \displaystyle\frac{\left(1-|z_k|^2\right)^q}{\left(1-|\phi_l(z)|^2\right)^p} =\left|\displaystyle\frac{\partial\psi}{\partial z_k}(z)\phi_l(z) +\psi(z)\displaystyle\frac{\partial\phi_l}{\partial z_k}(z)\right|(1-|z_k|^2)^q \leq C.$$ So for all $z\in U^n,$ $$|\psi(z)|\sum\limits^n_{k,l=1}\left|\displaystyle\frac{\partial \phi_{l}} {\partial z_k}(z)\right| \displaystyle\frac{\left(1-|z_k|^2\right)^q}{\left(1-|\phi_l(z)|^2\right)^p}\leq C,$$ that is, (\[4\]) is valid. If $p>1$, similarly, the test functions would be $$f_w(z)=\displaystyle\frac{1}{\overline w}\left(\displaystyle\frac{1-|w|^2}{\left(1-\overline {w}z_l\right)^p}-\displaystyle\frac{1}{\left(1-\overline {w}z_l\right)^{p-1}}\right),\hspace*{4mm}(|w|<1, w\neq 0, 1\leq l\leq n)$$ for proving (\[6\]), and $$g_w(z)=\left(\displaystyle\frac{p}{\left(1-\overline {w}z_l\right)^{p-1}}-\displaystyle\frac{(p-1)(1-|w|^2)}{\left(1-\overline {w}z_l\right)^p}\right),\hspace*{4mm}(|w|<1, 1\leq l\leq n)$$ for proving (\[5\]), we omit the details. Now the proof of Theorem 1 is completed. The Proof of Theorem 2 ====================== To show the sufficiency. If $p=1$. First assume conditions (\[7\]) and (\[8\]) hold, we need to prove $W_{\psi,\phi}: {\cal B}^p(U^n)\longrightarrow {\cal B}^q(U^n) $ is compact. According to Lemma 2, assume that $\left\|f_{j}\right\|_{p}\leq C, j=1,2,\ldots,$ and $\{f_{j}\}$ converges to zero uniformly on compact subsets of $U^n,$ we need only prove that $\left\|W_{\psi,\phi}f_{j}\right\|_{q}\to 0,$ as $j\to\infty.$ For every $\varepsilon>0,$ (\[7\]) and (\[8\]) imply that there exists a $r$, $0<r<1$, such that $$\sum\limits^n_{k,l=1}\left|\displaystyle\frac{\partial \psi} {\partial z_k}(z)\right|\left(1-|z_k|^2\right)^{q}\ln \displaystyle\frac{4}{1-|\phi_l(z)|^2} <\varepsilon \label{27}$$ and$$\sum\limits^n_{k,l=1}\left|\psi(z)\displaystyle\frac{\partial \phi_l}{\partial z_k}(z)\right| \displaystyle\frac{\left(1-|z_k|^2\right)^{q}}{1-|\phi_l(z)|^2} <\varepsilon,\label{28}$$ whenever $dist(\phi(z), \partial U^n)<r.$ Since $f_j(\phi(0))$ converges to zero, by (\[27\]) and (\[28\]), it follows from (\[21\]) that for large enough $j$ $$\sum\limits^n_{k=1}\left|\displaystyle\frac{\partial\left(W_{\psi,\phi}f_j\right)} {\partial z_k}(z)\right| (1-|z_k|^2)^{q}\leq C\varepsilon,\label{29}$$ whenever $dist\left(\phi(z), \partial U^n\right)< r.$ If we set $\varepsilon=1,$ by (\[27\]) and (\[28\]),it is easy to show that (\[1\]) and (\[2\]) holds, from Remark 1, we know $\psi\in{\cal B}^q(U^n).$ On the other hand, if we write $E=\left\{w\in U^n: dist(w,\partial U^n)\geq r\right\},$ which is a closed subset of $U^n$, then $f_j(w)$ and $\displaystyle\frac{\partial f_j}{\partial w_l}(w)\to 0$ uniformly on $E$. So by (\[19\]) and the boundedness condition (2) in Theorem 1, we obtain for $dist(\phi(z),\partial U^n)\geq r,$ $$\begin{aligned} &&\sum\limits^n_{k=1}\left|\displaystyle\frac{\partial\left(W_{\psi,\phi}f_j\right)} {\partial z_k}(z)\right| (1-|z_k|^2)^{q}\leq C\left(|f_j(\phi(z))|+\sum\limits^n_{l=1}\left|\displaystyle\frac{\partial f_j}{\partial w_l}(\phi(z))\right|\right)\nonumber\\ && = C\left(|f_j(w)|+\sum\limits^n_{l=1}\left|\displaystyle\frac{\partial f_j}{\partial w_l}(w)\right|\right)\leq C\varepsilon.\label{30}\end{aligned}$$ Since $\psi(0)f_j(\phi(0))\to 0$ for large enough $j,$ combining (\[29\]) and (\[30\]) we know $\left\|W_{\psi,\phi}f_{j}\right\|_{q}\to 0,$ as $j\to\infty.$ If $p>1,$ note that (\[23\]), in a similar manner to the case $p=1$, we can show the sufficiency, omit the details. To show the necessity. First we will prove the following Lemma: Let $p\geq 1$ and $q\geq 0$. If $W_{\psi,\phi}: {\cal B}^p(U^n)\longrightarrow {\cal B}^q(U^n)$ is compact, then $$|\psi(z)|\sum\limits^n_{k,l=1}\left|\displaystyle\frac{\partial \phi_{l}} {\partial z_k}(z)\right|\displaystyle\frac{\left(1-|z_k|^2\right)^{q}}{\left(1-|\phi_l(z)|^2\right)^{p}} =o(1)\hspace*{6mm} (\phi(z)\to\partial U^n).\label{31}$$ [**Proof**]{} For any $\{z^{j}\}$ in $U^n$ with $\phi(z^j)\to\partial U^n$ as $j\to\infty.$ Let $A_j=\phi(z^{j})=(a_{1j},\ldots, a_{nj}),$ where $a_{kj}=\phi_{k}(z^j), 1\leq k\leq n .$ Since $\phi(z^{j})\to\partial U^n,$ as $j\to\infty$, there exists some $s, (1\leq s\leq n),$ with $|a_{sj}|\to 1$ as $j\to\infty.$ Without loss of generality, we may assume that $s=1$. Case 1: If for some $l (1\leq l\leq n),$ $|a_{lj}|\to 1$ as $j\to\infty,$ then set $$f_{j}(z)=\displaystyle\frac{\left(1-|a_{lj}|^2\right)^2}{\left(1-z_l\overline{a_{lj}}\right)^{p+1}}- \displaystyle\frac{1-|a_{lj}|^2}{\left(1-z_l\overline{a_{lj}}\right)^p}, \hspace*{4mm}j=1,2,\cdots.\label{32}$$ $$\displaystyle\frac{\partial f_{j}}{\partial z_{k}}=0,\hspace*{4mm} (k\neq l),$$ $$\displaystyle\frac{\partial f_{j}}{\partial z_{l}} =(p+1)\overline{a_{lj}}\displaystyle\frac{\left(1-|a_{lj}|^2\right)^2}{\left(1-z_l\overline{a_{lj}}\right)^{p+2}}- p\overline{a_{lj}}\displaystyle\frac{1-|a_{lj}|^2}{\left(1-z_l\overline{a_{lj}}\right)^{p+1}},$$ so $\|f_{j}\|_{p}\leq C$ and $\{f_j(z)\}$ tends to zero uniformly on compact subsets of $U^n.$ So by Lemma 2, we know $\left\|W_{\psi,\phi}f_{j}\right\|_{q}\to 0$ as $j\to\infty.$ It follows from (\[19\]) that $$\begin{aligned} &&\sum\limits^n_{k=1}\left(1-|z^j_k|^2\right)^{q} \left|\displaystyle\frac{\partial \psi}{\partial z_k}(z^j)f_j(\phi(z^j))+\psi(z^j)\displaystyle\frac{\partial f_j}{\partial w_l}(\phi(z^j))\displaystyle\frac{\partial \phi_l}{\partial z_k}(z^j)\right|\nonumber\\ &&\leq \left\|W_{\psi,\phi}f_{j}\right\|_{q}\to 0 .\label{33}\end{aligned}$$ Note that $f_j(\phi(z^j))=0$ and $\displaystyle\frac{\partial f_j}{\partial z_l}(\phi(z^j))=\overline{a_{lj}}\displaystyle\frac{1}{\left(1-|a_{lj}|^2\right)^p}$, (\[33\]) gives that $$\begin{aligned} &&|\psi(z^j)|\sum\limits^n_{k=1} \displaystyle\frac{\left(1-|z^j_k|^2\right)^{q}}{\left(1-|a_{lj}|^2\right)^p} \left|\displaystyle\frac{\partial \phi_l}{\partial z_k}(z^j)\right|\nonumber\\ &&\leq C\displaystyle\frac{1}{|a_{lj}|}\left\|W_{\psi,\phi}f_{j}\right\|_{q} \to 0 \hspace*{4mm}\mbox{as $j\to\infty.$}\label{34}\end{aligned}$$ Case 2: If for some $l (2\leq l\leq n),$$|a_{lj}|\not\to 1$ as $j\to\infty,$ then we assume $|a_{lj}|\leq\rho<1.$ If $p\geq 1$, The compactness of $W_{\psi,\phi}$ implies $W_{\psi,\phi}$ is bounded, by Theorem 1 and Remark 1, (\[11\]) is valid. Set $$f_{j}(z)=z_l\left(\displaystyle\frac{1-|a_{1j}|^2} {1-z_1\overline{a_{1j}}}\right)^p, \hspace*{4mm}j=1,2,\cdots.\label{35}$$ It is easy to show that $\|f_j\|_{p}\leq C$, and $\{f_j\}$ tends to zero uniformly on compact subsets of $U^n.$ It follows from (\[19\]) that $$\begin{aligned} &&|\psi(z^j)|\sum\limits^n_{k=1} \left(1-|z^j_k|^2\right)^{q}\left|\displaystyle\frac{\partial \phi_l}{\partial z_k}(z^j)\right|\nonumber\\ &&\leq \left\|W_{\psi,\phi}f_{j}\right\|_{q} +C\sum\limits^n_{k=1}\left(1-|z^j_k|^2\right)^{q}\left|\displaystyle\frac{\partial \psi }{\partial z_k}(z^j)\right|\nonumber\\ &&+C|\psi(z^j)|\sum\limits^n_{k=1} \displaystyle\frac{\left(1-|z^j_k|^2\right)^{q}}{1-|a_{1j}|^2} \left|\displaystyle\frac{\partial \phi_1}{\partial z_k}(z^j)\right| \nonumber\\ &&\leq \left\|W_{\psi,\phi}f_{j}\right\|_{q} +C\sum\limits^n_{k=1}\left(1-|z^j_k|^2\right)^{q}\left|\displaystyle\frac{\partial \psi }{\partial z_k}(z^j)\right|\nonumber\\ &&+C|\psi(z^j)|\sum\limits^n_{k=1} \displaystyle\frac{\left(1-|z^j_k|^2\right)^{q}}{(1-|a_{1j}|^2)^p} \left|\displaystyle\frac{\partial \phi_1}{\partial z_k}(z^j)\right|\to 0.\label{36}\end{aligned}$$ So $$\begin{aligned} &&|\psi(z^j)|\sum\limits^n_{k=1} \displaystyle\frac{\left(1-|z^j_k|^2\right)^{q}} {(1-|a_{lj}|^2)^p}\left|\displaystyle\frac{\partial \phi_l}{\partial z_k}(z^j)\right|\nonumber\\ &&\leq \displaystyle\frac{1}{(1-\rho^2)^p}|\psi(z^j)|\sum\limits^n_{k=1} \left(1-|z^j_k|^2\right)^{q}\left|\displaystyle\frac{\partial \phi_l}{\partial z_k}(z^j)\right|\to 0.\label{37}\end{aligned}$$ Now we return to prove the necessary of Theorem 2. If $p=1$, by Lemma 7, (\[8\]) is necessary, now we prove that (\[7\]) is also necessary. In case 1, set$$f_j(z)=\left(\ln\displaystyle\frac{4}{1-|a_{lj}|^2}\right)^{-1} \left(\ln\displaystyle\frac{4}{1-z_l\overline{a_{lj}}}\right)^2,\label{38}$$ It is easy to show that $\|f_j\|_{p}\leq C$, and $\{f_j\}$ tends to zero uniformly on compact subsets of $U^n.$ It follows from (\[19\]) that $$\sum\limits^n_{k=1}\left(1-|z^j_k|^2\right)^{q} \left|\displaystyle\frac{\partial \psi}{\partial z_k}(z^j)f_j(\phi(z^j))+\psi(z^j)\displaystyle\frac{\partial f_j}{\partial w_l}(\phi(z^j))\displaystyle\frac{\partial \phi_l}{\partial z_k}(z^j)\right|\leq \left\|W_{\psi,\phi}f_{j}\right\|_{q}\to 0 .$$ By a direct calculation and by (\[31\]), we obtain $$\begin{aligned} &&\sum\limits^n_{k=1}\left|\displaystyle\frac{\partial \psi} {\partial z_k}(z)\right|\left(1-|z_k|^2\right)^{q}\ln \displaystyle\frac{4}{1-|\phi_l(z)|^2}\nonumber\\ &&\leq \left\|W_{\psi,\phi}f_{j}\right\|_{q}+2|\psi(z^j)|\sum\limits^n_{k=1} \displaystyle\frac{\left(1-|z^j_k|^2\right)^{q}}{\left(1-|a_{lj}|^2\right)^{p}} \left|\displaystyle\frac{\partial \phi_l}{\partial z_k}(z^j)\right|\to 0.\label{39}\end{aligned}$$ In case 2, by remark 1, $$\sum\limits^n_{k=1}\left|\displaystyle\frac{\partial \psi} {\partial z_k}(z^j)\right|\left(1-|z^j_k|^2\right)^{q}\ln \displaystyle\frac{4}{1-|\phi_l(z^j)|^2}\leq \ln\displaystyle\frac{4}{1-\rho^2}\sum\limits^n_{k=1}\left|\displaystyle\frac{\partial \psi} {\partial z_k}(z^j)\right|\left(1-|z^j_k|^2\right)^{q}\to 0.$$ Combining case 1 and case 2, we know (\[7\]) is necessary. If $p>1.$ by Lemma 7, we know (\[10\]) is necessary, now we prove (\[9\]) is also necessary. In case 1, set $$f_{j}(z)=(p+1)\displaystyle\frac{1-|a_{lj}|^2}{\left(1-z_l\overline{a_{lj}}\right)^p}- p\displaystyle\frac{\left(1-|a_{lj}|^2\right)^2}{\left(1-z_l\overline{a_{lj}}\right)^{p+1}}, \hspace*{4mm}j=1,2,\cdots.$$ It is easy to show that $\|f_j\|_{p}\leq C$, and $\{f_j\}$ tends to zero uniformly on compact subsets of $U^n.$ Note that $f_j(\phi(z^j))=\displaystyle\frac{1}{\left(1-|a_{lj}|^2\right)^{p-1}}$ and $\displaystyle\frac{\partial f_j}{\partial z_l}(\phi(z^j))=0,$ it follows from (\[19\]) that $$\begin{aligned} &&\sum\limits^n_{k=1}\left(1-|z^j_k|^2\right)^{q} \left|\displaystyle\frac{\partial \psi}{\partial z_k}(z^j)f_j(\phi(z^j))+\psi(z^j)\displaystyle\frac{\partial f_j}{\partial w_l}(\phi(z^j))\displaystyle\frac{\partial \phi_l}{\partial z_k}(z^j)\right|\nonumber\\ &&=\sum\limits^n_{k=1}\left|\displaystyle\frac{\partial \psi}{\partial z_k}(z^j)\right|\displaystyle\frac{\left(1-|z^j_k|^2\right)^{q}}{(1-|a_{lj}|^2)^{p-1}}\leq \left\|W_{\psi,\phi}f_{j}\right\|_{q}\to 0.\label{40}\end{aligned}$$ In case 2, by remark 1, $$\begin{aligned} &&\sum\limits^n_{k=1}\left|\displaystyle\frac{\partial \psi} {\partial z_k}(z^j)\right|\displaystyle\frac{\left(1-|z^j_k|^2\right)^{q}}{\left(1-|\phi_l(z^j)|^2\right)^{p-1}}\\ &&\leq \displaystyle\frac{1}{\left(1-\rho^2\right)^{p-1}}\sum\limits^n_{k=1}\left|\displaystyle\frac{\partial \psi} {\partial z_k}(z^j)\right|\left(1-|z^j_k|^2\right)^{q} \to 0.\end{aligned}$$ Combining cas1 and case 2, we know (\[9\]) is necessary. Now the proof of Theorem 2 is completed. Proof of Theorem 3 ================== Proof of Theorem 3. First assume $W_{\psi,\phi}: {\cal B}^p(U^n)\longrightarrow {\cal B}^q(U^n)$ is bounded and (\[12\]) holds, we prove that $W_{\psi,\phi}:{\cal B} ^p(U^n)\to {\cal B} ^q(U^n)$ is compact. By Lemma 6, assume that $\left\|f_{j}\right\|_p\leq C,\, j=1,2,...,$ and $\{f_{j}\}$ converges to zero uniformly on $\overline{U^n},$ we need to prove that $\left\|W_{\psi,\phi}f_{j}\right\|_q\to 0,$ as $j\to\infty.$ Note that the boundedness of $W_{\psi,\phi}$ and Theorem 1, (\[1\]) and (\[2\]) hold. So $$|\psi(z)|\leq C\|\psi\|_q\leq C,\hspace*{4mm} |\psi(z)|\sum\limits^n_{k=1}\left|\frac{\partial \phi_l}{\partial z_k}(z)\right|\frac{(1-|z_k|^2)^q}{(1-|\phi_l(z)|^2)^p}\leq C \label{41}$$ for $l\in\{1,2,\cdots,n\}.$ By the assumption as $j\to\infty$ $$\sup\limits_{z\in\overline{U^n}}|f_j(z)|\to 0\label{42}$$ $$\begin{aligned} &&\sum\limits^n_{k=1}\left|\displaystyle\frac{\partial \left(W_{\psi,\phi}f_j(z)\right)} {\partial z_k}\right| (1-|z_k|^2)^{q}\nonumber\\ &&=\sum\limits^n_{k=1}\left|\displaystyle\frac{\partial \psi(z)}{\partial z_k}f_j(\phi(z))+\psi(z)\sum\limits^n_{l=1}\displaystyle\frac{\partial f_j}{\partial w_l}(\phi(z)) \displaystyle\frac{\partial \phi_l}{\partial z_k}(z)\right|(1-|z_k|^2)^{q}\nonumber\\ &&\leq |f_j(\phi(z))|\sum\limits^n_{k=1}\left|\displaystyle\frac{\partial \psi} {\partial z_k}(z)\right|\left(1-|z_k|^2\right)^{q}\nonumber\\ &&+\sum\limits^n_{k=1}\sum\limits^n_{l=1}\left|\frac{\partial f_j}{\partial w_l}(\phi(z))\right||\psi(z)|\left|\frac{\partial \phi_l} {\partial z_k}(z)\right|\displaystyle\frac{(1-|z_k|^2)^q}{(1-|\phi_l(z)|^2)^p}\nonumber\\ &&\leq C\left|f_j(\phi(z))\right|+\sum\limits^n_{k=1}\sum\limits^n_{k=1}\left|\frac{\partial f_j}{\partial w_l}(\phi(z))\right||\psi(z)|\left|\frac{\partial \phi_l} {\partial z_k}(z)\right|\displaystyle\frac{(1-|z_k|^2)^q}{(1-|\phi_l(z)|^2)^p}\nonumber\\ &&\leq C\varepsilon+\sum\limits^n_{k=1}\sum\limits^n_{l=1}\left|\frac{\partial f_j}{\partial w_l}(\phi(z))\right||\psi(z)|\left|\frac{\partial \phi_l} {\partial z_k}(z)\right|\displaystyle\frac{(1-|z_k|^2)^q}{(1-|\phi_l(z)|^2)^p}.\label{43}\end{aligned}$$ For every $\varepsilon>0$, $l\in\{1,...,n\},$ (\[12\]) implies that there exists an $r$, $0<r<1$, such that $$|\psi(z)|\sum\limits^n_{k=1}\left|\frac{\partial \phi_l}{\partial z_k}(z)\right|\frac{(1-|z_k|^2)^q}{(1-|\phi_l(z)|^2)^p}<\varepsilon,\label{44}$$ whenever $|\phi_l(z)|>r.$ Note that $$U^n= \left\{z\in U^n: |\phi_l(z)|>r\right\}\bigcup\left\{z\in U^n: |\phi_l(z)|\leq r\right\}.$$ For each $l\in\{1,2,\cdots,n\}.$ If $|\phi_l(z)|>r,$ from (\[44\]) and $\|f_j\|_p\leq C$, we have $$\left|\frac{\partial f_j}{\partial w_l}(\phi(z))\right||\psi(z)|\left|\frac{\partial \phi_l} {\partial z_k}(z)\right|\displaystyle\frac{(1-|z_k|^2)^q}{(1-|\phi_l(z)|^2)^p}<C\varepsilon.\label{45}$$ If $|\phi_l(z)|\leq r,$ by the Cauchy’s estimate applied to the function $$g(w_l)=f(w_1,...,w_{l-1},w_l,w_{l+1}...,w_n),$$ of one variable, if $|w_l|\leq r,$ we have $$\left|\frac{\partial f_j}{\partial w_l}(w)\right|\leq C\sup_{|w_l|\leq \frac{1+r}2}|f_j(w)|\leq C\, \sup_{z\in \overline{U^n}}|f_j(z)|,$$ for some $C>0$ independent of $f.$ From this, (\[41\]) and (\[42\]) we have $$\begin{aligned} &&\left|\frac{\partial f_j}{\partial w_l}(\phi(z))\right||\psi(z)|\left|\frac{\partial \phi_l} {\partial z_k}(z)\right|\displaystyle\frac{(1-|z_k|^2)^q}{(1-|\phi_l(z)|^2)^p}\nonumber\\ &&\leq C\sup_{z\in \overline{U^n}}|f_j(z)|\to 0 \label{46}\end{aligned}$$ as $j\to\infty.$ So From (\[43\]),(\[45\]) and (\[46\]), and since $\lim\limits_{j\to\infty}f_j(\phi(0))=0,$ we obtain $\left\|C_{\phi}f_{j}\right\|_q\to 0,$ as $j\to\infty,$ from which the result follows. Now suppose that $W_{\psi,\phi}: {\cal B} ^p(U^n)\to {\cal B}^q(\mbox{\Bbb C}^n)$ is compact. Then $W_{\psi,\phi}$ is bounded, and by Theorem 1 we know that (\[4\]) holds. Now we prove that condition (\[12\]) holds. Let $\{z^{j}\}$ be a sequence in $U^n$ and $w^j=\phi(z^{j})=(w^j_1,..., w^j_n).$ For each $l\in\{1,2,\cdots,n\}$ with $\lim\limits_{j\to\infty}|w^j_l|\to 1.$ Let $$f_{j}(z)=\frac{1-|w^j_l|^2}{(1-z_l\overline{w^j_l})^p},\quad j=1,2,...\;,$$ then$$\displaystyle\frac{\partial f_j}{\partial z_l}(z)=p\overline{w^j_l}\displaystyle\frac{1-|w^j_l|^2}{(1-z_l\overline{w^j_l|^2})^{p+1}}.$$ As in the proof of Theorem 2 we can prove that $\|f_{j}\|_p\leq 1+2^{p+1}p,$ for all $j\in {\bf N},$ i.e. $\{f_j\}$ is bounded on ${\cal B} ^p(U^{n}).$ It is easy to see that $f_j$ tends to zero uniformly on compact subsets of $\mbox{\Bbb C}^n.$ So by Lemma 2, we know $\left\|W_{\phi}f_{j}\right\|_q\to 0$ as $j\to\infty$ and notice that $$f_j(\phi(z^j))=(1-|w^j_l|^2)^{1-p},\hspace*{4mm}\displaystyle\frac{\partial f_j}{\partial w_l}(\phi(z^j))=p\overline{w^j_l}\displaystyle\frac{1}{(1-|w^j_l|^2)^p},$$ consequently, by (\[19\]) $$\begin{aligned} &&\sum\limits^n_{k=1}\left(1-|z^j_k|^2\right)^{q} \left|\displaystyle\frac{\partial \psi}{\partial z_k}(z^j)f_j(\phi(z^j))+\psi(z^j)\displaystyle\frac{\partial f_j}{\partial w_l}(\phi(z^j))\displaystyle\frac{\partial \phi_l}{\partial z_k}(z^j)\right|\nonumber\\ &&\leq \left\|W_{\psi,\phi}f_{j}\right\|_{q}.\label{47}\end{aligned}$$ So $$\sum\limits^n_{k=1}p|w^j_l||\psi(z^j)\left|\displaystyle\frac{\partial \phi_l}{\partial z_k}(z^j)\right|\displaystyle\frac{\left(1-|z^j_k|^2\right)^{q}}{(1-|w^j_l|^2)^p}\leq \|\psi\|_q\left(1-|w^j_l|^2\right)^{1-p} + \left\|W_{\psi,\phi}f_{j}\right\|_{q}.$$ Hence $$|\psi(z^j)|\sum\limits^n_{k=1}\frac{(1-|z^j_k|^2)^q}{(1-|w^j_l|^2)^p} \left|\frac{\partial \phi_l}{\partial z_k}(z^j)\right|\leq \frac{1}{p|w^j_l|}\left(C(1-|w^j_l|^2)^{1-p} + \left\|W_{\psi,\phi}f_{j}\right\|_{q}\right)\to 0$$ as $j\to\infty.$ Now the proof of Theorem 3 is finished. [99]{} R.Timoney, Bloch Function in Several Complex Variables, I, Bull.London Math.Soc. 12(1980),241-267. R.Timoney, Bloch Function in Several Complex Variables, II, J. Reine Angew Math., 319(1980):1-22. C. C. Cowen and B. D. MacCluer, Composition operators on spaces of analytic functions, CRC Press, Boca Raton, FL,1995. K. Madigan and A. Matheson, Compact composition operators on the Bloch space, Trans. Amer. Math. Soc. 347(1995): 2679-2687. K. Madigan, Compact composition operators on analytic Lipschitz space, Proc. Amer. Math. Soc. 119(1993): 465-473. M. D. Contreras and A. G. Hernandez-Diaz, Weighted composition operators in weighted Banach spaces of ananytic functions, J. Austral. Math. Soc. (Series A), 69(2000):41-46. Alfonso Montes-Rodriguez, Weighted composition operators on weighted banach spaces of analytic functions, J. London Math. Soc. (2)61(2000):872-884. S.Ohno, K. Stroethoff and R.H.Zhao, Weighted composition operators between-type spaces, Rocky Mountain Journal of Mathematics,Vol33, No.1(2003):191-215. J. H. Shi and L. Luo, Composition operators on the Bloch space of several complex variables, Acta Math. Sinica, English Series, 16(2000):85-98. Z. H. Zhou and J. H. Shi, Compact composition operators on the Bloch space in polydisk, Science in China (Series A), 44(2001): 286-291. Z. H. Zhou, Composition operators on the Lipschitz spaces in polydisk. Science in China (Series A), 46(2003): 33-38. Z. H. Zhou and J. H. Shi, Compactness of composition operators on the Bloch space in classical bounded symmetric domains, The Michigan Mathematical Journal, 50(2002): 381-405. J. P. D’Angelo, Several complex variables and geometry of real hypersurfaces, CRC Press, 1993. [^1]: Zehua Zhou, Corresponding author. Supported in part by the National Natural Science Foundation of China (Grand No.10371091), and LiuHui Center for Applied Mathematics, Nankai University and Tianjin University
{ "pile_set_name": "ArXiv" }
1. Introduction {#sec0005} =============== Epidemiological studies of birth and death records led to "Barker\'s hypothesis" almost 30 years ago, suggesting the influence of perturbed gestational milieu on the development of diseases later in life ([@bib0060]). This generated a great deal of interest in the fetal origins of adult disorders. Although Barker\'s hypothesis was mainly based on the potential impact of gestational malnutrition to result in permanently altered organs function and structure, a growing body of evidence suggests that a range of maternal complications of pregnancy such as gestational diabetes mellitus, intrauterine growth restriction (IUGR), preeclampsia and maternal stress are associated with adult disorders ([@bib0065], [@bib0295], [@bib0210]). Perturbation of developmental adaptive processes that are known to be involved in permanent changes in physiology, structure and metabolism or early life programming can adversely affect brain development, impacting both brain structure and function ([@bib1065]). Findings from human and animal studies indicate that several environmental factors and physiological mechanisms involving endocrine as well as immune system during gestation play crucial role in early-life programming of later-life brain and behavior by long-term remodeling of the brain ([@bib1065], [@bib0120], [@bib0050]). Evidence toward this notion was derived from neuropathological aberrations including enlarged cerebral ventricles, as well as changes in gray and white matter indicative of impaired neural development during gestation in serious mental illnesses such as schizophrenia ([@bib0545], [@bib0975], [@bib0340]). Importantly, structural brain changes during development of schizophrenia are seemingly determined by genetic components, altered expression of schizophrenia risk genes and epigenetic dysregulation ([@bib0765], [@bib0895], [@bib1110]). The developmental origin of schizophrenia might potentially be a result of prenatal exposure to a diversity of factors such as infection, stress, persistent organic pollutants, smoking and other substance use, maladaptive diet and developmental epigenetic changes ([@bib0185], [@bib0710], [@bib0635]). A two-hit model is one of the leading theories of schizophrenia pathogenesis. The two hit model predominantly implicating the neurodevelopmental theory is mainly based on the assumption that aberrant development during two critical time points (early brain development and adolescence) additively produces risk for schizophrenia-like symptoms. The "first hit" potentially occurs in utero. Although genetic components were primarily considered as the "first hit", recent understanding suggests that along with genetic, environmental factors might also exert a similar function. Animal as well as human studies demonstrated that genetic susceptibility in combination with a developmental insults can prime an individual for a later event that ultimately increase risk for the onset of schizophrenia and this could possibly be mediated by known salient signaling pathways ([@bib0080], [@bib0850]). The "first hit" may disrupt developing neuronal architecture, specific neural networks, establish an abnormal inflammatory response and account for premorbid signs and symptoms in individuals who later develop schizophrenia ([@bib0685], [@bib0435]). Contextually, prenatal infection has become one of the best evidenced environmental risk factors of the "two-hit" hypothesis of schizophrenia as it increases the offspring\'s sensitivity to environmental challenges postnatally and renders them more vulnerable to the pathological effects of a second postnatal stimulus ([@bib0080], [@bib0850]). This "second hit" due to stress, immune re-exposure or even peri-pubertal sex hormonal changes might potentially unmask and exacerbate the hitherto latent inflammatory processes with resultant onset of clinical symptoms ([@bib0880], [@bib0735]). Experimental support for the impact of a second hit is evident from animal studies, where prenatal immune activation elicited by gestational infection and subsequent exposure to stress, cannabinoid use, etc. during adolescence has been shown to unmask the latent neuropathological consequences of prenatal infection and lead to increased risk for the development of schizophrenia ([@bib0305], [@bib0490]). During adolescence, events like excessive elimination of synapses and loss of plasticity might influence the development of the disorder ([Fig. 1](#fig0005){ref-type="fig"} ). Despite this understanding, precisely how the abnormal developmental trajectory of the brain is established during gestation and also how this is causally related to the manifestation of symptoms that appear early in adult life remains a challenging issue. Here we examine recent advances and discuss many emergent factors and mechanisms that might elucidate the mechanistic link between early life programming and adult manifestation of psychiatric conditions.Fig. 1Depiction of 'two-hit' model of schizophrenia. 2. Neurodevelopmental origin of schizophrenia: a review of evidence {#sec0010} =================================================================== Disparate lines of evidence support the view that schizophrenia is a neurodevelopmental disorder. The primary reason is that the onset of schizophrenia has a cumulative age incidence distribution, or developmental function, that is nonlinear with a peak change in slope or acceleration that usually takes to occur during young adulthood. Given the plausibility of the existence of brain abnormalities in schizophrenia at the onset of the illness, it further seems reasonable to conceive schizophrenia as a neurodevelopmental disorder ([@bib1005]). Recent understanding suggests determining role of gene and environmental interactions in the neurodevelopmental trajectories of schizophrenia. The genetic and environmental factors cause structural and functional change not only during pre- and peri-natal periods but also in childhood and early adolescence ([@bib0625], [@bib1230]). Further support has been provided by epidemiological studies showing premorbid intellectual deficits dating back to early development, and neuropathological studies showing altered cerebral cytoarchitecture indicative of a developmental rather than acquired encephalopathy. The main neurodevelopmental hypotheses for schizophrenia set forth in the last 15 years are relatively restricted and share three assumptions ([@bib1255]). Firstly, the primary pathogenic defect is an early derangement of the orderly development of the central nervous system that occurs in the pre- or peri-natal period. Secondly, the period of active operation of the causative agent is of short duration, meaning that it is essentially static and lastly the behavioral consequences of this static process remain relatively latent until long after the primary pathogenic process has run its course. In addition, it is now becoming evident that prenatal adversity induced neurodevelopmental disruption can have physical manifestations. Minor physical abnormalities, neurological soft signs and altered dermatoglyphics pattern represent important markers of disordered neurodevelopment in schizophrenia ([@bib1095], [@bib0460], [@bib0020]). Some of the minor physical abnormalities such as confluent eyebrows, hypertelorism, ear protrusion, low-set ears, palatal abnormalities, tongue furrows and so on represent a set of risk markers for schizophrenia ([@bib1270]). Neurological soft signs correlate with various neuro-cognitive and neuro-anatomical abnormalities in schizophrenia ([@bib1195]). Neurological soft signs are understood as a manifestation of the "cerebello-thalamo-prefrontal" brain network model of schizophrenia ([@bib1290]). Higher levels of neurological soft signs have been reported in healthy children who later develop schizophrenia and in first episode as well as antipsychotic-naïve schizophrenia patients ([@bib0770], [@bib0325], [@bib1190]). Recent examinations of cortex morphology, a marker of brain development in first-episode schizophrenia patients with neurological soft signs revealed a lower global sulcal index (g-SI) in both hemispheres, a lower regional sulcal indexes (r-SI) in left dorsolateral prefrontal and right lateral occipital cortices ([@bib0470]). Taken together, these findings strongly suggest evidence of distinct neurodevelopmental pathways in schizophrenia patients with neurological soft signs. Although various findings including twin studies have highlighted the importance of genetic determination of neurological soft signs, minor physical abnormalities and dermatoglyphic patterns in schizophrenia ([@bib0920], [@bib0430]); the precise genetic determinant of these parameters are yet to be identified. 3. Different risk factors and mechanisms underlying developmental origin of schizophrenia {#sec0015} ========================================================================================= 3.1. Exogenous risk factors {#sec0020} --------------------------- ### 3.1.1. Prenatal teratogens {#sec0025} A range of teratogens and neurotoxic agents such as industrial chemicals (persistent organic pollutants and heavy metals), high levels of ionizing radiation, tobacco smoke, cocaine, alcohol and certain drugs affect early brain development ([@bib0505]). Multiple studies have demonstrated that chemical exposures during early development constitute a new potential class of risk factors for schizophrenia. Prenatal exposure to Pb^2+^ has been found to increase the risk of schizophrenia in the offspring ([@bib0950]). One plausible underlying neurobiological mechanism is the alteration of subunit composition of N-methyl-[d]{.smallcaps}-aspartate receptor (NMDAR) complexes with subsequent effects on calcium-sensitive signaling pathways involved in CREB phosphorylation ([@bib1145]). Prenatal exposure to analgesics in the second trimester of pregnancy conferred a more than four-fold greater risk of schizophrenia ([@bib1105]). Aspirin taken during pregnancy interferes with the prostaglandin pathway, and exposure may influence the risk of schizophrenia in offspring ([@bib0525]). Animal models of schizophrenia have demonstrated that rats exposed to cigarette smoke in the prenatal period exhibited a significant increase of the lipid peroxidation, protein oxidation and DNA damage in adult offspring ([@bib0450]). These effects can lead to several neurochemical changes overlapping with the pathophysiology of schizophrenia. Maternal smoking through pregnancy increases the risk of later schizophrenia among offspring, conferring an increased severity of negative symptoms ([@bib1115]). Interestingly, some of the chemicals and drugs contribute to schizophrenia risk not only as a result of prenatal exposure but also an adolescent exposure. Cadmium and lead for example appear to be associated with both mood and psychotic disorders ([@bib0675], [@bib0115], [@bib0955]). Pre-adolescence exposure to cannabis is shown to be associated with a twofold increase in the risk of schizophrenia ([@bib1175]). ### 3.1.2. Prenatal nutrition {#sec0030} Compelling evidence suggests that prenatal malnutrition leads to long-term brain impairment and increased risk of schizophrenia ([@bib0205], [@bib0180], [@bib1205]). Studies conducted after in utero exposure to hunger/famine during Dutch Hunger Winter of 1944--1945 and 1959--1961 Chinese Famine have indicated a direct association between prenatal starvation and increased risk of schizophrenia ([@bib0570], [@bib1120]). Prenatal exposure to famine affected brain morphology such as decreased intracranial volume, which is seen in schizophrenia ([@bib0605]). More recently, there is increasing evidence that poor quality diet rather than malnutrition per se is a risk factor. The western diet is calorie, fat and sugar rich and nutrient poor, and obesity is currently one of the major public health issues. There is now good prospective evidence in the depression literature that poor quality diet is a risk factor for depression ([@bib1015]), and recent data that maternal prenatal diet impacts the risk of internalizing and externalizing diet in offspring ([@bib0635]). The amount of information on the link between schizophrenia and diet is poorer, but such data is emerging ([@bib0360]). There is emerging evidence of a link between gluten sensitivity and increased levels of antigliadin antibodies and schizophrenia ([@bib1315]). What is known is that diet influences the pathways to neuroprogression in schizophrenia including inflammation and oxidative stress ([@bib0110]). Maternal vitamin deficiency during early pregnancy has been associated with the risk of schizophrenia in the offspring. One of the widely studied vitamins in the context of neurodevelopmental disorders is vitamin D. Vitamin D is arguably the nutritionally related factor that is most deficient in western populations, and some data that this is particularly an issue in psychiatric cohort ([@bib0100]). There is now clear evidence that vitamin D is involved in brain development and being a potent pro-differentiation agent, vitamin D can influence brain functioning via many different pathways ([@bib0420]). Transient prenatal vitamin D deficiency results in abnormal brain development, persistent changes in adult brain structure, neurotransmission, synaptic plasticity, neurochemistry, and behavior and several other biological pathways including oxidative phosphorylation, redox balance, cytoskeleton maintenance, calcium homeostasis, chaperoning and post-translational modifications ([@bib0405], [@bib0410], [@bib0420]). Several studies have demonstrated the immuno-modulatory properties of vitamin D and its implications in a number of autoimmune/inflammatory disorders ([@bib0445]). Importantly, fetal vitamin D plays a crucial role in controlling placental inflammation ([@bib0800]). Vitamin D influences Th1:Th2 balance by inhibiting Th1 pathway and promoting the Th2 pathway through down-regulation of pro-inflammatory cytokines and up-regulation of anti-inflammatory cytokines. Pro-inflammatory cytokine-induced alterations in cognition/behavior could therefore be linked to low levels of vitamin D. This is supported by recent findings that vitamin D mitigates age-related cognitive decline through the modulation of pro-inflammatory cytokine production in rats ([@bib0155]). In addition, developmental vitamin D3 deficiency induces persistent alterations in immune phenotype and function in adult offspring. Furthermore, when stimulated, lymphocytes from developmental vitamin D-deficient rats exhibited a pro-inflammatory phenotype ([@bib0550]). Human population studies have also indicated a significant association between developmental vitamin D deficiency and risk of schizophrenia ([@bib0865]). ### 3.1.3. Prenatal infection {#sec0035} Some of the strongest support toward the developmental etiology of schizophrenia has come from its association with prenatal infection ([@bib0130], [@bib0690]). Accumulating epidemiological data indicates that 38--46% of cases of schizophrenia may have an association with prenatal infection ([@bib0190]). Maternal infection by *Toxoplasma gondii*, influenza, rubella, herpes simplex virus, and cytomegalovirus has consistently been associated with the risk of schizophrenia in adult offspring. Although some of these infectious agents, e.g. rubella, *T. gondii*, cytomegalovirus, etc. can cross the placenta and directly affect the developing fetus, the detrimental effects of infection is known to be elicited by activation of maternal immune system ([@bib0595]). Converging evidence suggests that immuno-inflammatory responses together with downstream oxidative and nitrosative stress pathway are crucial in mediating prenatal infection induced neurodevelopmental abnormality ([@bib0025]). The detrimental effects of redox dysregulation, excessive generation of reactive oxygen species (ROS)/reactive nitrogen species (RNS), etc. on developing brain after prenatal infection are quite well known ([@bib0365], [@bib0760]). Further, intrauterine infection/inflammation evokes the expression of inducible nitric oxide synthase (iNOS) and nitric oxide (NO) in the brain and leads to oligodendrocyte injury in the developing brain ([@bib1085]). Prenatal immune activation leads to changes in the levels of multiple neurotransmitter systems ([@bib1250]). In this context, dopamine abnormalities are one of the most enduring etiological hypotheses of schizophrenia. Emerging findings from animal studies reveal that prenatal exposure to infection and/or inflammation has long-lasting effects on dopaminergic structures and functions ([@bib0015], [@bib0415], [@bib0960], [@bib1220], [@bib1310]). In mice, a viral-like acute phase response during early/mid gestation causes a complex pattern of age-dependent structural abnormalities in the mesoaccumbal and nigrostriatal dopamine system ([@bib1220]). Notably, cytokines are known to modulate dopaminergic neurotransmission and dopamine can also modulate immune response by influencing the cytokine network ([@bib1100], [@bib0255]). Inflammation and oxidative/nitrosative stress strongly influence each other, and increased levels of serum oxidative stress markers and inflammatory cytokines have been reported in schizophrenia patients ([@bib0985]). Based on this understanding, it is likely that prenatal infection induced activation of IO&NS pathway will have an important downstream role in dopaminergic neurotoxicity in schizophrenia. A recent study has demonstrated increased protein oxidation in the dopamine-rich areas of the prefrontal cortex in schizophrenia patients, suggesting the importance of interactions between oxidative stress and dopamine in the pathophysiology of schizophrenia ([@bib0700]). Psychosis is hypothesized to be a hyperdopaminergic state, and models of increased dopamine transmission are linked to increases in ROS ([@bib1265]). Dopamine antagonists can block increased oxidative stress and apoptotic potential ([@bib0945]). Additionally, dopamine metabolism itself, by generating its metabolites like dopamine-semiquinone and dopamine-quinone leads to the generation of ROS within CNS ([@bib0510]). Importantly, in neurodegenerative disorders quinone formation has been shown to be linked with inflammation and oxidative stress. Furthermore, oxidative stress is shown to inhibit the uptake of dopamine through post-translational modification of the dopamine transporter ([@bib0695]). There is crosstalk between other transmitters germane to schizophrenia such as GABA and serotonin and inflammation ([@bib1235]). Prenatal immune activation in mouse with poly I:C is shown to cause maturation-dependent alterations in prefrontal GABAergic gene expression, implying long-term effect of prenatal immune insults on the GABAergic system ([@bib1025]). Agents enhancing GABAergic transmission such as gabapentin down-regulate inflammatory and oxidative stress markers ([@bib0345], [@bib0515], [@bib1295]). Similarly, serotonergic agents cause down-regulation of inflammatory markers in some studies ([@bib1130], [@bib0780]). Further relevant to schizophrenia pathogenesis, prenatal immune activation has shown to modulate hippocampal NMDAR function by interacting with stress and the stress hormone corticosterone at adolescence ([@bib0200]). Taken together, maternal infection induced IO&NS responses can adversely affect pre- and/or peri-natal outcomes and even lead to neurodegeneration or teratogenesis ([@bib1240], [@bib1275]), indicating that inflammation-induced effects may be associated with a direct damage by oxidative/nitrosative stress. ### 3.1.4. Prenatal stress {#sec0040} Prenatal stress-induced changes are found to confer high risk for diverse outcomes in offspring including schizophrenia ([@bib0835]). For example, gestational exposure to prenatal stress or stress hormones contributes to deficits in hippocampal structure and function, as well as the neurotransmitter and immune systems ([@bib0775], [@bib0090], [@bib0840]). The enhanced production of corticosterone or maternal exposure to exogenous glucocorticoids due to chronic exposures to stress has direct influence on fetal brain development and plasticity as well as programming of hypothalamic-pituitary-adrenocortical (HPA) axis ([@bib0715], [@bib0670]). Prenatal stress increases serotonin 2A and decreases mGlu2 expression in frontal cortex, suggesting schizophrenia-like alterations of serotonin 2A and metabotropic glutamate 2 receptors ([@bib0580]). Prenatal stress also affects development of the hippocampal alpha 7 nicotinic acetyl choline receptor (nAChRs) in adult offspring ([@bib1070]). It is interesting to note that repeated variable prenatal stress during critical period of fetal brain development reprograms the response of the HPA axis to acute stress and alters pre- and postsynaptic gene expression that might impact synaptic function in the offspring ([@bib0705]). Studies have demonstrated that both down-regulation of glutamate decarboxylase 67 (GAD67) and maternal exposure to severe stress can increase the risk of schizophrenia in offspring. This is further supported by a study where heterozygous deletion in GAD67 enhances maternal and fetal stress vulnerability ([@bib1150]). ### 3.1.5. Paternal age {#sec0045} Epidemiological studies have provided robust evidence of association between advanced paternal age and the enhanced risk of schizophrenia ([@bib0870], [@bib0170], [@bib0890]). One of the contributing mechanisms that has consistently been implicated in paternal age associated risk of schizophrenia is de novo mutations, which are found to be more abundant in sperm of older men ([@bib1030], [@bib0830]). In a comprehensive study on 78 families, an increase in two de novo mutations per year of advancing paternal age was observed, indicating a linear relationship between paternal age and the number of de novo mutations in offspring ([@bib0720]). Recently, "selfish spermatogonial selection" which means clonal expansion of germs cells carrying pathogenic mutations has been proposed to be a mechanism for association between advanced paternal age and the risk of schizophrenia ([@bib0500]). The clonal expansion leads to relative enrichment of de novo mutations that essentially explain the effect of advanced paternal age on schizophrenia. 3.2. Endogenous risk factors {#sec0050} ---------------------------- ### 3.2.1. Obstetric events {#sec0055} Obstetric complications are well established predictors of risk of schizophrenia ([@bib0230]). Although the term "obstetric events" includes a wide range of complications, the most commonly found complications are fetal growth retardation, fetal hypoxia and prenatal complications. Low birth weight and reduced length at birth are crude indicators of IUGR or abnormally slow fetal growth. Fetal growth restriction increases risk of later schizophrenia ([@bib0390]). Smaller head circumference and small gestational age have been associated with schizophrenia, indicating the implications of fetal growth restriction ([@bib0875]). Although the underlying mechanism of growth restriction and risk of schizophrenia is poorly understood, accumulating evidence suggests that a combination of factors such as environment, placental, and genetic enable expression of a particular mental health outcome. Recent animal data suggests that IUGR leads to metabolic alterations in the fetal brain by influencing neuronal viability, inflammatory regulation, energy metabolism and oxidative stress pathways ([@bib1185]). Suggesting the importance of genetic effects on fetal growth restriction, it has been found that mothers with schizophrenia also have higher rates of low birth weight among offspring ([@bib0630]). However, in a study on same-sex twins discordant for schizophrenia, it was observed that within these twin pairs, low birth weight and smaller head circumference were significantly associated with later development of schizophrenia, indicating that the fetal growth restriction may be independent of familial factors ([@bib0925]). Fetal hypoxia is an environmental risk factor of schizophrenia in the offspring. Hypoxia-associated obstetric complications and the increased risk of schizophrenia is a replicated finding ([@bib1300], [@bib0310]). It is evident that interactions between neuronal genes and molecular regulators of oxygen could lead to hypoxia induced neurodevelopmental abnormality and subsequent risk of neuropsychiatric disorders. Fetal hypoxia also appears to influence the severity of certain neuropathological attributes of schizophrenia, such as hippocampal and cortical gray matter reduction ([@bib0235]). Importantly, such changes in schizophrenia are proposed to be mediated by interactions between schizophrenia susceptibility genes and hypoxia related regulatory processes ([@bib1165], [@bib1060]). A large number of schizophrenia susceptibility genes viz. AKT1, BDNF, COMT, DNTBP1, NOTCH4, NRG1, PRODH, RELN, RGS4 are regulated by hypoxia ([@bib1055]). Furthermore, genes regulated by hypoxia also interact with serious obstetric complications and influence schizophrenia risk ([@bib0910]). ### 3.2.2. Gut microbiota and developmental immune modulation {#sec0060} Microbial colonization of gut is an evolutionary process, which influences both metabolic and immune functions, particularly during early neonatal life. However, recent findings indicate that microbial colonization or contact of the fetus with maternal gut microbiota may start in utero as bacteria from maternal gastrointestinal tract (GIT) have been detected in amniotic fluid, placental and fetal membranes ([@bib0565]). Pregnancy is associated with a profound alteration of maternal gut microbiota, and the changes in gut microbiota composition have been associated with weight gain, altered biochemical and metabolic parameters during pregnancy ([@bib1050], [@bib0725]). Obstetric complications, long known to increase risk for schizophrenia, may in theory be mediated through higher rates of cesarean section, which limits the infants accrual of a normal microbiota from the maternal genitourinary tract through birth ([@bib0125]). This has been hypothesized to also be a factor in autism ([@bib0300]). This implies the possible roles of the gut microbiota composition in mother\'s health during pregnancy as well as on maternal-fetal interactions, influencing the infant\'s health later in life. The perinatal colonization of the gut by microbes contributes to developmental programming of gut homeostasis, angiogenesis and immune competence ([@bib0585], [@bib0815]). There are extensive interactions between the gut microbiota and the host immune system in the newborns and the development of the adaptive immune system is regulated by bacterial colonization of the gut. It is now evident that time variation in microbial colonization of the gut during early life shapes future immune system reactivity. For example, delayed colonization seems to exert permanent changes in the immune system ([@bib0540]). A range of environmental factors including cesarean section, toxins, infectious agents, diet and stress could affect the gut microbiome during this critical developmental period. Disruption of the developing miocrobiome could lead to long-term changes in immune and psychological development. Furthermore, disturbances in the microbiota can also result in dysregulation of adaptive immune cells, intestinal inflammation and potentially enhance the host\'s susceptibility to immune-mediated diseases. The gut microbiota communicates with the brain and affects normal brain development and subsequent adult behavior ([@bib0350]). Gut--brain communication occurs through direct neuronal, immune-related signaling and hormonal pathways. Exposure to many of the afore-mentioned environmental factors during both the pre-and post-natal periods has been established as risk factors for disorders including schizophrenia and autism. One of the widely accepted underlying mechanisms that mediates the interaction between such environmental factors and host as well as gut--brain communication is through immunological signaling involving cytokines. Animal studies suggest that perturbation in the composition of gut microbiota influence the risk of depression and anxiety-like behaviors ([@bib0905], [@bib0355]). In autistic children, there appears to be a distinct and less diverse gut microbe composition ([@bib0665]). A recent study highlighted the importance of gastrointestinal inflammation in schizophrenia pathology ([@bib1075]). Translocation of commensal microbiota such as *Citrobacter koseri*, *Hafnia alvei*, *Pseudomonas aeruginosa*, *Pseudomonas putida*, *Klebsiella pneumonia* and *Morganella morganii* across the gastrointestinal barrier can lead to an antibody response to bacterial translocation, and lysozyme production and consequently leads to persistent low-grade inflammation and increases the risk of depression ([@bib0820], [@bib0825]). Bacterial translocation causes an imbalanced and activated innate immune state ([@bib1080]). Quality data linking these processes to schizophrenia is awaited. ### 3.2.3. Role of placenta in fetal brain development {#sec0065} There is a wide appreciation that perturbations in the maternal hormonal and nutrient environment have deleterious effects on the developing brain and subsequently influence susceptibility to a range of metabolic, neurodevelopmental and psychiatric disorders in adulthood ([@bib0440], [@bib0055]). Importantly, such effects can be transmitted to the fetus by changes in placental function ([@bib0650]), thereby indicating a direct role of placenta in developmental programming of brain and behavior. Placental insufficiency causes intrauterine growth restriction ([@bib0070]). In mice, food deprivation for 24 h on days E12--E13 has been shown to affect placental gene expression, through which placenta provides protection to the fetal brain ([@bib0160]). Interestingly, recent studies suggest that the placenta can convert maternal tryptophan into the neurotransmitter serotonin (5-hydroxytryptamine or 5-HT), which is essential for developing mouse forebrain at mid-gestation ([@bib0140]). This implies a significant role of tryptophan catabolites (TRYCATs) in the placenta in modulating fetal brain development and well as affecting long-term brain function ([@bib0145], [@bib0495]). However, developmental disruption of 5-HT signaling in specific regions of fetal brain causes abnormal wiring of major axonal pathways, altered cell division and laminar organization in the neocortex ([@bib1210], [@bib0135]). Altered brain 5-HT signaling is consistently linked to several psychiatric disorders. Considering the significant role of 5-HT in essential neurodevelopmental processes, genetic or environmental perturbations directly affecting placental tryptophan metabolism can lead to neurodevelopmental abnormality, and therefore contribute to the developmental origin of diverse psychiatric disorders. Prenatal exposure to maternal infection leads to increased expression of pro-inflammatory cytokines such as IL-6 and TNF-α in the placenta and also leads to fetal inflammation which in turn can cause organ damage and potentially downstream developmental deficiencies ([@bib1155], [@bib0245]). Activation of the maternal immune system induces endocrine changes in the placenta, especially IL-6 dependent disruption of the growth hormone-insulin-like growth factor (GH-IGF) axis i.e. decreased levels of GH, IGFI and IGFBP3 ([@bib0595]). Taken together, these observations suggest that the placenta might act as a central mediator of fetal programming of the TRYCAT pathway that may underlie developmental origin of adult psychiatric disorders including schizophrenia ([@bib0495]). ### 3.2.4. Prenatal neuroendocrine pathway {#sec0070} Hormones are established environment-dependent coordinators of the developing "neuro-endocrine-immune network". However, non-physiological concentrations of hormones during crucial phases of embryogenesis can act as 'endogenous functional teratogens'. This is exemplified by fetal and neonatal hyper-insulinism in the offspring of diabetic mothers. Diabetes mellitus is the most common metabolic complication during gestation and is known to have neurodevelopmental sequelae. A number of studies have highlighted relationship between maternal diabetes and the risk of schizophrenia in the offspring ([@bib1180]). Importantly, the risk of schizophrenia in the offspring born to diabetic mothers could be induced by hyperglycemia and mediated by hypoxia, inflammation and oxidative stress. Endocrine disruption as etiological component is theoretically implicated in schizophrenia. Estrogen is proposed to be a potential mediator of brain functions during development and adulthood. Estrogen protects brain cells against injury from oxidative stress, inflammation and apoptosis ([@bib0045], [@bib0085]). Estrogen is relevant to schizophrenia due to its significant effects on synaptogenesis, neurogenesis, neuroendocrine and inflammatory processes. Recently, combinations of both estrogen and selective estrogen receptor modulators with antipsychotics have been shown to decrease positive and negative symptoms significantly in women with chronic schizophrenia ([@bib0750], [@bib0755], [@bib0475]). However, prenatal exposure to excess estrogen could increase the risk of schizophrenia in the offspring through certain mechanisms ([@bib0165]). For example, estrogen has been found to increase susceptibility to certain viral infections by altering innate and adaptive immune responses, such as by reducing CD4 T-cell responses and by inhibiting type 1 interferon production and dendritic cell maturation ([@bib0400], [@bib0980]). Interestingly, many such viruses including borna disease virus, mumps, influenza, corona viruses, etc. are associated with increased risk of schizophrenia. A summary of prenatal endogenous and exogenous risk factors and/or mechanisms leading to psychopathology has been presented in [Fig. 2](#fig0010){ref-type="fig"} .Fig. 2Summary of potential prenatal endogenous and exogenous risk factors and/or mechanisms leading to psychopathology. 3.3. Specificity of the risk factors of schizophrenia {#sec0075} ----------------------------------------------------- Converging evidence from multiple animal studies indicate that prenatal infection can act as a "neurodevelopmental disease primer', and this seems to be a shared environmental risk factor across a number of chronic mental illnesses (as reviewed in [@bib0885], [@bib0745]). It is now widely appreciated that activation of IO& NS pathway due to prenatal infection is one of the underlying mechanisms in the pathogenesis of various neuropsychiatric disorders like schizophrenia, autism, and bipolar disorder ([@bib0025]; [@bib0040]). Although the specificity of prenatal infection on subsequent disease or symptoms is yet to be precisely understood, it is likely to be influenced by the interactions between genetic and additional environmental factors. For example, major histocompatibility complex (MHC) molecules have been shown to play important roles during neurodevelopment ([@bib0250]). Neurons exposed to MIA were found to have higher levels of MHC class I expression and lower synapse density ([@bib0395]), suggesting that such effects of MIA on MHCI expression could affect activity-dependent plasticity and synaptic pruning during crucial phases of neurodevelopment. A plethora of genetic studies have consistently implicated MHC as a risk determinant of schizophrenia ([@bib0335]); however, this has not been observed in bipolar disorder ([@bib0290]). Furthermore, MHC is also found to be associated with various schizophrenia risk factors such as obstetric complications, season of birth, infection and so on ([@bib0335]), thus implying that genetic components along with environmental factors might determine the specificity of disease pathogenesis. 4. Neurodevelopmental origin of schizophrenia: a unifying genetic--epigenetic--environmental pathway {#sec0080} ==================================================================================================== 4.1. Genomic imprinting {#sec0085} ----------------------- The expression of some genes in the human genome depends on whether they are located on the maternal or paternal chromosome. This is accomplished through a highly powerful epigenetic phenomenon called genomic imprinting, which is a significant form of gene regulation. Several of the imprinted genes that are expressed from only one of the parental chromosomes have novel roles in the normal placental development and fetal growth ([@bib0455]). Although most known imprinted genes are expressed during placentation, a considerable number are expressed primarily or entirely in the brain ([@bib0315]). Brain development is strongly influenced by the epigenetic regulation of imprinted genes, and there is increasing evidence that imprinted genes can influence neurogenetic and psychiatric manifestations by affecting neurodevelopmental processes ([@bib0620], [@bib1245]). A recent family based trio study has suggested the occurrence of imprinting of schizophrenia candidate gene, GABRB2 that codes for GABA(A) receptor β(2) subunit ([@bib1010]). Evidence of imprinting in schizophrenia has also been observed in other chromosomal locus, such as DLK1-DIO3 region in chromosome 14q32 ([@bib0465]). 4.2. Feto-maternal genetic conflict {#sec0090} ----------------------------------- Fetal--maternal genetic conflict may potentially contribute to many disorders related to pregnancy including preeclampsia ([@bib0560]). Interestingly, a combination of maternal/fetal genetic predisposition and environmental factors has been implicated as potential risk factors for preeclampsia ([@bib1035]). This may be based on MHC and Rh gene compatibility/incompatibility ([@bib0535]). With respect to HLA antigens, when there is a lack of maternal recognition i.e. if paternally derived HLAs do not differ from maternal HLAs, this may have an adverse effect on reproductive outcomes ([@bib0935]). HLA matching, in couples or between mother and fetus, increases prenatal or obstetric complications including preeclampsia, low birth weight, and can even lead to fetal loss ([@bib0940]). The first indication of the importance of HLA matching in neurodevelopmental disorders came from a study showing that parents of children with autism are more likely to share at least one HLA-A, -B, or -C antigen in common compared to the parents of unaffected children ([@bib1125]). Recently, the significance of maternal--fetal genotype incompatibility at HLA loci in schizophrenia susceptibility has been described, in that maternal--fetal matching at the HLA-B locus increases fetal risk for developing schizophrenia ([@bib0970], [@bib0965]). Maternal--fetal HLA-B matching may increase the risk of schizophrenia only in female offspring ([@bib0275]). Various roles of MHC molecules in neuronal development by in vitro and in vivo studies and risk of schizophrenia conferred by MHC variants have been well supported by genome wide association studies ([@bib0335], [@bib0855], [@bib0290]). These observations led to the hypothesis that maternal--fetal genotype combinations at HLA loci, by modulating feto-maternal immune responses, can affect fetal neurodevelopment and subsequently enhance one\'s risk of developing schizophrenia. 4.3. Developmental epigenetic modifications {#sec0095} ------------------------------------------- Environmental signals during prenatal life lead to adverse long-term effects. Although the mechanisms underlying such risk remain poorly understood, emerging studies both in animals and humans indicate that maternal exposure to infection, stress, drugs or toxins alter epigenetic programming in regulatory as well as growth-related genes ([@bib0485]). There is a growing recognition that prenatal epigenetic dysregulation due to such adverse in utero environments not only affect fetal brain development, but also predispose an individual to neurodevelopmental, behavioral and neurocognitive deficits later in life ([@bib0425], [@bib0995]). A recent study has demonstrated that MIA causes epigenetic changes in adolescent mouse brain ([@bib0075]). The impact of prenatal stress on the modification of epigenetic signatures during critical periods of fetal brain development has been elucidated by several recent studies. Exposure to gestational stress increases DNA methylation at the glucocorticoid receptor (GR) gene promoter and reduces methylation at the corticotrophin-releasing factor (CRF) gene promoter in hypothalamic tissue in adult male mice ([@bib0900]). Prenatal stress down-regulates 11β-hydroxysteroid dehydrogenase type 2 (HSD11β2) that converts cortisone/corticosterone into inactive metabolites through DNA methylation in the placenta and fetal brain ([@bib0655]). Further evidence suggests that the offspring of mice exposed to gestational stress have an altered transcriptomic brain profile of genes related to development, axonal guidance and neuropathology due to up-regulation and down-regulation of certain microRNA (miRNA) ([@bib1305]). In addition, prenatal stress through disruption of DNA methylation network affects GABAergic interneurons associated with schizophrenia-like phenotypes ([@bib0845]). Maternal cigarette smoking during pregnancy is a common hazard affecting key pathways crucial for proper fetal growth and development. Recent data suggests that maternal cigarette smoking during pregnancy can lead to alteration in DNA methylation and expression of microRNA ([@bib1160]). Importantly, maternal smoking during pregnancy has been found to be associated with increased DNA methylation in a key gene involved in brain development, brain-derived neurotrophic factor (BDNF) in adolescent offspring ([@bib1140]). Maternal diet during pregnancy can also affect brain development and function by modifying the fetal epigenome. Persistent epigenetic changes were observed in the offspring exposed to prenatal famine. Peri-conceptional exposure to famine during Dutch Hunger Winter was associated with reduced DNA methylation of Insulin-like growth factor 2 (IGF2), which is a key factor in human growth and development ([@bib0555]). Dietary intake of methyl-group (choline, methionine, and folate) containing nutrients during critical phases of prenatal development can alter the epigenomic profile of the developing offspring, thereby resulting in altered fetal and lifelong changes in gene expression. Unbalanced maternal diet during pregnancy alters DNA methylation in important genes controlling glucocorticoid function and fetal growth ([@bib0380]). Recently, an association between maternal prenatal nutrition and schizophrenia risk in the offspring via epigenetic effects has been highlighted ([@bib0710]). 4.4. Gene--environment interactions {#sec0100} ----------------------------------- A large number of environmental factors have been proposed to cause neurodevelopmental abnormalities and confer enhanced risk of schizophrenia in offspring. It is now becoming apparent that genetic factors potentially modulate the adverse effects of environmental stressors on neurodevelopment during pre- and peri-natal periods as well as behavioral outcomes in the offspring ([@bib0240]). Importantly, the impact of gene--environmental interactions on perinatal programming of schizophrenia is a critical issue in prenatal adversity induced changes in neurodevelopment. The genetic liability of perinatal environmental adversities has been exemplified by various studies. A recent study has shown how maternal cytomegalovirus infection influences the risk of schizophrenia in the offspring by interacting with the genotype of CTNNA3 gene of the progeny ([@bib0150]). The additive or interactive effects of hypoxia with genetic factors in influencing liability to schizophrenia have been reported ([@bib0225]). Animal studies have demonstrated that MIA during pregnancy with polyI:C of mice having mutation in DISC1, a consistently replicated risk gene of schizophrenia exacerbate schizophrenia-like phenotypes ([@bib0005], [@bib0810]). Another study has shown that prenatal immune activation in mice with mutations in Nurr1, a transcription factor crucial for dopaminergic development leads to neuropathological consequences, such as locomotor hyperactivity, deficits in sensorimotor gating, and attentional impairments ([@bib1225]). Furthermore, recent animal studies demonstrated that combined effects of neonatal immune activation and mutant DISC1 on the risk of schizophrenia- like behavioral phenotypes in the offspring ([@bib0610]). One of the important pathways that can be modulated by perinatal adverse conditions is HPA axis activity in offspring. Perinatal exposure to excess glucocorticoids can lead to a persistently altered HPA axis and subsequently enhance the risk of schizophrenia ([@bib0600]). Disturbed genome regulation due to adverse perinatal environmental conditions has been shown to contribute to schizophrenia risk and pathophysiology. Recent observations indicate that prenatal infection increases the associated risk of schizophrenia if occurring in offspring with a family history of psychosis; this implies an interaction of genetic vulnerability with prenatal infection ([@bib0280]). This could possibly be mediated by certain gene loci such as MHC, HLA-G, toll-like receptor (TLR) 3 and 4 that are known to have predominant expression during pregnancy ([@bib0330], [@bib1200]). Taken together, such evidence suggests that fetal immune programming may have profound consequences on brain and behavior, and is associated with the adult presentation of schizophrenia. 5. Prenatal events and neuroprogression in schizophrenia {#sec0105} ======================================================== There is now strong evidence of pathological reorganization of the central nervous system along the course of severe mental disorder. Neuroimaging studies have demonstrated significant volume reduction of certain specific regions in the brain of schizophrenia patients, providing evidence of neuroprogressive processes including neurodegeneration and neuronal apoptosis ([@bib0575]). There is a wide appreciation that neuroprogression is partially mediated by IO&NS pathways, apoptosis and mitochondrial energy dysregulation ([@bib0105], [@bib0025]). The generation of ROS and RNS has both physiologic and pathologic roles in the placenta, embryo and fetus; the developing brain is highly vulnerable to ROS and RNS. Amongst the several causative mechanisms of fetal origin of adult diseases, a significant role of oxidative and nitrosative stress (O&NS) in fetal programming is predominant ([@bib1135]). It is now evident that a number of factors such as prenatal hypoxia, maternal under-and over-nutrition, excessive glucocorticoid exposure can induce O&NS process during pregnancy and subsequently lead to neuronal death/brain injury ([@bib0615]). In a recent study it was observed that chronic fetal hypoxia induced brain injury is associated with altered nitric oxide synthase activity ([@bib0375]). It is now becoming evident that a range of prenatal adversities can lead to heightened maternal inflammation, which can contribute to placental hypoxia and O&NS process underlying altered fetal growth and development. For example, the effects of prenatal malnutrition have also been found to be mediated by pro-inflammatory factors ([@bib1090]). Fetal hypoxemia can cause fetal inflammatory response syndrome as well as fetal brain injury by up-regulating inflammatory cytokine cascade ([@bib0530]). It is interesting to note that melatonin, an endogenously produced indoleamine from the pineal gland, acts as an antioxidant, free radical scavenger and anti-inflammatory molecule ([@bib1020]). Importantly, melatonin has a role in redox modification in fetal programming and reverses oxidative stress during prenatal period. Further, melatonin influences epigenetic modifications associated with developmental programming ([@bib0730]). Melatonin might play a pivotal role in epigenetic modifications induced by maternal stress, maternal under-nutrition or IUGR ([@bib0270]). As melatonin levels and melatonin circadian rhythm are significantly decreased in schizophrenia ([@bib0035]), a role of melatonin in neuroprogressive pathways seems credible. Molecular hydrogen is an odorless and tasteless gas, and this bioactive molecule has various biological attributes including anti-inflammatory, anti-apoptotic and anti-oxidative effects ([@bib0930]). Animal studies have indicated that inhalation of hydrogen decreased acute lung inflammation and hydrogen enriched water decreased the production of ROS ([@bib1260], [@bib0680]). Importantly, a protective role of hydrogen on fetal brain injury during maternal hypoxia has also been recently highlighted ([@bib0805]). Some intestinal bacteria, e.g. *Escherichia coli* can produce a remarkable amount of molecular hydrogen and under certain circumstances can suppress inflammation ([@bib0660]). Considering the above biological properties of molecular hydrogen and their relevance in neurodevelopment and function including neuroprogressive changes, implications of molecular hydrogen have been highlighted recently in bipolar disorder and schizophrenia ([@bib0480]). 6. Implications: prediction and prevention {#sec0110} ========================================== Understanding the pathophysiological basis of schizophrenia from the perspectives of MIA with fetal programming aberrations permits potential translational implications as well. Over the past few years multiple blood-based, imaging, neurophysiologic and neurocognitive biomarkers have been identified for schizophrenia ([@bib0260], [@bib0795], [@bib1280]). However, there seems to be a considerable imprecision in the nosology of biomarkers that have been identified in schizophrenia. Recent conceptualization suggests that a classification of biomarkers based on six categories such as risk, diagnosis/trait, state or acuity, stage, treatment response and prognosis may be applicable to neuropsychiatric disorders ([@bib0320]). Several studies have consistently shown altered levels of markers of inflammation, oxidative stress, metabolism and hormonal status in the first onset schizophrenia patients and have suggested the potential implications of such risk biomarkers of schizophrenia ([@bib0520], [@bib0990]). Considering the ever growing support toward the neurodevelopmental origin of schizophrenia, identification of biomarkers bearing signatures of events from as early as embryonic development or birth would be of considerable interest in predicting risk as well as treatment responses. A recent methylome-wide association study examining blood based biomarkers in schizophrenia has shown changes in genes that reflect the effects of environmental insults related to hypoxia, infection etc. ([@bib0010]), suggesting that pathogenic events might be preserved in the methylome. Such understanding essentially highlights the importance of environmental adversities on fetal epigenome, therefore, early epigenomic profiling might be one of the areas which could offer potential schizophrenia risk predicting biomarker. In addition, elevated levels of inflammatory marker such as maternal C-reactive protein, TNF-α and IL-8 have robustly been associated with increased risk of schizophrenia in adult offspring ([@bib0195], [@bib0175], [@bib0215]). Such maternal inflammatory markers could also be considered as potential risk biomarker in predicting schizophrenia early in life. Maternal stress is an established risk factor of schizophrenia. Recently, O-GlcNAc transferase (OGT) has been demonstrated to be a placental biomarker of maternal stress ([@bib0590]). This biomarker might also be useful in predicting gestational stress exposure and risk of schizophrenia in adult offspring. Impaired sensory gating indicative of aberrant cerebral inhibition is a documented component of the pathogenesis of schizophrenia ([@bib1215]). Significantly, prenatal MIA can result in sensory gating aberrations ([@bib1040]). Hence, within the pathogenetic paradigm of aberrant fetal programming due to prenatal immune disturbances, certain biomarkers like P50, that are indicative of sensory gating deficits, especially in combination with other significant biomarkers like P85, P300, mismatch negativity and eye movement aberrations (smooth pursuit as well as antisaccades) ([@bib0095]), with subsequent analyses of markers for persistent immune activation (cytokines, lymphocyte functions ([@bib0385]) as well as microglia imaging using positron emission tomography ([@bib0370]) might facilitate reliable prediction of risk for schizophrenia. Prevention of psychiatric disorders of neurodevelopmental origin such as schizophrenia is becoming a challenging issue ([@bib0640]). Public health approaches including control of infectious diseases, improvements in obstetric and neonatal care and nutritional supplementation might be beneficial. For instance, choline, an essential nutrient, has been shown to improve immune parameters with associated adaptive modulation of cognitive functions ([@bib0860], [@bib0785], [@bib0790]). Choline plays a critical role in optimal neurodevelopment ([@bib9055]). Interestingly, several maternal factors that elevate schizophrenia risk can lead to decreased availability of choline during fetal development ([@bib1285]). Recently, a randomized placebo-controlled clinical trial examined 100 healthy pregnant women with dietary phosphatidylcholine supplementation that was initiated in the second trimester until the time of delivery. After birth, infants were given 100 mg of phosphatidylcholine in an oral suspension once daily or placebo ([@bib1045]). In comparison with placebo-treated infants, choline-treated infants demonstrated better sensory gating as examined by P50 response ([@bib9045]). Choline supplementation was shown to enhance sensory gating measures in healthy adults as well ([@bib0740]). Availability of safe interventions like choline supplementation is worth exploring with large scale studies to ascertain potential preventive interventions. 7. Limitations of neurodevelopmental theory and future directions {#sec0115} ================================================================= The neurodevelopmental origin of schizophrenia although has become one of the most influential etiologic theories in recent times; however, there are certain limitations of this theory. Amongst the range of factors and mechanisms that are shown to alter the developmental trajectories, the association of certain risk factors/mechanisms remain weak and needs to be replicated. Various risk factors seem to mediate a large number of mechanisms that impair crucial phases of fetal development and result in a similar set of behavioral outcomes in the offspring. It is essential to classify the risk factors that confer predominant risk and delineate their mechanistic basis. The current understanding suggests that developmental modulation during embryogenesis by various factors and mechanisms could potentially predict behavioral outcomes in the offspring during adolescence or early adulthood and these precede the onset of illness. Early onset schizophrenia is a severe form of schizophrenia that occurs during childhood or adolescence and is often chronic and persistently debilitating. However, the frequency of early onset schizophrenia has been reported to be around 4% ([@bib0220]). Although converging functional genomics suggests involvement of multiple genes in neurodevelopment, certain genes are found to confer susceptibility to various neurodevelopmental disorders. Furthermore, most of the risk genes have a variable pattern of expression and different effects at different developmental stages. Some of the genes exhibit preferential expression in the fetal brain and high gene expression occurring during fetal development can be reversed in early postnatal life ([@bib0285]). In addition, progressive brain changes have also been reported in chronic adult patients with schizophrenia ([@bib0265]). Therefore, it is important to study the effect of various risk factors including genes as well as neuroprogressive changes at different time points during the lifespan to gain more insights on the pathogenesis of schizophrenia rather than focussing emphatically on neurodevelopmental insults. The developmental neuroinflammation has also been contradicted by a recent study where neonates who later developed schizophrenia had unaltered levels of 17 inflammatory markers, thus refuting an association between neonatal inflammation and risk of schizophrenia ([@bib0915]). Future research should pay more focus to establish 'missing heritability' aspects and disentangle the different effects of prenatal environmental and genetic exposures. The early-life epigenetic disruption also plays pivotal role in the neurodevelopmental origin of schizophrenia. This notion is experimentally supported by methylomic profiling of human brain tissue of schizophrenia patients, identifying disease-associated differential DNA methylation in the prefrontal cortex and discrete modules of co-methylated loci associated with the disorder that are significantly enriched for genes involved in neurodevelopmental processes ([@bib1000]). Improved understanding of the genetic as well as epigenetic contribution to environmental risk mediation will offer possible candidate for primary prevention and early intervention strategies. Combined studies of prenatal exposures and neurodevelopmental disorders with simultaneous evaluation of neural and immune systems might delineate the mechanisms enhancing individual vulnerability or resilience to neurodevelopmental disorders. The importance of early life programming as a target for prevention of mental disorders in the offspring has recently been highlighted by [@bib0790] and several recommendations were made with respect to public health and clinical implications. 8. Conclusion {#sec0120} ============= There is strong evidence that schizophrenia is a complex multi-factorial disorder and no one factor seems to be of solitary significance in the genesis of schizophrenia. Among the various etiological models tested so far, gene--environmental interactions appear to be most widely appreciated one in schizophrenia. The adverse effects of certain risk factors are found to be linked to genetic components, therefore, it is essential to identify specific genetic components that confer major risk to schizophrenia in combination with environmental stressors. The series of neurological insults rendered by an array of environmental factors during gestation reviewed above strongly level schizophrenia to a disorder of neurodevelopment and significantly highlight the implications of fetal programming of schizophrenia. Such compelling evidence calls upon researchers to translate these findings into interventions designed to prevent mental disorders. Conflict of interest {#sec0125} ==================== The authors declare that they have no conflicts of interest to disclose germane to this paper. MB is supported by a NHMRC Senior Principal Research Fellowship 1059660.
{ "pile_set_name": "PubMed Central" }
Missouri Revised Statutes Chapter 214 Cemeteries Section 214.190 August 28, 2014 Cemetery not subject to execution, dower or partition--exception. 214.190. Lands or property, set apart as burial grounds, either for public or private use, and so recorded in the recorder's office of the county where such lands are situated, or any burial ground that may have been used as such for ten years shall not be subject to sale on execution, to dower, nor to compulsory partition; provided, that the lands so appropriated and set apart as a private burial ground shall not exceed one acre in area or one hundred dollars in value; and provided further, that nothing contained in this section shall be so construed as to exempt any such burial ground or cemetery property from being liable for special assessments for street improvements, when such assessment is levied by an incorporated city in this state.
{ "pile_set_name": "Pile-CC" }
[Laparoscopic adrenalectomy]. The authors performed three left and one right sided laparoscopic adrenalectomies between 3rd April and 8th August 1997. The indication of surgery was hormonally active cortical adenoma of about 2 cm size in three cases, a 6 cm large hormonally inactive tumour in one case respectively. For the operation on the left side three, on the right side four trocars with 11 mm diameter was used. The duration of the operations was between 115 and 220 min. The patients left one the second or third postoperative day, no complication was observed. The authors' opinion based on both literature data and their own experience is that laparoscopic approach to adrenalectomies is the method of choice today.
{ "pile_set_name": "PubMed Abstracts" }
Insights into the function of FhaA, a cell division-associated protein in mycobacteria. FhaA is a forkhead-associated domain-containing protein, the depletion of which leads to accumulation of peptidoglycan (PG) precursors at the septum and poles in Mycobacterium smegmatis (M. smegmatis), by a mechanism undefined thus far. To elucidate its function, we constructed an fhaA (MSMEG_0035) knockout (ΔfhaA) strain in M. smegmatis and demonstrated that this gene is dispensable for in vitro growth. The mutant showed a short cell length phenotype due to a probable defect in cell elongation/cell wall synthesis, which was reversed by complementation with both M. smegmatis and Mycobacterium tuberculosis (M. tb) fhaA (Rv0020c), confirming their association with the observed phenotype. The identification of penicillin binding protein A (PbpA), a PG biosynthesis enzyme as an interacting partner for mycobacterial FhaA, provided a hint into the functioning of FhaA. A drastic reduction in the levels of ectopically expressed PbpA in the ΔfhaA mutant vs wild-type M. smegmatis suggested that FhaA interacts with and stabilises PbpA. In addition, the fhaA deletion mutant was sensitive to multiple classes of antibiotics pointing to a general permeability defect. Our findings uncover a role for FhaA in PG biosynthesis and suggest its involvement in the maintenance of mycobacterial cell envelope integrity.
{ "pile_set_name": "PubMed Abstracts" }
Our system has found that you are using an ad-blocking browser add-on. We just wanted to let you know that our site content is, of course, available to you absolutely free of charge. Our ads are the only way we have to be able to bring you the latest high-quality content, which is written by professional journalists, with the help of editors, graphic designers, and our site production and I.T. staff, as well as many other talented people who work around the clock for this site. So, we ask you to add this site to your Ad Blocker’s "white list" or to simply disable your Ad Blocker while visiting this site. Bing and DuckDuckGo are both getting a boost in Apple's coming mobile and desktop operating systems, allowing the company to take traffic away from Google. On Monday, Apple revealed it would be moving away from Google as its default search provider and would replace it with Microsoft's Bing. The change will affect Spotlight on OS X Yosemite and all future versions of iOS starting with iOS 8. During last year's WWDC, Apple announced that it was switching to Bing for Siri's Web search but the impact on Google is much more significant with this year's update. Google is involved in many industries, but Search is still the source of much of its revenue, so any move against Search can cost Google millions. Changing the Default Starting with iOS 8 and OS X Yosemite, almost all of Apple's devices will be using Bing as the default search engine in Spotlight, and it is possible that Safari could be changed to Bing in the future as well. Spotlight is getting an overall upgrade in both of the new operating systems as it will be used to search local files and the Web. Safari on Yosemite will also use Spotlight, which means that searches through the address bar should go through Bing rather than Google. Spotlight has been the default search tool on Mac computers for years and many people use it on a daily basis to find files that are on their computer. Now that Web search is enabled in Spotlight and will be utilizing Bing, Google will lose out on even more traffic. With Apple's increased focus on using Bing wherever it can, it also seems less plausible that Yahoo's rumored bid to become Safari's default search engine would be accepted. Safari will continue to default to Google for now but if that were to change, the momentum seems to be in the direction of Bing rather than Yahoo. Adding in DuckDuckGo Defaults will not change but Safari will be updated in iOS 8 and OS X Yosemite to support DuckDuckGo, the most well-known private search engine. If users want to manually enable DuckDuckGo, they can use it as the default search option, whereas before, there were only a few mainstream options available outside of Google. Letting people choose DuckDuckGo on their Macs, iPhones, iPads, and iPods will benefit both the search engine and users. DuckDuckGo received a large amount of attention in 2013 when people were looking for a secure and private alternative to Google. Now that switching to the service is easier, more people will have the option to protect their information and not have it used to sell advertisements. Integrating DuckDuckGo is yet another way that Apple is targeting Google as it provides yet one more way for people to avoid using Google Search. Plus, DuckDuckGo vows to not collect data for advertising purposes, whereas that is the primary way Google makes its money. Have been using ixQuick and Startpage for a while because I am allergic to Google's tracking. It is appalling to read that Apple can limit the choices of users of iDevices. Another good reason to stay away from the walled orchard.
{ "pile_set_name": "Pile-CC" }
It is a happy day when we can tell you about a brand new cupcake! (Or at least one that’s new to us!) HUGE thanks to DFB readers Matt and Lenore for telling me about this — and making it imperative that I head over to Disney’s Caribbean Beach Resort on my last Disney World Visit! Monkey Cupcake! One of the treats that I couldn’t wait to sample on my recent trip to Walt Disney World was the Monkey Cupcake at Old Port Royale Food Court within Disney’s Caribbean Beach Resort. I’d heard it had peanut butter buttercream icing (hubba hubba!!) and a surprise inside! You might be asking at this point: so, what makes this a “monkey cupcake?” I mean, there are no little chocolate monkeys or faces on it, like you’d find on the Elephant Cupcake at Animal Kingdom’s Kusafiri Bakery and Coffee Shop… But when you cut into the moist cake, you begin to get the picture. The proof is in the pudding — or filling as it were. And the filling just happens to be chock full of bananas! If you get a fork in there like I did, you can see that there are real banana pieces in the custard. It’s not just banana flavored. The effect is a very fresh, from-scratch taste in the filling that I really loved! The combination of the moist cake, a good amount of that thick, sweet buttercream, and the filling was delicious. I quickly realized that it’s basically the King Cupcake from Pop Century Resort, minus the candied bacon crumbles! So if you enjoyed the King Cupcake, you’ll love this one, too! It’s not particularly flashy, like some of the other cupcakes we’ve seen recently (the Contempo Cafe’s Birthday Cupcake springs to mind 🙂 ) but it was tasty and somewhat lighter. I really enjoyed it! If you’re as big a fan of Disney Cupcakes as we are, be sure to check out our Disney Cupcake Gallery, or sign on to take a Disney Cupcake Crawl Challenge! NOTE! This particular cupcake has the awesome distinction of coming in both chocolate and vanilla flavors. So you can take your pick depending on what flavor you’re feeling that day! (To see a cross section of the chocolate version, head over to our review of the King Cupcake at Pop Century Resort!) I love finding unique items at Disney Resort restaurants and food courts!! Be sure to tell us when you run into something awesome on your trips by sending us an email! Will you be heading over to Caribbean Beach Resort to try out the Monkey Cupcake? Weigh in with comments below!
{ "pile_set_name": "OpenWebText2" }
Fair Trade Soft Toys Beautiful Fair Trade and organic cotton soft toys at Babipur. Ethically made waldorf dolls and stuffed animal toys are soft and snuggly making a perfect first toy for a new baby, and will be loved for years to come.
{ "pile_set_name": "Pile-CC" }
At first glance, Colombia and Sri Lanka have little in common aside from a brutal history of violence. Nevertheless, the few but important similarities mean that by studying how the other moves towards national reconciliation and the reestablishment of Government legitimacy could prove to be beneficial. A case in point is the revolutionary new Victim’s Law approved by the Colombian Congress this past June that just might prove be an interesting case study for Sri Lanka. Civil War in the Andes Colombia is a vast country broken apart by soaring mountain ranges, sprawling grasslands and the depths of the Amazon jungle. For the past four decades a vicious war between peasant land movements, paramilitary armies, government forces and armed gangs have plagued the countryside leaving hundreds of thousands dead and millions displaced. Fueled by drug money, Colombia’s war morphed overtime into a snake pit of drug lords, organized crime, and the markedly non-political remnants of once powerful movements. In 2002, newly elected President Alvaro Uribe rejected previous attempts at peace negotiations and launched a relentless military campaign against the strongest of the guerilla groups, the Fuerzas Armadas Revolucionarias de Colombia (FARC). At the same time, he extended a hand to the largest paramilitary army—the Autodefensas Unidas de Colombia (AUC)—and made a deal that resulted in the group’s eventual disbandment and disarmament.[i] Wildly popular until the day he left office, President Uribe successfully drove the FARC further into the jungle and gave Colombians a new lease on life. News of bombs exploding came less frequently and Colombians themselves were much less likely to be kidnapped or killed. Bogota was no longer a city synonymous with death, but rather began popping up on lists of up-and-coming places to live. The Transition from War to Peace Nevertheless, this military success came at a cost. President Uribe’s tenure was riddled with scandals engulfing the very highest levels of office. Words such as parapolítica and falsos positivos had to be invented just to be able to explain the allegations of what was occurring. Countless accusations of human right abuses by all sides involved as well as the almost daily murders of witnesses, activists, judges and politicians have so far gone uninvestigated. As a result, Colombia has one of the world’s highest impunity rates at around 96%.[ii] To name only a few of the more notorious scandals, in 2010: 10% of members of Colombian’s House and Senate—a total of 33 people—were behind bars after being accused of supporting right-wing paramilitary groups; young men from the slums of Bogota were pulled from their homes, shot, and presented by the army as dead FARC members; and the Administrative Department of Security (DAS) was found to have been illegally spying on opposition members of Congress. Last year’s Presidential polls saw the election of the hard-line former Minister of Defense, Juan Manuel Santos, who at the time promised to continue the policies of his predecessor. Nevertheless, President Santos has made a move so remarkable that it shows not only a substantial legal, but also a psychological break with the past. On May 26 of this year, the Colombian Congress passed the groundbreaking La Ley de Víctimas y de Restitución de Tierras or the Victim and Land Restitution Law (known popularly just as the Victim’s Law) that has the potential to improve the lives of millions across the country. First, this bill will provide monetary restitution to victims of violence—or those that suffered from the acts of terrorists; illegally armed groups, and, most significantly, of Government armed forces. Second, the passage of this bill marked a significant rhetorical break from past policy by naming the war being waged in Colombia as an “internal armed conflict” as opposed to just a “terrorist threat”. What does it mean to be a Victim in Colombia? Colombia has more than 3 million IDPs and while the country boasts of some of the most advanced laws in the world regarding the rights of the displaced, implementation has so far been seriously lacking. Many of the displaced still have not returned to their communities for fear of continued violence and those who did return have only limited access to state services. In support of the displaced and others who suffered during the armed conflict, the Victim’s Law was first proposed in 2007 as a way forward in national healing and reconciliation. However, the law stalled for years in the Colombian legislature as politicians argued relentlessly over the definition of a victim. President Uribe and his supporters championed the point of view that refused to include victims of Colombian Armed Forces, and rather only victims of terrorist activities, within the bill. This side originally received the majority of Congressional support, despite viable evidence of Armed Forces involvement in human rights violations. As a result of the disagreement, the bill was never passed. However, in highly unexpected turn in October 2010, President Santos chose to reintroduce the bill in its current form, which will provide unprecedented compensation to victims of violence—including those that suffered at the hands of the armed forces. This time, the Colombian Congress passed the bill and made reparations available to all victims of the armed conflict, regardless of the perpetrator. Importantly, while former child soldiers are eligible to participate under the law, victims of criminal activity as well as demobilized ex-combatants are excluded. In Montes de Maria at an Independence Day Celebration organized by Accion Social and aimed at improving community cohesion. Montes is a community that suffered much violence in the 1990's and is now in the process of welcoming back returnees Making Amends: Reparations and Restitution In order to achieve transitional justice, this law aims to use the means of reparations, or the making of amends for the loss of a family member by paying money, to the more than 4 million people recognized as victims of the armed conflict. The maximum amount that can be allocated to each beneficiary is 20 million Colombian pesos or around UD$11,400, which is equivalent to about 40 months of minimum wage.[iii] Additionally, victims are entitled through the plan to an education allowance applicable to schooling from the elementary to high school levels as well as to healthcare. Those eligible include victims whose fundamental rights were denied; those who suffered injury, emotional suffering, loss of liberty, forced recruitment, financial loss, or displacement; as well as those killed or disappeared as a result of the armed conflict. In order to preemptively combat fraudulent claims by non-victims, the Government has imposed harsh prison sentences of up to ten years for any false claims submitted. Tackling one of Colombia’s most difficult challenges, the law also calls for the restitution or returning of titles to the displaced forced off their land. The total area under question is equal to about 6.6 million hectares. Significantly, the law places the burden of proof on the current landholders, who must prove that they acquired the land legally, as opposed to those displaced from the land. This nuanced approach demonstrates an understanding of both the trauma of displacement, during which many had to quickly flee leaving their documents behind, as well as knowledge of the psychological importance for victims of being able to their return home. The restitution of land is expected to be an particularly difficult process to implement given the unnerving reports of criminal gangs and other types of armed groups purposefully amassing land in the Northern part of the country—an area where many of the displaced come from—through intimidation. Nevertheless, this law is a significant first step towards the total resettlement and the normalization of life. Another contentious issue regarding the law is the timeframe it covers. While some politicians wanted a shorter period beginning the 1990’s, the law as approved covers incidents that occurred as far back as 1985 and will be applicable for new cases that occur until 2021. The extension of the bill to cover incidents until 2021 is an impressive step that recognizes the fact that the conflict is not yet over and that new victims are created everyday. It is expected that the implementation of the bill will cost the Government of Colombia around US$20 billion dollars. While human rights analysts have pointed out certain flaws in the law, such as the lack of special clauses addressing particularly vulnerable groups like Afro-Colombians and indigenous populations, there is a general hope that the implementation of the law will help to solidify the gains made in building a sustainable peace. As with past measures aimed at providing support to IDPs, the key will be in its implementation as well as the protection provided to witnesses coming forward to declare themselves as victims. The Power of Rhetoric Another change that resulted from the Victim’s Law was the sanctioning of the term “internal armed conflict” by President Santos to describe Colombia’s decades long orgy of violence. Those who disagree with this new classification argue that it will confer political legitimacy on the illegally armed groups terrorizing the country. On the other hand, for the millions of victims this switch signals an important break with the past and a long-awaited recognition of the realities in the country. Initially, the labeling of the situation in Colombia as a “terrorist threat” placed the country closer to the frontlines of the US’s war on terror. The FARC’s prolific use of terrorist tactics and, more importantly, its deep involvement with the drug trade prompted the US to provide millions of dollars worth of military aid to the beleaguered country. Some skeptics believe that this aid would not have come if the US knew that it was involved in an “internal conflict” as opposed to a fight against a terrorist threat with a global reach. Nevertheless, the United States Embassy has actually lauded the change in rhetoric. Additionally, to assuage those worried about conferring political legitimacy, the law directly recognizes that even though the State is providing compensation for victims of the Armed Forces, it can by no means be construed as recognition of criminal responsibility of the State or of the political legitimacy of the armed guerilla groups. What does it mean to be a Victim in Sri Lanka? As of yet, the Sri Lankan Government has not developed a comprehensive plan to compensate the hundreds of thousands displaced, killed, and disappeared during the civil war. The support provided so far has been only on an ad hoc basis regarding specific incidents. It is not clear whether or not the Government is interested in providing reparations to individuals and families. If the Government does decide, as it should, to provide restitution to these victims, the groundbreaking decision by the Colombian Government to give blanket compensation to all victims sets a high—albeit good—standard. Given the sensitivities posed by the ethnic and political dimensions of the conflict, a single scheme that provides equal compensation for all—regardless of the perpetrator—could be the best way to show a palpable commitment to reconciliation and equality. Unfortunately, looking at the Government’s harsh response to allegations of human rights violations by the armed forces, the idea that the Government will admit that victims of State violence exist—let alone deserve restitution—seems unlikely if not impossible. Outside of reparations, contentions over land rights in the North and East are a potential source of future discontent unless addressed quickly and efficiently.[iv] Given the common problems of loss of documentation, competing claims, and continued occupation, the Government will find itself needing to address this problem sooner rather than later. Keeping an eye on how the new law proceeds in Colombia could provide a good learning lab for Sri Lanka, particularly the clause that places the burden of proof on current landholders. Looking towards the Future Given the precarious security situation in Colombia, the passing of the Victim’s Law was accompanied by an ambitious security plan to combat drug-traffickers, newly emerging criminal gangs, and the remaining guerilla groups. Additionally, the most vulnerable areas of the country are receiving unprecedented levels of investments in social and economic infrastructure in an effort to build Government legitimacy and consolidate security gains through political engagement. By promoting high-levels community involvement in the process and giving heavy focus to alternative livelihoods in order to ease the transition from reliance on illegal crops, the Government’s commitment to change is impressive, but will require both large sums of money as well as continued public support. Importantly, despite the undeniable gains in security, a least ten activists working on land issues as well as scores of witnesses and activists throughout the country have been killed this year alone. While it is clear there is much left to be done, the steps made by President Santos have given hope to many anxiously waiting for Colombia to continue on the road to peace. While Sri Lanka is by no means Colombia, such South-to-South exchange of ideas and experiences between countries recovering from conflict could prove to be quite beneficial as people try to rebuild their lives and reconcile with the past. [i] There are have been reports that some of the demobilized ex-combatants are reforming into new and equally as brutal BACRIMS or criminal bands throughout the country. (Smith, C.L. “Águilas Negras: Rising from the Ashes of Demobilization in Colombia.” Venezuelan Analysis. 25 Apr. 2011. Web. < http://venezuelanalysis.com/analysis/6150> accessed 20 July 2011.) [iv] For more information on this topic please watch out for the forthcoming CPA report on Land Reform in the North. Dr Dayan Jayatilleka Valuable as this example may be, this is not an impressive exercise in comparative politics. Colombia hasn’t (yet) won the war, while Sri Lanka did. Furthermore, the closer parallel to the FARC may be the two Southern insurrections in Sri Lanka, both od which the state prevailed over. Ward It is not easy to save those oppressed by internal colonialism in an island located in a geopolitically strategic location in a world of numerically strong human rights violating states. Henry Why cannot the government of Sri Lanka come up with a scheme to compens ate the victims of the war? This is re-building Sri Lanka in a real sense.
{ "pile_set_name": "Pile-CC" }
using Microsoft.CodeAnalysis; using Microsoft.CodeAnalysis.CSharp; using Microsoft.CodeAnalysis.CSharp.Syntax; using Microsoft.CodeAnalysis.Diagnostics; using System.Collections.Immutable; using System.Linq; namespace UnityEngineAnalyzer.StringMethods { [DiagnosticAnalyzer(LanguageNames.CSharp)] public sealed class DoNotUseStringMethodsAnalyzer : DiagnosticAnalyzer { private static readonly ImmutableHashSet<string> StringMethods = ImmutableHashSet.Create("SendMessage", "SendMessageUpwards", "BroadcastMessage", "Invoke", "InvokeRepeating"); private static readonly ImmutableHashSet<string> Namespaces = ImmutableHashSet.Create("UnityEngine.Component", "UnityEngine.GameObject", "UnityEngine.MonoBehaviour"); public override ImmutableArray<DiagnosticDescriptor> SupportedDiagnostics => ImmutableArray.Create(DiagnosticDescriptors.DoNotUseStringMethods); public override void Initialize(AnalysisContext context) { context.RegisterSyntaxNodeAction(AnalyzeNode, SyntaxKind.InvocationExpression); } private static void AnalyzeNode(SyntaxNodeAnalysisContext context) { var invocation = context.Node as InvocationExpressionSyntax; if (invocation == null) { return; } string name = null; if (invocation.Expression is MemberAccessExpressionSyntax) { name = ((MemberAccessExpressionSyntax)invocation.Expression).Name.Identifier.ToString(); } else if (invocation.Expression is IdentifierNameSyntax) { name = ((IdentifierNameSyntax)invocation.Expression).ToString(); } else if (invocation.Expression is GenericNameSyntax) { name = ((GenericNameSyntax)invocation.Expression).Identifier.ToString(); } // check if any of the "string" methods are used if (!StringMethods.Contains(name)) { return; } // check if the method is the one from UnityEngine var symbolInfo = context.SemanticModel.GetSymbolInfo(invocation); var methodSymbol = symbolInfo.Symbol as IMethodSymbol; if (Namespaces.Any(ns => methodSymbol?.ToString().StartsWith(ns) ?? false)) { var diagnostic = Diagnostic.Create(DiagnosticDescriptors.DoNotUseStringMethods, invocation.GetLocation()); context.ReportDiagnostic(diagnostic); } } } }
{ "pile_set_name": "Github" }
# Lines starting with '#' and sections without content # are not displayed by a call to 'details' # [Website] http://forum.ruboard.ru/showthread.php/143139-VSO-Downloader-v.2.7.0.4-%D0%B1%D0%B5%D1%81%D0%BF%D0%BB%D0%B0%D1%82%D0%BD%D1%8B%D0%B9-%D0%B4%D0%B8%D1%81%D0%BF%D0%B5%D1%82%D1%87%D0%B5%D1%80-%D0%B7%D0%B0%D0%BA%D0%B0%D1%87%D0%B5%D0%BA [filters] http://cdn.leadsleader.ru/ll.js [other] # Any other details [comments] fanboy
{ "pile_set_name": "Github" }
Marilyn The Getty Images Gallery presents Marilyn, a collection of imagery and memorabilia to commemorate 50 years since the untimely death of Marilyn Monroe. Showcased in London for the first time, the exhibition will feature a number of original dresses and costumes worn by the Hollywood icon, alongside unique and iconic photographs. Marilyn will include imagery from Monroe's early years as an aspiring actress through to her rise to international stardom. Accompanying the photographs will be original film costumes and dresses from the legendary collection of David Gainsborough Roberts, owner of one of the largest collections of Marilyn Monroe memorabilia in the world. Original video will also be shown ensuring Marilyn offers an unrivalled glimpse into the life of one of the world's most famous stars. Louise Garczewska, Director, Getty Images Gallery says: "We are extremely excited to present our Marilyn exhibition, offering the public unparalleled and rare access to Marilyn's life through the iconic imagery from Getty Images' extensive archival collection. David Gainsborough Roberts has kindly loaned us Marilyn's dresses which the public can see in London for the first time ever, making this exhibition a perfect tribute to one of Hollywood's greats." A smaller exhibition will also be on display at Getty Images Gallery in Westfield Stratford City at a slightly later date of 23 March to 3 June 2012.
{ "pile_set_name": "Pile-CC" }
Influenza-associated acute encephalopathy has been described in children, and results in a high frequency of neurologic sequelae and death. Altered consciousness, disorientation, and seizures occur within a few days after the onset of fever and respiratory symptoms ([@R1]*--*[@R3]). In some patients, symptoms are transient but in others rapid progression to necrotizing encephalitis, deep coma, and death may occur ([@R1]*--*[@R3]). Cases in adults are infrequently reported and remain poorly characterized, although the more complex clinical scenarios in adults may have hindered case recognition ([@R1]*,*[@R4]*--*[@R6]). The pathogenesis is unclear, but a hyperactivated cytokine response, rather than viral invasion, is believed responsible in most childhood cases ([@R1]*--*[@R5]). We describe 3 cases of acute encephalopathy associated with influenza A infection in adults. The clinical, virologic, immunologic findings (cytokines in plasma and cerebrospinal fluid \[CSF\]), and CSF penetration of oseltamivir for these cases are reported. The Study ========= At Prince of Wales Hospital, Hong Kong ([@R7]), from January 2007 through August 2008, influenza infection was diagnosed for \>460 hospitalized adult patients for whom acute febrile respiratory illnesses had been diagnosed. Nasopharyngeal aspiration and immunofluorescence assays (IFA) were used for rapid diagnosis of influenza A and B infection, confirmed by virus isolation. Thirteen (2.8%) patients had signs of confusion or altered consciousness, together with fever and respiratory symptoms (mean ± SD age 77.7 ± 8.8 years). We studied 3 patients from whom CSF was obtained for analysis, and who fulfilled the definition of influenza-associated acute encephalopathy (altered mental status \>24 hours within 5 days of influenza onset and without alternative explanation) ([@R1]*,*[@R2]*,*[@R4]*--*[@R6]). Nasopharyngeal aspirates were subjected to IFA, virus isolation, and subsequent subtyping ([@R7]). CSF specimens were subjected to virus isolation using MDCK cells, and reverse transcription--PCR to detect influenza virus RNA by using H1/H3 subtype-specific primers. Herpes simplex virus, herpes zoster virus, and enterovirus DNA/RNA was detected using PCRs ([Technical Appendix](#SD1){ref-type="local-data"}). CSF and plasma samples collected on the same day were analyzed simultaneously for the concentrations of 11 cytokines/chemokines by bead-based multiplex flow cytometry. Their assay methods and plasma reference ranges (established from \>100 healthy persons) have been described ([Technical Appendix](#SD1){ref-type="local-data"}) ([@R7]). In CSF, in patients without central nervous system (CNS) disease/infection, cytokines/chemokines are either undetectable (e.g., interleukin-6 \[IL-6\], CXCL8/IL-8, CXCL10/IP-10, CXCL9/MIG) or present at low levels (e.g., CCL2/MCP-1) ([@R8]*--*[@R10]). Concentrations of oseltamivir phosphate (OP) and its biologically active metabolite oseltamivir carboxylate (OC) were measured in CSF and plasma taken simultaneously from 1 patient who received concurrent treatment, using tandem mass spectrometry ([@R11]). The assay methods have been described ([Technical Appendix](#SD1){ref-type="local-data"}). The clinical and virologic findings are summarized in [Table 1](#T1){ref-type="table"}. All case-patients were elderly (72--86 years of age), but none were known to have neuropsychiatric illness, dementia, or to be taking psychotropic medication. None had received updated influenza vaccination ([@R6]). Confusion and altered consciousness developed in patients 1 and 2 one to 2 days after the onset of fever and cough. These patients had no meningismus, focal neurologic deficit, hypotension, respiratory distress, or metabolic disturbances. Brain computed tomography (CT) scans showed no acute cerebral lesion. CSF analyses showed no bacterial or viral pathogen or pleocytosis. Oseltamivir was given to patient 2 only when influenza A was later confirmed by nasopharnygeal aspirate/IFA; patient 1 did not receive antiviral treatment. Both patients recovered in the next 2 days. Patient 3 had fever, severe chronic obstructive pulmonary disease exacerbation requiring noninvasive ventilatory support, complicated by acute coronary syndrome. He was given oseltamivir, 75 mg 2×/day, after influenza A infection was confirmed. Agitation and confusion developed in the patient on day 3--4 of illness (onset after the third dose of oseltamivir), despite resolution of the patient's respiratory failure. These symptoms were followed by involuntary, tremulous movements involving all 4 limbs, while at rest and during movement. Brain CT scan was normal. Electroencephalogram showed generalized slowing. Oseltamivir was stopped after the ninth dose, but tremor persisted. CSF analyses showed no pathogen or pleocytosis. The patient's symptoms resolved in the next 3--4 days without sequelae. ###### Clinical and laboratory findings in 3 patients with acute encephalopathy associated with influenza infection, Prince of Wales Hospital, Hong Kong\* Clinical and laboratory findings Patient 1 Patient 2 Patient 3 -------------------------------------- ------------------------------------------------------------------------- --------------------------------------------------------------------------------------- ---------------------------------------------------------------------------------------------- Age, y/sex 76/M 86/F 72/M Concurrent illnesses Ischemic heart disease Diabetes mellitus, hypertension COPD Influenza vaccination within 6 mo None None None Symptoms on examination Fever \>38°C, cough, disorientation, incoherent speech, mental dullness Fever \>38°C, cough, delirious, impaired consciousness, did not follow verbal command Fever \>38°C, cough, disorientation, agitation, incoherent speech, involuntary 4-limb tremor Focal neurologic sign or meningism Absent Absent Absent Chest radiograph, consolidation Absent Absent Absent Antiviral (oseltamvir) None Given Given Outcome (duration of encephalopathy) Recovered (2--3 d) Recovered (3--4 d) Recovered (6--7 d) Brain CT scan (noncontrast) Normal Old ischemic changes; known small, calcified meningioma Normal Virus isolated from NPA Seasonal (H1N1) 2008 Subtype H3N2 Subtype H3N2 CSF testing results Opening pressure, cm H~2~O 11 9 14 Cell count (x 10^6^/L) 1 -- 0 Glucose, mmol/L 4.2 7.4 3.7 Protein, g/L 0.46 0.47 0.16 Virus isolated None None None RT-PCR for H3 and H1 influenza virus Negative Negative Negative Bacterial culture Negative Negative Negative Others HSV, HZV, and enterovirus PCR negative HSV, HZV, and enterovirus PCR negative HSV PCR negative \*COPD, chronic obstructive pulmonary disease; CT, computed tomographic scan; NPA, nasopharyngeal aspirate; CSF, cerebrospinal fluid; RT-PCR, reverse transcription--PCR; HSV, herpes simples virus; HZV, herpes zoster virus. In all cases, there was no hypoglycemia, and liver and renal function test results were normal. C-reactive protein level was elevated in all cases. For patient 3, an electroencephalogram was performed and showed generalized slowing of background consistent with moderate encephalopathic change (similar to that observed in septic encephalopathy) ([@R1],[@R6]). Findings are consistent with previous reports on adult cases of influenza-associated encephalopathy: patients are all unvaccinated, pleocytosis and cerebral imaging abnormalities (even with magnetic resonance imaging) are usually absent, and symptoms are generally self-limiting ([@R1],[@R6]). Most reports have mentioned influenza A as a cause of encephalopathy, and more commonly subtype H3N2 ([@R1]--[@R6]). Despite apparently normal CSF findings, high concentrations of cytokines/chemokines were detected in the CSF and plasma specimens of all patients ([Table 2](#T2){ref-type="table"}). Plasma concentrations of IL-6, CXCL8/IL-8, CXCL10/IP-10, CCL2/MCP-1, and CXCL9/MIG were elevated at median values of 2.0, 2.8, 11.9, 3.7, and 2.1× the upper limits of their respective reference ranges (comparable to or higher than that observed in other hospitalized influenza patients) ([Table 2](#T2){ref-type="table"}) ([@R7]). Other cytokines were not elevated ([@R4]*,*[@R7]). In their CSF, IL-6, CXCL8/IL-8, CXCL10/IP-10, and CCL2/MCP-1 were consistently detected, and were elevated at median values of 2.6, 15.0, 3.4, and 20.0 × the upper limits of their respective plasma reference ranges. The CSF/plasma concentration ratios of CXCL8/IL-8 and CCL2/MCP-1 were \>3 (median CSF/plasma ratio 5.4 and 8.0, respectively). ###### Cytokine and chemokine concentrations in CSF and plasma samples from 3 patients with acute encephalopathy associated with influenza A infection, Prince of Wales Hospital, Hong Kong\* Cytokine or chemokine Reference range, pg/mL CSF/plasma cytokine concentration, pg/mL (ratio) ----------------------- ------------------------ -------------------------------------------------- -------------------- ------------------- IL-6† \<3.1 8.0/6.3 (1.3) 11.6/35.1 (0.3) 2.2/5.9 (0.4) CXCL8/IL-8‡ \<5.0 84.0/15.5 (5.4) 74.8/13.8 (5.4) 21.9/6.3 (3.5) CXCL10/IP-10† 202--1,480 15,374/102,019 (0.2) 5,101/17,594 (0.3) 1,371/1,550 (0.9) CCL2/MCP-1‡ \< 10-57 996/82 (12.1) 1,287/336 (3.8) -- CXCL9/MIG 48--482 11,58/14,001 (0.1) 70/333 (0.2) 145/1,019 (0.1) IFN-γ \<15.6 UD/14.4 4.7/10.1 0.4/2.0 IL-12p70 \<7.8 1.5/UD 1.3/UD UD/UD TNF-α \<10.0 1.7/1.4 UD/1.2 UD/UD IL-10 \<7.8 2.5/2.2 UD/7.3 UD/1.7 IL-1β \<3.9 UD/UD UD/3.7 UD/UD CCL5/RANTES 4,382--18,783 4/2,507 14/1,609 1.3/814 \*CSF, cerebrospinal fluid; --, test not done due to inadequate sample; UD, undetectable (i.e., below the detection limit of the cytokine/chemokine assay). Cytokines: Interleukin (IL)--1β, IL-6, IL-10, IL-12p70, tumor necrosis factor α (TNF-α). Chemokines: CXCL8/IL-8, monokine induced by interferon-γ (IFN- γ) (CXCL9/MIG), IFN-γ--inducible protein-10 (CXCL10/IP-10), monocyte chemoattractant protein--1 (CCL2/MCP-1), and regulated upon activation normal T cell--expressed and secreted (CCL5/RANTES). The plasma reference ranges are established from \>100 healthy adults. The assay sensitivities of IL-1β, IL-6, IL-10, IL-12p70, TNF-α, IL8, MIG, IP-10, MCP-1, RANTES, and IFN-γ are 2.5, 3.3, 3.7, 1.9, 7.2, 0.2, 2.5, 2.8, 2.7, 1.0, and 7.1 pg/mL, respectively. Coefficients of variation are all \<10%. In an earlier study involving 39 adult influenza patients hospitalized with cardio-respiratory complications ([@R8]), the median (interquartile range) plasma concentrations of IL-6, IL-8, IP-10, MCP-1, and MIG were 10.6 (4.2--18.4), 5.4 (2.5--8.7), 7,043.0 (4,025.1--1,2381.1), 76.5 (49.5-97.0), and 992.1 (499.1--1,992.3) pg/mL, respectively. In CSF, in subjects without neurologic disease/infection, these cytokines/chemokines are either undetectable or present at low levels ([@R9]--[@R11]). In a pediatrics influenza cohort, CSF cytokine levels were substantially higher in encephalopathy cases when compared to those with febrile seizure; CSF/plasma concentration was \<1 ([@R9]).
†CSF cytokine concentrations above plasma reference ranges.
‡CSF/plasma cytokine concentration ratio consistently \>3 (3.5--12.1), in addition to CSF cytokine concentrations being above the plasma reference ranges. For IFN-γ, IL-12p70, TNF-α, IL-10, IL-1β and RANTES, because of their low/undetectable levels, the CSF/plasma ratios were not calculated. CSF specimens from patients 1 and 2 were collected at the peak of symptoms, and before antiviral treatment (if given); CSF from patient 3 was collected when persistent tremor developed 18 hours after the ninth dose of oseltamivir; the drug was stopped afterward. Simultaneous CSF and plasma OC and OP concentrations were determined for patient 3, as symptoms progressed at 18 h after oseltamivir. The concentrations (mean ± SD) of OC in duplicate CSF and plasma samples were 18.3 ± 0.9 ng/mL and 143.8 ± 3.3 ng/mL, respectively; the CSF/plasma concentration ratio was 12%--13%. The OP plasma concentration was 1.05 ± 0.03 ng/mL; it was not detectable in the CSF. Conclusions =========== We report 3 adults with acute encephalopathy (altered consciousness, confusion) associated with influenza. High CSF and blood cytokine/chemokine (CXCL8/IL-8, CCL2/MCP-1, IL-6, CXCL10/IP-10) levels were detected. No evidence of direct viral neuroinvasion was found. All patients recovered rapidly without sequelae ([@R1]*,*[@R6]). Our findings agree with studies of influenza-associated encephalopathy in children. Influenza virus is rarely detected in the CSF, and pleocytosis is often absent ([@R1]*,*[@R2]*,*[@R4]*--*[@R6]). High levels of cytokines (e.g., IL-6, soluble tumor necrosis factor receptor 1) can be consistently found in CSF/blood specimens, correlating with disease severity and outcomes (hyperactivated cytokine response is absent in febrile seizure associated with influenza) ([@R2]*--*[@R4]*,*[@R8]). We found a broader range of cytokines/chemokines being activated ([@R7]); for certain cytokines (CXCL8/IL-8, CCL2/MCP-1), the CSF concentrations were 3× those in plasma. IL-6, CXCL8/IL-8, CCL2/MCP-1 and CXCL10/IP-10 have been shown to play pathogenic roles in CNS viral infections, cerebral injury, and acute brain syndrome in susceptible patients ([@R7]*,*[@R9]*,*[@R12]). The high CSF/plasma ratios suggest that for some cytokines, activation within the CNS might have occurred along with respiratory-tract and systemic productions (cytokines are not detected in CSF normally; ([Table 2](#T2){ref-type="table"}) ([@R4]*,*[@R7]*--*[@R10]*,*[@R12]). Resident macrophages/monocytes, astrocytes, microglial and endothelial cells in the CNS are shown to release cytokines/chemokines when stimulated by viral/influenza infection; activation mechanisms without involving overt CNS invasion have been suggested ([@R1]*,*[@R4]*,*[@R9]*,*[@R12]*--*[@R14]). Cytokines may cause direct neurotoxic effects, cerebral metabolism changes, or breakdown of the blood-brain-barrier (endothelial injury) to produce symptoms ([@R1]*--*[@R4]*,*[@R8]*,*[@R12]*--*[@R14]). Whether early viral suppression by antivirals can lead to attenuation of these cytokine responses and better outcomes warrants further study ([@R7]). We measured oseltamivir concentrations because of the concerns over its neuropsychiatric side-effects in children and adolescents. However, only the active metabolite (OC) was detected in the CSF of patient 3; the CSF/plasma concentration ratio was 12%--13% (18.3/143.8 ng/mL) at 18-hours postdose. This degree of CSF penetration is similar to that observed among healthy patients, with a Cmax CSF/plasma concentration ratio of 3.5% (at ≈8 hours), and a ratio of ≈10% at 18 hours (concentration-time profiles for plasma/CSF differ). Assuming a similar ratio, the CSF OP concentration would have fallen below the assay's detection limit (0.25 ng/mL) by 18 hours ([@R11]*,*[@R15]). The low CSF drug-penetration, together with high cytokines in CSF and symptom progression despite drug withdrawal suggest that the manifestations of patient 3 may have been disease-related. Symptoms developed in patients 1 and 2 without antiviral exposure. Further investigations on the CNS effects of oseltamivir in the clinical setting are needed.. Our study is limited by the small patient number and the lack of feasibility in obtaining CSF for study/comparison in influenza patients without neurologic symptoms. Further studies on the clinical spectrum of influenza encephalopathy and encephalitis in adults ([@R1]*,*[@R6]) and their pathogenesis are indicated. In conclusion, acute encephalopathy may occur in adults with influenza. Exuberant cytokine/chemokine response may play an important role in its pathogenesis. Supplementary Material ====================== ###### Technical Appendix Acute Encephalopathy Associated with Influenza A Infection in Adults *Suggested citation for this article*: Lee N, Wong CK, Chan PKS, Lindegardh N, White NJ, Hayden FG, et al. Acute encephalopathy associated with influenza A infection in adults. Emerg Infect Dis \[serial on the Internet\]. 2010 Jan \[*date cited*\]. Available from <http://www.cdc.gov/EID/content/16/1/139.htm> We thank Rity Wong for clerical assistance. This study was supported by a research fund from the Department of Medicine and Therapeutics, The Chinese University of Hong Kong. Dr Lee is an associate professor in infectious diseases at The Chinese University of Hong Kong. His primary research interest is severe emerging infections, including severe acute respiratory syndrome and influenza.
{ "pile_set_name": "PubMed Central" }
1. . /ˈɛftə/ noun acronym 1. European Free Trade Association; established in 1960 to eliminate trade tariffs on industrial products; now comprises Norway, Switzerland, Iceland, and Liechtenstein. Free trade was established between EFTA and the EC (now EU) in 1984. In 1994 EFTA (excluding Switzerland) and the EU together created the European Economic Area (EEA) […] Disclaimer: Efph definition / meaning should not be considered complete, up to date, and is not intended to be used in place of a visit, consultation, or advice of a legal, medical, or any other professional. All content on this website is for informational purposes only.
{ "pile_set_name": "Pile-CC" }
The invention relates to the field of semiconductor etching, and in particular to a process of crystallographic wet chemical etching of III-Nitride material, and in particular gallium nitride. The III-Nitride materials system, gallium nitride (GaN) and its indium- and aluminum-containing alloys, shows great promise for producing high-speed electronic devices that operate efficiently at high temperatures. III-Nitrides are the material of choice for producing light-emitting devices including LEDs and lasers that operate at wavelengths throughout the visible and UV parts of the electromagnetic spectrum. These materials are extremely stable, allowing them to be used in high temperature and corrosive environments. Because of this stability, it is difficult to find methods for etching of III-Nitrides. Most processing of the III-Nitrides is currently done by dry plasma etching. There are several disadvantages to dry etching, including rough surface profiles, ion-induced damage in the exposed surface areas and difficulty in obtaining smooth etched sidewalls, which are required for lasers, the expense of the equipment required. Photoenhanced electro-chemical (PEC) wet etching has also been used for etching of GaN. PEC etching has the advantage of low surface damage and relatively low equipment cost, but there has not yet been found a method for producing smooth etched vertical sidewalls, which are required for lasers. Even what seems to be a very small roughness can have a large effect on the reflectivity of a laser facet. FIG. 1 illustrates this point, showing a graph of the maximum reflectivity of a laser facet as a function of surface roughness in a typical InGaN/GaN laser structure. The best published roughness results from several different experimental groups are indicated by arrows in the figure. Note that most etching techniques produce a roughness of approximately 50 nm, allowing a maximum specular reflectivity of less than 1%. Production of laser facets using an etching technique is preferable to using cleaving or polishing because an entire wafer of several thousand lasers can be produced at one time by etching, but cleaving must be done on individual rows of devices, and polishing is an even more labor-intensive technique. Recently, researchers at Xerox Coxp. fabricated a laser using chemically assisted ion beam etching (CAIBE), producing sidewalls with a roughness of 4-6 nm. This is the lowest sidewall roughness ever reported for etching in the III-Nitride material system, but even with this roughness the reflectivity is only 60-70% of the ideal reflectivity, and the roughness is enough to cause interference fringes in the emitted laser beam. It would be very beneficial to take advantage of the crystal structure of the III-Nitride material itself to produce atomically smooth crystallographic planes without damaging the surface. Such crystallographic planes would have reflectivities greater than 99% of the ideal reflectivity, given by the well known Fresnel formula, as compared to the above values of 1% and 60-70% for plasma etching and CAIBE, respectively. Improvement in facet reflectivity corresponds to higher output power and a better defined laser spot. Wet chemical etching has been used for producing atomically smooth crystallographic planes in other semiconductor materials systems, such as silicon, gallium arsenide, and gallium phosphide. Previously, prior to the invention, this had never been achieved in the III-Nitride materials system.
{ "pile_set_name": "USPTO Backgrounds" }
Essay von Evelyn Roll Ein Gespenst geht um in Europa - das Gespenst des Nationalismus. In fast jedem europäischen Land marschieren sie jetzt, die kleinen Trumps, wie Karikaturen und Zwerg-Wiedergänger der Schlafwandler von 1914. Mit populistischen Dummheiten, nationalistischen Abschottungsfantasien, Verschwörungstheorien und Scheinlösungen sammeln sie die Stimmen der von den globalen Herausforderungen Überforderten, Verängstigten, der Denkfaulen und Verbitterten. Sie wollen vor allem eines: An die Macht. Und dann? Europa abschaffen. In Polen bestand eine der ersten Amtshandlungen der neuen Rechtsregierung darin, die EU-Flagge aus öffentlichen Gebäuden zu entfernen. Marine Le Pens Front National, der Frankreichs Austritt aus dem Euro fordert, hat erschreckend realistische Chancen, die Macht zu übernehmen. Ungarn scheint schon ganz verloren zu sein. Auch sozialistisch inspirierte Populisten wie Robert Fico in der Slowakei oder Tschechiens Präsident Milos Zeman machen gegen Europa Politik . Cameron riskiert mit seiner Anbiederung an den nationalpopulistischen Zeitgeist, das Europa-Projekt erst zu schwächen und sein Land dann in den Abgrund des Brexit zu stürzen, aus Versehen sozusagen, als Unfall, Braccident. Schon seit der Europawahl 2014 sind euroskeptische Parteien die drittstärkste Kraft im europäischen Parlament. 156 von 751 Abgeordnete wollen das Parlament, in das sie sich haben wählen lassen, in seinen Rechten beschneiden oder noch lieber ganz abschaffen. Jeder Fünfte also. So etwas hat es in der Geschichte des Parlamentarismus auch noch nicht oft gegeben. In der nächsten Woche beim EU-Rat wird sich zeigen, ob es die Europäische Union im eigentlichen Sinn überhaupt noch gibt, ob die 28 Länder sich in der Flüchtlingsfrage wenigstens auf einen Minimalkonsens einigen können. Es wird, auch wenn das nicht gelingt, nicht den einen großen Knall geben, mit dem die Europäische Union dann auseinanderfliegt. Aber sie löst sich mehr und mehr auf in zu wenig Solidarität, Ernsthaftigkeit, Enthusiasmus und zu große Skepsis. Und wir aufgeklärten bis leidenschaftlich überzeugten Europäer aller Länder müssen zuschauen und abwarten, weil wir gegen die Erosion Europas leider so gar nichts tun können? Das ist falsch. Jeder von uns kann zum Beispiel gleich an diesem Wochenende mit den intelligenteren seiner Einfache-Lösung-Freunden zum örtlichen Chinesen gehen und sich an den Tisch setzen, der unter der pazifikzentrierten Landkarte platziert ist. Man kann solche Karten natürlich auch im Internet betrachten oder den Globus mit dem Pazifik-Bauch nach vorne drehen. So also sehen alle anderen die Welt: Amerika, Lateinamerika, China, Russland, Indien, Afrika, fette Landmassen, beeindruckende Wirtschaftsräume. Ernüchternd marginal und klein am äußeren linken Rand dagegen: Europa, die Länder der europäische Union. Suchen wir unser Land: Italien, Polen, Kroatien, wo sind sie? Sogar Frankreich und Deutschland sind nicht gleich zu finden, Luxemburg oder Slowenien nur Stecknadelköpfchen. Unter diesem Weltbild sprechen wir über: Klimawandel, Epidemien, Geldströme, Informationsgeschwindigkeit, globale Wirtschaftsunternehmen, Finanzkrisen, Islamfaschisten, internationalen Terrorismus, Armut, Hunger, Gerechtigkeit und über die fast 60 Millionen Menschen, die weltweit auf der Flucht sind. Noch bevor das Essen kommt, ist schon einmal klar: Ein Stecknadelköpfchen allein wird keine dieser Aufgaben lösen können. Es gibt keine wirksame Politik isolierter Nationalstaaten mehr. Einmauern ist keine Alternative. Der Verzicht auf Weltpolitik schützt nicht vor ihren Folgen. Wer angesichts einer der globalen Herausforderungen in einem europäischen Land sagt "Wir schaffen das", muss mit "wir" genau genommen die Weltgesellschaft meinen, mindestens aber Europa. Besser wäre es, wenn Angela Merkel das gleich dazu gesagt hätte. Wenn das Weltbild und damit das Selbstbild korrigiert oder befestigt ist, müssen wir - vielleicht beim Gehen nach dem Essen - nur noch einen Denkfehler beseitigen, bevor sich die Energie unserer Sorge in intelligente Aktion umwandeln kann: Es gibt keinen Fortschritt in der Geschichte. Das ist nur eine Utopie, eine säkularisierte Jenseitsvorstellung, die Ende des 18. Jahrhunderts mit dem Verbleichen der christlichen Glaubensgewissheiten leider zu einer Art Zivilreligion der Aufklärung wurde. Marx und Hegel haben daraus die Meistererzählung der Moderne gemacht, die seither zur kulturellen DNA Europas gehört und trotzdem ein Irrtum ist. Wir haben das in der Wolle wie kindliche Dressurbefehle: Ein Junge weint nicht! Kartoffeln nicht mit dem Messer schneiden! Immer schön die rechte Hand geben! Geschichte schreitet linear fort zum Besseren! Man legt das nicht so leicht wieder ab. Aber man muss es versuchen. Weil dieser Denkfehler einerseits das übertrieben große Erschrecken, die Ratlosigkeit und lähmende Erschütterung über den gegenwärtigen Zustand der Welt erzeugt ("aber wir waren doch schon viel weiter") und andererseits die selbstgefällige Gleichgültigkeit und den mangelnden Kampfgeist ("man kann ja eh nichts tun"). Geschichte schreitet nicht zum Besseren fort, jedenfalls nicht von alleine. Was immer gewonnen ist, Demokratie, Rechtsstaatlichkeit, Achtung der Menschenrechte, Aufklärung, kann in Hochgeschwindigkeit wieder verloren gehen. Sogar Deutsche vergessen das gelegentlich: Jederzeit kann das Schlimmste in einer zivilisierten, gebildeten, Dichtung und Musik verehrenden Gesellschaft passieren. Empört euch! reicht deswegen fast nie. Besser ist: Tut was! In Deutschland haben diejenigen, die nicht mit den Weltverfinsterern und Nationalpopulisten von AFD oder CSU den Apokalypso tanzen wollten, dank der vielen Geflüchteten in den vergangenen Monaten eine interessante Wiederentdeckung gemacht: sich selbst. Den Bürger, der sich kümmern und einspringen muss, wenn sein Staat nicht in die Puschen kommt. Bürger sein ist eine Aufgabe, die Sinn und sogar Spaß macht, nicht nur für Kant-Liebhaber: "Aufklärung ist der Ausgang des Menschen aus seiner selbstverschuldeten Unmündigkeit." Der nächste, entscheidende Schritt des aufgeklärten, um Europa besorgten Bürgers könnte sein, sich zu vergewissern, dass er nicht alleine ist. In jedem EU-Land gibt es überzeugte Europäer, gerade in Victor Orbáns Ungarn, in Polen, auch in Bayern: Menschen, die unbedingt dafür sind, dass ihre Regierungen sich nicht an kurzfristigen nationalen Interessen oder sogar an reinen, nur parteipolitisch oder persönlich bedeutsamen Umfragewerten und Rachegelüsten orientieren, sondern am Gemeinschaftsinteresse Europas und an den globalen Notwendigkeiten. Sie artikulieren sich noch nicht so deutlich wie die Angsthasen. Aber es sind viele.
{ "pile_set_name": "OpenWebText2" }
p38 MAPK-mediated activation of NF-kappaB by the RhoGEF domain of Bcr. The oncogenic fusion protein p210 Bcr-Abl is causally associated with virtually all cases of chronic myelogenous leukemia. The wild-type Bcr product has several recognizable structural and functional motifs including a domain that contains guanine nucleotide exchange activity for Rho family GTPases (DH/PH domain). Although this domain is retained within p210 Bcr-Abl, it has no known signaling activities in vivo. Here we report that a fragment of Bcr that encodes the isolated DH/PH domain is a potent activator of the NF-kappaB transcription factor. Within the context of full length Bcr, this activity is regulated by proximal flanking sequences that suppress the DH/PH domain encoded guanine nucleotide exchange activity. NF-kappaB activation by Bcr is not mediated by nuclear translocation, but rather by p38 mitogen-activated protein kinase (MAPK)-dependent modification of the RelA/p65 transactivation domain. Although we were able to demonstrate that Bcr can function as an exchange factor for Cdc42 in vivo, NF-kappaB activation appears to occur via a Cdc42-independent mechanism. These studies constitute direct evidence that the Bcr RhoGEF domain can function in vivo, and identify a new signaling activity that may contribute to the transforming potential of p210 Bcr-Abl.
{ "pile_set_name": "PubMed Abstracts" }
package reflect2 import ( "reflect" "runtime" "strings" "sync" "unsafe" ) // typelinks1 for 1.5 ~ 1.6 //go:linkname typelinks1 reflect.typelinks func typelinks1() [][]unsafe.Pointer // typelinks2 for 1.7 ~ //go:linkname typelinks2 reflect.typelinks func typelinks2() (sections []unsafe.Pointer, offset [][]int32) // initOnce guards initialization of types and packages var initOnce sync.Once var types map[string]reflect.Type var packages map[string]map[string]reflect.Type // discoverTypes initializes types and packages func discoverTypes() { types = make(map[string]reflect.Type) packages = make(map[string]map[string]reflect.Type) ver := runtime.Version() if ver == "go1.5" || strings.HasPrefix(ver, "go1.5.") { loadGo15Types() } else if ver == "go1.6" || strings.HasPrefix(ver, "go1.6.") { loadGo15Types() } else { loadGo17Types() } } func loadGo15Types() { var obj interface{} = reflect.TypeOf(0) typePtrss := typelinks1() for _, typePtrs := range typePtrss { for _, typePtr := range typePtrs { (*emptyInterface)(unsafe.Pointer(&obj)).word = typePtr typ := obj.(reflect.Type) if typ.Kind() == reflect.Ptr && typ.Elem().Kind() == reflect.Struct { loadedType := typ.Elem() pkgTypes := packages[loadedType.PkgPath()] if pkgTypes == nil { pkgTypes = map[string]reflect.Type{} packages[loadedType.PkgPath()] = pkgTypes } types[loadedType.String()] = loadedType pkgTypes[loadedType.Name()] = loadedType } if typ.Kind() == reflect.Slice && typ.Elem().Kind() == reflect.Ptr && typ.Elem().Elem().Kind() == reflect.Struct { loadedType := typ.Elem().Elem() pkgTypes := packages[loadedType.PkgPath()] if pkgTypes == nil { pkgTypes = map[string]reflect.Type{} packages[loadedType.PkgPath()] = pkgTypes } types[loadedType.String()] = loadedType pkgTypes[loadedType.Name()] = loadedType } } } } func loadGo17Types() { var obj interface{} = reflect.TypeOf(0) sections, offset := typelinks2() for i, offs := range offset { rodata := sections[i] for _, off := range offs { (*emptyInterface)(unsafe.Pointer(&obj)).word = resolveTypeOff(unsafe.Pointer(rodata), off) typ := obj.(reflect.Type) if typ.Kind() == reflect.Ptr && typ.Elem().Kind() == reflect.Struct { loadedType := typ.Elem() pkgTypes := packages[loadedType.PkgPath()] if pkgTypes == nil { pkgTypes = map[string]reflect.Type{} packages[loadedType.PkgPath()] = pkgTypes } types[loadedType.String()] = loadedType pkgTypes[loadedType.Name()] = loadedType } } } } type emptyInterface struct { typ unsafe.Pointer word unsafe.Pointer } // TypeByName return the type by its name, just like Class.forName in java func TypeByName(typeName string) Type { initOnce.Do(discoverTypes) return Type2(types[typeName]) } // TypeByPackageName return the type by its package and name func TypeByPackageName(pkgPath string, name string) Type { initOnce.Do(discoverTypes) pkgTypes := packages[pkgPath] if pkgTypes == nil { return nil } return Type2(pkgTypes[name]) }
{ "pile_set_name": "Github" }
// // Generated by class-dump 3.5 (64 bit) (Debug version compiled Sep 17 2017 16:24:48). // // class-dump is Copyright (C) 1997-1998, 2000-2001, 2004-2015 by Steve Nygard. // #import "WebviewJSEventHandlerBase.h" #import "JSApiSelectContactsViewControllerDelegate-Protocol.h" #import "JSApiSelectSessionViewControllerDelegate-Protocol.h" #import "PBMessageObserverDelegate-Protocol.h" @class CContact, JSApiSelectContactsViewController, JSApiSelectSessionViewController, JSEvent, NSString; @interface WebviewJSEventHandler_selectSingleContact : WebviewJSEventHandlerBase <JSApiSelectContactsViewControllerDelegate, JSApiSelectSessionViewControllerDelegate, PBMessageObserverDelegate> { int m_enReturnValueSignedType; JSApiSelectSessionViewController *m_oSelectSessionViewController; JSApiSelectContactsViewController *m_oSelectContactViewController; JSEvent *m_oJSEvent; CContact *m_oSelectedContact; unsigned int m_uiSelectMode; NSString *m_nsBusiId; NSString *m_nsAppid; } - (void).cxx_destruct; - (void)getBizUserOpenIdRequest; - (void)getIBGUserOpenIdRequest; - (void)handleBizResponseCGIWrap:(id)arg1; - (void)handlePayResponeCGIWrap:(id)arg1; - (void)MessageReturn:(id)arg1 Event:(unsigned int)arg2; - (void)OnJSApiSelectSessionViewControllerNewSession; - (void)OnJSApiSelectSessionViewControllerSelectContactReturn:(id)arg1 atScene:(unsigned int)arg2; - (_Bool)OnJSApiSelectSessionViewControllerFilterContactCandidate:(id)arg1; - (void)OnJSApiSelectSessionViewControllerBack; - (void)OnJSApiSelectContactsViewControllerSelectContactReturn:(id)arg1 atScene:(unsigned int)arg2; - (_Bool)OnJSApiSelectContactsViewControllerFilterContactCandidate:(id)arg1; - (void)OnJSApiSelectContactsViewControllerBack; - (void)dealloc; - (void)confirmEndJSEvent; - (void)cancelEndJSEnvent; - (void)handleJSEvent:(id)arg1 HandlerFacade:(id)arg2 ExtraData:(id)arg3 CurrentViewController:(id)arg4; - (void)handleJSEvent:(id)arg1 HandlerFacade:(id)arg2 ExtraData:(id)arg3; @end
{ "pile_set_name": "Github" }
Q: jquery drag drop - draggable is not enabled after drop outside designated drop areas & disabling designated areas after drop is completed I need help with 2 issues: 1) draggability is disabled if a draggable element didn't drop on one of designated drop areas (e.g. if a user released left-mouse button unintentionally). In all other cases drag and drop works as expected: clone is created and is available for dragging and dropping into any of designated drop areas. I tried to "disabled: false" draggable but it didn't help. 2) only one answer should be accepted/allowed per "dropContainer" (e.g. .dropTarget_m_1_1_a should accept only one drop regardless the answer is correct or wrong). I tried to provide a more specific name via associative array (linking dropContainer and specific drop elements' id's) with no luck. I can hardcode it to disable a specific class i.e. $(".dropTarget_m_1_1_a").droppable("disable"); Unfortunately I need iteration e.g. going through each .dropTargetxxxxx class or each dropContainerxxx id. Thank you very much in advance!!! That's what I have so far: <!DOCTYPE html> <html lang="en"> <head> <meta charset="UTF-8"> <script src="https://ajax.googleapis.com/ajax/libs/jquery/1.11.3/jquery.js"></script> <script src="js/jquery-ui.js"></script> <style> ul { list-style-type: none; } li.draggable { list-style:none; } #button_list_1a li { display: inline-block; list-style-type: none; width: 60px; height: 10px; margin-top: 70px; } #m_1_l_3 { position: absolute; top: 25px; left: 80px; height: 15px; width: 110px; display:flex; align-items:center; z-index: 10; opacity: 0.3; -moz-opacity: 0.3; filter: alpha(opacity=30); background-color:blue; } #m_1_l_2 { position: absolute; top: 40px; left: 80px; height: 15px; width: 110px; display:flex; align-items:center; z-index: 10; opacity: 0.3; -moz-opacity: 0.3; filter: alpha(opacity=30); background-color:red; } #m_1_l_1 { position: absolute; top: 55px; left: 80px; height: 15px; width: 110px; display:flex; align-items:center; z-index: 10; opacity: 0.3; -moz-opacity: 0.3; filter: alpha(opacity=30); background-color:yellow; } #m_2_l_3 { position: absolute; top: 25px; left: 210px; height: 15px; width: 110px; display:flex; align-items:center; z-index: 10; opacity: 0.3; -moz-opacity: 0.3; filter: alpha(opacity=30); background-color:blue; } #m_2_l_2 { position: absolute; top: 40px; left: 210px; height: 15px; width: 110px; display:flex; align-items:center; z-index: 10; opacity: 0.3; -moz-opacity: 0.3; filter: alpha(opacity=30); background-color:red; } #m_2_l_1 { position: absolute; top: 55px; left: 210px; height: 15px; width: 110px; display:flex; align-items:center; z-index: 10; opacity: 0.3; -moz-opacity: 0.3; filter: alpha(opacity=30); background-color:yellow; } #m_3_l_3 { position: absolute; top: 25px; left: 350px; height: 15px; width: 110px; display:flex; align-items:center; z-index: 10; opacity: 0.3; -moz-opacity: 0.3; filter: alpha(opacity=30); background-color:blue; } #m_3_l_2 { position: absolute; top: 40px; left: 350px; height: 15px; width: 110px; display:flex; align-items:center; z-index: 10; opacity: 0.3; -moz-opacity: 0.3; filter: alpha(opacity=30); background-color:red; } #m_3_l_1 { position: absolute; top: 55px; left: 350px; height: 15px; width: 110px; display:flex; align-items:center; z-index: 10; opacity: 0.3; -moz-opacity: 0.3; filter: alpha(opacity=30); background-color:yellow; } </style> </head> <body> <div id="dropContainer_m_1"> <div id="m_1_l_3" class= "dropTarget_m_1_1_a droppable_1_a"></div> <div id="m_1_l_2" class= "dropTarget_m_1_1_a droppable_1_a"></div> <div id="m_1_l_1" class= "dropTarget_m_1_1_a droppable_1_a"></div> <div id="dropContainer_m_2"> <div id="m_2_l_3" class= "dropTarget_m_2_1_a droppable_1_a"></div> <div id="m_2_l_2" class= "dropTarget_m_2_1_a droppable_1_a"></div> <div id="m_2_l_1" class= "dropTarget_m_2_1_a droppable_1_a"></div> <div id="dropContainer_m_3"> <div id="m_3_l_3" class= "dropTarget_m_3_1_a droppable_1_a"></div> <div id="m_3_l_2" class= "dropTarget_m_3_1_a droppable_1_a"> </div> <div id="m_3_l_1" class= "dropTarget_m_3_1_a droppable_1_a"></div> </div> <ul id = "button_list_1a"> <!--// answers 1 a --> <li class = "button_small draggable_1_a" id = "image#1" draggable="true">Image#1</li><!-- --><li class = "button_small draggable_1_a" id = "image#2" draggable="true">Image#2</li><!-- --><li class = "button_small draggable_1_a" id = "image#3" draggable="true">Image#3</li> </ul> <script> $(document).ready(function a_1_dnd(){ $(".draggable_1_a").draggable({ cursorAt: { top: 5, left: 30 }, cursor : 'pointer', revert : 'invalid', opacity: 0.35, helper: function (event) { var id = $(this).attr('id'); var ret = $(this).clone(); ret.attr('dragId', id); console.log('dragId: ', ret.attr('dragId')); return ret; }, start : function (event, ui) { }, // end start drag : function (event, ui) { }, // end drag stop : function(event, ui){ ui.helper.clone().appendTo ($(this).parent()); ui.helper.clone().disabled; } }); $(".droppable_1_a").droppable({ accept: ".draggable_1_a", tolerance: 'pointer', drop: function (event,ui) { var draggable_id = ui.draggable.attr("id"); var droppable_id = $(this).attr("id"); var correctAnswer = { m_1_l_1 : "image#1", m_1_l_3 : "image#1", m_2_l_2 : "image#2", m_3_l_1 : "image#3" }; if(correctAnswer[droppable_id] === draggable_id) { console.log(ui); $(ui.draggable).attr('id', $(ui.helper).attr('id')); console.log(droppable_id); localStorage.totalCorrectAnswers = parseFloat(localStorage.totalCorrectAnswers) + 1.0; } else { console.log(ui.helper.attr( "dragId" )); console.log("Wrong!!!"); console.log(droppable_id); } } }); }); </script> </body> </html> A: The first thing you should look at is a clone you create. After «mouseup» event in the area which is not area for dropping the clone is moving on the place where original droppable element is. And the clone is the thing which prevents your element from being clicked. In fact, you click on the clone, not on the droppable element So I would recommend you to attach the clone to the droppable element which means to move these lines ui.helper.clone().appendTo ($(this).parent()); ui.helper.clone().disabled; to the «drop» event handler of the droppable element instead of draggable. Thus you will create a clone only if draggable element was dropped in the one of three containers. Take into account that you will need to modify your CSS to get the clone visible. The second issue might me solved in the same handler, you should put something like $(this).parent().find(".droppable_1_a").droppable({ disabled: true }); there. This line will disable all droppable elements in one parent container
{ "pile_set_name": "StackExchange" }
Saint-Petersburg is known as the "Northern Palmire" because of its rich architectural treasures. The baroque form of this exquisite ring was inspired by the city architecture. The luminous emerald-green phianite will make this piece stand out in your collection.
{ "pile_set_name": "Pile-CC" }
Q: Create an "all-in-one" function using DS in C# In my web app I use several asmx (Web Services) from the same provider, they have one for this, other for that, but all require a SOAP Header with Authentication. It is simple to add the Authentication: public static SoCredentialsHeader AttachCredentialHeader() { SoCredentialsHeader ch = new SoCredentialsHeader(); ch.AuthenticationType = SoAuthenticationType.CRM5; ch.UserId = "myUsername"; ch.Secret = apUtilities.CalculateCredentialsSecret( SoAuthenticationType.CRM5, apUtilities.GetDays(), "myUsername", "myPassword"); return ch; } The problem is this SoCredentialsHeader come (derivation) from ONE webservice and I need to add the same code to the others, like: public static wsContact.SoCredentialsHeader AttachContactCredentialHeader() { wsContact.SoCredentialsHeader ch = new wsContact.SoCredentialsHeader(); ch.AuthenticationType = wsContact.SoAuthenticationType.CRM5; ch.UserId = "myUsername"; ch.Secret = apUtilities.CalculateCredentialsSecret( wsContact.SoAuthenticationType.CRM5, apUtilities.GetDays(), "myUsername", "myPassword"); return ch; } public static wsDiary.SoCredentialsHeader AttachDiaryCredentialHeader() { wsDiary.SoCredentialsHeader ch = new wsDiary.SoCredentialsHeader(); ch.AuthenticationType = wsDiary.SoAuthenticationType.CRM5; ch.UserId = "myUsername"; ch.Secret = apUtilities.CalculateCredentialsSecret( wsDiary.SoAuthenticationType.CRM5, apUtilities.GetDays(), "myUsername", "myPassword"); return ch; } Is there a way to implement a design pattern in order to use only one function but that suits all webServices? sometimes I see the T letter, is this a case for that? if yes, how can I accomplish such feature? P.S. I could pass an enum and use a switch to check the enum name and apply the correct Header but everytime I need to add a new WebService, I need to add the enum and the code, I'm searcging for an advanced technique for this. Thank you. A: Create a file called whatever.tt (the trick is the .tt extension) anywhere in your VS solution and paste the following code: using System; namespace Whatever { public static class Howdy { <# string[] webServices = new string[] {"wsContact", "wsDiary"}; foreach (string wsName in webServices) { #> public static <#=wsName#>.SoCredentialsHeader AttachContactCredentialHeader() { <#=wsName#>.SoCredentialsHeader ch = new <#=wsName#>.SoCredentialsHeader(); ch.AuthenticationType = <#=wsName#>.SoAuthenticationType.CRM5; ch.UserId = "myUsername"; ch.Secret = apUtilities.CalculateCredentialsSecret(<#=wsName#>.SoAuthenticationType.CRM5, apUtilities.GetDays(), "myUsername", "myPassword"); return ch; } } <# } #> } Then watch as a whatever.cs magically appears with the desired code snippets.These are called T4 templates for code generation in VS. You'll want to turn these into partial classes or extension methods or something. The above code will not function "as is" but you get the idea.
{ "pile_set_name": "StackExchange" }
Q: Получение элемента вне класса браузер на pyqt5. В ответ на сигнал QWebEngineView(обычный класс который унаследовал его, в нем изменена функция createWindow) urlChanged нужно изменить адрессную строку и положить туды url. Но вот вопрос: как получить доступ к адресной строке?(QLineEdit) A: Какие-то сложные ответы. Почему бы не передать ссылку на адресную строку в __ init __ спасибо тебе, ув. eri!
{ "pile_set_name": "StackExchange" }
Salvation Army allegedly violated Family Medical Leave Act PHILADELPHIA — A former administration assistant is suing Salvation Army in Philadelphia, Pennsylvania over allegations she was fired for taking medical leave that should have been protected under the Family Medical Leave Act. Lisa Knoll filed a lawsuit against the Salvation Army on Sept. 25 in the U.S. District Court for the Eastern District of Pennsylvania alleging a violation of the Family Medical Leave Act. While working as an administrative assistant in the Salvation Army’s Women’s Ministries, Knoll submitted an application for leave to seek treatment for her medical conditions, and provide care for her mother and father. Her leave was scheduled to end on May 8. On March 9, Knoll alleges she received an email stating that her job protection under the medical leave would be exhausted on May 8. She then contacted the company’s Human Resources administrator about returning to work earlier than May 8. She was told and complied with instructions to re-submit the paperwork for her medical leave – even though she had submitted the paperwork on Feb. 17. On May 7, Knoll alleges she called the Salvation Army to confirm that she was ready to return to work. She alleges that Human Resources told her that the Salvation Army was “not ready” and told her to not return to work until May 11. In the lawsuit, Knoll said a supervisor called her on May 8 to further postpone her return until May 12. On May 8, Knoll alleges she received a letter in the mail informing her that her employment status had been changed from “active” to “non-active.” Believing the letter was sent in error, Knoll returned to work as planned on May 12, at which time she was fired allegedly in retaliation for taking the leave of absence. In addition to preventing Salvation Army from violating the Family Medical Leave Act in the future, Knoll is seeking reimbursement for any lost pay and benefits, damages, and costs for the lawsuit. She is being represented by Cherry Hill, New Jersey-based attorney Richard Swartz of Swartz Swidler, LLC. U.S. District Court for the Eastern District of Pennsylvania Case no.. 2:15-cv-04812-JHS Want to get notified whenever we write about The Salvation Army ? Sign-up Next time we write about The Salvation Army, we'll email you a link to the story. You may edit your settings or unsubscribe at any time.
{ "pile_set_name": "Pile-CC" }
Who’s your favorite New Yorker, living or dead, real or fictional? Seriously? Is there an answer other than Donald Trump? However, if I eliminate any genetic bias it would likely be George Steinbrenner or RobertMoses. What’s the best meal you’ve eaten in New York? Summer picnics in Sheep Meadow with mykids. In one sentence, what do you actually do all day in your job? I do anything and everything that entails realestate. What was your first job in New York? Working in landscaping in my teens inWestchester. Do you give money to panhandlers? I give to panhandlers on occasion, especially around the holidays, but have always been involved with charity, which was an important part of the way I was brought up. My siblings and I knew early on in life that we were incredibly fortunate and have never taken that for granted, so we recognize the importance of giving back. I sit on the board of Operation Smile and am involved with my brother’s foundation (the Eric Trump Foundation) that has raised money for St. Jude’s Children’sHospital. What’s your drink? Sugar Free RedBull. How often do you prepare your own meals? Quite often. My wife and I like to cook, so we actually prepare our own meals often, and can hold our own in thekitchen. What’s your favorite medication? As a person who spends a lot of time traveling and in different time zones, Ambien is alifesaver. What’s hanging above your sofa? Bare Sheetrock because I am in the process of building out a newapartment. How much is too much to spend on a haircut? $200. When’s bedtime? Embarrassingly early. Which do you prefer, the old Times Square or the new Times Square? As much as any real New Yorker loved running the gauntlet of thieves and pillagers in old Times Square, I’ll probably take the Disneyland version oftoday. What do you think of Donald Trump? See question one, he is the best father, friend, and mentor a son couldhave! What do you hate most about living in New York? As cliché as it sounds, finding a cab during rush hour, especially in therain. Who is your mortal enemy? Time. When’s the last time you drove a car? Twenty minutes ago. I may be one of the last New Yorkers who actually drives in the citydaily. How has the Wall Street crash affected you? Other than the financial ramifications to my balance sheet, I think the downturn has been a valuable lesson and an important thing to have experienced as abusinessperson. Times , Post, or Daily News? Post. Where do you go to be alone? My cabin in theCatskills. What makes someone a New Yorker? To me what defines a New Yorker is the edge that one develops from having actually lived here. Once you have it, it doesn’t go away and everywhere else in the world feels like it is in slowmotion.
{ "pile_set_name": "Pile-CC" }
Trump says tax plan is about 'jobs, jobs, jobs' President Trump continued his push for tax reform at the White House on Oct. 24. "It's time to take care of our country, and fight for our families," he said.
{ "pile_set_name": "OpenWebText2" }
“The truest prayer is ofttimes that in which we creep into the bosom of God and rest there in silence. We do not know what to ask, and we dare not say even a word, lest it might be the wrong word, hence we simply wait before God in quietness and confidence. We know that what is best–our Father will do, and we trust Him to do what He will.” “It comes the very moment you wake up each morning. All your wishes and hopes for the day rush at you like wild animals. And the first job each morning consists simply in shoving them all back; in listening to that other voice, taking that other point of view, letting that other larger, stronger, quieter life come flowing in.” “Every assignment is measured and controlled for my eternal good. As I accept the given portion other options are cancelled. Decisions become much easier, directions clearer, and hence my heart becomes inexpressibly quieter.”
{ "pile_set_name": "Pile-CC" }
After missing the mark on their Kickstarter goals, Forged Chaos returned to the drawing board to design a new method to get their highly ambitious MMORPG, Trials of Ascension, funded. Earlier this month a store offering a set bounty of goods for any level of donation in addition to other purchasables garnered this sandbox title over $10,000 in funding. And none of that is going to be given as a cut to any middlemen mind you. Those looking for an industry changing sandbox MMORPG that’s ready to take risks should check out the store themselves and gain access to the Founder’s Forum to stay up-to-date on development of Trials of Ascension.
{ "pile_set_name": "OpenWebText2" }
r. 16.3, -4/5, -1, -3, -6 Sort 2, -51, 7, -7. -51, -7, 2, 7 Put -0.0661, 1, 0.2 in descending order. 1, 0.2, -0.0661 Sort 0.5, 1/6, -0.7, 21/5, 2/11 in decreasing order. 21/5, 0.5, 2/11, 1/6, -0.7 Sort -408, -2/19, 0.11, -0.1, -3 in decreasing order. 0.11, -0.1, -2/19, -3, -408 Sort -3, 8001, -2 in decreasing order. 8001, -2, -3 Put 2, 0.3, -18, -3 in decreasing order. 2, 0.3, -3, -18 Sort 1, -76, -1/108, -2/3 in descending order. 1, -1/108, -2/3, -76 Put -22, 352, -5, 0 in decreasing order. 352, 0, -5, -22 Put 14, 0.2, 1/7, 1/4, -3, -132 in ascending order. -132, -3, 1/7, 0.2, 1/4, 14 Put 0.3, 0, 1029, -1/5, 5 in decreasing order. 1029, 5, 0.3, 0, -1/5 Sort -24816.8, 6, -5 in ascending order. -24816.8, -5, 6 Put 6, 11151, 4 in increasing order. 4, 6, 11151 Put -2252.4, 4, 0.3 in decreasing order. 4, 0.3, -2252.4 Sort -64.81, -0.4, 26 in increasing order. -64.81, -0.4, 26 Put 2, 4, 2380 in descending order. 2380, 4, 2 Sort 2, -65, -2437 in ascending order. -2437, -65, 2 Sort -7566, -5, 43, 0 in descending order. 43, 0, -5, -7566 Put -5, 805, -32 in ascending order. -32, -5, 805 Sort -1, 2/9, 0.3, -13, -0.18, 0.1 in decreasing order. 0.3, 2/9, 0.1, -0.18, -1, -13 Sort -2, -5, -1206, 12, 2, 4 in decreasing order. 12, 4, 2, -2, -5, -1206 Sort 15, 741, -1 in decreasing order. 741, 15, -1 Sort 4, -39, 5, 18, -12. -39, -12, 4, 5, 18 Put 1/2, 35/2, -0.073 in ascending order. -0.073, 1/2, 35/2 Sort 10, -1, 0.3, 93, -2/9 in increasing order. -1, -2/9, 0.3, 10, 93 Put 3, 90, 4, 0, -20 in descending order. 90, 4, 3, 0, -20 Put -2, 39, 881 in ascending order. -2, 39, 881 Put -2/29, 5, 1/3089, 1/3 in increasing order. -2/29, 1/3089, 1/3, 5 Sort -15, 2, 5, -2/3, 4 in decreasing order. 5, 4, 2, -2/3, -15 Put -1/3, 20, 22, 0.05, 2 in ascending order. -1/3, 0.05, 2, 20, 22 Sort -1, 38, 167, 5, -5, 1 in decreasing order. 167, 38, 5, 1, -1, -5 Put 4/9, -5, -1382, 1/8, -7, -0.5 in decreasing order. 4/9, 1/8, -0.5, -5, -7, -1382 Sort -5, -2, 33212, -4 in increasing order. -5, -4, -2, 33212 Sort -9, 80, 15 in increasing order. -9, 15, 80 Sort 19, 0.3, 217. 0.3, 19, 217 Sort 8, 5, -3, 3, -33, 1 in descending order. 8, 5, 3, 1, -3, -33 Put -10, 0.11, -5, -2/11, -7, 0 in ascending order. -10, -7, -5, -2/11, 0, 0.11 Sort -57, -0.06, -2/3, 3 in increasing order. -57, -2/3, -0.06, 3 Sort -3, 9, -4, -9 in decreasing order. 9, -3, -4, -9 Put 4, -2, -1119 in ascending order. -1119, -2, 4 Sort -584, -11/9, 0.5 in decreasing order. 0.5, -11/9, -584 Put -1, -2, 6, -3546 in increasing order. -3546, -2, -1, 6 Put -0.5, -15, 1.29, 5 in increasing order. -15, -0.5, 1.29, 5 Sort 1298, -107, -4 in descending order. 1298, -4, -107 Put -75212, 26, 2/11 in descending order. 26, 2/11, -75212 Sort 5, -0.26, -1249. -1249, -0.26, 5 Put 2/7, -1/2, 287 in increasing order. -1/2, 2/7, 287 Sort 0, 22, 3, -3, 92 in decreasing order. 92, 22, 3, 0, -3 Sort -0.5, 1/5, -30/679, -3 in increasing order. -3, -0.5, -30/679, 1/5 Put -1/2, 591, 1/3 in ascending order. -1/2, 1/3, 591 Sort 3, -3, -248, 1 in descending order. 3, 1, -3, -248 Put 2, 689, -3, -5, -1 in descending order. 689, 2, -1, -3, -5 Put 9, 0, -2, -7, -3, 2 in decreasing order. 9, 2, 0, -2, -3, -7 Sort -2/15, -583882, -1/2 in ascending order. -583882, -1/2, -2/15 Put 1, -41, 1483, -4, 2 in ascending order. -41, -4, 1, 2, 1483 Put -25, 1/3, 5, -2/7, -0.3, 87 in increasing order. -25, -0.3, -2/7, 1/3, 5, 87 Sort 1/5, -3/4, -0.1, -465/152 in decreasing order. 1/5, -0.1, -3/4, -465/152 Put -0.1419, -4, 4, 2/7 in decreasing order. 4, 2/7, -0.1419, -4 Put 5.18683, -0.4, -0.1 in increasing order. -0.4, -0.1, 5.18683 Put 9, -5/6, -7, -4/3, 2/7 in ascending order. -7, -4/3, -5/6, 2/7, 9 Put 39569, 2, -6 in descending order. 39569, 2, -6 Sort 2994, 160, -3 in descending order. 2994, 160, -3 Sort 2, 0.1, 2/7, 20, -220 in decreasing order. 20, 2, 2/7, 0.1, -220 Put -2/5, 79766, -2/9, -1 in descending order. 79766, -2/9, -2/5, -1 Put -3/7, -415, 21/5 in descending order. 21/5, -3/7, -415 Put -0.057, 0, -1/8, -1700, 4 in decreasing order. 4, 0, -0.057, -1/8, -1700 Sort -5, 3, 42, -864. -864, -5, 3, 42 Sort 4, -4, 2, 34, -3, 0 in ascending order. -4, -3, 0, 2, 4, 34 Put 0, -0.5, 144 in decreasing order. 144, 0, -0.5 Sort 28, 285, 2/9, -1 in decreasing order. 285, 28, 2/9, -1 Sort 1/6, -0.8, 839, 4. -0.8, 1/6, 4, 839 Sort 80779, -5, 2, -3, 4 in decreasing order. 80779, 4, 2, -3, -5 Sort -33, 18, 4, 5, -1. -33, -1, 4, 5, 18 Put -9/14, -2/3, 1/6, 1/4 in descending order. 1/4, 1/6, -9/14, -2/3 Sort 2/9, 4, -55.63, 1/4 in increasing order. -55.63, 2/9, 1/4, 4 Sort 651, 6/17, 17 in decreasing order. 651, 17, 6/17 Sort 4, -2, -39, 7, 2, 3 in ascending order. -39, -2, 2, 3, 4, 7 Put -1, 65, -12558 in ascending order. -12558, -1, 65 Sort 0, -2, 16, -3, -4 in ascending order. -4, -3, -2, 0, 16 Put 2, -549, -0.3, -2 in ascending order. -549, -2, -0.3, 2 Sort -0.4, 0.5, 0.2, -1/618. -0.4, -1/618, 0.2, 0.5 Put -4, 1, -1353 in decreasing order. 1, -4, -1353 Put 622, -2, -1, 4/5, -41 in decreasing order. 622, 4/5, -1, -2, -41 Sort -14, -2, 12, 1, -3. -14, -3, -2, 1, 12 Sort 3, -4/3, 15, 1/17, 1 in increasing order. -4/3, 1/17, 1, 3, 15 Put 1, -148430, -3 in descending order. 1, -3, -148430 Put -2, 2, 5, 1907 in increasing order. -2, 2, 5, 1907 Put -78, 69, -1/2 in ascending order. -78, -1/2, 69 Sort -5/4, 57/13, 1/5 in descending order. 57/13, 1/5, -5/4 Sort 2, -1/12, 2/41, -2, 4 in decreasing order. 4, 2, 2/41, -1/12, -2 Put 19, 0, 3, -123 in decreasing order. 19, 3, 0, -123 Put 0, 1/4, 0.5, 358/3 in decreasing order. 358/3, 0.5, 1/4, 0 Sort -102, 26, 6 in ascending order. -102, 6, 26 Put 4, -2, -28844, 3 in decreasing order. 4, 3, -2, -28844 Put 3, 85, 50, -6, -4, -3 in ascending order. -6, -4, -3, 3, 50, 85 Put -3, 0, -1, -79 in increasing order. -79, -3, -1, 0 Put 22948, 5, 7 in descending order. 22948, 7, 5 Put 6, -3/20, 5/24 in ascending order. -3/20, 5/24, 6 Sort 48, 4/7, -218, -2 in ascending order. -218, -2, 4/7, 48 Sort -155, 268, 0 in descending order. 268, 0, -155 Put -838, -1, 5, 26, 0.3 in increasing order. -838, -1, 0.3, 5, 26 Sort 0.3, -4, 2/13, 0.4, 1. -4, 2/13, 0.3, 0.4, 1 Put 1595, 10, 0, 5 in decreasing order. 1595, 10, 5, 0 Sort 1/3, 3, -2/13, 5/8, 10.8 in increasing order. -2/13, 1/3, 5/8, 3, 10.8 Sort 0, 2, -78879 in decreasing order. 2, 0, -78879 Sort 3, -2, 11/9, 0.1, 4 in decreasing order. 4, 3, 11/9, 0.1, -2 Sort 0.06, 0.0699, -6 in increasing order. -6, 0.06, 0.0699 Sort -22, 3, 51 in decreasing order. 51, 3, -22 Sort -1, -11, 23, -2, -0.3, 3/44 in decreasing order. 23, 3/44, -0.3, -1, -2, -11 Sort 46, -0.08, -1, 3/5. -1, -0.08, 3/5, 46 Sort -2, 22, 150, 1, 44. -2, 1, 22, 44, 150 Sort -3462, -0.3, 0.21 in ascending order. -3462, -0.3, 0.21 Sort -5, 2, 4/3, -0.116, -0.3, -3 in descending order. 2, 4/3, -0.116, -0.3, -3, -5 Sort -1/377, 0.4, 1/4 in decreasing order. 0.4, 1/4, -1/377 Sort -2520/19, -3, 5, 0.1 in descending order. 5, 0.1, -3, -2520/19 Sort -20, 11, -578 in descending order. 11, -20, -578 Sort -1.6, -4, 0.2, 77, -1/2, 5 in increasing order. -4, -1.6, -1/2, 0.2, 5, 77 Put -1/23, -2, -0.0663 in descending order. -1/23, -0.0663, -2 Sort 0.04301, -2, 2, 6. -2, 0.04301, 2, 6 Put -9086, -4, 5 in decreasing order. 5, -4, -9086 Put 0.1, -0.04, -5838 in decreasing order. 0.1, -0.04, -5838 Put -2, -141, 191, 3 in descending order. 191, 3, -2, -141 Put 0.12, -4, 2/3, -4/43 in ascending order. -4, -4/43, 0.12, 2/3 Sort 0, -0.3, -54, 86 in descending order. 86, 0, -0.3, -54 Sort 0, 14, -168, 2, 1. -168, 0, 1, 2, 14 Put -0.3, 45, 0, 1367 in descending order. 1367, 45, 0, -0.3 Sort -1.1, -3.4, -3/7, 1.4, -5/2. -3.4, -5/2, -1.1, -3/7, 1.4 Put 64742, -1, 3 in ascending order. -1, 3, 64742 Sort 6, 6/7, -1.3, 1.36, 1/4 in decreasing order. 6, 1.36, 6/7, 1/4, -1.3 Put -5, 4, -323, -4 in ascending order. -323, -5, -4, 4 Put -74, -13, -132 in increasing order. -132, -74, -13 Sort 47, 95, -3 in descending order. 95, 47, -3 Sort -2, 3/34, 28, -0.3, 1/6 in increasing order. -2, -0.3, 3/34, 1/6, 28 Put 0.03, 2, -0.3, 3, 4, 16 in ascending order. -0.3, 0.03, 2, 3, 4, 16 Sort 0.0925, -0.4, -4, 4/5 in ascending order. -4, -0.4, 0.0925, 4/5 Sort 0.4, 1/5, 3, 531, -4, 1 in decreasing order. 531, 3, 1, 0.4, 1/5, -4 Sort -0.05, -0.3, -2572, 4 in descending
{ "pile_set_name": "DM Mathematics" }
Former Ald. Wallace Davis, owner of Wallace's Catfish Corner; Danyele Leonard, a Chicago teacher; and Zoe Young, supervising manager at Wallace's, talk about their reaction to President Barack Obama being elected to a second term and the issues that are important to them. West Siders celebrate Obama win at Catfish Corner, political hub for decades Wallace Davis promised himself he wouldn’t have another alcoholic drink unless Barack Obama got elected to a second presidential term. But when the results came in Tuesday night, the former Chicago alderman, who hasn’t had a beer in a year, said he was so overcome with joy that he decided to stay sober for the event. “I am so ecstatic,” Wallace said Wednesday at his restaurant Wallace’s Catfish Corner on Chicago’s West Side. Voters “sent a message to the world that we are going to stick with leadership that has love and passion. It was a breath of fresh air.” It’s no secret that Wallace and the people who frequent his soul food restaurant support the president. Catfish Corner has served as a hub for Democratic politics since it opened more than two decades ago on West Madison Street, across from U.S. Rep. Danny Davis’ (D-Chicago) office. A portrait of the president with the word “Forward” is painted outside the restaurant’s entrance, and photos of Barack Obama and Chicago politicians cover the restaurant’s walls. Wallace, who served time in federal prison for a federal bribery conviction in the ‘80s, proudly showed a photo of Obama visiting the restaurant during his run for the U.S. Senate in 2004. Even Ill. Rep. Derrick Smith (D-Chicago), who was re-elected Tuesday night despite being impeached on federal bribery charges, stopped by to chat with Wallace. The patrons who dined in Catfish Corner Wednesday expressed excitement at Obama being elected to a second term. They generally believed Obama inherited a string of challenges that were out of his control and think another four years will give him more time to address them. “I’m with him 100 percent,” said Levi Davis, a retired businessman. “He’s qualified to be there.” However, diners said there are many issues that have yet to be resolved, namely the area’s high unemployment and crime rates. “When you’re unemployed you have nothing to do all day but think about how to commit a crime, how to be violent, how to be a bully,” said Zoe Young, a West Side resident and supervising manager at Wallace’s Catfish Corner. “If (Obama) could work on the issue of unemployment, it would give our community the chance to thrive.” Danyele Leonard, a teacher at Kellman Corporate Community Elementary School, said she hopes Obama will focus on education issues during his second term, particularly helping students in low-income areas succeed. “Poverty has a role and their environment has a role,” Leonard said of the nation’s challenges with student performance and dropout rates. “Until these issues are looked at, to know the cause and effect, we really can’t have functional, literate America the way we would like.”
{ "pile_set_name": "Pile-CC" }
Tag: medicinal use of conifers I swear I never heard of Arborvitae until this year, but when I stop to think about it, I believe we had some growing in our front yard until we took them out to change the landscape. They were annoying. The branches bent under heavy snow or ice. Arborvitae are native to the eastern United States and Canada where they may be called Eastern White Cedar or Northern White Cedar. Thuja occidentalis Brandon Arborvitae means tree of life in Latin, but unfortunately, in common parlance, other varieties of trees are referred to as the tree of life. The baobab and coconut both may carry that appellation while a specific mesquite tree in Bahrain also is called that. Thuja occidentalis may have been the first specimen tree to be transported and transplanted to Europe and has been grown there since the 1500s. It was given the name Tree of Life when Jacques Cartier learned from the Iroquois that a tea made from its leaves would cure his men of scurvy. There are five species in the genus, but only two of them are native to North America. The other three species are native to Asia. Native Americans not only used the leaves for the nourishing tea, but as bedding, and the lumber was used as canoe frames. Many parts of the tree were used for other medicinal purposes, including as an abortifacient. Log cabins have been built from larger specimens, partly due to the wood’s insulating properties and rot resistance. This last property also contributes to the wood’s use as fence posts. Arborvitae are important for wildlife as both a food source and shelter. Although today this species is most often used in the landscape, it can be a long-lived tree with one of the oldest known thought to be over 1000 years. The Wintergreen Arborvitae variety seems especially well suited as a privacy screen while other varieties planted in a row are used for windbreaks. A lone Wintergreen Arbor Vitae According to some sources, the tree has antibacterial, anti-fungal, and anti-viral components. Alternative medicine practitioners may suggest its use during radiation. An essential oil is made from its steam distillate, which is most commonly used to burn off warts. According to the site cited above, the essential oil is up to 65% thujone, Thujone, also a component of absinthe, is considered toxic and the use of the oil, especially ingested, is not recommended. Apparently thujone is mentioned in at least one of the Harry Potter books and caused quite a stir with the religious right! Two of the three arborvitae in City Park are near each other. A94 Wintergreen Arborvitae (Thuja occidentalis Hertz Wintergreen ) and B96 Techny Arborvitae (Thuja occidentalis Techny) are located along Roosevelt Drive between Oak Street and City Park Drive. Both are in the field on the east side, across from the trolley station and tennis courts. The Wintergreen Arborvitae is closer to City Park Drive, near the tall conifers. The Techny is directly across from the trolley station. Techny Arborvitae The third tree, E62 Brandon Arborvitae (Thuja occidentalis Brandon) is between the ditch and the miniature Train Station, just past the rock wall that runs along City Park Drive, across from Tico’s.
{ "pile_set_name": "Pile-CC" }
Thursday, March 22, 2012 The first review of Einstein's Jewish Science: Physics at the Intersection of Politics and religion is up at Publishers Weekly. Prior to WWII, Nazi sympathizers dismissed Einstein’s theory of relativity as “Jewish science.” Yet Einstein himself, notes Gimbel, recognized an intellectual style that could be identified as Jewish. In this wide-ranging exploration, Gimbel (Exploring the Scientific Method), chair of the department of philosophy at Gettysburg College, seeks to discover whether and to what extent Einstein’s work could legitimately be called “Jewish” and what difference it makes. He speculates about whether only a Jew could have discovered relativity theory, or whether the style of reasoning characteristic of Jewish theology can influence scientific thinking (as Catholicism informed the reasoning of Descartes). Finally, Gimbel asks, did Einstein’s theory contribute to wider conversations about Jewish themes among contemporary scholars such as Walter Benjamin and Martin Buber? Gimbel felicitously concludes that what makes the theory of relativity so attractive is its cosmopolitanism and intellectual open-mindedness. It is thus only metaphorically Jewish: as the ancient rabbis assumed the existence of God’s truth but could approach it only through their contrasting interpretations, so Einstein assumed that science was the pursuit of truth about the world that still allows us the integration of different perspectives on, and individual beliefs about, the world. Agent: Deirdre Mullane, Mullane Literary Associates.
{ "pile_set_name": "Pile-CC" }
#ifndef _DELAUNAY_UTILS_H #define _DELAUNAY_UTILS_H #include <vector> #include <queue> #include <functional> using namespace std; #define ONRIGHT(x0, y0, x1, y1, x, y) ((y0-y)*(x1-x) > (x0-x)*(y1-y)) #define EDGE0(node) ((node + 1) % 3) #define EDGE1(node) ((node + 2) % 3) #define INDEX2(arr,ix,jx) (arr[2*ix+jx]) #define INDEX3(arr,ix,jx) (arr[3*ix+jx]) #define INDEXN(arr,N,ix,jx) (arr[N*ix+jx]) #define SQ(a) ((a)*(a)) #define TOLERANCE_EPS (4e-13) #define PERTURB_EPS (1e-3) #define GINORMOUS (1e100) extern int walking_triangles(int start, double targetx, double targety, double *x, double *y, int *nodes, int *neighbors); extern void getminmax(double *arr, int n, double& minimum, double& maximum); extern bool circumcenter(double x0, double y0, double x1, double y1, double x2, double y2, double& centerx, double& centery); extern double signed_area(double x0, double y0, double x1, double y1, double x2, double y2); class SeededPoint { public: SeededPoint() {}; SeededPoint(double x0c, double y0c, double xc, double yc) { this->x0 = x0c; this->y0 = y0c; this->x = xc; this->y = yc; }; ~SeededPoint() {}; double x0, y0; double x, y; bool operator<(const SeededPoint& p2) const { double test = (this->y0-p2.y)*(this->x-p2.x) - (this->x0-p2.x)*(this->y-p2.y); if (test == 0) { double length1 = SQ(this->x-this->x0) + SQ(this->y-this->y0); double length2 = SQ(p2.x-this->x0) + SQ(p2.y-this->y0); return (length2 > length1); } else return (test < 0); } }; class ConvexPolygon { public: ConvexPolygon(); ~ConvexPolygon(); void seed(double x0c, double y0c); void push(double x, double y); double area(); // private: // I don't care much for data-hiding double x0, y0; vector<SeededPoint> points; bool seeded; }; #endif // _DELAUNAY_UTILS_H
{ "pile_set_name": "Github" }
10-Gingerol, a Phytochemical Derivative from "Tongling White Ginger", Inhibits Cervical Cancer: Insights into the Molecular Mechanism and Inhibitory Targets. With the aim of evaluating anticancerous activities of 10-gingerol (10-G) against HeLa cells, it was purified and identified from "Tongling white ginger" by HSCCC, UPLC-TOF-MS/MS, and NMR analysis, respectively. 10-G inhibited the proliferation of HeLa cells at IC50 (29.19 μM) and IC80 (50.87 μM) with altered cell morphology, increased cytotoxicity, and arrested cell cycle in the G0/G1 phase. Most cell cycle related genes and protein expression significantly decreased, followed by a slight decrease in a few without affecting cyclin B1 and cyclin E1 (protein). Both death receptors significantly up-regulated and activated apoptosis indicators (caspase family). Furthermore, significant changes in mitochondria-dependent pathway markers were observed and led to cell death. 10-G led to PI3K/AKT inhibition and AMPK activation to induce mTOR-mediated cell apoptosis in HeLa cells. These results can be an asset to exploit 10-G with other medicinal plant derivatives for future applications.
{ "pile_set_name": "PubMed Abstracts" }
-- Posted Wednesday, 18 February 2009 | | Source: GoldSeek.com Analysis of News�www.analysis-news.com Of Interest to Investors, Survivalists and Others Concerned About Their Economic and Financial Futures, for Week of Feb 1, 2009 __________________________________________________________________________________________________________________ With a focus on the Plutocrats, Goldsmiths, Super-Rich Insiders, and their Allies and what they are conspiratorially doing to manipulate the financial markets, make more profits, rip us off and install a world government under their control By R. D. Bradshaw In the Goldsmiths, Part XXXIII (published at goldseek.com), I outlined the basic problem faced by gold advocates and proponents. I recognized the power of the Rothschild Cabal to make or break markets, however they see fit to do so. The gold and silver markets have been seriously impacted by this Rothschild oversight for many years now. Here�s what I suggested in Goldsmiths XXXIII: Today, the Rothschilds and their relatives, cousins, and colleagues own or control most of the wealth and assets on planet earth. Obviously, this ownership and control of money has made this combine the plutocratic rulers of much of Western Christianity�particularly in Europe and in North America . While much of the Third World puts up with this combine, because of the Cabal�s power over money (principally the US dollar which is their primary currency), some of the people in the Third World nations are now or will be soon looking for ways to break the money yoke which the Rothschild Cabal holds over them. This backdrop will have a profound impact on gold as will be demonstrated in comments to follow in this Goldsmiths. With its power over money, and therefore over politicians who need money to win elections, the Rothschild Cabal has come to literally control most or all of the Western Christian civilization found in Europe, North America and the White British Commonwealth. With this control, and the Cabal�s ownership of the international banks in the West, it has meant that the Cabal has owned and controlled all of the central banks in these countries. Yes, the Rothschild Cabal owns the Bank of England, the Bank of France, the ECB, the Swiss National Bank, the Federal Reserve and so forth. This ownership, plus the fact that the bosses and leaders at these banks are often Rothschild cousins/relatives, has meant that the Cabal issues orders and instructions to the central banks. Hence, people like Ben Bernanke actually work for and serve the Rothschild team. The same is true with the financial market exchanges and most of the big brokerage houses. They are all linked together under the Rothschild umbrella. With a background in gold, it is a historic fact for the past centuries that the Rothschilds and their cousins/relatives/colleagues have controlled gold and pretty well have determined its price or value in the financial markets. Therefore, it is safe to say that the Rothschild combine controls and/or owns most of the gold in the world today. Of course, some might argue that nations and central banks own much gold. But it must be understood that even here the control of that gold rests with the Rothschild Cabal (since the Cabal controls the central banks and political leaders in the democratic Western Christian civilization). In my years of watching and studying the Rothschild combine and gold, I have long ago concluded that the price of gold will explode up--either when the Rothschilds and their allies control it all or when they lose control of it. I am not absolutely sure which of these courses will come first. But I am certain that both motions are underway right now. Along with their lust and appreciation for gold, it is interesting that this Cabal of bankers introduced and promoted paper money over the past 200 years (which has turned out to be fiat money thru the irresponsible spending habits of the nations and central banks involved). What a paradox this whole thing has come to be because the Cabal has had to suppress the price and value of gold in order to keep up public acceptance and use of fiat paper money. In any case, the Cabal has actively suppressed the value of gold for many years now. So here, one might ask if this conflicting paradox of gold versus fiat paper money will ever end? Hence, the answer must devolve to my position stated above�that the price and value of gold will explode up when the Rothschilds and their relatives/cousins/colleagues either own it all/almost all or lose control of it in the markets. With this backdrop, the situation for gold ultimately comes down to if and when the Cabal has it all or loses control. What is Involved In that Goldsmiths study, I offered some of the current thinking among some persons that the gold and other financial markets will reach a turn around time in March 2009�meaning that precious metals will once more resume a strong up-turn. But I also cautioned readers that the Rothschild team (especially JP Morgan-Chase) is holding a large short position in gold. It is not clear where all these shorts are amassed by date, but we can be sure that the Cabal intends on taking gold down again, if it can. Of course, the basic question devolves to when the Rothschild combine either owns/controls all or most all of the world�s gold supply or when the combine will lose control over gold in the financial markets. I think that either of these options will cause some sharp moves up in gold (and silver as well). But if and when gold starts up in earnest, the Rothschild controlled US government will make a fast, surprise call-in of US gold (and in marking their call, they will blame people like me and other gold supporters for the alleged problems necessitating the call-in). The ruling plutocrats and their prostitute politicians are not going to sit back and allow the American people to make much money in gold or anything else. They are in a position of power to control what happens in gold. And they will use that power. In any case, the whole dilemma boils down presently to the question of timing. I outlined in Goldsmiths 33 some of the arguments for a possible significant change in gold value in March. It could come this early. But I doubt that we will see the explosion up which will come later if and when the Cabal either owns/controls all or most of it or when the Cabal loses control. Frankly, my guess would be a loss of control. But I would suppose that this will come later this year or perhaps starting by Passover in 2010. In any case, in the vein of broaching the possible date for a major change in the direction in gold, I recently picked up on an article from the Asia News, as published by rense.com. I have read and quoted material from the Asia Times/Asian News before since these sources seem to have some grip on thinking in particularly China . The Asia News of Dec 24, 2008 Here�s what the Asia News reported back in Dec 2008 on �US Debt Approaches Insolvency: In 2007, 61.82% of America �s public debt was held by foreign investors, most of them Asian,� viz: In the United States, the danger of debt insolvency is growing, putting at risk the currency reserves of foreign countries, China chief among them. According to new figures published by Bloomberg in recent days (Nov. 25, 2008), the American government has employed a total of 8.549 trillion dollars to stop the financial crisis. This means a total of about 24-25.4 trillion dollars of direct or indirect public debt weighing on American taxpayers. The complete tally must also include the debt - about 5-6 trillion dollars - of Fannie Mae and Freddie Mac, which are now quasi-public companies, because 79.9% of their capital is controlled by a public entity, the Federal Housing Finance Agency, which manages them as a public conservatorship. In 2007, public debt in the United States was 10.6 trillion dollars, compared to a GDP (gross domestic product) of 13.811 trillion dollars. In just one year, direct and indirect public debt have grown to more than 100% of GDP, reaching 176.9% to 184.2%. These percentages exclude the debt guaranteed by policies underwritten by AIG, also nationalized, and liabilities for health spending (Medicaid and Medicare) and pensions (Social Security). By way of comparison, the Maastricht accords require member states of the European Union (EU) to reduce their public debt to no more than 60% of GDP. Again by way of comparison, in one of the EU countries with the largest public debt, Italy, public debt in 2007 was equal to 104% of GDP. In 2007, 61.82% of America's public debt was held by foreign investors, most of them Asian. So the U.S. public debt held by nonresident foreigners is equal to about 109.39% (113.86%) of GDP. According to a study by the International Monetary Fund, countries with more than 60% of their public debt held by nonresident foreigners run a high risk of currency crisis and insolvency, or debt default. On the historical level, there are no recent examples of countries with currencies valued at reserve status that have lapsed into public debt insolvency. There are also few or no precedents of such a vast and rapid expansion of public debt. The United States also runs large deficits in its public balance sheet and balance of trade. Families and businesses are also deeply in debt: in 2007, American private debt was equal to a little more than 100% of GDP. At the moment, it is not clear how much of America's private debt has been "nationalized" with the recent bailouts. In the early months of next year, when the official data are published, the United States will run a serious risk of insolvency. This would involve, in the first place, a valuation crisis for the dollar. After this, the United States could face a social crisis like that in Argentina in 2001. A crisis in U.S. public debt would likely have a severe impact on the Asian countries that are the main exporters to the United States, China first among them. Chinese monetary authorities, thanks to a steeply undervalued artificial exchange rate, at about 55% of its fair value, have limited imports (including food) and have achieved an export surplus. This has allowed them to accumulate a large stockpile of dollar reserves. In a currency crisis, China risks losing much of the value of its accumulated currency reserves. At the same time, pressure on imports (wheat, other grains, and meat) have led to inflation in the prices of food, the most important expenditure for more than 900 million Chinese. This is nothing more than a small confirmation of the recent statements of the pope, in his message for the World Day for Peace, where the pontiff calls the current financial system and its methods "based upon very short-term thinking," without depth and breadth, preoccupied with creating wealth from nothing and leading the planet to its current disaster. The US debt structure has ballooned up even more since December 2008. We can be sure that people in China are watching this gigantic spending of money and wondering how much longer should they sit on the sidelines and allow the US to ruin their investments with give-away programs for the big banks. In a related report, World Net Daily had a story by Jerome R. Corsi on �Federal obligations exceed world GDP.� It provides some clue to the dangerous predicament that the US government is now in. Corsi took note of the recent $800 billion stimulus plan and said that the �true deficit of the federal government already is measured in trillions of dollars, and in fact its $65.5 trillion in total obligations exceeds the gross domestic product of the world.� In his further remarks, Corsi noted that the debt situation has placed the US government in bankruptcy�even before new obligations take place. Corsi quoted John Williams of shadowstats.com that �The federal government is bankrupt� In a post-Enron world, if the federal government were a corporation such as General Motors, the president and senior Treasury officers would be in federal penitentiary� the appetite of foreign buyers to purchase continued trillions of U.S. debt has become more questionable as the world has witnessed the rapid deterioration of the U.S. fiscal condition in the current financial crisis.� As noted above from Asia News, the presentation back in December offered some cause to believe that the next big turn date in the US financials (and thus in gold and silver) could come in early 2009. Well, we haven�t had a collapse yet in US IOU paper. But those days are on the horizon. We need to be extra careful at this time and start watching Asia more carefully. Decisions in China may be the catalyst to turn the gold and US IOU markets around. The Bottom Line Before concluding this study, it should be noted that as of this writing on Feb 17, 2009, stocks and commodities are generally down while gold and the US dollar are up. The dollar index is almost at 88. It appears that the Cabal will next let the dollar index come down later this week and perhaps into next week. But March currency options and contracts won�t expire until in March. So by early March, they may try to repeat things with another boost up in the dollar. The manipulators love their controlled oscillations up and down as they make money on the moves. Since gold options and contracts expire on February 24-25, the manipulators logically will try to hold the line on gold this week, to protect their huge short positions. If they are unable to keep it flat this week, for whatever reason, it could be an excellent clue that they are having manipulating and control problems for some reason�like possible trouble from Asia as the Asia News allows. Asians could be buying some gold in secret. After all, we must remember that the Chinese and other Asians are not as stupid and gullible as the manipulating Cabal seems to think. ___________________________________________________________________________ Back issues of the Goldsmiths, by the editor of the Analysis of News, can be accessed from a Google or Yahoo search engine by typing in �The Goldsmiths� and R. D. Bradshaw. Several hundred web sites can be found with the back issues and with translations to Spanish, Italian, German, Chinese and other foreign languages. The goldseek.com archives have the first 28 Goldsmiths. Finally, the �Archives-Goldsmiths� of this website ( www.analysis-news.com ) has all of the Goldsmith articles issued to date. Besides the revelations contained in the Goldsmiths� articles, the work of the plutocratic financial market manipulators to conspiratorially manipulate and control the financial markets (to make more profits and install a world government under their management) is also addressed at length in the periodic analysis of the news and in other articles produced at www.analysis-news.com . This website has an article of interest to any person interested in understanding the market Manipulators. It is the Hidden Secret of the Manipulators, why they succeed and how to follow their manipulations. Readers of the above articles are invited to visit www.analysis-news.com and become a subscriber to regularly read some of the material from the world of information which will further reveal how extensive the manipulation, control and dishonesty realities are in the financial, currency and commodity markets, not only in the US but indeed around the world. To go to this related website, please click at the link here: www.analysis-news.com . -- Posted Wednesday, 18 February 2009 | Digg This Article | Source: GoldSeek.com Previous Articles
{ "pile_set_name": "OpenWebText2" }
"Juan Manuel has been unequivocal in his assertion that he never voluntarily left the country while he had DACA. We believe him. We filed a [Freedom of Information Act] lawsuit to get answers. Rather than continue to provide half-truths and varying assertions, [Homeland Security] should respond to our request for documentation," said Nora A. Preciado, a staff attorney with the National Immigration Law Center and co-counsel on the case.
{ "pile_set_name": "OpenWebText2" }
Information By its pharmacological properties it is completely predictable with its antecedent, Kamagra tablets. The key contrast of the Kamagra Oral Jelly is consistency, intended to encourage its utilization and essentially accelerate the beginning of the coveted impact. In the event that coveted, the purchaser can browse a few tastes. Dissimilar to tablets Kamagra gel can be expended without water. It is very safe for the mucosa of the stomach related framework. Kamagra Oral Jelly isn't a stimulant, Kamagra Oral Jelly just reestablishes lost physiological conditions in which it ends up plainly conceivable to a solid erection. In this manner, its fruitful operation requires sexual incitement.
{ "pile_set_name": "Pile-CC" }
Using some of the Earth’s most powerful telescopes and supercomputers, Japanese researchers have made a discovery about black holes which may force a rewrite of the world’s astronomy textbooks. Takuma Izumi, a researcher at the National Astronomical Observatory of Japan (NAOJ), led a team of astronomers who were investigating the theorized ‘donut’ shaped structures at the gaping mouth of the universe’s supermassive black holes. Specifically, the team pointed the Atacama Large Millimeter/submillimeter Array (ALMA) at the central black hole in the Circinus Galaxy, located roughly 14 million light-years away from Earth. The team then compared the observations with a simulation produced by the Cray XC30 ATERUI supercomputer and they discovered that the rings of gas around supermassive black holes, which are millions or even billions of times as heavy as our sun, found at the centers of galaxies are not quite the simple donut shapes that were previously theorized. Instead, the gas expelled from the black holes combines with additional gas that is falling inwards creating a circulating pattern not dissimilar to the water in a public drinking fountain. According to Izumi’s team’s model, the initial cold, falling gas forms a disc at the mouth of the black hole. As it falls it heats until the molecules break up into their constituent atoms and ions which are then expelled above and below the disc. The hot atomic gas fired upwards then falls back on top of the disc creating a tumultuous three dimensional structure. READ MORE: Massive black hole’s spectacular spin ‘may rotate space around it’ “By investigating the motion and distribution of both the cold molecular gas and warm atomic gas with ALMA, we demonstrated the origin of the so-called ‘donut’ structure around active black holes,” Izumi said in a press release. “Based on this discovery, we need to rewrite the astronomy textbooks.” Think your friends would be interested? Share this story!
{ "pile_set_name": "OpenWebText2" }
As friend Emily Loechen comforts him, James van Kuilenburg talks about some of his experiences as a transgender student in Frederick County, Md. (Essdras M Suarez/For the Washington Post) When James van Kuilenburg used the bathroom at his Maryland high school, he always worried. Would he be taunted by his classmates? Would he be shamed or beaten? Most of the time, he avoided the risk altogether. "You don't feel safe," the teenager said, five years after coming out as transgender. But van Kuilenburg and others in Frederick County hope this year marks a turning point across the Maryland system's 67 schools as a new policy takes hold that is regarded as one of the most progressive in the state. The policy spells out that bathrooms and locker rooms should be used according to gender identity and provides alternatives for students uncomfortable for any reason. It also covers privacy, preferred names, dress codes for major events and participation in sports teams. "I see it as one of the most comprehensive transgender student policies in the country," said Jabari Lyles, executive director of GLSEN Maryland, which advocates for LGBT students on issues of education. Some in Frederick see the policy's adoption — in a growing exurb of Washington once viewed as largely rural and conservative — as a reflection of changing politics, greater diversity, dogged student activism and a school board that did not shy away from a contentious issue. Members of the Frederick County Public School Trans Student Support group talk about their struggles, achievements and frustrations. From left are Maxx Frazier, 15, James Van Kuilenburg, 17, Emily Loechen, 16, and Asher Burrows. (Essdras M Suarez/For the Washington Post) "It was sort of unstoppable," said Alicia Barmon, a Frederick psychotherapist who joined in rallies and meetings. But critics have spoken out, too. A suit was recently filed on behalf of a mother and her 15-year-old daughter, asserting the girl's rights to bodily privacy and saying the teen fears for her safety and feels humiliated to undress in front of "the opposite sex." The family's attorney, Dan Cox, an unsuccessful Republican candidate for Congress last year, declined to comment on the suit, which at points invokes totalitarian regimes and Nazi death camps. Frederick school officials will soon respond to the complaint in court, said attorney Donny English. "We look forward to defending our policy, which we think is inclusive and respects everyone's rights," he said. The push for change started in February, when van Kuilenburg and others went to Frederick's school board as the Trump administration revoked federal guidance that said transgender students have the right to use public school restrooms that match their gender identity. They said they felt unsafe and urged local action. "There's no procedure, and there's no policy," testified Maxx Frazier, a transgender student who is 15, "and it's worrying because right now with the election and the results of that, a lot of people feel they have the right to hate." [Trump administration rolls back protections for transgender students] Led by van Kuilenburg, who attends Gov. Thomas Johnson High School in Frederick, students told the board about school experiences — crude comments, fear of harassment, being outed when teachers use the wrong name. They organized an email campaign, launched a Facebook page and held two rallies. They were joined by parents, classmates, educators and community members. "We see this as being on the right side of history, and an overall sign of fairness," said Tyler Oyler, 34, the owner of a craft brewery who heard about the effort through social media. The Frederick deliberations came at a time of flux nationally, with both the Trump administration's action and a U.S. Supreme Court decision to remand a key case — involving Virginia student Gavin Grimm — to a lower court, leaving many without the legal clarity they sought. Some school districts have responded with local policies, as Frederick did, but a large majority are accommodating students on a case-by-case basis, out of the spotlight, said Francisco M. Negron Jr., chief legal officer for the National School Boards Association. Dozens of legal complaints have been filed in recent years on both sides of the debate, he said. "The priority for schools is keeping students safe, and they are squarely in the middle of this," he said. [Appeals court sides with transgender student in Wis. school bathroom case] The policy that emerged in Frederick largely reflected what the district was already doing on key issues such as bathrooms but it is more clear and concrete, with the idea of increasing consistency and compliance, supporters say. Teachers backed the change, said Melissa Dirks, president of the Frederick County Teachers Association. "It's brought a peace of mind to our students that they will be treated more fairly and equitably, and has also brought about more training for staff," she said. But as the board voted in June, opponents spoke out. "One of our problems with this policy is it appears to be concerned only with the rights and affirmations of transgender students," said Cindy Rose, speaking for the Republican Women of Frederick County. "Will there be a policy protecting the band geek, the math nerd and the other children who have felt unwelcome and bullied for decades? Will they get a similar carve-out?" Rose described the issue as a question of privacy rights and "whether boys should be able to watch girls undress and vice versa." Other critics cited a greater risk of emotional distress or sexual assault, and a string of speakers took issue with a privacy provision that allows students to express a gender identity at school that parents potentially may not know about. As board members voted, several recounted months of getting to know an unfamiliar subject and thinking it through. "My opinions have changed, and a lot of the concerns I had I find no longer to be valid," board member Ken Kerr said. Board member Michael Bunitsky compared the issue with other historical flash points: integrated schools, voting rights, women's rights. "What was once controversial we now consider to be as American as apple pie," he said. Van Kuilenburg held up his transgender flag after the policy passed, 5 to 1, with the student member also in favor. He hugged friends and supporters. That night, he cried. The 17-year-old describes the policy as "perfect," a change he never imagined. "We created history in Frederick County," he said. He recalled that when he came out as transgender at age 12, the principal at his West Virginia middle school had no idea what to do. The principal told the then-seventh-grader to use the bathroom in the nurse's office and removed him from his P.E. class, he said. "The years I felt completely hopeless," he said, "and I felt that nothing would get better — it was all worth it." Students say they recognize that the policy won't change everything immediately, but it has begun to make a difference. Asher Burrows, 15, who identifies as neither male nor female, recalls being singled out last year for dress code violations that seemed vague and related to clothing that teachers appeared to consider too feminine. "It's very embarrassing," the teenager said. "It makes me feel that I am not allowed to wear the clothes that make me feel comfortable in my own skin." This year, there have been fewer such moments, the teenager said. Van Kuilenburg said he thinks school is more welcoming — and so is the county he lives in. With the lawsuit challenging the policy underway, students and their allies launched another social media campaign to show the breadth of their support. They asked people to contribute photos of themselves with a sign that says "#IAmFrederick and I support trans youth because . . . " "No child should be afraid to be themselves!" one person wrote. Said another: "School should be about learning, not survival."
{ "pile_set_name": "OpenWebText2" }
Q: Excel macro to get SEPARATE graphs of many Ys with the same Xs I have a data set in which the first column is the x but the other columns (> 50) are the Ys. There are 6 rows. I know I can plot all the Ys on the same axis in the same chart, but I need separate graphs of Y all with the same x. However, I am clueless if it is possible to have an excel macro that will allow me to plot DIFFERENT bar graphs for as many Ys all at once. Doing it manually is a pain because I have many datasets with these dimensions. Any help would be greatly appreciated. Below is the code I used but it plotted all the bars in a single graph. Found this code online and tweaked it Sheets("sheet1").Select ActiveSheet.Shapes.AddChart.Select With ActiveChart .ChartType = xlColumnClustered .SetSourceData Source:=Sheets("sheet1").Range("A1:D7") 'sets source data for graph including labels .SetElement (msoElementLegendRight) 'including legend .HasTitle = True 'dimentions & location: .Parent.Left = 47 'defines the coordinates for the left side of the chart .Parent.Height = 300 .Parent.Width = 600 .ChartTitle.Text = "Yield by group " & intGraphStart End With A sample A: The procedure below create a chart in a separated sheet for each of the columns from B to L using column A as a common horizontal axis. Sub Rng_Charts_Add_Multiple() Const kChrTtl As String = "Yield by group " Dim Wbk As Workbook, WshSrc As Worksheet Dim rSrc As Range, Chrt As Chart Dim sCol As String, bCol As Byte Rem Application Settings Application.EnableEvents = False Application.DisplayAlerts = False Application.ScreenUpdating = False Set Wbk = ThisWorkbook Set WshSrc = Wbk.Sheets("Sht(1)") Application.Goto WshSrc.Cells(1), 1 Set rSrc = WshSrc.Cells(1).CurrentRegion For bCol = 2 To rSrc.Columns.Count Rem Add Chart in a New Sheet sCol = rSrc.Cells(1, bCol).Value2 With Wbk On Error Resume Next .Sheets("Chart " & sCol).Delete On Error GoTo 0 Application.Goto WshSrc.UsedRange.SpecialCells(xlCellTypeLastCell).Offset(2, 2) Set Chrt = .Charts.Add2(After:=.Sheets(.Sheets.Count), NewLayout:=1) End With Rem Chart Settings With Chrt .name = "Chart " & sCol .ApplyLayout (1) .ChartTitle.Text = kChrTtl & sCol .ChartType = xlColumnClustered .SetSourceData Source:=Union(rSrc.Columns(1), rSrc.Columns(bCol)) End With: Next Rem Application Settings Application.EnableEvents = True Application.DisplayAlerts = True Application.ScreenUpdating = True End Sub Suggest to visit the following pages: Variables & Constants, Application Object (Excel), Excel Objects With Statement, For...Next Statement, Range Object (Excel) Worksheet Object (Excel), ChartObjects Members (Excel)
{ "pile_set_name": "StackExchange" }
Mark, would you please furnish me the name of the William, Cutler attorney that you are dealing with? Thank you. Jim -----Original Message----- From: Evans, Mark (London Legal) Sent: Monday, November 05, 2001 2:50 AM To: Derrick Jr., James Cc: Walls Jr., Rob Subject: WILMER CUTLER Jim, we find ourselves negotiating continental power trading documents and credit provisions with Wilmer Cutler's New York office, acting for Morgan Stanley. I wonder if that conflict was raised when WC were instructed to act on the SEC inquiry? Mark
{ "pile_set_name": "Enron Emails" }