text
stringlengths
0
1.59M
meta
dict
SIMENGINE: a low-cost, high-performance platform for embedded biophysical simulations. Numerical simulations of dynamical systems are an obvious application of high-performance computing. Unfortunately, this application is underutilized because many modelers lack the technical expertise and financial resources to leverage high-performance computing hardware. Additionally, few platforms exist that can enable high-performance computing with real-time guarantees for inclusion into embedded systems--a prerequisite for working with medical devices. Here we introduce simEngine, a platform for numerical simulations of dynamical systems that reduces modelers' programming effort, delivers simulation speeds 10-100 times faster than a conventional microprocessor, and targets high-performance hardware suitable for real-time and embedded applications. This platform consists of a high-level mathematical language used to describe the simulation, a compiler/resource scheduler that generates the high-performance implementation of the simulation, and the high-performance hardware target. In this paper we present an overview of the platform, including a network-attached embedded computing device utilizing field-programmable gate arrays (FPGAs) suitable for real-time, high-performance computing. We go on to describe an example model implementation to demonstrate the platform's performance and describe how future development will improve system performance.
{ "pile_set_name": "PubMed Abstracts" }
/* SPDX-License-Identifier: GPL-2.0+ */ /* * (C) Copyright 2013-2016, Freescale Semiconductor, Inc. */ #ifndef __ASM_ARCH_IMX_REGS_H__ #define __ASM_ARCH_IMX_REGS_H__ #define ARCH_MXC #define IRAM_BASE_ADDR 0x3E800000 /* internal ram */ #define IRAM_SIZE 0x00400000 /* 4MB */ #define AIPS0_BASE_ADDR (0x40000000UL) #define AIPS1_BASE_ADDR (0x40080000UL) /* AIPS 0 */ #define AXBS_BASE_ADDR (AIPS0_BASE_ADDR + 0x00000000) #define CSE3_BASE_ADDR (AIPS0_BASE_ADDR + 0x00001000) #define EDMA_BASE_ADDR (AIPS0_BASE_ADDR + 0x00002000) #define XRDC_BASE_ADDR (AIPS0_BASE_ADDR + 0x00004000) #define SWT0_BASE_ADDR (AIPS0_BASE_ADDR + 0x0000A000) #define SWT1_BASE_ADDR (AIPS0_BASE_ADDR + 0x0000B000) #define STM0_BASE_ADDR (AIPS0_BASE_ADDR + 0x0000D000) #define NIC301_BASE_ADDR (AIPS0_BASE_ADDR + 0x00010000) #define GC3000_BASE_ADDR (AIPS0_BASE_ADDR + 0x00020000) #define DEC200_DECODER_BASE_ADDR (AIPS0_BASE_ADDR + 0x00026000) #define DEC200_ENCODER_BASE_ADDR (AIPS0_BASE_ADDR + 0x00027000) #define TWOD_ACE_BASE_ADDR (AIPS0_BASE_ADDR + 0x00028000) #define MIPI_CSI0_BASE_ADDR (AIPS0_BASE_ADDR + 0x00030000) #define DMAMUX0_BASE_ADDR (AIPS0_BASE_ADDR + 0x00031000) #define ENET_BASE_ADDR (AIPS0_BASE_ADDR + 0x00032000) #define FLEXRAY_BASE_ADDR (AIPS0_BASE_ADDR + 0x00034000) #define MMDC0_BASE_ADDR (AIPS0_BASE_ADDR + 0x00036000) #define MEW0_BASE_ADDR (AIPS0_BASE_ADDR + 0x00037000) #define MONITOR_DDR0_BASE_ADDR (AIPS0_BASE_ADDR + 0x00038000) #define MONITOR_CCI0_BASE_ADDR (AIPS0_BASE_ADDR + 0x00039000) #define PIT0_BASE_ADDR (AIPS0_BASE_ADDR + 0x0003A000) #define MC_CGM0_BASE_ADDR (AIPS0_BASE_ADDR + 0x0003C000) #define MC_CGM1_BASE_ADDR (AIPS0_BASE_ADDR + 0x0003F000) #define MC_CGM2_BASE_ADDR (AIPS0_BASE_ADDR + 0x00042000) #define MC_CGM3_BASE_ADDR (AIPS0_BASE_ADDR + 0x00045000) #define MC_RGM_BASE_ADDR (AIPS0_BASE_ADDR + 0x00048000) #define MC_ME_BASE_ADDR (AIPS0_BASE_ADDR + 0x0004A000) #define MC_PCU_BASE_ADDR (AIPS0_BASE_ADDR + 0x0004B000) #define ADC0_BASE_ADDR (AIPS0_BASE_ADDR + 0x0004D000) #define FLEXTIMER_BASE_ADDR (AIPS0_BASE_ADDR + 0x0004F000) #define I2C0_BASE_ADDR (AIPS0_BASE_ADDR + 0x00051000) #define LINFLEXD0_BASE_ADDR (AIPS0_BASE_ADDR + 0x00053000) #define FLEXCAN0_BASE_ADDR (AIPS0_BASE_ADDR + 0x00055000) #define SPI0_BASE_ADDR (AIPS0_BASE_ADDR + 0x00057000) #define SPI2_BASE_ADDR (AIPS0_BASE_ADDR + 0x00059000) #define CRC0_BASE_ADDR (AIPS0_BASE_ADDR + 0x0005B000) #define USDHC_BASE_ADDR (AIPS0_BASE_ADDR + 0x0005D000) #define OCOTP_CONTROLLER_BASE_ADDR (AIPS0_BASE_ADDR + 0x0005F000) #define WKPU_BASE_ADDR (AIPS0_BASE_ADDR + 0x00063000) #define VIU0_BASE_ADDR (AIPS0_BASE_ADDR + 0x00064000) #define HPSMI_SRAM_CONTROLLER_BASE_ADDR (AIPS0_BASE_ADDR + 0x00068000) #define SIUL2_BASE_ADDR (AIPS0_BASE_ADDR + 0x0006C000) #define SIPI_BASE_ADDR (AIPS0_BASE_ADDR + 0x00074000) #define LFAST_BASE_ADDR (AIPS0_BASE_ADDR + 0x00078000) #define SSE_BASE_ADDR (AIPS0_BASE_ADDR + 0x00079000) #define SRC_SOC_BASE_ADDR (AIPS0_BASE_ADDR + 0x0007C000) /* AIPS 1 */ #define ERM_BASE_ADDR (AIPS1_BASE_ADDR + 0X000000000) #define MSCM_BASE_ADDR (AIPS1_BASE_ADDR + 0X000001000) #define SEMA42_BASE_ADDR (AIPS1_BASE_ADDR + 0X000002000) #define INTC_MON_BASE_ADDR (AIPS1_BASE_ADDR + 0X000003000) #define SWT2_BASE_ADDR (AIPS1_BASE_ADDR + 0X000004000) #define SWT3_BASE_ADDR (AIPS1_BASE_ADDR + 0X000005000) #define SWT4_BASE_ADDR (AIPS1_BASE_ADDR + 0X000006000) #define STM1_BASE_ADDR (AIPS1_BASE_ADDR + 0X000007000) #define EIM_BASE_ADDR (AIPS1_BASE_ADDR + 0X000008000) #define APB_BASE_ADDR (AIPS1_BASE_ADDR + 0X000009000) #define XBIC_BASE_ADDR (AIPS1_BASE_ADDR + 0X000012000) #define MIPI_BASE_ADDR (AIPS1_BASE_ADDR + 0X000020000) #define DMAMUX1_BASE_ADDR (AIPS1_BASE_ADDR + 0X000021000) #define MMDC1_BASE_ADDR (AIPS1_BASE_ADDR + 0X000022000) #define MEW1_BASE_ADDR (AIPS1_BASE_ADDR + 0X000023000) #define DDR1_BASE_ADDR (AIPS1_BASE_ADDR + 0X000024000) #define CCI1_BASE_ADDR (AIPS1_BASE_ADDR + 0X000025000) #define QUADSPI0_BASE_ADDR (AIPS1_BASE_ADDR + 0X000026000) #define PIT1_BASE_ADDR (AIPS1_BASE_ADDR + 0X00002A000) #define FCCU_BASE_ADDR (AIPS1_BASE_ADDR + 0X000030000) #define FLEXTIMER_FTM1_BASE_ADDR (AIPS1_BASE_ADDR + 0X000036000) #define I2C1_BASE_ADDR (AIPS1_BASE_ADDR + 0X000038000) #define I2C2_BASE_ADDR (AIPS1_BASE_ADDR + 0X00003A000) #define LINFLEXD1_BASE_ADDR (AIPS1_BASE_ADDR + 0X00003C000) #define FLEXCAN1_BASE_ADDR (AIPS1_BASE_ADDR + 0X00003E000) #define SPI1_BASE_ADDR (AIPS1_BASE_ADDR + 0X000040000) #define SPI3_BASE_ADDR (AIPS1_BASE_ADDR + 0X000042000) #define IPL_BASE_ADDR (AIPS1_BASE_ADDR + 0X000043000) #define CGM_CMU_BASE_ADDR (AIPS1_BASE_ADDR + 0X000044000) #define PMC_BASE_ADDR (AIPS1_BASE_ADDR + 0X000048000) #define CRC1_BASE_ADDR (AIPS1_BASE_ADDR + 0X00004C000) #define TMU_BASE_ADDR (AIPS1_BASE_ADDR + 0X00004E000) #define VIU1_BASE_ADDR (AIPS1_BASE_ADDR + 0X000050000) #define JPEG_BASE_ADDR (AIPS1_BASE_ADDR + 0X000054000) #define H264_DEC_BASE_ADDR (AIPS1_BASE_ADDR + 0X000058000) #define H264_ENC_BASE_ADDR (AIPS1_BASE_ADDR + 0X00005C000) #define MEMU_BASE_ADDR (AIPS1_BASE_ADDR + 0X000060000) #define STCU_BASE_ADDR (AIPS1_BASE_ADDR + 0X000064000) #define SLFTST_CTRL_BASE_ADDR (AIPS1_BASE_ADDR + 0X000066000) #define MCT_BASE_ADDR (AIPS1_BASE_ADDR + 0X000068000) #define REP_BASE_ADDR (AIPS1_BASE_ADDR + 0X00006A000) #define MBIST_CONTROLLER_BASE_ADDR (AIPS1_BASE_ADDR + 0X00006C000) #define BOOT_LOADER_BASE_ADDR (AIPS1_BASE_ADDR + 0X00006F000) /* TODO Remove this after the IOMUX framework is implemented */ #define IOMUXC_BASE_ADDR SIUL2_BASE_ADDR /* MUX mode and PAD ctrl are in one register */ #define CONFIG_IOMUX_SHARE_CONF_REG #define FEC_QUIRK_ENET_MAC #define I2C_QUIRK_REG /* MSCM interrupt router */ #define MSCM_IRSPRC_CPn_EN 3 #define MSCM_IRSPRC_NUM 176 #define MSCM_CPXTYPE_RYPZ_MASK 0xFF #define MSCM_CPXTYPE_RYPZ_OFFSET 0 #define MSCM_CPXTYPE_PERS_MASK 0xFFFFFF00 #define MSCM_CPXTYPE_PERS_OFFSET 8 #define MSCM_CPXTYPE_PERS_A53 0x413533 #define MSCM_CPXTYPE_PERS_CM4 0x434d34 #if !(defined(__KERNEL_STRICT_NAMES) || defined(__ASSEMBLY__)) #include <asm/types.h> /* System Reset Controller (SRC) */ struct src { u32 bmr1; u32 bmr2; u32 gpr1_boot; u32 reserved_0x00C[61]; u32 gpr1; u32 gpr2; u32 gpr3; u32 gpr4; u32 gpr5; u32 gpr6; u32 gpr7; u32 reserved_0x11C[1]; u32 gpr9; u32 gpr10; u32 gpr11; u32 gpr12; u32 gpr13; u32 gpr14; u32 gpr15; u32 gpr16; u32 reserved_0x140[1]; u32 gpr17; u32 gpr18; u32 gpr19; u32 gpr20; u32 gpr21; u32 gpr22; u32 gpr23; u32 gpr24; u32 gpr25; u32 gpr26; u32 gpr27; u32 reserved_0x16C[5]; u32 pcie_config1; u32 ddr_self_ref_ctrl; u32 pcie_config0; u32 reserved_0x18C[4]; u32 soc_misc_config2; }; /* SRC registers definitions */ /* SRC_GPR1 */ #define SRC_GPR1_PLL_SOURCE(pll,val)( ((val) & SRC_GPR1_PLL_SOURCE_MASK) << \ (SRC_GPR1_PLL_OFFSET + (pll)) ) #define SRC_GPR1_PLL_SOURCE_MASK (0x1) #define SRC_GPR1_PLL_OFFSET (27) #define SRC_GPR1_FIRC_CLK_SOURCE (0x0) #define SRC_GPR1_XOSC_CLK_SOURCE (0x1) /* Periodic Interrupt Timer (PIT) */ struct pit_reg { u32 mcr; u32 recv0[55]; u32 ltmr64h; u32 ltmr64l; u32 recv1[6]; u32 ldval0; u32 cval0; u32 tctrl0; u32 tflg0; u32 ldval1; u32 cval1; u32 tctrl1; u32 tflg1; u32 ldval2; u32 cval2; u32 tctrl2; u32 tflg2; u32 ldval3; u32 cval3; u32 tctrl3; u32 tflg3; u32 ldval4; u32 cval4; u32 tctrl4; u32 tflg4; u32 ldval5; u32 cval5; u32 tctrl5; u32 tflg5; }; /* Watchdog Timer (WDOG) */ struct wdog_regs { u32 cr; u32 ir; u32 to; u32 wn; u32 sr; u32 co; u32 sk; }; /* UART */ struct linflex_fsl { u32 lincr1; u32 linier; u32 linsr; u32 linesr; u32 uartcr; u32 uartsr; u32 lintcsr; u32 linocr; u32 lintocr; u32 linfbrr; u32 linibrr; u32 lincfr; u32 lincr2; u32 bidr; u32 bdrl; u32 bdrm; u32 ifer; u32 ifmi; u32 ifmr; u32 ifcr0; u32 ifcr1; u32 ifcr2; u32 ifcr3; u32 ifcr4; u32 ifcr5; u32 ifcr6; u32 ifcr7; u32 ifcr8; u32 ifcr9; u32 ifcr10; u32 ifcr11; u32 ifcr12; u32 ifcr13; u32 ifcr14; u32 ifcr15; u32 gcr; u32 uartpto; u32 uartcto; u32 dmatxe; u32 dmarxe; }; /* MSCM Interrupt Router */ struct mscm_ir { u32 cpxtype; /* Processor x Type Register */ u32 cpxnum; /* Processor x Number Register */ u32 cpxmaster; /* Processor x Master Number Register */ u32 cpxcount; /* Processor x Count Register */ u32 cpxcfg0; /* Processor x Configuration 0 Register */ u32 cpxcfg1; /* Processor x Configuration 1 Register */ u32 cpxcfg2; /* Processor x Configuration 2 Register */ u32 cpxcfg3; /* Processor x Configuration 3 Register */ u32 cp0type; /* Processor 0 Type Register */ u32 cp0num; /* Processor 0 Number Register */ u32 cp0master; /* Processor 0 Master Number Register */ u32 cp0count; /* Processor 0 Count Register */ u32 cp0cfg0; /* Processor 0 Configuration 0 Register */ u32 cp0cfg1; /* Processor 0 Configuration 1 Register */ u32 cp0cfg2; /* Processor 0 Configuration 2 Register */ u32 cp0cfg3; /* Processor 0 Configuration 3 Register */ u32 cp1type; /* Processor 1 Type Register */ u32 cp1num; /* Processor 1 Number Register */ u32 cp1master; /* Processor 1 Master Number Register */ u32 cp1count; /* Processor 1 Count Register */ u32 cp1cfg0; /* Processor 1 Configuration 0 Register */ u32 cp1cfg1; /* Processor 1 Configuration 1 Register */ u32 cp1cfg2; /* Processor 1 Configuration 2 Register */ u32 cp1cfg3; /* Processor 1 Configuration 3 Register */ u32 reserved_0x060[232]; u32 ocmdr0; /* On-Chip Memory Descriptor Register */ u32 reserved_0x404[2]; u32 ocmdr3; /* On-Chip Memory Descriptor Register */ u32 reserved_0x410[28]; u32 tcmdr[4]; /* Generic Tightly Coupled Memory Descriptor Register */ u32 reserved_0x490[28]; u32 cpce0; /* Core Parity Checking Enable Register 0 */ u32 reserved_0x504[191]; u32 ircp0ir; /* Interrupt Router CP0 Interrupt Register */ u32 ircp1ir; /* Interrupt Router CP1 Interrupt Register */ u32 reserved_0x808[6]; u32 ircpgir; /* Interrupt Router CPU Generate Interrupt Register */ u32 reserved_0x824[23]; u16 irsprc[176]; /* Interrupt Router Shared Peripheral Routing Control Register */ u32 reserved_0x9e0[136]; u32 iahbbe0; /* Gasket Burst Enable Register */ u32 reserved_0xc04[63]; u32 ipcge; /* Interconnect Parity Checking Global Enable Register */ u32 reserved_0xd04[3]; u32 ipce[4]; /* Interconnect Parity Checking Enable Register */ u32 reserved_0xd20[8]; u32 ipcgie; /* Interconnect Parity Checking Global Injection Enable Register */ u32 reserved_0xd44[3]; u32 ipcie[4]; /* Interconnect Parity Checking Injection Enable Register */ }; #endif /* __ASSEMBLY__ */ #endif /* __ASM_ARCH_IMX_REGS_H__ */
{ "pile_set_name": "Github" }
VRBO is part of the HomeAway family, the world leader in vacation rentals. We offer the largest selection of properties for any travel occasion and every budget. We’re committed to helping families and friends find a perfect vacation rental to create unforgettable travel experiences together. You will now have a $20.00 + tax per night resort fee and the refundable security deposit (Up To $100.00) due upon arrival. ******************************** 7 Day advance notice of arrival date required. Cancellation Policy: Cancel at least 30 days prior to arrival date - get a 100% refund. (Refund Amount Is Minus VRBO Fees We Incur) Cancel at least 14 days prior to arrival date - get a 50% refund. (Refund Amount Is Minus VRBO Fees We Incur) Cancel less than 14 days prior to arrival date - No Refund. Cancellations must be made by 12:00 PM CST(Central Standard Time) Bedrooms 2 Bedrooms Sleeps 6 Property Manager Chris Duval Member Since 2014 Speaks: english Calendar last updated: Dec 17, 2018 Amenities Children Welcome Bathrooms 2 Bathrooms Suitability limited accessibility House Rules Check-in: 4:00 PM Check-out: 10:00 AM Cancellation Policy 100% refund if canceled at least 30 days before arrival date. 50% refund if canceled at least 14 days before arrival date. 9 Reviews Excellent4.4/5 1 - 6 of 9 Nice, very clean, friendly service and very family oriented. 4/5 Stayed Mar 2018 Robert C.Bay St Louis, Ms It was very nice, my family and I really enjoyed it! Only thing is the Lagoon and shuffleboard Close early, like 7 so we didn’t get to do a lot of that being that we didn’t get back from the park till around that time, but other than that it’s truly a great place to stay!!!
{ "pile_set_name": "Pile-CC" }
Clinical characteristics of individuals with intellectual disability who have experienced sexual abuse. An overview of the literature. Sexual abuse in individuals with average IQ or above is associated with a wide range of behavioural, psychological and body-related characteristics. It is unknown whether individuals with intellectual disability (ID) and a history of sexual abuse suffer from similar clinical characteristics. The aim of the review is to provide an overview of the literature on the clinical characteristics of individuals with ID who have experienced sexual abuse. PubMed, Embase, PsycInfo, CINAHL, Cochrane Library and Web of Sciences were searched for relevant publications using terms related to concepts of "intellectual disability" and "sexual abuse". Two independent reviewers screened and selected articles for inclusion in the study, resulting in seven studies. The studies mostly reported behavioural and psychological characteristics such as aggression, self-injury, or posttraumatic stress, anxiety or depressive symptoms associated with sexual abuse in individuals with ID. None mentioned body-related characteristics. Similar to individuals with average IQ or above, sexual abuse in individuals with ID is associated with a broad range of behavioural and psychological characteristics. Conduct disorders, self-injury, inappropriate sexualised talk and poor feelings of personal safety seem to be more indicative for the ID population. Anxiety, depression and PTSD are prevalent in individuals with and without ID who both have experienced sexual abuse. Whether individuals with ID experience body-related characteristics is unclear.
{ "pile_set_name": "PubMed Abstracts" }
Lichen sclerosus in 68 patients with squamous cell carcinoma of the penis: frequent atypias and correlation with special carcinoma variants suggests a precancerous role. Lichen sclerosus, an unusual chronic mucocutaneous condition of the penis, has been found in association with invasive penile cancer, and squamous cell carcinoma has been reported in patients with longstanding lichen sclerosus. The aim of this study was to determine the anatomic distribution and prevalence of lichen sclerosus in patients with squamous cell carcinoma of the penis and to search for a correlation with special types of carcinomas. Clinical and pathologic data from 207 penectomy and circumcision specimens with squamous cell carcinomas and giant condylomas were evaluated, and 68 patients with lichen sclerosus were identified. Mean age was 61 years. The preferential anatomic site of lichen sclerosus was the foreskin, but other sites (glans and coronal sulcus) including urethra were also involved. Grossly, the lesions showed white-gray smooth or irregular patches and plaques adjacent to invasive cancers. Microscopically, the lesion was stromal-epithelial with atrophic and hyperplastic epithelium and edematous or densely eosinophilic hyalinized lamina propria. A variable band of lymphocytic infiltration beneath the sclerosis was noted. Lichen sclerosus were preferentially associated with non-human papillomavirus variants of squamous cell carcinoma. When lichen sclerosus was associated with malignancy, it often showed, in addition to the hyperplastic epithelium, a low-grade squamous intraepithelial lesion. These findings suggest that lichen sclerosus may represent preneoplastic condition for at least some types of penile cancers, in particular those not related to human papillomavirus.
{ "pile_set_name": "PubMed Abstracts" }
SPONSOR Be part of the team Our community of entrepreneurs could make the most of resources that more established companies can offer. We work with select companies to engage with our awesome, talented and growing community. If you'd like to play a part in what we do, get in touch on the forms below and we can see if we're a good fit.
{ "pile_set_name": "Pile-CC" }
Choosing Magnetic Water Treatment as science fair ideas or science project ideas would make it a very interesting subject. Perfect science fair projects for high school.Plant experiments on how plants grow as easy science fair projects for students. Good science fair projects because science fair experiments are interesting when few know about magnetic properties. These are the results you should acheive within weeks as yourscience fair ideas or science project ideas Copy the steps below if you are looking forscience fair ideas or science project ideas What you will need for your sceince fair ideas or sceince project ideas. If you want to make your sceince fair ideas or sceince project ideas easier, just use 2 seed growing trays, one for magnetic water and the other of standard tap water. Some seeds from your local nursery and that's it. Well, your will need aWater MagnetizerUnit too. We are running a new plant growth test with assistance from Cambridge University, but not much different from the plant growth test method shown below. So there shouldn't be much change to the growth results, just slightly more scientific. Pots I decided to have 2 different colour pots to identify which were going to be normal tap water and which were going to be the enhanced water magnetised through one of our water magnetizer units. I got 7 of each colour so there were going to be 14 separate growth experiments. Considerations: I did not decide which would be which until after the soil and seeds were in place to not have any biased approach. I flipped a coin to decide which was going to be which. Water Magnetizer We used our old water magnetizer design unit for this test which was 50 mm in length. The new water magnetizer design units now have higher strength neodymium magents plus the new units are 70 mm in length. Ensuring a far great increase in energising the water as it passes through the water magnetizer Growth Boost Units. We are in the process of running a new growth test with the assistance of Cambridge University advising a slight change in the growth test setup. This will ensure a slightly more scientific approach. This will be the method Cambridge University use for plant growth testing. Magnetic Water Treatment Agriculture Increased plant growth expectations We are not expecting to achieve a higher plant growth rate than our astonishing first test result of 29.63% plant growth increase. We will be extremely pleased to achieve the same results or possibly slightly less. (There is so little difference in the test setup) Coriander seeds I used 2 packs of the same seeds, bought from the same manufacturer on the same day. Consideration: To ensure there was an equal opportunity for the experiment I mixed the two bags together before allocating the seeds to their pots. Method I weighed out 50g of fertiliser (all from the same bag) into each of the 14 test pots. After which 15g of fertiliser was laid on top of the seeds in each test pot. Once I had them all topped up with the fertiliser I then flipped a coin to decide which colour pot would receive the magnetic water and which would receive the regular tap water. Through this method it was decided that the brown pots would receive the magnet water and the green pots would receive the regular water. To randomise the test further I then flipped the coin again to decide what order the test pots would be located on the trays. The final formation you can see in the bottom righthand image. Each test pot then received 10ml of water, the green pots receiving tap water using syringe 1 and the brown pots receiving magnetic water from syringe 2. Consideration: Syringes were used so I could accurately measure the water administered to each pot as well as reducing the possibility of cross over that may occur if I was to use a spray for administration. I used 2 separate syringes to make sure the water was always separated and the results would not be altered. The test pots were always watered at the same time with the same amount of water to each. Growth Tracker. Over the following 2 months I documented the growth of the samples. They first showed signs of sprouting on the 25 th of April. This was 18 days after planting the seeds. 25 th April (18 days after planting) 5 th May 2017 (28 days after planting) 9 th June 2017 (63 days after planting) Harvesting and Results of Magnetic Water Plant Growth Boost The test plants were harvested on the 9 th June 2017. I weighted each full pot first, then harvested all the growth that pot had received and weighed the cuttings on their own.Regular tap water I repeated the harvesting process outlined above for all the regular tap water fed plans then added them all together to get the combined weight. Combined weight of the regular tap water fed plants when harvested was 27g. Magnetised Water I repeated the harvesting process outlined above for all the magnetised water fed plans then added them all together to get the combined weight. Combined weight of the magnetised water fed plants when harvested was 35g. The percentage increase in plant growth from using the magnetic water is a whopping 29.63% Summary By using magnetic water to hydrate your plants you can expect to see an increase in growth, this experiment showed an increase in growth of 29.63% using the same amount of water.27g x 29.63% = 35g You could either use the same amount of water and see increased growth or you can theoretically use less water and receive the same level of growth.__________________________________________________________________ INTERESTING OBSERVATION It has started becoming standard practice to install MAGNETIC WATER CONDITIONERS in new builds by numberous large construction companies around United Kingdom This is the quickest way to grow grass and the easiest way to grow grass at a fraction of the cost of using costly lawn fertilizer, plus the labourinvolved in applying the grass fertilizer, plus having to repeat the process. MagnaEnergiser™ products feed natural lawn fertilizer every time you irrigate your lawn or plants, which is a perfect way to make grass greener and helps toregrow grass to make grass grow faster. There is no risk of over or under fertilizing either. The perfect mixture, every time. Saves having to work out the best time to fertilize lawn. On tap grass fertilizer, every time you turn on the tap. Perfect way to getting grass to grow. This is the best organic grass fertilizer because it is a natural lawn fertilizer.How convenient is that, plus our grass fertilizer lasts forever. Lifetime guarantee. MagnaEnergiser™ is a one-off cost with a Lifetime Guarantee. Saves water too.How can it save water? If you feed 29.63% less water for your plant/crop/lawn growth, you will achieve the same growth rate if you just used normal tap water. All MagnaEnergiser™ Products come with a lifetime guarantee plus a money-back guarantee if you are not totally saticefied with our product Installation ofMagnaEnergiser™ lawn fertilizer products: What this means is once you clip-on one of our MagnaEnergiser™ products to the mains water inlet to your property, you instantly get all the benefits as shown above right after clipping on the lawn fertilizerunit.We only recommend one lawn fertilizer unit per property but if you have a large, say 4 bedroom home, it would be beneficial to install, clip-on, one of our MagnaEnergiser™lawn fertilizerunits feeding your garden separately. MagnaEnergiser™ are tested and provennaturallawn fertilizerproducts which is aninline Water TreatmentSystem(no cutting of mains water supply, simply clip-on the unit onto the mains inlet pipe). Magnetic Water Treatmentwith no running or maintenance costs Hassle free,Fit it & Forget it,lawn fertilizer on tap Different lawn fertilizer sizes availableModern homes built in the past 15 years tend to have 25mm (blue PVC pipe) mains water supply. Older homes have either 15mm or 22mm pipes. 25mm unit will work perfectly on all sizes INTERESTING OBSERVATION It has started becoming standard practice to install MAGNETIC WATER CONDITIONERS in new builds by numberous large construction companies around United Kingdom Magnetic Water Treatment How does magnetic water treatment work? We use the most powerful magnetic water treatment magnets in the world called Neodymium magnets to create a water conditioning system when the magnetized water passes through the water softner which affects the bonding angle between the oxygen and hydrogen atom in the water molecules. The Magnetized water causes a reduced angle in the water atom between the oxygen/hydrogen bond from 104 to 103 degrees. Causing the water molecules to bond together in clusters of 6-7, rather than clusters of 10-12 or higher. The smaller clusters achieve better absorption of water across cell walls. This explains why our test results in plant growth exceeded our expectations with 29.63% increase in plant growth through the magnetic water treatment. (One of the many added benefits of our water conditioning system) MagnaEnergiser™Tested and Proven Magnetic Water Softening Water Treatment System to Boost Plant Growth How does Magnetic Water Treatment help with plant growth? In the same way our magnetic water treatment alters the water structure, making it softer (wetter so to speak) through the magnetic water process of passing water through a powerfull magnetic field. Water consists of the same H²O molecule but varies dependant on how these molecules bond together to form smaller magnetic water clusters. The smaller the clusters, the softer (wetter) the water becomes through our magnetic water treatment, making the water more absorbant for plant growth benefits. Image aboveshowing a microscopic photo of untreated water with hardness of 140 ppm(Parts Per Million) magnified 400x The next picture shows the effects after the water passes through the magnetic water treatment/conditioner unit Image above showing a microscopic photo of the same water after Magnetic Water Treatment is applied. Magnified 400x Picture shows magnetized water particles clustered together in smaller particles, keeping them in suspension and lowering the surface tension of the water and in doing so, softens the water. Making the water wetter, so to speak. (Magnetized water is held in suspension for ± 200 hours / 8 days) Magnetic Water Treatment The clustering of the magnetized water releases surface tension. Our Magnetic Water Treatment breaks the surface tension, softening the water through our water softener system. An easy observation can be seen when washing your car with normal tap water, the water beads up in droplets on the surfaces. After installing one of our water magnetizer units, the water will run off without creating these droplets on the surface, leaving the surface cleaner.Far less detergent used for washing up Detergent is used to break the surface tension, but using magnetized water helps break up the large molecular clusters apart and makes the water wetter and easier to clean surfaces, using far less detergent in the process. Lawn Fertilizer Price Advantages of our small lawn fertilizer units: Fits under the sink (most common place) out of the way and out of sight. Out of sight, out of mind.Maintenance free - additive free. DIY installation The cost of our magnetic water treatment unit is negligible if you consider it is a once off purchase. Our lawn fertilizer unit is a multifunctional product, adding value to your grass fertilizer purchase. If you look at our lawn fertilizer price in comparison to other lawn fertilizer and weigh up all the benefits we include, all in the same product, plus the ease and simplicity of the installation. You getting the best grass fertilizer on the market. Water Softener Installation DIY - easy water softener installation. Clips on in seconds.So easy to do the water softener installation yourself. NO TOOLS REQUIRED. Simply clip it on to your mains inlet pipe normally under the sink in the kitchen. Substantially reducing the water softener price. Whole House Water Softener Our Lawn Fertilizer units are actually water softener units based on the magnetic water treatment process (as explained earlier) when the water passes through the strong magnetic fields. We find many water softener companies arounf the world have their water softeners for sale advising or recommending you buy more than one unit. This obviously pushes up the water softener system cost. We recommend only one whole house water softener needed. Liquid Lawn Fertilizer Companies - (Water Softener Companies) Magna Energiser are one of many Liquid Lawn Fertilizer companies (water softener companies) around the world but we consider ourselves to have a unique copyrightLiquid Lawn Fertilizer (magnetic water softening) design making it so easy for our customers to install the Grass Fertilizer units themselves, saving any additional costs involved simply by opening up the unit and clipping it on the incoming water mains. Lawn Fertilizer- Grass Fertilizer For Sale MagnaEnergiserTM manufacture and distribute Lawn Fertilizer/Grass Fertilizer units from the United Kingdom. Having our Lawn Fertilizer/Grass Fertilizer for sale in the United Kindom does not effect the Lawn Fertilizer/Grass Fertilizerfor our international customers. We offer a world wide free delivey service to any country. Patent Rights on our water treatment system We were so impressed with this amazing water treatment system, we bought the patent rights to manufacture and market these water treatment products internationally, which we have successfully been doing since 2003. Making further improvements to the product over the years through our own R&D efforts. Chemical and Additive Free Magnetic Water Treatment - Conditioner We recommend - Only 1 unit per property required The unique design of our magnetic water treatment conditioner units allow for a range of pipe sizes to work on each unit. Check size before ordering. New Developments in the making/testing phase1. We working on developing a new maintenance free, self flushing, self cleaning water filtration system to remove limescale deposits within the mains water supply, after our Magnetic Water Descaler units.This will soften the water by removing the lime scale from the water2. Swimming pool water ph balancing. Which means far less chlorine usage. Far healthier and reduced monthly costs Eventually removing all traces of lime scale in your entire water system, cutting down on costly repairs and replacement of water heater elements in all your appliances. Boilers, power showers, shower heads, dish washer & clothes washing machines, coffee makers, kettles, irons ..... Reducing your electricity bill. Once the lime scale has been removed, the water heating elements do not have to heat the water through the layer of lime scale, dramatically improving efficiency and lifespan of the elements Additional benefits after installation of Magnetic Water Conditioner Health Effects from Magnetized Water Research carried out by NASA has demonstrated that astronauts who are cut off from the earth's magnetic field develop significant health problems which can be prevented by providing an artificial magnetic field within the space capsule. Read more.....http://www.yourhealthbase.com/mag_water.htm (To view, copy and paste above url into your brouwser) Water softener reviews consumer reports Mr Isaiah Lungu - Zambia We've already noticed the change; no scale seems to form in the kettle. We have installed the unit outside, how do they fair in rainfall. Should we cover them? Hi there. No problem with rain. The magnets have been nickel coated. No corrosion. But, we feel it would be beneficial to cover/seal the units up with plumbers Desil Tape or equivalent product in your country. Thanks for the feedback. Appreciated. Ingrid: Manager/owner ToftShop.co.uk Since installing one of your units I have been keeping an eye on our kettle from time to time to see if there are any improvements in reducing the lime scale buildup. The descaling doesn't work as fast as I was hoping for but it certainly is working. I'm impressed with the results thus far so over a period of time our water system should be flushed out. The installation was so easy I installed it myself. Hello. Thank you for safe delivery. The result is obvious, just as I expected. We have been in this new build home for 18months. The chalk buildup was evident very early on, but I had no time to address it. Already, the metal sink surface has been cleared, and cleaned of limescale. In particular, hot drinks have a cleaner taste - as though the water is a separate layer being tasted, allowing the flavours greater exposure. really great. So thank you for the 15+ years of research. The result is worth it. Kind regards Clive Walters Built To Last, FOREVEREvery Home Should Have a Magnetic Water Treatment System
{ "pile_set_name": "Pile-CC" }
// // UIWindow+Hierarchy.m // https://github.com/hackiftekhar/IQKeyboardManager // Copyright (c) 2013-16 Iftekhar Qurashi. // // Permission is hereby granted, free of charge, to any person obtaining a copy // of this software and associated documentation files (the "Software"), to deal // in the Software without restriction, including without limitation the rights // to use, copy, modify, merge, publish, distribute, sublicense, and/or sell // copies of the Software, and to permit persons to whom the Software is // furnished to do so, subject to the following conditions: // // The above copyright notice and this permission notice shall be included in // all copies or substantial portions of the Software. // // THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR // IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, // FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE // AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER // LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, // OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN // THE SOFTWARE. #import "IQUIWindow+Hierarchy.h" #import <UIKit/UINavigationController.h> @implementation UIWindow (IQ_UIWindow_Hierarchy) - (UIViewController*)topMostController { UIViewController *topController = [self rootViewController]; // Getting topMost ViewController while ([topController presentedViewController]) topController = [topController presentedViewController]; // Returning topMost ViewController return topController; } - (UIViewController*)currentViewController; { UIViewController *currentViewController = [self topMostController]; while ([currentViewController isKindOfClass:[UINavigationController class]] && [(UINavigationController*)currentViewController topViewController]) currentViewController = [(UINavigationController*)currentViewController topViewController]; return currentViewController; } @end
{ "pile_set_name": "Github" }
## # This code was generated by # \ / _ _ _| _ _ # | (_)\/(_)(_|\/| |(/_ v1.0.0 # / / # # frozen_string_literal: true module Twilio module REST class Voice < Domain class V1 < Version ## # PLEASE NOTE that this class contains preview products that are subject to change. Use them with caution. If you currently do not have developer preview access, please contact [email protected]. class DialingPermissionsList < ListResource ## # Initialize the DialingPermissionsList # @param [Version] version Version that contains the resource # @return [DialingPermissionsList] DialingPermissionsList def initialize(version) super(version) # Path Solution @solution = {} # Components @countries = nil @settings = nil @bulk_country_updates = nil end ## # Access the countries # @param [String] iso_code The {ISO country # code}[https://en.wikipedia.org/wiki/ISO_3166-1_alpha-2] of the # DialingPermissions Country resource to fetch # @return [CountryList] # @return [CountryContext] if iso_code was passed. def countries(iso_code=:unset) raise ArgumentError, 'iso_code cannot be nil' if iso_code.nil? if iso_code != :unset return CountryContext.new(@version, iso_code, ) end @countries ||= CountryList.new(@version, ) end ## # Access the settings # @return [SettingsContext] SettingsContext def settings return SettingsContext.new(@version, ) end ## # Access the bulk_country_updates # @return [BulkCountryUpdateList] # @return [BulkCountryUpdateContext] def bulk_country_updates @bulk_country_updates ||= BulkCountryUpdateList.new(@version, ) end ## # Provide a user friendly representation def to_s '#<Twilio.Voice.V1.DialingPermissionsList>' end end ## # PLEASE NOTE that this class contains preview products that are subject to change. Use them with caution. If you currently do not have developer preview access, please contact [email protected]. class DialingPermissionsPage < Page ## # Initialize the DialingPermissionsPage # @param [Version] version Version that contains the resource # @param [Response] response Response from the API # @param [Hash] solution Path solution for the resource # @return [DialingPermissionsPage] DialingPermissionsPage def initialize(version, response, solution) super(version, response) # Path Solution @solution = solution end ## # Build an instance of DialingPermissionsInstance # @param [Hash] payload Payload response from the API # @return [DialingPermissionsInstance] DialingPermissionsInstance def get_instance(payload) DialingPermissionsInstance.new(@version, payload, ) end ## # Provide a user friendly representation def to_s '<Twilio.Voice.V1.DialingPermissionsPage>' end end ## # PLEASE NOTE that this class contains preview products that are subject to change. Use them with caution. If you currently do not have developer preview access, please contact [email protected]. class DialingPermissionsInstance < InstanceResource ## # Initialize the DialingPermissionsInstance # @param [Version] version Version that contains the resource # @param [Hash] payload payload that contains response from Twilio # @return [DialingPermissionsInstance] DialingPermissionsInstance def initialize(version, payload) super(version) end ## # Provide a user friendly representation def to_s "<Twilio.Voice.V1.DialingPermissionsInstance>" end ## # Provide a detailed, user friendly representation def inspect "<Twilio.Voice.V1.DialingPermissionsInstance>" end end end end end end
{ "pile_set_name": "Github" }
Payment cards, e.g., debit cards, credit cards, and the like, provide a convenient and widely used payment mechanism at merchant locations around the world. Transactions using a payment card are very often conducted electronically. A merchant location may have one or more terminal devices equipped to read data from a magnetic strip on a payment card, e.g., when the card is “swiped.” A terminal device may be connected to a network, and may thereby communicate with a payment processor. The payment processor may in turn communicate with the issuing institution via the network or some other network. Processing rules for different payment cards may be different. For example, present merchant terminals may be configured to process credit card transactions differently than debit card transactions. However, present merchant terminals have not been configured to differentiate between various kinds of payment cards, but rather have required user input or a query to a payment processor to make such differentiation. Either way, use of payment terminals has been inefficient and cumbersome with respect to determining a type of payment card. Further, different kinds of debit cards, e.g., pin-based debit cards and signature debit cards (also sometimes referred to as check cards) have historically been treated differently. For example, pin-based debit cards have historically been associated with being able to assess a service fee charged by a merchant, whereas signature debit cards, due to card payment network restrictions, have not.
{ "pile_set_name": "USPTO Backgrounds" }
Q: Oracle: Overwrite values in a column with the longest string I’m running into a problem. Say, I have columns called “C1, C2, C3....” in a table. I’d like to use the longest string in C1 to replace every other cells in C1 column without disturbing other columns. I tired several ways but I cannot get my Oracle code run. Could someone please show me a sample code to do this problem? I typed my question using a cellphone so I apologize for not showing you my code. But I think my description is fine... Thank you! A: For example: SQL> select * from test; DEPTNO DNAME LOC ---------- -------------- ------------- 10 ACCOUNTING NEW YORK 20 RESEARCH DALLAS 30 SALES CHICAGO 40 OPERATIONS BOSTON SQL> update test set 2 dname = (select max(dname) --> MAX fixes TOO-MANY-ROWS because ACCOUNTING 3 from test -- and OPERATIONS have same length 4 where length(dname) = (select max(length(dname)) 5 from test 6 ) 7 ); 4 rows updated. SQL> select * from test; DEPTNO DNAME LOC ---------- -------------- ------------- 10 OPERATIONS NEW YORK 20 OPERATIONS DALLAS 30 OPERATIONS CHICAGO 40 OPERATIONS BOSTON SQL> [EDIT, GROUP BY] Another example is based on a different table, which reflects what you described in a comment. The DEPTNO (department number) is used to "group" employees, and I'm going to update the JOB column value to the longest job name within that department. Query is similar to the previous one; it just joins appropriate columns (DEPTNO) throughout code. Sample data: SQL> select * from test order by deptno, ename; DEPTNO ENAME JOB ---------- ---------- --------- 10 CLARK MANAGER KING PRESIDENT --> the longest in DEPTNO = 10 MILLER CLERK 20 ADAMS CLERK FORD ANALYST JONES MANAGER --> as long as ANALYST, but MAX(JOB) will return this value SCOTT ANALYST SMITH CLERK 30 ALLEN SALESMAN --> the longest in DEPTNO = 30 BLAKE MANAGER JAMES CLERK MARTIN SALESMAN TURNER SALESMAN WARD SALESMAN Update and the result: SQL> update test t set 2 t.job = (select max(t1.job) 3 from test t1 4 where t1.deptno = t.deptno 5 and length(t1.job) = (select max(length(t2.job)) 6 from test t2 7 where t2.deptno = t1.deptno 8 ) 9 ); 14 rows updated. SQL> select * from test order by deptno, ename; DEPTNO ENAME JOB ---------- ---------- --------- 10 CLARK PRESIDENT KING PRESIDENT MILLER PRESIDENT 20 ADAMS MANAGER FORD MANAGER JONES MANAGER SCOTT MANAGER SMITH MANAGER 30 ALLEN SALESMAN BLAKE SALESMAN JAMES SALESMAN MARTIN SALESMAN TURNER SALESMAN WARD SALESMAN
{ "pile_set_name": "StackExchange" }
Gentle Family Chiropractic Read the Labels Just about every packaged food made in the U.S. has a food label indicating serving size and other nutritional information. Learning how to read food labels is like looking at a prescription for your health and your life. We recommend looking for red-flag ingredients- if a Hall of Shame ingredient is listed among the top five ingredients overall, steer clear! Just about every packaged food made in the U.S. has a food label indicating serving size and other nutritional information. The "Nutrition Facts" food labels are intended to give you information about the specific packaged food in question. Measurements of fat, cholesterol, sodium, carbohydrate, protein, vitamins and minerals are calculated for a "typical portion." But, reading these labels can be confusing. Below are some explanations of its components. Serving Size. Serving sizes are based on the amount of food people typically eat, which makes them realistic and easy to compare to similar foods. This may or may not be the serving amount you normally eat. It is important that you pay attention to the serving size, including the number of servings in the package and compare it to how much you actually eat. The size of the serving on the food package influences all the nutrient amounts listed on the top part of the label. For example, if a package has 4 servings and you eat the entire package, you quadruple the calories, fat, etc. that you have eaten. Calories and Calories From Fat. The number of calories and grams of nutrients are provided for the stated serving size. This is the part of the food label where you will find the amount of fat per serving. Nutrients. This section lists the daily amount of each nutrient in the food package. These daily values are the reference numbers that are set by the government and are based on current nutrition recommendations. Some labels list daily values for both 2,000 and 2,500 calorie diets. "% Daily Value" shows how a food fits into a 2,000 calorie/day diet. For diets other than 2,000 calories, divide by 2,000 to determine the % Daily Value for nutrients. For example, if you are following a 1,500 calorie diet, your % Daily Value goal will be based on 75% for each nutrient, not 100%. For fat, saturated fat and cholesterol, choose foods with a low % Daily Value. For total carbohydrates, dietary fiber, vitamins and minerals, try to reach your goal for each nutrient. Ingredients. Each product should list the ingredients on the label. They are listed from largest to smallest amount (by weight). This means a food contains the largest amount of the first ingredient and the smallest amount of the last ingredient. Label Claim. Another aspect of food labeling is label claims. Some food labels make claims such as "low cholesterol" or "low fat." These claims can only be used if a food meets strict government definitions.
{ "pile_set_name": "Pile-CC" }
Where did you study? Ousedale School in Newport Pagnell, where I completed my GCSEs. What was your first job? I count myself very lucky to have been one of the last school leavers to be accepted onto a Railway Training Scheme with Network Southeast, now London Midland. This not only introduced me to the workplace, in a very male industry, but gave me the opportunity to experience lots of different placements across the network, enabling me to decide the career direction I wanted to follow. I felt I could opt for any job. However, rather than becoming a train driver, I chose an office role. What I learned there provided a strong foundation for the career I eventually pursued. It was common in those days (around 1990), to leave school and get a job straight away. Today, things are obviously different, with a much higher percentage of people going to University. Where do you work now? Bitzer UK Ltd, based in Milton Keynes, as Personal Assistant to the Managing Director. What attracted you to the industry? I was attracted to the role initially, and I have learned a lot about the industry since I joined. I am very pleased to be part of the industry - people are friendly and positive, and keen to get on and work together to make a success of it. What do you specialise in now? The great thing about my job is that it is extremely varied, so no two days are ever the same. My main role and priority is Personal Assistant to Kevin Glass. Beyond that, I get involved with marketing, health and safety, co-ordinating the Bitzer UK training scheme, travel arrangements for the team and anything else that may come up in the day. I am also very pleased and excited to have recently become the Chair of the Steering Group for Women in RACHP, an initiative of the Institute of Refrigeration. What excites/interests you about the industry? I believe this is a great time to be joining the industry. Not only have people acknowledged that we need to do more to appeal to women, in order to attract them into the industry, but people are starting to work together to explore practical ways of doing this. On the technical side, the innovations I see being developed around me are fascinating. To give one recent example: Bitzer UK recently worked in collaboration with a customer, G&O Refrigeration, to develop a new high efficiency refrigeration system for Milton Keynes Ice Rink. The project won the Project of the Year Award in the recent National ACR Heat & Pump awards. It was a proud moment for everyone involved. Where do you see your career developing? I find the Personal Assistant role at this level in a high quality company such as Bitzer UK rewarding and challenging. I have been here 11 months and thoroughly enjoy my work. I would like to continue to develop my skills and knowledge in the role for some time. What is the best piece of advice you were ever given? Be punctual, professional, presentable and polite. If you go by that mantra, it will do you proud. What challenges does the industry face? Again, I have to mention diversity. I believe it is entirely achievable to gain a more diverse workforce. Engineering-related industries, such as refrigeration and air conditioning, need to have a fresh think about how they ‘sell’ themselves to young people. We need to make much clearer the massive difference that refrigeration makes to the world, and how our quality of life – indeed civilisation – depends on it. Another key area is obviously the environment, and the industry’s role in safeguarding the planet for future generations. This is very much on the industry’s agenda, I know, and I would like to see it made a priority. Improved design, best practice and constant innovation are the keys to maintaining momentum and building on the industry’s achievements in this vital field. What are the benefits of being in your role? Because I work in a small team, I can see the difference my contributions make to the company. Last November, I was lucky enough to travel to Head Office in Sindelfingen, Germany, to work with my colleagues there. This not only gave me an insight to our global operations, but it was great to meet people I was working with long-distance. I was able to clarify any queries I had face-to-face, and it helped me feel part of the bigger picture. At Bitzer in Germany we have our own art gallery, Schauwerk Sindelfingen, which consists of art and cultural artefacts, primarily from the 20th and 21st centuries, collected by our late owner and CEO Peter Schaufler and his wife Christiane Schaufler-Münch. It was an amazing experience and privilege to have a private tour around the current exhibition. The Schaufler Foundation, established in 2005 by Peter Schaufler, will continue his life’s work, uniting entrepreneurship, vocational training and university teaching with research, science and art. What industry associations and activities are you involved with, and what are the benefits? As mentioned, I am involved with the IOR’s Women in RACHP initiative. We are planning a special training event to coincide with International Women in Engineering Day, on 23 June 2017. This will take the form of a training course for non-technical women working in the industry. The day will be split into two parts: The morning session will give delegates an opportunity to closely examine a refrigeration system and do some practical work; the afternoon session will focus on career development for women in engineering. We are very much in the planning stage, and will publicise it in the very near future. What would you say to other women who are considering coming into the ACR industry? I think it is a great industry to join with lots of opportunity. No area of work should be ignored or passed over as a result of being perceived as a ‘male’ industry. I have met some great people in the last 11 months on all levels, and thoroughly enjoy my job. I would encourage anyone with an interest to join the ACR industry. We value your privacy We use cookies to improve your experience of this website by remembering your usage preferences, collecting statistics, and targeting relevant content. If you continue to use this site we’ll assume you’re happy to receive all cookies. We value your privacy We use cookies to improve your experience of this website by remembering your usage preferences, collecting statistics, and targeting relevant content. If you continue to use this site we’ll assume you’re happy to receive all cookies.
{ "pile_set_name": "Pile-CC" }
Man it all started last summer with a RO150. Then a RO90 and a bunch of sandpaper for both. This year it all went...downhill . A new Kapex (to take advantage of the 10% sale they had back in March), then an MFT3, the OF 2200 router then the MFK 700, the OF1400 and LR32, the Carvex and all the extra bases... it has become a blur for me now...I know I have spent well over 6K on Festool this year alone and do not regret anything. And to think I was one of (ignorant) critics of this company a few years ago... I wish I could remember! The last two years have been a GREEN blur! After the CXS, it 'might' have been the T18+3, but I truly can't remember what was #2. Cheers, Frank Out of a wealth of curiosity, and a spat of boredom.... I went back to all my purchase invoices to see if I could answer the original question. Success! The second Festool I bought was an ETS 125 Sander one month after the CXS first purchase, and thereafter I found I needed a better ShopVac/Dust Collector, and that's when the Green Disease started in earnest! Not Kidding!! Well, hey Chrisprols, welcome to the FOG forum. Looks like you're on your way with some good Festool kit. It's been a long time, but I think my first/second purchase was not quite identical, but similar to many others on here: a Ts75 saw, the old style MFT table, and a CT vacI see you're from France so: "Bienvenue!" added PS to the other members:I couldn't help but notice the post above the last one. Whatever happened to the blue elf guy--does anyone know? He seemed pretty gung-ho about the whole Festool brand and very enthusiastic to detail all his purchases. I don't recall seeing any posts by him recently. Did he flame out and got hooked on some other type of buying spree? I do remember that he had some amusing threads--has anyone kept in touch with the guy? It'd be a shame for Festool / FOG to lose the captain of its cheerleading team.
{ "pile_set_name": "Pile-CC" }
package com.yibao.music.adapter; import androidx.recyclerview.widget.RecyclerView; import android.view.View; import android.widget.LinearLayout; import android.widget.RelativeLayout; import android.widget.TextView; import com.yibao.music.MusicApplication; import com.yibao.music.R; import com.yibao.music.base.BaseRvAdapter; import com.yibao.music.model.AddAndDeleteListBean; import com.yibao.music.model.MusicBean; import com.yibao.music.util.Constants; import com.yibao.music.util.LogUtil; import com.yibao.music.util.RxBus; import com.yibao.music.util.StringUtil; import java.util.List; import butterknife.BindView; import butterknife.ButterKnife; /** * Des:${快速列表的Adapter} * Time:2017/8/22 14:31 * * @author Stran */ public class BottomSheetAdapter extends BaseRvAdapter<MusicBean> { public BottomSheetAdapter(List<MusicBean> list) { super(list); } @Override protected String getLastItemDes() { return " 首歌"; } @Override protected void bindView(RecyclerView.ViewHolder holder, MusicBean musicItem) { if (holder instanceof MusicHolder) { MusicHolder musicHolder = (MusicHolder) holder; musicHolder.mMusicName.setText(musicItem.getTitle()); String unknownName = "<unknown>"; musicHolder.mMusicSinger.setText(unknownName.equals(musicItem.getArtist()) ? "Smartisan" : musicItem.getArtist()); musicHolder.mFavoriteTime.setText(StringUtil.getFormatDate(Long.valueOf(musicItem.getTime()))); int position = musicHolder.getAdapterPosition(); // 侧滑删除收藏歌曲 musicHolder.mDeleteLayout.setOnClickListener(v -> { musicItem.setFavorite(false); MusicApplication.getIntstance().getMusicDao().update(musicItem); RxBus.getInstance().post(new AddAndDeleteListBean(Constants.NUMBER_FIVE, position, musicItem.getTitle())); }); // MusicBottomSheetDialog页面接收,用于播放收藏列表中点击Position的音乐 musicHolder.mRootBottomSheet.setOnClickListener(view -> RxBus.getInstance().post(Constants.FAVORITE_POSITION, position)); } } @Override protected RecyclerView.ViewHolder getViewHolder(View view) { return new MusicHolder(view); } @Override protected int getLayoutId() { return R.layout.bottom_sheet_music_item; } @Override public int getPositionForSection(int i) { return 0; } @Override public int getSectionForPosition(int i) { return 0; } static class MusicHolder extends RecyclerView.ViewHolder { @BindView(R.id.favorite_music_name) TextView mMusicName; @BindView(R.id.favorite_artist_name) TextView mMusicSinger; @BindView(R.id.favorite_time) TextView mFavoriteTime; @BindView(R.id.delete_item) LinearLayout mDeleteLayout; @BindView(R.id.root_favorite_bottom_sheet) RelativeLayout mRootBottomSheet; MusicHolder(View view) { super(view); ButterKnife.bind(this, view); } } }
{ "pile_set_name": "Github" }
The use of needles in the practice of anesthesiology and the effect of a needleless intravenous administration system. Anesthesia personnel are at risk for occupationally acquired blood-borne infections transmitted through needlestick injuries. To formulate strategies for the prevention of needlestick injuries, it is necessary to identify the types of needles used by anesthesia personnel and the devices associated with injuries. The introduction of a needleless intravenous (i.v.) administration system provided an opportunity to assess its effect on needle usage in the practice of anesthesiology. The contents of needle disposal containers placed in the preoperative holding area and five operating rooms before (control) and after the introduction of a needleless administration system (study) were categorized by needle type. The information on needles used by anesthesia personnel was compared with that on needles purchased for the entire hospital. During the control period, most of the needles used were 18-23-gauge hollow needles (51.6%), i.c. catheter stylets (23%), and 25-26-gauge small-bore hollow needles (17.1%). There was no difference in the total number of needles collected after the introduction of the needleless administration system, but there was an increase in capped 18-23-gauge hollow needles. Anesthesia personnel used a relatively greater number of small-bore hollow needles (25-26 gauge), i.v. catheters, and spinal and epidural needles, but fewer hollow needles (18-23 gauge) than were purchased for hospital-wide use. Small-bore hollow needles (25-26 gauge) were responsible for 31.6% of the 19 needlestick injuries reported by anesthesia personnel to the Employee Health Service.(ABSTRACT TRUNCATED AT 250 WORDS)
{ "pile_set_name": "PubMed Abstracts" }
Vegan recipes for the hippie in all of us Restaurant Review – Tibits London I’ve lived in London now for almost 7 years and having been vegan for 3 of those I’ve discovered my fair share of tantalising vegan and vegetarian food jaunts. The one, however, that I resisted going to for such a long time was Tibits; a very well-known veggie haven amongst plant-based peeps in the know. Somewhere in my past I developed an irrational fear of buffet dining (ok, it was the $4 Chinese buffet in an inner-city Melbourne basement) and even though I had heard good things, the fear held tight! It’s for this reason that I am thrilled to report that this lovely establishment on Heddon Street (right off Regent) has well and truly reversed my negative opinion of the humble buffet. Apologies now for the phone pictures, I didn’t have the beastly Nikon with me! On a bright and cold night in December, there is really nothing like walking down Regent Street, with its glory on display lit up in warm Christmas lights and the hum and buzz of excited tourists and reckless locals clambering around with their arms overflowing with shopping bags. Turn off onto Heddon Street, away from the frenzy, and you enter into a little culinary oasis with a number of impressive-looking eateries. Here you find Tibits with a welcoming facade of large windows and low lighting. The outdoor seating area too would provide diners with a perfect setting for lunch or dinner in slightly warmer months! On entering, we were met with a very friendly waiter who showed us to our table, within view of the sumptuous ‘food boat’ (a fancier ring to it than buffet!). He explained that once you serve yourself from the array of dishes, you take your plate to the bar, order drinks, pay up and you’re good to go. (Cost is by weight). Everything was freshly prepared and there was no sign of that dreaded out-of-date looking produce or dried edges that sometimes accompanies a buffet. The wedges were perfectly crispy and seasoned (and heavenly when dipped in the beet hummus can I suggest!); the pasta salad was moorish as was the creamy avocado salad. The fattiness of the onion rings and falafel were offset by the crisp carrot salad and fresh green beans that were wonderfully mixed in a not-too-salty dressing. The food boat is also loaded with a variety of sauces, condiments for salads, dips and fresh bread; all of which found an accompanying main or salad on my plate to cosy up to! Although the salads were delightful, it would have been nice on such a cold evening to have a few more hot dishes, but as the lovely manager informed me, each day the menu can change and so this may just be another reason for me to return and sample some more delicious cuisine! The restaurant itself has a warm and exotic atmosphere, with a well-designed interior and furniture. I was thankful for the comfortable setting as we were there for over an hour gorging ourselves on all Tibits had to offer; which, I should not forget to mention, included a pint of Freedom organic lager during and a cup of green tea for after – what can I say, there was an eclectic theme to the evening! Both I and my partner had a great time and with the news that they now have VEGAN days at the restaurant (where everything on the boat is animal product-free; next one is 15 December) I will certainly be returning and will in fact become a regular no doubt, as they offer breakfast, lunch and dinner – all with the option to take-away also. I strongly suggest to all my London/UK readers, next time you are having a bit of a shopping spree down Oxford or Regent street, that you rest those tired feet and calm those grumbling tummies with a stop in at Tibits – the cuisine, whilst being delicious and (mostly) plant-based, is the perfect refuel food for getting back out there and tackling the high street. And for those international readers, perhaps travelling here, put Tibits on the to-do list; your taste buds and bellies will thank you. Your email address will not be published. Required fields are marked * Comment Name * Email * Website Welcome and thanks for stopping by! Before I was vegan, I would often mock those who were as 'mung-bean loving hippies' - terrible I know! Now that I have seen the light I couldn't love these little legumes more and here now display - my Ode to Mung beans! Enjoy!
{ "pile_set_name": "Pile-CC" }
Q: Query data that does not fulfill constraints in table in Oracle DB In Oracle I have a lot of tables in a given schema. Some of the table constraints in the schema have been disabled. I have to know for all tables in a given schema with any of the constraints deactivated, what are the (data) rows that would not fulfil the deactivated constraints. Question Is there a way to easily collect all the rows that would produce an error if I were to decide to enable the constraints again? So far, I would try to go constraint by constraint, create a query for each table and run the query. But I wonder whether there is anything that may do the work quickly and less error prone. If possible, the solution should use the information available in view USER_CONSTRAINTS or any similar one. I have checked the constraint documentation in Oracle, in which the constraint clause may use ENABLE NOVALIDATE, which allows for having non-compliant rows of data for the existing values until they are modified. However, I am looking for a solution that would allow me to fix the data before I re-enable the constraints. A: Reporting Constraint Exceptions You must create an appropriate exceptions report table to accept information from the EXCEPTIONS option of the ENABLE clause before enabling the constraint. You can create an exception table by executing the UTLEXCPT.SQL script or the UTLEXPT1.SQL script. The following statement attempts to validate the PRIMARY KEY of the dept table, and if exceptions exist, information is inserted into a table named EXCEPTIONS: ALTER TABLE dept ENABLE PRIMARY KEY EXCEPTIONS INTO EXCEPTIONS; If duplicate primary key values exist in the dept table and the name of the PRIMARY KEY constraint on dept is sys_c00610, then the following query will display those exceptions: SELECT * FROM EXCEPTIONS; The following exceptions are shown: fROWID OWNER TABLE_NAME CONSTRAINT ------------------ --------- -------------- ----------- AAAAZ9AABAAABvqAAB SCOTT DEPT SYS_C00610 AAAAZ9AABAAABvqAAG SCOTT DEPT SYS_C00610
{ "pile_set_name": "StackExchange" }
Kinetics of [11C]N,N-dimethylphenylethylamine in mice and humans: potential for measurement of brain MAO-B activity. Carbon-11-labeled N,N-dimethylphenylethylamine ([11C]DMPEA) was synthesized by the reaction of N-methylphenylethylamine with [11C]methyl iodide. This newly synthesized radiotracer was developed for the purpose of in vivo measurement of monoamine oxidase-B activity in the brain using a metabolic trapping method. Initially, biodistribution was investigated in mice. The rapid and high uptake of 11C radioactivity in the brain was observed following intravenous injection of [11C]DMPEA, the peak of which was reached at 1 min, followed by a decrease at 1-5 min and slowly thereafter. The kinetics of [11C]DMPEA in the human brain were determined using positron emission tomography (PET) and showed that 11C radioactivity increased gradually over 60 min following initial rapid uptake of 11C radioactivity, with basal ganglia and thalamus showing high accumulation.
{ "pile_set_name": "PubMed Abstracts" }
Kleinschnittger Kleinschnittger was a German company that between 1950 and 1957 produced microcars. They were powered by a 125 cc single cylinder two-stroke engine that produced and a top speed of . It was very fuel efficient and consumed less than 3 litres per 100 km (~.79 US gal per 60 mi). The body was in aluminium. The F250 was fitted with a 250 cc engine from ILO giving . It is alleged that it was also made in Belgium under the name Kleinstwagen and in the Netherlands as the Alco. Category:Microcars Category:Defunct motor vehicle manufacturers of Germany
{ "pile_set_name": "Wikipedia (en)" }
Order entered January 2, 2014 In The Court of Appeals Fifth District of Texas at Dallas No. 05-13-01086-CR DANIEL RUBIN HILLIN, Appellant V. THE STATE OF TEXAS, Appellee On Appeal from the Criminal District Court No. 4 Dallas County, Texas Trial Court Cause No. F12-34374-K ORDER Appellant’s December 27, 2013 motion for extension of time to file a reply brief is GRANTED. The time to file appellant’s reply brief is EXTENDED to February 5, 2014. /s/ LANA MYERS JUSTICE
{ "pile_set_name": "FreeLaw" }
High sensitivity detection of targets and in particular of biomarkers has been a challenge in the field of biological molecule analysis, in particular when aimed at detection of a plurality of targets and/or at detection of target of a certain dimension or present in the sample at a low concentration. Whether for pathological examination or for fundamental biology studies, several methods are commonly used for the detection of various classes of biomaterials and biomolecules. Some of the techniques most commonly used in the laboratory for detection of single biological targets include gel electrophoresis, polyacrylamide gel electrophoresis (PAGE), western blots, fluorescent in situ hybridization (FISH), Florescent activated cell sorting (FACS), Polymerase chain reaction (PCR), and enzyme linked immunosorbent assay (ELISA). These methods have provided the ability to detect one or more biomarkers in biological samples such as tissues and are also suitable for diagnostic purposes. Subsequent polynucleotide encoding approaches, developed by Applicants, provided improvements over previous techniques, and in particular, allowed performance of a highly sensitive and selective multiplex detection of targets.
{ "pile_set_name": "USPTO Backgrounds" }
This invention relates generally to fluid power systems and more particularly to a fluid power assisted steering system for a vehicle. A prior art fluid power assisted vehicle steering system typically includes a pair of fluid actuated cylinders connected to vehicle wheels, a fluid reservoir, and a pump for pressurizing fluid in the system. An operator responsive control valve is in the system for controlling fluid flow to the cylinders selectively to effect vehicle steering. Fluid flow lines connect the system's components and define one or more continuous fluid circuits. There have been proposals for systems which will remain operative even though a portion of such system is either damaged and non-functioning or malfunctioning. A problem which these proposals have sought to overcome is rupture of a fluid line with consequent loss of all or substantially all of the pressurized fluid in the system. Such proposals have included independent fluid circuits or isolatable circuit sections. Should damage occur to one circuit or circuit section, that damaged circuit or section is to be isolated from the rest of the system. The remainder of the system is to remain integral and retain as much of the system's fluid as possible. There have been proposals for circuit isolation which take place either manually or automatically. One proposed power steering system incorporating an automatic cutoff for an independent circuit is disclosed in U.S. Pat. No. 3,865,211 issued to Liebert et al. Liebert et al discloses a two cylinder system where the cylinders are disposed in a series fluid flow relation. When the vehicle is steering, pressurized fluid is directed from the pump to only one of the cylinders and that cylinder powers the vehicle steering. During normal operation a primary circuit conducts pressurized fluid from the pressurized fluid source to one chamber of the appropriate one of the cylinders and a fluid resevoir receives fluid back from one chamber of the other cylinder. In response to pressurized fluid entering and leaving the cylinder chambers communicating with the pressurized fluid source, a secondary circuit acts as a slave circuit merely shifting fluid back and forth between the cylinder chambers which are not communicating with the pressurized fluid source. Should there be a rupture in a portion of the circuit conducting pressurized fluid between the pressurized fluid source and either of the cylinders, that circuit portion and the associated cylinder are automatically cut out of the circuit and the pressurized fluid normally conducted through that portion is diverted to the slave circuit and passes to the chamber of the other cylinder communicating with that slave circuit.
{ "pile_set_name": "USPTO Backgrounds" }
Firuzabad, Sirjan Firuzabad (, also Romanized as Fīrūzābād) is a village in Balvard Rural District, in the Central District of Sirjan County, Kerman Province, Iran. At the 2006 census, its existence was noted, but its population was not reported. References Category:Populated places in Sirjan County
{ "pile_set_name": "Wikipedia (en)" }
In the nuclear industry it is often necessary to accomplish hermetically sealed electrical connections in extremely harsh environments characterized by high radiation levels, steam saturated air, and temperature and pressure extremes. In such harsh environments conventional electrical connectors often prove unsuitable. Even those connectors which accomplish a hermetically sealed connection often are unable to withstand the temperature and pressure extremes, or the effects of high radiation levels. Further, those connectors which have been devised to withstand the rigors of such harsh environments tend to be complex, bulky devices which are difficult to install and maintain. Therefore, it is an object of the present invention to provide an improved electrical connector for releasably connecting a plurality of electrical wires. It is another object of the present invention to provide an improved electrical connector which can maintain a hermetically sealed electrical connection in an environment characterized by high radiation levels, steam saturated air, and temperature and pressure extremes. A further object of the present invention is to provide an improved electrical connector comprising a pair of connector halves, and locking means for releasably locking the connector halves together to avoid inadvertent disconnection. It is yet another object of the present invention to provide an improved electrical connector with a streamline design, allowing such connector to be inserted through small apertures. Still a further object of the present invention is to provide an electrical connector which is inexpensive to manufacture and maintain.
{ "pile_set_name": "USPTO Backgrounds" }
Bruce Momjian <[EMAIL PROTECTED]> writes: > I think there was an updated BSD license approved by Berkeley that > we are using. I think this is an area where we need a higher degree of certainty than that. > If we took the file unchanged, I would not remove the copyright > because it is the file _unchanged_, no? It's the license, not the copyright attribution, that is the question. I also don't see how it makes any difference whether the files are modified (although at least some of these files _have_ been modified since being imported: e.g. src/port/qsort.c). To summarize, my understanding is that there are two problems: (1) Some of the files in the main source tree are 4 clause BSD. Since PostgreSQL is "derived" from these files, we fall under its licensing restrictions, namely the advertising clause. We can solve this by getting the license on these files changed to 3 clause BSD, or by removing the files from the tree. Checking the current NetBSD CVS tree, it seems that they switched to 3 clause BSD at some point after we imported the files in question: http://cvsweb.netbsd.org/bsdweb.cgi/src/lib/libc/stdlib/qsort.c So it seems kosher to change the license on the NetBSD-derived files to 3 clause BSD. That leaves the contrib/ stuff, but since we still have GPL licensed code in there, I don't think we need worry about it. (2) Is the 3 clause BSD license identical to the PostgreSQL license? It looks superficially dissimilar to me, but Bruce thinks that ours is an "updated" version of the BSD license. If that's the case we should be okay; if it's not, we may not be. This needs to be confirmed. (And, of course, IANAL...) -Neil ---------------------------(end of broadcast)--------------------------- TIP 4: Don't 'kill -9' the postmaster
{ "pile_set_name": "Pile-CC" }
Q: How to use `quick-error` with boxed error types? Problem Description I am trying to use quick_error like this: #[macro_use] extern crate quick_error; use std::error::Error; use std::io; fn main() { quick_error!{ #[derive(Debug)] pub enum MyError { Io(err: io::Error) { cause(err) } Any(err: Box<Error>) { cause(err) } } } } Even though there are many other error variants, the one I am most interested in is one that can handle any kind of error by boxing it. However, the code above does not work for the boxed type: error[E0277]: the trait bound `std::error::Error + 'static: std::marker::Sized` is not satisfied --> src/main.rs:11:23 | 11 | cause(err) | ^^^ When looking at the generated code (using cargo expand), it becomes a bit more evident why that is: #[allow(unused)] impl ::std::error::Error for MyError { [...] fn cause(&self) -> Option<&::std::error::Error> { match *self { MyError::Io(ref err) => Some(err), MyError::Any(ref err) => Some(err), } } } A &Box<Error> does not automatically become a &Error, unless you call err.as_ref() on it specifically. Thus the code below works, and I tried it by just compiling the expanded, adjusted version myself using rustc. #[allow(unused)] impl ::std::error::Error for MyError { [...] fn cause(&self) -> Option<&::std::error::Error> { match *self { MyError::Io(ref err) => Some(err), // ------> note the *as_ref()* <------ MyError::Any(ref err) => Some(err.as_ref()), } } } Question What can I do to make the above work ? Additional Notes To me it would be viable to modify quick-error, however, it's not allowed to call .as_ref() on &std::io::Error for example, which seemed like a simple fix for quick-error: #[allow(unused)] impl ::std::error::Error for MyError { [...] fn cause(&self) -> Option<&::std::error::Error> { match *self { MyError::Io(ref err) => Some(err.as_ref()), MyError::Any(ref err) => Some(err.as_ref()), } } } The above causes this error: error: no method named `as_ref` found for type `&std::io::Error` in the current scope --> expanded.rs:91:50 | 91 | MyError::Io(ref err) => Some(err.as_ref()), | ^^^^^^ | = note: the method `as_ref` exists but the following trait bounds were not satisfied: `std::io::Error : core::convert::AsRef<_> And it really makes me wonder why I can't use &std::io::Error.as_ref() on any reference, considering it becomes a reference to an implemented trait automatically otherwise. Maybe it's syntax I am missing to state the intend. A: as_ref is provided by the AsRef trait. Notice that as_ref receives self by reference (noted &self), so in order to call it on a &T, T must implement AsRef. std::io::Error does not implement that trait. However, there is another trait that looks a lot like AsRef: Borrow. Borrow provides a single method, borrow, with the same signature as as_ref. Borrow also has a different set of implementors; notably, it has impl<T> Borrow<T> for T where T: ?Sized. This means that for every type, we can invoke a borrow method (provided that the Borrow trait is brought into scope with use) to obtain a reference to the same type. Borrow<T> is also implemented for Box<T>, so you can borrow a T from a Box<T>, and likewise for other pointer/smart pointer types. #[allow(unused)] impl ::std::error::Error for MyError { fn cause(&self) -> Option<&::std::error::Error> { use std::borrow::Borrow; match *self { MyError::Io(ref err) => Some(err.borrow()), MyError::Any(ref err) => Some(err.borrow()), } } }
{ "pile_set_name": "StackExchange" }
How Not To Sell Out: Talk by Matt Haughey of MeFi on growing a site into a small business - halo http://metatalk.metafilter.com/16577/How-Not-To-Sell-Out ====== halo I think this is a good antithesis to some the hype that you read about growing a big business on the "next big thing", people taking millions from venture capitalists before selling to Google and the like. Rather it focuses on doing something you love, making a small business out of it through organic growth and not seeing selling your company, community or soul. I think this is underrated - you don't hear much about this approach which should be painfully obvious. ------ jamongkad Reminds of this book Davidw recommend. I think it's entitled "How to grow a Business"? Again with the hustle and bustle of the Valley, people selling out here and there (mind you it's not bad but I believe it is not the optimal approach for some people) there is something to be said about growing a business the old fashion way. ~~~ pchristensen "Growing a Business" by Paul Hawken? (<http://www.amazon.com/o/asin/0671671642/pchristensen-20> ) I haven't read that book but I have read other books by Hawken and I highly recommend his work. GaB is probably just as good (Joel recommends it too). ------ sutro Mmm-hmm. Um, would someone please provide a link to a different article, entitled "How To Sell Out?"
{ "pile_set_name": "HackerNews" }
Water resources data, California, water year 2004, volume 2. Pacific Slope basins from Arroyo Grande to Oregon state line except Central Valley Water Data Report CA-04-2 Links Abstract Water-resources data for the 2004 water year for California consist of records of stage, discharge, and water quality of streams, stage and contents in lakes and reservoirs, and water levels and water quality in wells. Volume 2 contains discharge records for 134 gaging stations, stage and content records for 8 lakes and reservoirs, gage-height records for 8 stations, and water-quality records for 36 streamflow-gaging stations and 4 water-quality partial-record stations. Also included are data for 1 low-flow partial-record station, and 1 miscellaneous-measurement station. These data represent that part of the National Water Data System operated by the U.S. Geological Survey and cooperating State and Federal agencies in California. Additional publication details Publication type: Report Publication Subtype: USGS Numbered Series Title: Water resources data, California, water year 2004, volume 2. Pacific Slope basins from Arroyo Grande to Oregon state line except Central Valley
{ "pile_set_name": "Pile-CC" }
Q: Find length of a side from given mesurements Source: gradestack.com This is a problem I am trying to solve for a long time. But still not able to proceed. After spending some time, I got a doubt whether this question is correct. Because, in a rhombus, diagonals bisects each other. Here PA=PC. That means, P is the center point of diagonal AC. So PD must be equal to PB which is not the case. Why I am wrong here? Please give pointers in how to solve this problem. thanks. A: $PA=PC\implies P $ lies on the perpendicular bisector of the line $AC$. Proceed in the following way . Suppose $Q$is the center of the rhombus. $PB+PD=BD=10\implies QD= 5 \\ AQ=\sqrt{PA^2-PQ^2}=\sqrt{5^2-3^2}=4\\ AD=\sqrt{AQ^2+QD^2}=\sqrt{41}$
{ "pile_set_name": "StackExchange" }
Consumers who purchase products online or by mail-order often desire to see photographs of a product before purchasing the product. For many personal articles, such as apparel or footwear, the appearance of an article may be a very important consideration in whether or not to purchase the article. In the case of shoes, for example, a customer may wish to see how the shoes look from the sides, the top, and several other directions. One retailer may offer hundreds or even thousands of different articles. Moreover, a retailer's offerings for some types of consumer products may be in a continual state of change, with new items being added continually. For such retailers, acquiring and processing all of the images of interest to its customers may be labor-intensive and expensive. Some online retailers employ a photographer, or even several photographers, to take photographs of specimens of articles to be offered for sale. Setting up, photographing, and post-image acquisition processing of the needed images, as well as the associated handling and tracking of the specimens themselves, is likely to require substantial staff, studio facilities, and other resources. In addition, the photographs taken are likely to vary from photographer to photographer, and, even with the same photographer, from photo shoot to photo shoot and from shot to shot, due to a myriad of variations in object placement, lighting, background, camera position, camera setting choices, etc. With many imaging systems, when a camera is moved from one position to another to capture different views of an object, the background will change from view to view, as different features of the imaging apparatus (such as rails, platforms, or positioning mechanisms), and/or objects behind the apparatus, appear in the background. Some inconsistencies, anomalies, and other undesired features introduced during a photo shoot can be removed or at least mitigated by post-image acquisition processing techniques. For example, an image may be touched up to remove the edge of a platform. Such post-processing techniques may, however, be expensive and time-consuming to employ, and even when employed may not ultimately achieve the level of article-to-article consistency that is sought by the retailer. While the invention is susceptible to various modifications and alternative forms, specific embodiments thereof are shown by way of example in the drawings and will herein be described in detail. It should be understood, however, that the drawings and detailed description thereto are not intended to limit the invention to the particular form disclosed, but on the contrary, the intention is to cover all modifications, equivalents and alternatives falling within the spirit and scope of the present invention as defined by the appended claims. The headings used herein are for organizational purposes only and are not meant to be used to limit the scope of the description or the claims. As used throughout this application, the word “may” is used in a permissive sense (i.e., meaning having the potential to), rather than the mandatory sense (i.e., meaning must). Similarly, the words “include,” “including,” and “includes” mean including, but not limited to.
{ "pile_set_name": "USPTO Backgrounds" }
Studies on the effects of nitrendipine on oxytocin, angiotensin II and ergometrine-induced contraction of pregnant human myometrium in vitro. The effects of nitrendipine, a Calcium channel antagonist, on stimulated contractions of 72 tissue strips of pregnant human myometrium was studied. The agonists used were oxytocin, angiotensin II (AII) and ergometrine maleate. The concentration: response curves for the contractile effects on these agonists on the myometrial tissue strips were initially established in three separate but identical experiments (n = 24 in each group) over a predetermined optimal concentration range of each of the agonists. Contractions were recorded isotonically against a fixed tension of 500mg using microtorque technique. The curves were then re-established, for each agonist, in the absence and in the presence of 10(-9)M nitrendipine. The agonists consistently contracted the myometrial tissues in a dose-dependent manner during the establishment of the initial curves. The overall initial EC50 for the oxytocin treatment group was 6.4 x 10(-10)M, while the corresponding EC50s for the AII, and ergometrine treatment groups were 5.9 x 10(-11) and 4.0 x 10(-8)M respectively. Nitrendipine significantly blunted the myometrial tissue response to oxytocin. The EC50 of the oxytocin control group was significantly different from similar group treated with nitrendipine. (9.0 x 10(-10)M for the control, as compared with 8.3 x 10(-7)M for the nitrendipine treatment group p less than or equal to 0.05). Nitrendipine did not significantly influence the myometrial tissue response to AII or ergometrine.(ABSTRACT TRUNCATED AT 250 WORDS)
{ "pile_set_name": "PubMed Abstracts" }
Pseudomuscari chalusicum {{speciesbox | image = Muscari chalusicum - Flickr - peganum.jpg | taxon = Pseudomuscari chalusicum | authority = (D.C.Stuart) Garbari | synonyms = Bellevalia pseudomuscari Hyacinthella pseudomuscari Hyacinthus pseudomuscari Muscari chalusicum Muscari pseudomuscari }}Pseudomuscari chalusicum, the Chalus grape hyacinth, is a species of flowering plant in the squill subfamily Scilloideae of the asparagus family Asparagaceae, native to Iran. Chalus is a county in northern Iran. Growing to about in height, it is a bulbous perennial with floppy, curved leaves sitting close to the ground, and small clusters of bell-shaped flowers on erect stems, appearing in mid-spring. The flower colour is pale blue at the tip, shading downwards to a darker blue. Unlike some other Muscari species, it does not spread rapidly. It is still known under its synonym Muscari pseudomuscari''. In cultivation in the United Kingdom it has gained the Royal Horticultural Society’s Award of Garden Merit. It requires a sunny position in well-drained soil, and is hardy in most places in the UK - down to about . References Category:Flora of Iran Category:Scilloideae
{ "pile_set_name": "Wikipedia (en)" }
Offering a sun terrace and views of the lake, Flat Brasília - Setor Hoteleiro Norte is located in the North Wing district in Brasilia. The accommodation features a sauna. Conjunto Nacional Mall is 200 metres away. Free private parking is available on site. All units feature a flat-screen TV. There is also a kitchenette, equipped with a microwave. Every unit has a private bathroom with free toiletries and a hairdryer. The aparthotel features free WiFi. Flat Brasília - Setor Hoteleiro Nor also includes a hot tub. Guests can enjoy the on-site restaurant. Cultural Complex of the Republic is 900 metres from Flat Brasília - Setor Hoteleiro Norte. The nearest airport is Brasilia - Presidente Juscelino Kubitschek International Airport, 10 km from the property. Important information Please inform Flat Brasília - Setor Hoteleiro Norte in advance of your expected arrival time. You can use the Special Requests box when booking, or contact the property directly with the contact details provided in your confirmation.
{ "pile_set_name": "Pile-CC" }
1. Field of the Invention This invention generally relates to a bicycle hub with a detachable freewheel. More specifically, the present invention relates to a bicycle hub with a spacer provided on a two-part axle to allow separation of a sprocket support member from the hub without removing the freewheel from the bicycle frame. 2. Background Information Bicycling is becoming an increasingly popular form of recreation as well as a means of transportation. Moreover, bicycling has become a very popular competitive sport. Whether the bicycle is used for recreation, transportation or competition, the bicycle industry is constantly improving the components of the bicycle. One particular component of the bicycle, which has been extensively redesigned over the past years, is the rear bicycle hub. Specifically, most bicycles have several speeds. Accordingly, the rear bicycle hub usually includes a freewheel. The freewheel includes at least one chain engaging sprocket. One popular form of drive train and freewheel for a bicycle includes a plurality of sprockets that are mounted on the hub of the rear bicycle wheel. During pedaling, the bicycle chain engages one of the rear sprockets to rotate the rear wheel. When bicycle rider stops pedaling, the rear wheel should be able to continue to rotate while the sprockets remain stationary. Accordingly, the rear hub is usually provided with a freewheel that has a one-way clutch. Freewheels are used to transmit a driving force to the rear bicycle wheel in one rotation direction only. These freewheels are usually mounted on the rear hub of a bicycle. Freewheels typically allow the bicycle to advance freely without any rotation of the pedals. Freewheels usually include boss type freewheels which are mounted on the boss of the rear hub by being screwed onto the rear hub, and free hub type freewheels which are fastened to the rear hub as integral parts of the rear hub. Both types of freewheels are equipped with an outer tubular part, an inner tubular part which is installed radially inwardly of the outer tubular part so that the inner tubular part is free to rotate relative to the outer cylinder part. A one-way clutch is installed between the outer tubular part and inner tubular part for transmitting the driving force from the outer tubular part to the inner tubular part in one rotational direction only. The outer tubular part usually has a plurality of gears mounted thereon, while the inner tubular part is usually mounted on the rear hub of the bicycle. Splines are formed between the sprocket wheels and boss to prohibit relative rotation therebetween positively. Since this unit is used for the rear wheel of a bicycle, drive must be transmitted between the rear wheel axle and boss through a one-way mechanism. For this purpose, the boss is formed as an outer race of a one-way clutch, and the one-way clutch and inner race are disposed on an inner periphery of the boss. With the increased number of speeds provided by a derailleur of a bicycle today, a multi-step sprocket wheel unit for the rear wheel includes an increased number of sprockets which is now usually at least five to seven. With the increased number of gears or sprockets, a wider range of torque can be applied from the sprockets to the freewheel. Often the sizes of the sprockets (i.e. the number of gear teeth on the sprockets) are configured for certain riding conditions, such as hilly or flat conditions. Moreover, the configuration of the sprockets or gears is designed for different rider skill levels or rider preferences. Accordingly, sometimes it is necessary to change freewheels or the entire rear wheel depending on the rider or riding conditions. Therefore, there are demands for a simplified mounting structure and an easy mounting method. Furthermore, as the number of rear gears or sprockets have increased over the years, the freewheel has become larger and heavier. Additionally, with the increased number of gears or sprockets, rear hubs and freewheels can be complicated and expensive to manufacture and install. Moreover, with the increased number of gears or sprockets, it can be difficult to remove the rear wheel from the bicycle frame or to replace an existing freewheel with a different freewheel. In view of the above, there exists a need for a bicycle hub with a detachable freewheel which overcomes the above mentioned problems in the prior art. This invention addresses this need in the prior art as well as other needs, which will become apparent to those skilled in the art from this disclosure.
{ "pile_set_name": "USPTO Backgrounds" }
— THE LUXURY APOTHECARY, SUPPORT TO AFRICAN COMMUNITIES! The involved luxury apothecary 1.618 member Virginia Stone sources its raw materials mainly there, natural products from fair-trade cooperatives. A huge commitment we wanted to share because sustainable development is not just about environmental issues but also social procedures! Felt in love with Africa’s beauty and wildlife, Virginia Stone does her best to support as well as she can local communities. “I have always believed in the importance of giving back more than you take, and feel that it is an obligation to support humanitarian work, environmental initiatives, and animal sanctuaries within this great continent.” Al Amal Women’s co-operative is the first cooperative in Morocco to be completely run by women. Sourcing many raw materials there, Virginia Stone is part of the opportunity for these women to lead a decent life of dignity. The founder met The Mother Africa Trust during a travel across Zimbabwe and Mozambique. The NGO provides a helping hand for Zimbabwe’s people, encouraging them to use their own resources and abilities to improve their lives, homes and communities. This same association helped Virginia to be in contact with Ethandweni Children’s Home. “The home is run solely on solar power, and has a beautiful garden that supplies the children with healthy meals. No child should be without a home, healthy food, and love” Virginia told us. As we don’t always know how to contribute to these kinds of organizations, the brand give a portion of every sale to the association the customer chose. Be part of the Sustainability movement and improve the Sustainable Luxury meanings! Discover more about Virginia in our Guide and find her amazing skin cares on our e-shop.
{ "pile_set_name": "Pile-CC" }
Search form Georgia Tech Post Office The Georgia Tech Post Office is here for all of your postal needs. You can send packages, buy mail supplies, and more. Students living on campus can find their mailbox at the Post Office, as well as the package pick-up window for picking up parcels. The Georgia Tech Post Office provides mail and parcel pick-up services for students receiving packages from the United States Postal Service (USPS), United Parcel Service (UPS), Federal Express, Airborne and DHL. Outgoing shipping services are provided by the United States Postal Service (USPS) only. For customer services inquiries, please contact our team at [email protected]. Mailbox Policies When you receive a package you will be notified by email. To pick up a package once you receive that email, present a valid form of I.D. at the package window. Be sure to check your mailbox regularly! Items left longer than 30 days may be returned as unclaimed. Sharing your mailbox with another student is prohibited. Moving off campus | If you are moving off-campus, including into Greek Housing, and would like to keep a mailbox in the Student Center, you must complete the Mailbox Rental Form. The annual fee is only $30 and covers fall term through summer term. Reservations are on a first come, first served basis, and assignments are not guaranteed to stay the same year after year. Mailbox Rental Form Students who graduate can have their mail forwarded for one semester after graduation. However, mail cannot be forwarded internationally. Magazines and other publishings can not be forwarded. Mailing Forwarding Instructions Sending Mail to Your Student Your student is responsible for letting you know their address. Please be sure that mail is addressed with the correct mailbox number and valid zip code. Always use your student’s full name, as listed with the registrar. Use of another name may prevent mail from reaching your student. Special occasion and holiday cards are prime targets for theft. To minimize the threat to your student’s parcels please DO NOT SEND CASH through the mail. The Georgia Tech Post Office recommends using a trackable method of mailing such as delivery confirmation or priority mailing. When sending packages, tracking will indicate when a package has arrived at the Post Office, not when your student has received it​. The Georgia Tech Post Office receives packages from the United States Postal Service, United Parcel ​Service, Federal Express, Airborne, and DHL. There is no package delivery to the residence halls. Students will be notified they have a package via email. After a week, a second notification will be sent. A week after the second notification, the package will be returned to sender. FAQs Q. How do I get a mailbox? A. Students living in on-campus housing will automatically be assigned a mailbox and will retain that box as long as they live on campus. If you move off campus and want to rent a mailbox, please notify the Post Office immediately. Q. Can I still get a mailbox even if I don't live on campus? A. All students (excluding Graduate Living Center and 10th and Home residents) may request a mailbox and pay a $30.00 non-refundable annual fee. Availability of boxes are limited so applications are accepted on a first come, first serve basis. Please stop by the Georgia Tech Post Office or contact us at 404-894-4560 for more information. Q. How often should I check my box for mail? A. We recommend at least once to twice a week. We perform mailbox housekeeping every 30 to 45 days. Checking your box on a regular basis ensures that your mail will not be returned as unclaimed. Department Mail Inter-Campus Mail Use inter-campus mail envelopes whenever possible, but be sure to cross out all previous names and information. Inter-campus mail must be separated from U.S. Mail by securing it with a rubber band. Always include the recipient's full name, department name and mail code. Click below for the most current mail code listing.Departmental Mail Codes Mail is delivered and collected twice daily in most departments. All mail must be ready for pick-up when the carrier arrives at your department. The Georgia Tech Post Office is a government contract station, therefore all mail sent via inter-campus mail must be official Georgia Tech Correspondence. Personal mail is not permitted on the campus mail system. Other Mail Guidelines If you have a large mailing, which requires a special pick-up, you must make arrangements in advance by calling the Georgia Tech Post Office at (404) 385.4174. When a faculty or staff member leaves Georgia Tech, or transfers to another department, it is the responsibility of the department to forward the individual's mail. Individual members of a department needing to modify their mail information should submit an Individual Move Form. Departments looking to change mail information should submit a Departmental Move Form.
{ "pile_set_name": "Pile-CC" }
1.1.0 / 2014-04-12 ================== * add non-array values support * expose internal utilities: - `.is()` - `.hasBody()` - `.normalize()` - `.match()` 1.0.1 / 2014-03-30 ================== * add `multipart` as a shorthand
{ "pile_set_name": "Github" }
Q: How to rewrite this double arrow function I have a function that updates my the state of schedule, an array of artist objects. Currently I am using a double arrow function that takes in the index and the artist id. However I can't use a double arrow function due to my javascript linter. How can I rewrite this? handleArtistChange = index => evt => { if (evt) { const newSchedule = this.state.schedule.map((artist, stateIndex) => { if (index !== stateIndex) return artist; return { ...artist, artist_id: evt.value }; }); this.setState({ schedule: newSchedule }); } } I have tried the following: handleArtistChange = function(index) { return function(evt) { if (evt) { const newSchedule = this.state.schedule.map((artist, stateIndex) => { if (index !== stateIndex) return artist; return { ...artist, artist_id: evt.value }; }); this.setState({ schedule: newSchedule }); } } } However this results in an error of Cannot read property 'schedule' of undefined The call to my function: const lineup = this.state.schedule.map((artist, index) => { return ( <div key={index} className="form__input-group--lineup"> <div> <label className="form__label">{getTextNode('Artist *')}</label> <Select onChange={this.handleArtistChange(index)} onInputChange={this.handleInputChange} isClearable options={options} styles={customStyles} backspaceRemovesValue={false} placeholder={`Artist #${index + 1}`} classNamePrefix="react-select" /> </div> <div className="form__input-group--time"> <label className="form__label">{getTextNode('start time *')}</label> <input name="startTime" type="time" required autoComplete="true" className="form__input" value={this.state.startTime} onChange={this.handleTimeChange(index)} /> </div> <button type="button">-</button> </div> ); }); A: You could modify your linting rules if necessary. If you want to modify your function, here is a way to define it, with a regular function returning an anonymous function bound to the outer this: function handleArtistChange(index) { return (function(evt) { if (evt) { const newSchedule = this.state.schedule.map((artist, stateIndex) => { if (index !== stateIndex) return artist; return { ...artist, artist_id: evt.value }; }); this.setState({ schedule: newSchedule }); } }).bind(this); }
{ "pile_set_name": "StackExchange" }
The Gas Trading Messaging System is ready for everyone to use. Here is the link to the site. Please let everyone know so they can start using it. http://gasmsgboard.dev.corp.enron.com For questions, contact the below: Brian T. Hoskins Enron Broadband Services 713-853-0380 (office) 713-412-3667 (mobile) 713-646-5745 (fax) [email protected]
{ "pile_set_name": "Enron Emails" }
NFL Series NFL Series could refer to: In American football video games: EA's Madden NFL series Sega's NFL 2K series (1999-2004) NFL (series), a series of games by Gameloft In toys: The McFarlane Sports Picks "NFL Series" of player figures (since 2001) Topps' "NFL Series" of trading cards, especially popular in the early 1990s
{ "pile_set_name": "Wikipedia (en)" }
Table of contents for Thirteen strategies to measure college teaching : a consumer's guide to rating scale construction, assessment, and decision making for faculty, administrators, and clinicians / Ronald A. Berk. Bibliographic record and links to related information available from the Library of Congress catalog. Note: Contents data are machine generated based on pre-publication provided by the publisher. Contents may have variations from the printed book or be incomplete or contain other coding. CONTENTS INTRODUCTION CHAPTER 1. TOP 13 SOURCES OF EVIDENCE OF TEACHING EFFECTIVENESS A Few Ground Rules Teaching Effectiveness: Defining the Construct National Standards Beyond Student Ratings A Unified Conceptualization 13 Sources of Evidence Student Ratings Peer Ratings Self-Evaluation External Expert Ratings Videos Student Interviews Exit and Alumni Ratings Employer Ratings Administrator Ratings Teaching Scholarship Teaching Awards Learning Outcome Measures Teaching Portfolio BONUS: 360° Multi-Source Assessment Berk's Top Picks Formative Decisions Summative Decisions Program Decisions Decision Time 2. CREATING THE RATING SCALE STRUCTURE Overview of Scale Construction Process Specifying the "Purpose" of the Scale Delimiting "What" Is to Be Measured Focus Groups Interviews Research Evidence Determining "How" to Measure the "What" Existing Scales Item Banks Commercially Published Scales Universe of Items Structure of Rating Scale Items Structured Items Unstructured Items 3. GENERATING THE STATEMENTS Preliminary Decisions Domain Specifications Number of Statements Rules for Writing Statements 1. The statement should be clear and direct. 2. The statement should be brief and concise. 3. The statement should contain only one complete behavior, thought, concept. 4. The statement should be a simple sentence. 5. The statement should be at the appropriate reading level. 6. The statement should be grammatically correct. 7. The statement should be worded strongly. 8. The statement should be congruent with the behavior it is intended to measure. 9. The statement should accurately measure a positive or negative behavior. 10. The statement should be applicable to all respondents. 11. The respondents should be in the best position to respond to the statement. 12. The statement should be interpretable in only one way. 13. The statement should NOT contain a double negative. 14. The statement should NOT contain universal or absolute terms. 15. The statement should NOT contain nonabsolute, warm and fuzzy terms. 16. The statement should NOT contain value-laden or inflammatory words. 17. The statement should NOT contain words, phrases, or abbreviations that would be unfamiliar to all respondents. 18. The statement should NOT tap a behavior appearing in any other statement. 19. The statement should NOT be factual or capable of being interpreted as factual. 20. The statement should NOT be endorsed or given one answer by almost all respondents or by almost none. 4. SELECTING THE ANCHORS Types of Anchors Intensity Anchors Evaluation Anchors Frequency Anchors Quantity Anchors Comparison Anchors Rules for Selecting Anchors 1. The anchors should be consistent with the purpose of the rating scale. 2. The anchors should match the statements, phrases, or word topics. 3. The anchors should be logically appropriate with each statement. 4. The anchors should be grammatically consistent with each statement. 5. The anchors should provide the most accurate and concrete responses possible. 6. The anchors should elicit a range of responses. 7. The anchors on bipolar scales should be balanced, not biased. 8. The anchors on unipolar scales should be graduated appropriately. 5. REFINING THE ITEM STRUCTURE Preparing for Structural Changes Issues in Scale Construction 1. What rating scale format is best? 2. How many anchor points should be on the scale? 3. Should there be a designated midpoint position, such as "neutral," "uncertain," or "undecided," on the scale? 4. How many anchors should be specified on the scale? 5. Should numbers be placed on the anchor scale? 6. Should a NOT APPLICABLE (NA) or NOT OBSERVED (NO) option be provided? 7. How can response set biases be minimized? 6. ASSEMBLING THE SCALE FOR ADMINISTRATION Assembling the Scale Identification Information Purpose Directions Structured Items Unstructured Items Scale Administration Paper-Based Administration Online Administration Comparability of Paper-Based and Online Ratings Conclusions 7. FIELD TESTING AND ITEM ANALYSES Preparing the Draft Scale for a Test Spin Field Test Procedures Mini-Field Test Monster-Field Test Item Analyses Stage 1: Item Descriptive Statistics Stage 2: Interitem and Item-Scale Correlations Stage 3: Factor Analysis 8. COLLECTING EVIDENCE OF VALIDITY AND RELIABILITY Validity Evidence Evidence Based on Job Content Domain Evidence Based on Response Processes Evidence Based on Internal Scale Structure Evidence Related to Other Measures of Teaching Effectiveness Evidence Based on the Consequences of Ratings Reliability Evidence Classical Reliability Theory Summated Rating Scale Theory Methods of Estimating Reliability Epilogue 9. REPORTING AND INTERPRETING SCALE RESULTS Generic Levels of Score Reporting Item Anchor Item Subscale Total Scale Department/Program Norms Subject Matter/Program Level State, Regional, and National Norms Criterion-Referenced vs. Norm-Referenced Interpretations Score Range Criterion-Referenced Interpretations Norm-Referenced Interpretations Formative, Summative, and Program Decisions Formative Decisions Summative Decisions Program Decisions Conclusions REFERENCES APPENDICES A. Sample Rating Scales B. Sample 360° Assessment Rating Scales C. Sample Reporting Formats D. Commercially Published Student Rating Scale Systems
{ "pile_set_name": "Pile-CC" }
Expression of the LIM-homeodomain gene Lmx1a (dreher) during development of the mouse nervous system. The expression pattern of Lmx1a, a LIM-homeodomain gene disrupted in the dreher mouse neurological mutant, is described during development. Lmx1a is predominantly expressed in the developing nervous system from embryonic day E8.5 to adulthood, in restricted areas. Major expression domains include the dorsal midline (roof plate) of the neural tube, the cortical hem, the otic vesicles, the developing cerebellum and the notochord. The Lmx1a expression pattern is therefore well correlated with the various aspects of the phenotype of the dreher mutant mice.
{ "pile_set_name": "PubMed Abstracts" }
Tag: Snack This tapenade is quick and easy to make. It’s packed with serious flavor–sauteed garlic, oregano, parsley, kalamata olives, and capers. It tastes great on toasted bread, sliced baguette, pitas, fresh cut veggies, pizza, or really anything that goes on the grill! Whether you use it as an appetizer, a snack or condiment, you cannot lose…. When I think of traditional Spinach Artichoke Dips, I think of deliciousness, but also think of the very high fat content. There’s just so much cheese, and then, cream cheese, and maybe, probably, sometimes, sour cream?! I wanted to come up with a plant based variety that didn’t just swap out the package of dairy cheese for… We love road trips. Going to a new place and exploring is the spice of life. Being prepared for the open road is also an imperative, especially when you know you’ll be passing through hundreds of miles of desert. You’d be lucky to find a gas station; let alone, a totally plant based meal. So,… I love chipotle peppers—their spiciness and their smokiness. And, this delicious tempeh marinade pays tribute to the chipotle pepper and all it’s amazing synergy with lime, agave, garlic, cilantro, and soy sauce! This marinade is very easy to make, and just takes a little bit of patience to allow all the flavors to develop. I… Fresh chives, dill, flat leaf parsley, lemon zest, garlic cloves, and a touch of jalapeño bring this marinade to LIFE. When I think of tofu marinades, I usually think of soy sauce or BBQ. I don’t often think of fresh herbs, lemon and garlic, and that’s a shame, because it works together so nicely with…
{ "pile_set_name": "Pile-CC" }
/* -*- Mode: C; indent-tabs-mode: t; c-basic-offset: 8; tab-width: 8 -*- nemo-directory.c: Nemo directory model. Copyright (C) 1999, 2000, 2001 Eazel, Inc. This program is free software; you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation; either version 2 of the License, or (at your option) any later version. This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details. You should have received a copy of the GNU General Public License along with this program; if not, write to the Free Software Foundation, Inc., 51 Franklin Street - Suite 500, Boston, MA 02110-1335, USA. Author: Darin Adler <[email protected]> */ #include <config.h> #include "nemo-directory-private.h" #include "nemo-directory-notify.h" #include "nemo-file-attributes.h" #include "nemo-file-private.h" #include "nemo-file-utilities.h" #include "nemo-search-directory.h" #include "nemo-global-preferences.h" #include "nemo-lib-self-check-functions.h" #include "nemo-metadata.h" #include "nemo-desktop-directory.h" #include "nemo-vfs-directory.h" #include <eel/eel-glib-extensions.h> #include <eel/eel-string.h> #include <gtk/gtk.h> enum { FILES_ADDED, FILES_CHANGED, DONE_LOADING, LOAD_ERROR, LAST_SIGNAL }; static guint signals[LAST_SIGNAL] = { 0 }; static GHashTable *directories; static void nemo_directory_finalize (GObject *object); static NemoDirectory *nemo_directory_new (GFile *location); static GList * real_get_file_list (NemoDirectory *directory); static gboolean real_is_editable (NemoDirectory *directory); static void set_directory_location (NemoDirectory *directory, GFile *location); G_DEFINE_TYPE (NemoDirectory, nemo_directory, G_TYPE_OBJECT); static void nemo_directory_class_init (NemoDirectoryClass *klass) { GObjectClass *object_class; object_class = G_OBJECT_CLASS (klass); object_class->finalize = nemo_directory_finalize; signals[FILES_ADDED] = g_signal_new ("files_added", G_TYPE_FROM_CLASS (object_class), G_SIGNAL_RUN_LAST, G_STRUCT_OFFSET (NemoDirectoryClass, files_added), NULL, NULL, g_cclosure_marshal_VOID__POINTER, G_TYPE_NONE, 1, G_TYPE_POINTER); signals[FILES_CHANGED] = g_signal_new ("files_changed", G_TYPE_FROM_CLASS (object_class), G_SIGNAL_RUN_LAST, G_STRUCT_OFFSET (NemoDirectoryClass, files_changed), NULL, NULL, g_cclosure_marshal_VOID__POINTER, G_TYPE_NONE, 1, G_TYPE_POINTER); signals[DONE_LOADING] = g_signal_new ("done_loading", G_TYPE_FROM_CLASS (object_class), G_SIGNAL_RUN_LAST, G_STRUCT_OFFSET (NemoDirectoryClass, done_loading), NULL, NULL, g_cclosure_marshal_VOID__VOID, G_TYPE_NONE, 0); signals[LOAD_ERROR] = g_signal_new ("load_error", G_TYPE_FROM_CLASS (object_class), G_SIGNAL_RUN_LAST, G_STRUCT_OFFSET (NemoDirectoryClass, load_error), NULL, NULL, g_cclosure_marshal_VOID__POINTER, G_TYPE_NONE, 1, G_TYPE_POINTER); klass->get_file_list = real_get_file_list; klass->is_editable = real_is_editable; g_type_class_add_private (klass, sizeof (NemoDirectoryDetails)); } static void nemo_directory_init (NemoDirectory *directory) { directory->details = G_TYPE_INSTANCE_GET_PRIVATE ((directory), NEMO_TYPE_DIRECTORY, NemoDirectoryDetails); directory->details->file_hash = g_hash_table_new (g_str_hash, g_str_equal); directory->details->high_priority_queue = nemo_file_queue_new (); directory->details->low_priority_queue = nemo_file_queue_new (); directory->details->extension_queue = nemo_file_queue_new (); directory->details->max_deferred_file_count = g_settings_get_int (nemo_preferences, NEMO_PREFERENCES_DEFERRED_ATTR_PRELOAD_LIMIT); } NemoDirectory * nemo_directory_ref (NemoDirectory *directory) { if (directory == NULL) { return directory; } g_return_val_if_fail (NEMO_IS_DIRECTORY (directory), NULL); g_object_ref (directory); return directory; } void nemo_directory_unref (NemoDirectory *directory) { if (directory == NULL) { return; } g_return_if_fail (NEMO_IS_DIRECTORY (directory)); g_object_unref (directory); } static void nemo_directory_finalize (GObject *object) { NemoDirectory *directory; directory = NEMO_DIRECTORY (object); g_hash_table_remove (directories, directory->details->location); nemo_directory_cancel (directory); g_assert (directory->details->count_in_progress == NULL); if (directory->details->monitor_list != NULL) { g_warning ("destroying a NemoDirectory while it's being monitored"); g_list_free_full (directory->details->monitor_list, g_free); } if (directory->details->monitor != NULL) { nemo_monitor_cancel (directory->details->monitor); } if (directory->details->dequeue_pending_idle_id != 0) { g_source_remove (directory->details->dequeue_pending_idle_id); } if (directory->details->call_ready_idle_id != 0) { g_source_remove (directory->details->call_ready_idle_id); } if (directory->details->location) { g_object_unref (directory->details->location); } g_assert (directory->details->file_list == NULL); g_hash_table_destroy (directory->details->file_hash); nemo_file_queue_destroy (directory->details->high_priority_queue); nemo_file_queue_destroy (directory->details->low_priority_queue); nemo_file_queue_destroy (directory->details->extension_queue); g_assert (directory->details->directory_load_in_progress == NULL); g_assert (directory->details->count_in_progress == NULL); g_assert (directory->details->dequeue_pending_idle_id == 0); g_list_free_full (directory->details->pending_file_info, g_object_unref); G_OBJECT_CLASS (nemo_directory_parent_class)->finalize (object); } static void invalidate_one_count (gpointer key, gpointer value, gpointer user_data) { NemoDirectory *directory; g_assert (key != NULL); g_assert (NEMO_IS_DIRECTORY (value)); g_assert (user_data == NULL); directory = NEMO_DIRECTORY (value); nemo_directory_invalidate_count_and_mime_list (directory); } static void filtering_changed_callback (gpointer callback_data) { g_assert (callback_data == NULL); /* Preference about which items to show has changed, so we * can't trust any of our precomputed directory counts. */ g_hash_table_foreach (directories, invalidate_one_count, NULL); } void emit_change_signals_for_all_files (NemoDirectory *directory) { GList *files; files = g_list_copy (directory->details->file_list); if (directory->details->as_file != NULL) { files = g_list_prepend (files, directory->details->as_file); } nemo_file_list_ref (files); nemo_directory_emit_change_signals (directory, files); nemo_file_list_free (files); } static void collect_all_directories (gpointer key, gpointer value, gpointer callback_data) { NemoDirectory *directory; GList **dirs; directory = NEMO_DIRECTORY (value); dirs = callback_data; *dirs = g_list_prepend (*dirs, nemo_directory_ref (directory)); } void emit_change_signals_for_all_files_in_all_directories (void) { GList *dirs, *l; NemoDirectory *directory; dirs = NULL; g_hash_table_foreach (directories, collect_all_directories, &dirs); for (l = dirs; l != NULL; l = l->next) { directory = NEMO_DIRECTORY (l->data); emit_change_signals_for_all_files (directory); nemo_directory_unref (directory); } g_list_free (dirs); } static void async_state_changed_one (gpointer key, gpointer value, gpointer user_data) { NemoDirectory *directory; g_assert (key != NULL); g_assert (NEMO_IS_DIRECTORY (value)); g_assert (user_data == NULL); directory = NEMO_DIRECTORY (value); nemo_directory_async_state_changed (directory); emit_change_signals_for_all_files (directory); } static void async_data_preference_changed_callback (gpointer callback_data) { g_assert (callback_data == NULL); /* Preference involving fetched async data has changed, so * we have to kick off refetching all async data, and tell * each file that it (might have) changed. */ g_hash_table_foreach (directories, async_state_changed_one, NULL); } static void add_preferences_callbacks (void) { nemo_global_preferences_init (); g_signal_connect_swapped (nemo_preferences, "changed::" NEMO_PREFERENCES_SHOW_HIDDEN_FILES, G_CALLBACK(filtering_changed_callback), NULL); g_signal_connect_swapped (nemo_preferences, "changed::" NEMO_PREFERENCES_SHOW_DIRECTORY_ITEM_COUNTS, G_CALLBACK (async_data_preference_changed_callback), NULL); g_signal_connect_swapped (nemo_preferences, "changed::" NEMO_PREFERENCES_DATE_FORMAT, G_CALLBACK(async_data_preference_changed_callback), NULL); } /** * nemo_directory_get_by_uri: * @uri: URI of directory to get. * * Get a directory given a uri. * Creates the appropriate subclass given the uri mappings. * Returns a referenced object, not a floating one. Unref when finished. * If two windows are viewing the same uri, the directory object is shared. */ NemoDirectory * nemo_directory_get_internal (GFile *location, gboolean create) { NemoDirectory *directory; /* Create the hash table first time through. */ if (directories == NULL) { directories = g_hash_table_new (g_file_hash, (GCompareFunc) g_file_equal); add_preferences_callbacks (); } /* If the object is already in the hash table, look it up. */ directory = g_hash_table_lookup (directories, location); if (directory != NULL) { nemo_directory_ref (directory); } else if (create) { /* Create a new directory object instead. */ directory = nemo_directory_new (location); if (directory == NULL) { return NULL; } /* Put it in the hash table. */ g_hash_table_insert (directories, directory->details->location, directory); } return directory; } NemoDirectory * nemo_directory_get (GFile *location) { if (location == NULL) { return NULL; } return nemo_directory_get_internal (location, TRUE); } NemoDirectory * nemo_directory_get_existing (GFile *location) { if (location == NULL) { return NULL; } return nemo_directory_get_internal (location, FALSE); } NemoDirectory * nemo_directory_get_by_uri (const char *uri) { NemoDirectory *directory; GFile *location; if (uri == NULL) { return NULL; } location = g_file_new_for_uri (uri); directory = nemo_directory_get_internal (location, TRUE); g_object_unref (location); return directory; } NemoDirectory * nemo_directory_get_for_file (NemoFile *file) { char *uri; NemoDirectory *directory; g_return_val_if_fail (NEMO_IS_FILE (file), NULL); uri = nemo_file_get_uri (file); directory = nemo_directory_get_by_uri (uri); g_free (uri); return directory; } /* Returns a reffed NemoFile object for this directory. */ NemoFile * nemo_directory_get_corresponding_file (NemoDirectory *directory) { NemoFile *file; char *uri; file = nemo_directory_get_existing_corresponding_file (directory); if (file == NULL) { uri = nemo_directory_get_uri (directory); file = nemo_file_get_by_uri (uri); g_free (uri); } return file; } /* Returns a reffed NemoFile object for this directory, but only if the * NemoFile object has already been created. */ NemoFile * nemo_directory_get_existing_corresponding_file (NemoDirectory *directory) { NemoFile *file; char *uri; file = directory->details->as_file; if (file != NULL) { nemo_file_ref (file); return file; } uri = nemo_directory_get_uri (directory); file = nemo_file_get_existing_by_uri (uri); g_free (uri); return file; } /* nemo_directory_get_name_for_self_as_new_file: * * Get a name to display for the file representing this * directory. This is called only when there's no VFS * directory for this NemoDirectory. */ char * nemo_directory_get_name_for_self_as_new_file (NemoDirectory *directory) { char *directory_uri; char *name, *colon; directory_uri = nemo_directory_get_uri (directory); colon = strchr (directory_uri, ':'); if (colon == NULL || colon == directory_uri) { name = g_strdup (directory_uri); } else { name = g_strndup (directory_uri, colon - directory_uri); } g_free (directory_uri); return name; } char * nemo_directory_get_uri (NemoDirectory *directory) { g_return_val_if_fail (NEMO_IS_DIRECTORY (directory), NULL); return g_file_get_uri (directory->details->location); } GFile * nemo_directory_get_location (NemoDirectory *directory) { g_return_val_if_fail (NEMO_IS_DIRECTORY (directory), NULL); return g_object_ref (directory->details->location); } static NemoDirectory * nemo_directory_new (GFile *location) { NemoDirectory *directory; char *uri; uri = g_file_get_uri (location); if (eel_uri_is_desktop (uri)) { directory = NEMO_DIRECTORY (g_object_new (NEMO_TYPE_DESKTOP_DIRECTORY, NULL)); } else if (eel_uri_is_search (uri)) { directory = NEMO_DIRECTORY (g_object_new (NEMO_TYPE_SEARCH_DIRECTORY, NULL)); } else if (g_str_has_suffix (uri, NEMO_SAVED_SEARCH_EXTENSION)) { directory = NEMO_DIRECTORY (nemo_search_directory_new_from_saved_search (uri)); } else { directory = NEMO_DIRECTORY (g_object_new (NEMO_TYPE_VFS_DIRECTORY, NULL)); } set_directory_location (directory, location); g_free (uri); return directory; } gboolean nemo_directory_is_local (NemoDirectory *directory) { g_return_val_if_fail (NEMO_IS_DIRECTORY (directory), FALSE); if (directory->details->location == NULL) { return TRUE; } return nemo_directory_is_in_trash (directory) || g_file_is_native (directory->details->location); } gboolean nemo_directory_is_in_trash (NemoDirectory *directory) { g_assert (NEMO_IS_DIRECTORY (directory)); if (directory->details->location == NULL) { return FALSE; } return g_file_has_uri_scheme (directory->details->location, "trash"); } gboolean nemo_directory_is_in_recent (NemoDirectory *directory) { g_assert (NEMO_IS_DIRECTORY (directory)); if (directory->details->location == NULL) { return FALSE; } return g_file_has_uri_scheme (directory->details->location, "recent"); } gboolean nemo_directory_is_in_admin (NemoDirectory *directory) { g_assert (NEMO_IS_DIRECTORY (directory)); if (directory->details->location == NULL) { return FALSE; } return g_file_has_uri_scheme (directory->details->location, "admin"); } gboolean nemo_directory_are_all_files_seen (NemoDirectory *directory) { g_return_val_if_fail (NEMO_IS_DIRECTORY (directory), FALSE); return NEMO_DIRECTORY_CLASS (G_OBJECT_GET_CLASS (directory))->are_all_files_seen (directory); } static void add_to_hash_table (NemoDirectory *directory, NemoFile *file, GList *node) { const char *name; name = eel_ref_str_peek (file->details->name); g_assert (node != NULL); g_assert (g_hash_table_lookup (directory->details->file_hash, name) == NULL); g_hash_table_insert (directory->details->file_hash, (char *) name, node); } static GList * extract_from_hash_table (NemoDirectory *directory, NemoFile *file) { const char *name; GList *node; name = eel_ref_str_peek (file->details->name); if (name == NULL) { return NULL; } /* Find the list node in the hash table. */ node = g_hash_table_lookup (directory->details->file_hash, name); g_hash_table_remove (directory->details->file_hash, name); return node; } void nemo_directory_add_file (NemoDirectory *directory, NemoFile *file) { GList *node; gboolean add_to_work_queue; g_assert (NEMO_IS_DIRECTORY (directory)); g_assert (NEMO_IS_FILE (file)); g_assert (file->details->name != NULL); /* Add to list. */ node = g_list_prepend (directory->details->file_list, file); directory->details->file_list = node; /* Add to hash table. */ add_to_hash_table (directory, file, node); directory->details->confirmed_file_count++; if (directory->details->early_load_file_count++ < directory->details->max_deferred_file_count) { file->details->load_deferred_attrs = NEMO_FILE_LOAD_DEFERRED_ATTRS_PRELOAD; } add_to_work_queue = FALSE; if (nemo_directory_is_file_list_monitored (directory)) { /* Ref if we are monitoring, since monitoring owns the file list. */ nemo_file_ref (file); add_to_work_queue = TRUE; } else if (nemo_directory_has_active_request_for_file (directory, file)) { /* We're waiting for the file in a call_when_ready. Make sure we add the file to the work queue so that said waiter won't wait forever for e.g. all files in the directory to be done */ add_to_work_queue = TRUE; } if (add_to_work_queue) { nemo_directory_add_file_to_work_queue (directory, file); } } void nemo_directory_remove_file (NemoDirectory *directory, NemoFile *file) { GList *node; g_assert (NEMO_IS_DIRECTORY (directory)); g_assert (NEMO_IS_FILE (file)); g_assert (file->details->name != NULL); /* Find the list node in the hash table. */ node = extract_from_hash_table (directory, file); g_assert (node != NULL); g_assert (node->data == file); /* Remove the item from the list. */ directory->details->file_list = g_list_remove_link (directory->details->file_list, node); g_list_free_1 (node); nemo_directory_remove_file_from_work_queue (directory, file); if (!file->details->unconfirmed) { directory->details->confirmed_file_count--; } /* Unref if we are monitoring. */ if (nemo_directory_is_file_list_monitored (directory)) { nemo_file_unref (file); } } GList * nemo_directory_begin_file_name_change (NemoDirectory *directory, NemoFile *file) { /* Find the list node in the hash table. */ return extract_from_hash_table (directory, file); } void nemo_directory_end_file_name_change (NemoDirectory *directory, NemoFile *file, GList *node) { /* Add the list node to the hash table. */ if (node != NULL) { add_to_hash_table (directory, file, node); } } NemoFile * nemo_directory_find_file_by_name (NemoDirectory *directory, const char *name) { GList *node; g_return_val_if_fail (NEMO_IS_DIRECTORY (directory), NULL); g_return_val_if_fail (name != NULL, NULL); node = g_hash_table_lookup (directory->details->file_hash, name); return node == NULL ? NULL : NEMO_FILE (node->data); } /* "." for the directory-as-file, otherwise the filename */ NemoFile * nemo_directory_find_file_by_internal_filename (NemoDirectory *directory, const char *internal_filename) { NemoFile *result; if (g_strcmp0 (internal_filename, ".") == 0) { result = nemo_directory_get_existing_corresponding_file (directory); if (result != NULL) { nemo_file_unref (result); } } else { result = nemo_directory_find_file_by_name (directory, internal_filename); } return result; } void nemo_directory_emit_files_added (NemoDirectory *directory, GList *added_files) { if (added_files != NULL) { g_signal_emit (directory, signals[FILES_ADDED], 0, added_files); } } void nemo_directory_emit_files_changed (NemoDirectory *directory, GList *changed_files) { if (changed_files != NULL) { g_signal_emit (directory, signals[FILES_CHANGED], 0, changed_files); } } void nemo_directory_emit_change_signals (NemoDirectory *directory, GList *changed_files) { GList *p; for (p = changed_files; p != NULL; p = p->next) { nemo_file_emit_changed (p->data); } nemo_directory_emit_files_changed (directory, changed_files); } void nemo_directory_emit_done_loading (NemoDirectory *directory) { directory->details->early_load_file_count = 0; g_signal_emit (directory, signals[DONE_LOADING], 0); } void nemo_directory_emit_load_error (NemoDirectory *directory, GError *error) { g_signal_emit (directory, signals[LOAD_ERROR], 0, error); } /* Return a directory object for this one's parent. */ static NemoDirectory * get_parent_directory (GFile *location) { NemoDirectory *directory; GFile *parent; parent = g_file_get_parent (location); if (parent) { directory = nemo_directory_get_internal (parent, TRUE); g_object_unref (parent); return directory; } return NULL; } /* If a directory object exists for this one's parent, then * return it, otherwise return NULL. */ static NemoDirectory * get_parent_directory_if_exists (GFile *location) { NemoDirectory *directory; GFile *parent; parent = g_file_get_parent (location); if (parent) { directory = nemo_directory_get_internal (parent, FALSE); g_object_unref (parent); return directory; } return NULL; } static void hash_table_list_prepend (GHashTable *table, gconstpointer key, gpointer data) { GList *list; list = g_hash_table_lookup (table, key); list = g_list_prepend (list, data); g_hash_table_insert (table, (gpointer) key, list); } static void call_files_added_free_list (gpointer key, gpointer value, gpointer user_data) { g_assert (NEMO_IS_DIRECTORY (key)); g_assert (value != NULL); g_assert (user_data == NULL); g_signal_emit (key, signals[FILES_ADDED], 0, value); g_list_free (value); } static void call_files_changed_common (NemoDirectory *directory, GList *file_list) { GList *node; NemoFile *file; for (node = file_list; node != NULL; node = node->next) { file = node->data; if (file->details->directory == directory) { nemo_directory_add_file_to_work_queue (directory, file); } } nemo_directory_async_state_changed (directory); nemo_directory_emit_change_signals (directory, file_list); } static void call_files_changed_free_list (gpointer key, gpointer value, gpointer user_data) { g_assert (value != NULL); g_assert (user_data == NULL); call_files_changed_common (NEMO_DIRECTORY (key), value); g_list_free (value); } static void call_files_changed_unref_free_list (gpointer key, gpointer value, gpointer user_data) { g_assert (value != NULL); g_assert (user_data == NULL); call_files_changed_common (NEMO_DIRECTORY (key), value); nemo_file_list_free (value); } static void call_get_file_info_free_list (gpointer key, gpointer value, gpointer user_data) { NemoDirectory *directory; GList *files; g_assert (NEMO_IS_DIRECTORY (key)); g_assert (value != NULL); g_assert (user_data == NULL); directory = key; files = value; nemo_directory_get_info_for_new_files (directory, files); g_list_foreach (files, (GFunc) g_object_unref, NULL); g_list_free (files); } static void invalidate_count_and_unref (gpointer key, gpointer value, gpointer user_data) { g_assert (NEMO_IS_DIRECTORY (key)); g_assert (value == key); g_assert (user_data == NULL); nemo_directory_invalidate_count_and_mime_list (key); nemo_directory_unref (key); } static void collect_parent_directories (GHashTable *hash_table, NemoDirectory *directory) { g_assert (hash_table != NULL); g_assert (NEMO_IS_DIRECTORY (directory)); if (g_hash_table_lookup (hash_table, directory) == NULL) { nemo_directory_ref (directory); g_hash_table_insert (hash_table, directory, directory); } } void nemo_directory_notify_files_added (GList *files) { GHashTable *added_lists; GList *p; NemoDirectory *directory; GHashTable *parent_directories; NemoFile *file; GFile *location, *parent; /* Make a list of added files in each directory. */ added_lists = g_hash_table_new (NULL, NULL); /* Make a list of parent directories that will need their counts updated. */ parent_directories = g_hash_table_new (NULL, NULL); for (p = files; p != NULL; p = p->next) { location = p->data; /* See if the directory is already known. */ directory = get_parent_directory_if_exists (location); if (directory == NULL) { /* In case the directory is not being * monitored, but the corresponding file is, * we must invalidate it's item count. */ file = NULL; parent = g_file_get_parent (location); if (parent) { file = nemo_file_get_existing (parent); g_object_unref (parent); } if (file != NULL) { nemo_file_invalidate_count_and_mime_list (file); nemo_file_unref (file); } continue; } collect_parent_directories (parent_directories, directory); /* If no one is monitoring files in the directory, nothing to do. */ if (!nemo_directory_is_file_list_monitored (directory)) { nemo_directory_unref (directory); continue; } file = nemo_file_get_existing (location); /* We check is_added here, because the file could have been added * to the directory by a nemo_file_get() but not gotten * files_added emitted */ if (file && file->details->is_added) { /* A file already exists, it was probably renamed. * If it was renamed this could be ignored, but * queue a change just in case */ nemo_file_changed (file); nemo_file_unref (file); } else { hash_table_list_prepend (added_lists, directory, g_object_ref (location)); } nemo_directory_unref (directory); } /* Now get file info for the new files. This creates NemoFile * objects for the new files, and sends out a files_added signal. */ g_hash_table_foreach (added_lists, call_get_file_info_free_list, NULL); g_hash_table_destroy (added_lists); /* Invalidate count for each parent directory. */ g_hash_table_foreach (parent_directories, invalidate_count_and_unref, NULL); g_hash_table_destroy (parent_directories); } static void g_file_pair_free (GFilePair *pair) { g_object_unref (pair->to); g_object_unref (pair->from); g_free (pair); } static GList * uri_pairs_to_file_pairs (GList *uri_pairs) { GList *l, *file_pair_list; GFilePair *file_pair; URIPair *uri_pair; file_pair_list = NULL; for (l = uri_pairs; l != NULL; l = l->next) { uri_pair = l->data; file_pair = g_new (GFilePair, 1); file_pair->from = g_file_new_for_uri (uri_pair->from_uri); file_pair->to = g_file_new_for_uri (uri_pair->to_uri); file_pair_list = g_list_prepend (file_pair_list, file_pair); } return g_list_reverse (file_pair_list); } void nemo_directory_notify_files_added_by_uri (GList *uris) { GList *files; files = nemo_file_list_from_uris (uris); nemo_directory_notify_files_added (files); g_list_free_full (files, g_object_unref); } void nemo_directory_notify_files_changed (GList *files) { GHashTable *changed_lists; GList *node; GFile *location; GFile *parent; NemoDirectory *dir; NemoFile *file; /* Make a list of changed files in each directory. */ changed_lists = g_hash_table_new (NULL, NULL); /* Go through all the notifications. */ for (node = files; node != NULL; node = node->next) { location = node->data; /* Find the file. */ file = nemo_file_get_existing (location); if (file != NULL) { /* Tell it to re-get info now, and later emit * a changed signal. */ file->details->file_info_is_up_to_date = FALSE; file->details->link_info_is_up_to_date = FALSE; nemo_file_invalidate_extension_info_internal (file); hash_table_list_prepend (changed_lists, file->details->directory, file); } else { parent = g_file_get_parent (location); dir = nemo_directory_get_existing (parent); if (dir != NULL && dir->details->new_files_in_progress != NULL && files != dir->details->new_files_in_progress_changes) { dir->details->new_files_in_progress_changes = g_list_prepend (dir->details->new_files_in_progress_changes, g_object_ref (location)); } if (dir != NULL) { nemo_directory_unref (dir); } if (parent != NULL) { g_object_unref (parent); } } } /* Now send out the changed signals. */ g_hash_table_foreach (changed_lists, call_files_changed_unref_free_list, NULL); g_hash_table_destroy (changed_lists); } void nemo_directory_notify_files_changed_by_uri (GList *uris) { GList *files; files = nemo_file_list_from_uris (uris); nemo_directory_notify_files_changed (files); g_list_free_full (files, g_object_unref); } void nemo_directory_notify_files_removed (GList *files) { GHashTable *changed_lists; GList *p; NemoDirectory *directory; GHashTable *parent_directories; NemoFile *file; GFile *location; /* Make a list of changed files in each directory. */ changed_lists = g_hash_table_new (NULL, NULL); /* Make a list of parent directories that will need their counts updated. */ parent_directories = g_hash_table_new (NULL, NULL); /* Go through all the notifications. */ for (p = files; p != NULL; p = p->next) { location = p->data; /* Update file count for parent directory if anyone might care. */ directory = get_parent_directory_if_exists (location); if (directory != NULL) { collect_parent_directories (parent_directories, directory); nemo_directory_unref (directory); } /* Find the file. */ file = nemo_file_get_existing (location); if (file != NULL && !nemo_file_rename_in_progress (file)) { /* Mark it gone and prepare to send the changed signal. */ nemo_file_mark_gone (file); hash_table_list_prepend (changed_lists, file->details->directory, nemo_file_ref (file)); } nemo_file_unref (file); } /* Now send out the changed signals. */ g_hash_table_foreach (changed_lists, call_files_changed_unref_free_list, NULL); g_hash_table_destroy (changed_lists); /* Invalidate count for each parent directory. */ g_hash_table_foreach (parent_directories, invalidate_count_and_unref, NULL); g_hash_table_destroy (parent_directories); } void nemo_directory_notify_files_removed_by_uri (GList *uris) { GList *files; files = nemo_file_list_from_uris (uris); nemo_directory_notify_files_changed (files); g_list_free_full (files, g_object_unref); } static void set_directory_location (NemoDirectory *directory, GFile *location) { if (directory->details->location) { g_object_unref (directory->details->location); } directory->details->location = g_object_ref (location); } static void change_directory_location (NemoDirectory *directory, GFile *new_location) { /* I believe it's impossible for a self-owned file/directory * to be moved. But if that did somehow happen, this function * wouldn't do enough to handle it. */ g_assert (directory->details->as_file == NULL); g_hash_table_remove (directories, directory->details->location); set_directory_location (directory, new_location); g_hash_table_insert (directories, directory->details->location, directory); } typedef struct { GFile *container; GList *directories; } CollectData; static void collect_directories_by_container (gpointer key, gpointer value, gpointer callback_data) { NemoDirectory *directory; CollectData *collect_data; GFile *location; location = (GFile *) key; directory = NEMO_DIRECTORY (value); collect_data = (CollectData *) callback_data; if (g_file_has_prefix (location, collect_data->container) || g_file_equal (collect_data->container, location)) { nemo_directory_ref (directory); collect_data->directories = g_list_prepend (collect_data->directories, directory); } } static GList * nemo_directory_moved_internal (GFile *old_location, GFile *new_location) { CollectData collection; NemoDirectory *directory; GList *node, *affected_files; GFile *new_directory_location; char *relative_path; collection.container = old_location; collection.directories = NULL; g_hash_table_foreach (directories, collect_directories_by_container, &collection); affected_files = NULL; for (node = collection.directories; node != NULL; node = node->next) { directory = NEMO_DIRECTORY (node->data); new_directory_location = NULL; if (g_file_equal (directory->details->location, old_location)) { new_directory_location = g_object_ref (new_location); } else { relative_path = g_file_get_relative_path (old_location, directory->details->location); if (relative_path != NULL) { new_directory_location = g_file_resolve_relative_path (new_location, relative_path); g_free (relative_path); } } if (new_directory_location) { change_directory_location (directory, new_directory_location); g_object_unref (new_directory_location); /* Collect affected files. */ if (directory->details->as_file != NULL) { affected_files = g_list_prepend (affected_files, nemo_file_ref (directory->details->as_file)); } affected_files = g_list_concat (affected_files, nemo_file_list_copy (directory->details->file_list)); } nemo_directory_unref (directory); } g_list_free (collection.directories); return affected_files; } void nemo_directory_moved (const char *old_uri, const char *new_uri) { GList *list, *node; GHashTable *hash; NemoFile *file; GFile *old_location; GFile *new_location; hash = g_hash_table_new (NULL, NULL); old_location = g_file_new_for_uri (old_uri); new_location = g_file_new_for_uri (new_uri); list = nemo_directory_moved_internal (old_location, new_location); for (node = list; node != NULL; node = node->next) { file = NEMO_FILE (node->data); hash_table_list_prepend (hash, file->details->directory, nemo_file_ref (file)); } nemo_file_list_free (list); g_object_unref (old_location); g_object_unref (new_location); g_hash_table_foreach (hash, call_files_changed_unref_free_list, NULL); g_hash_table_destroy (hash); } void nemo_directory_notify_files_moved (GList *file_pairs) { GList *p, *affected_files, *node; GFilePair *pair; NemoFile *file; NemoDirectory *old_directory, *new_directory; GHashTable *parent_directories; GList *new_files_list, *unref_list; GHashTable *added_lists, *changed_lists; char *name; NemoFileAttributes cancel_attributes; GFile *to_location, *from_location; /* Make a list of added and changed files in each directory. */ new_files_list = NULL; added_lists = g_hash_table_new (NULL, NULL); changed_lists = g_hash_table_new (NULL, NULL); unref_list = NULL; /* Make a list of parent directories that will need their counts updated. */ parent_directories = g_hash_table_new (NULL, NULL); cancel_attributes = nemo_file_get_all_attributes (); for (p = file_pairs; p != NULL; p = p->next) { pair = p->data; from_location = pair->from; to_location = pair->to; /* Handle overwriting a file. */ file = nemo_file_get_existing (to_location); if (file != NULL) { /* Mark it gone and prepare to send the changed signal. */ nemo_file_mark_gone (file); new_directory = file->details->directory; hash_table_list_prepend (changed_lists, new_directory, file); collect_parent_directories (parent_directories, new_directory); } /* Update any directory objects that are affected. */ affected_files = nemo_directory_moved_internal (from_location, to_location); for (node = affected_files; node != NULL; node = node->next) { file = NEMO_FILE (node->data); hash_table_list_prepend (changed_lists, file->details->directory, file); } unref_list = g_list_concat (unref_list, affected_files); /* Move an existing file. */ file = nemo_file_get_existing (from_location); if (file == NULL) { /* Handle this as if it was a new file. */ new_files_list = g_list_prepend (new_files_list, to_location); } else { /* Handle notification in the old directory. */ old_directory = file->details->directory; collect_parent_directories (parent_directories, old_directory); /* Cancel loading of attributes in the old directory */ nemo_directory_cancel_loading_file_attributes (old_directory, file, cancel_attributes); /* Locate the new directory. */ new_directory = get_parent_directory (to_location); collect_parent_directories (parent_directories, new_directory); /* We can unref now -- new_directory is in the * parent directories list so it will be * around until the end of this function * anyway. */ nemo_directory_unref (new_directory); /* Update the file's name and directory. */ name = g_file_get_basename (to_location); nemo_file_update_name_and_directory (file, name, new_directory); g_free (name); /* Update file attributes */ nemo_file_invalidate_attributes (file, NEMO_FILE_ATTRIBUTE_INFO); hash_table_list_prepend (changed_lists, old_directory, file); if (old_directory != new_directory) { hash_table_list_prepend (added_lists, new_directory, file); } /* Unref each file once to balance out nemo_file_get_by_uri. */ unref_list = g_list_prepend (unref_list, file); } } /* Now send out the changed and added signals for existing file objects. */ g_hash_table_foreach (changed_lists, call_files_changed_free_list, NULL); g_hash_table_destroy (changed_lists); g_hash_table_foreach (added_lists, call_files_added_free_list, NULL); g_hash_table_destroy (added_lists); /* Let the file objects go. */ nemo_file_list_free (unref_list); /* Invalidate count for each parent directory. */ g_hash_table_foreach (parent_directories, invalidate_count_and_unref, NULL); g_hash_table_destroy (parent_directories); /* Separate handling for brand new file objects. */ nemo_directory_notify_files_added (new_files_list); g_list_free (new_files_list); } void nemo_directory_notify_files_moved_by_uri (GList *uri_pairs) { GList *file_pairs; file_pairs = uri_pairs_to_file_pairs (uri_pairs); nemo_directory_notify_files_moved (file_pairs); g_list_foreach (file_pairs, (GFunc)g_file_pair_free, NULL); g_list_free (file_pairs); } void nemo_directory_schedule_position_set (GList *position_setting_list) { GList *p; const NemoFileChangesQueuePosition *item; NemoFile *file; time_t now; time (&now); for (p = position_setting_list; p != NULL; p = p->next) { item = (NemoFileChangesQueuePosition *) p->data; file = nemo_file_get (item->location); if (item->set) { nemo_file_set_position (file, item->point.x, item->point.y); } else { nemo_file_set_position (file, -1, -1); } if (item->set) { nemo_file_set_monitor_number (file, item->monitor); } else { nemo_file_set_monitor_number (file, -1); } nemo_file_set_time_metadata (file, NEMO_METADATA_KEY_ICON_POSITION_TIMESTAMP, UNDEFINED_TIME); nemo_file_unref (file); } } gboolean nemo_directory_contains_file (NemoDirectory *directory, NemoFile *file) { g_return_val_if_fail (NEMO_IS_DIRECTORY (directory), FALSE); g_return_val_if_fail (NEMO_IS_FILE (file), FALSE); if (nemo_file_is_gone (file)) { return FALSE; } return NEMO_DIRECTORY_CLASS (G_OBJECT_GET_CLASS (directory))->contains_file (directory, file); } char * nemo_directory_get_file_uri (NemoDirectory *directory, const char *file_name) { GFile *child; char *result; g_return_val_if_fail (NEMO_IS_DIRECTORY (directory), NULL); g_return_val_if_fail (file_name != NULL, NULL); result = NULL; child = g_file_get_child (directory->details->location, file_name); result = g_file_get_uri (child); g_object_unref (child); return result; } void nemo_directory_call_when_ready (NemoDirectory *directory, NemoFileAttributes file_attributes, gboolean wait_for_all_files, NemoDirectoryCallback callback, gpointer callback_data) { g_return_if_fail (NEMO_IS_DIRECTORY (directory)); g_return_if_fail (callback != NULL); NEMO_DIRECTORY_CLASS (G_OBJECT_GET_CLASS (directory))->call_when_ready (directory, file_attributes, wait_for_all_files, callback, callback_data); } void nemo_directory_cancel_callback (NemoDirectory *directory, NemoDirectoryCallback callback, gpointer callback_data) { g_return_if_fail (NEMO_IS_DIRECTORY (directory)); g_return_if_fail (callback != NULL); NEMO_DIRECTORY_CLASS (G_OBJECT_GET_CLASS (directory))->cancel_callback (directory, callback, callback_data); } void nemo_directory_file_monitor_add (NemoDirectory *directory, gconstpointer client, gboolean monitor_hidden_files, NemoFileAttributes file_attributes, NemoDirectoryCallback callback, gpointer callback_data) { g_return_if_fail (NEMO_IS_DIRECTORY (directory)); g_return_if_fail (client != NULL); NEMO_DIRECTORY_CLASS (G_OBJECT_GET_CLASS (directory))->file_monitor_add (directory, client, monitor_hidden_files, file_attributes, callback, callback_data); } void nemo_directory_file_monitor_remove (NemoDirectory *directory, gconstpointer client) { g_return_if_fail (NEMO_IS_DIRECTORY (directory)); g_return_if_fail (client != NULL); NEMO_DIRECTORY_CLASS (G_OBJECT_GET_CLASS (directory))->file_monitor_remove (directory, client); } void nemo_directory_force_reload (NemoDirectory *directory) { g_return_if_fail (NEMO_IS_DIRECTORY (directory)); NEMO_DIRECTORY_CLASS (G_OBJECT_GET_CLASS (directory))->force_reload (directory); } gboolean nemo_directory_is_not_empty (NemoDirectory *directory) { g_return_val_if_fail (NEMO_IS_DIRECTORY (directory), FALSE); return NEMO_DIRECTORY_CLASS (G_OBJECT_GET_CLASS (directory))->is_not_empty (directory); } static gboolean is_tentative (gpointer data, gpointer callback_data) { NemoFile *file; g_assert (callback_data == NULL); file = NEMO_FILE (data); /* Avoid returning files with !is_added, because these * will later be sent with the files_added signal, and a * user doing get_file_list + files_added monitoring will * then see the file twice */ return !file->details->got_file_info || !file->details->is_added; } GList * nemo_directory_get_file_list (NemoDirectory *directory) { return NEMO_DIRECTORY_CLASS (G_OBJECT_GET_CLASS (directory))->get_file_list (directory); } static GList * real_get_file_list (NemoDirectory *directory) { GList *tentative_files, *non_tentative_files; tentative_files = eel_g_list_partition (g_list_copy (directory->details->file_list), is_tentative, NULL, &non_tentative_files); g_list_free (tentative_files); nemo_file_list_ref (non_tentative_files); return non_tentative_files; } static gboolean real_is_editable (NemoDirectory *directory) { return TRUE; } gboolean nemo_directory_is_editable (NemoDirectory *directory) { return NEMO_DIRECTORY_CLASS (G_OBJECT_GET_CLASS (directory))->is_editable (directory); } GList * nemo_directory_match_pattern (NemoDirectory *directory, const char *pattern) { GList *files, *l, *ret; GPatternSpec *spec; ret = NULL; spec = g_pattern_spec_new (pattern); files = nemo_directory_get_file_list (directory); for (l = files; l; l = l->next) { NemoFile *file; char *name; file = NEMO_FILE (l->data); name = nemo_file_get_display_name (file); if (g_pattern_match_string (spec, name)) { ret = g_list_prepend(ret, nemo_file_ref (file)); } g_free (name); } g_pattern_spec_free (spec); nemo_file_list_free (files); return ret; } /** * nemo_directory_list_ref * * Ref all the directories in a list. * @list: GList of directories. **/ GList * nemo_directory_list_ref (GList *list) { g_list_foreach (list, (GFunc) nemo_directory_ref, NULL); return list; } /** * nemo_directory_list_unref * * Unref all the directories in a list. * @list: GList of directories. **/ void nemo_directory_list_unref (GList *list) { g_list_foreach (list, (GFunc) nemo_directory_unref, NULL); } /** * nemo_directory_list_free * * Free a list of directories after unrefing them. * @list: GList of directories. **/ void nemo_directory_list_free (GList *list) { nemo_directory_list_unref (list); g_list_free (list); } /** * nemo_directory_list_copy * * Copy the list of directories, making a new ref of each, * @list: GList of directories. **/ GList * nemo_directory_list_copy (GList *list) { return g_list_copy (nemo_directory_list_ref (list)); } static int compare_by_uri (NemoDirectory *a, NemoDirectory *b) { char *uri_a, *uri_b; int res; uri_a = g_file_get_uri (a->details->location); uri_b = g_file_get_uri (b->details->location); res = strcmp (uri_a, uri_b); g_free (uri_a); g_free (uri_b); return res; } static int compare_by_uri_cover (gconstpointer a, gconstpointer b) { return compare_by_uri (NEMO_DIRECTORY (a), NEMO_DIRECTORY (b)); } /** * nemo_directory_list_sort_by_uri * * Sort the list of directories by directory uri. * @list: GList of directories. **/ GList * nemo_directory_list_sort_by_uri (GList *list) { return g_list_sort (list, compare_by_uri_cover); } gboolean nemo_directory_is_desktop_directory (NemoDirectory *directory) { if (directory->details->location == NULL) { return FALSE; } return nemo_is_desktop_directory (directory->details->location); } void nemo_directory_set_show_thumbnails (NemoDirectory *directory, gboolean show_thumbnails) { NemoFile *file; file = nemo_file_get(directory->details->location); nemo_file_set_boolean_metadata (file, NEMO_METADATA_KEY_SHOW_THUMBNAILS, FALSE, show_thumbnails); nemo_directory_force_reload (directory); } #if !defined (NEMO_OMIT_SELF_CHECK) #include <eel/eel-debug.h> #include "nemo-file-attributes.h" static int data_dummy; static gboolean got_files_flag; static void got_files_callback (NemoDirectory *directory, GList *files, gpointer callback_data) { g_assert (NEMO_IS_DIRECTORY (directory)); g_assert (g_list_length (files) > 10); g_assert (callback_data == &data_dummy); got_files_flag = TRUE; } /* Return the number of extant NemoDirectories */ int nemo_directory_number_outstanding (void) { return directories ? g_hash_table_size (directories) : 0; } void nemo_self_check_directory (void) { NemoDirectory *directory; NemoFile *file; directory = nemo_directory_get_by_uri ("file:///etc"); file = nemo_file_get_by_uri ("file:///etc/passwd"); EEL_CHECK_INTEGER_RESULT (g_hash_table_size (directories), 1); nemo_directory_file_monitor_add (directory, &data_dummy, TRUE, 0, NULL, NULL); /* FIXME: these need to be updated to the new metadata infrastructure * as make check doesn't pass. nemo_file_set_metadata (file, "test", "default", "value"); EEL_CHECK_STRING_RESULT (nemo_file_get_metadata (file, "test", "default"), "value"); nemo_file_set_boolean_metadata (file, "test_boolean", TRUE, TRUE); EEL_CHECK_BOOLEAN_RESULT (nemo_file_get_boolean_metadata (file, "test_boolean", TRUE), TRUE); nemo_file_set_boolean_metadata (file, "test_boolean", TRUE, FALSE); EEL_CHECK_BOOLEAN_RESULT (nemo_file_get_boolean_metadata (file, "test_boolean", TRUE), FALSE); EEL_CHECK_BOOLEAN_RESULT (nemo_file_get_boolean_metadata (NULL, "test_boolean", TRUE), TRUE); nemo_file_set_integer_metadata (file, "test_integer", 0, 17); EEL_CHECK_INTEGER_RESULT (nemo_file_get_integer_metadata (file, "test_integer", 0), 17); nemo_file_set_integer_metadata (file, "test_integer", 0, -1); EEL_CHECK_INTEGER_RESULT (nemo_file_get_integer_metadata (file, "test_integer", 0), -1); nemo_file_set_integer_metadata (file, "test_integer", 42, 42); EEL_CHECK_INTEGER_RESULT (nemo_file_get_integer_metadata (file, "test_integer", 42), 42); EEL_CHECK_INTEGER_RESULT (nemo_file_get_integer_metadata (NULL, "test_integer", 42), 42); EEL_CHECK_INTEGER_RESULT (nemo_file_get_integer_metadata (file, "nonexistent_key", 42), 42); */ EEL_CHECK_BOOLEAN_RESULT (nemo_directory_get_by_uri ("file:///etc") == directory, TRUE); nemo_directory_unref (directory); EEL_CHECK_BOOLEAN_RESULT (nemo_directory_get_by_uri ("file:///etc/") == directory, TRUE); nemo_directory_unref (directory); EEL_CHECK_BOOLEAN_RESULT (nemo_directory_get_by_uri ("file:///etc////") == directory, TRUE); nemo_directory_unref (directory); nemo_file_unref (file); nemo_directory_file_monitor_remove (directory, &data_dummy); nemo_directory_unref (directory); while (g_hash_table_size (directories) != 0) { gtk_main_iteration (); } EEL_CHECK_INTEGER_RESULT (g_hash_table_size (directories), 0); directory = nemo_directory_get_by_uri ("file:///etc"); got_files_flag = FALSE; nemo_directory_call_when_ready (directory, NEMO_FILE_ATTRIBUTE_INFO | NEMO_FILE_ATTRIBUTE_DEEP_COUNTS, TRUE, got_files_callback, &data_dummy); while (!got_files_flag) { gtk_main_iteration (); } EEL_CHECK_BOOLEAN_RESULT (directory->details->file_list == NULL, TRUE); EEL_CHECK_INTEGER_RESULT (g_hash_table_size (directories), 1); file = nemo_file_get_by_uri ("file:///etc/passwd"); /* EEL_CHECK_STRING_RESULT (nemo_file_get_metadata (file, "test", "default"), "value"); */ nemo_file_unref (file); nemo_directory_unref (directory); EEL_CHECK_INTEGER_RESULT (g_hash_table_size (directories), 0); } #endif /* !NEMO_OMIT_SELF_CHECK */
{ "pile_set_name": "Github" }
Module 3: Curse of Icewind Dale brings us Combat TR interesting new toys to play with. Incidentally, these are not best-in-slot for the current PermaStealth META. So what does this mean? This means we dont have to hide anymore. I want to give you a build that can 1) contest nodes, 2) stand a chance against a permanently invisible rogue, 3) outlive the hunter, and 4) not get tossed around like a pancake by the GWF. Ok. Less chit-chat, let’s get our hands dirty; O.O *speechless* … …… ……… Get out! Brandon: I’m serious.groupie: How on earth? The answer was actually simpler than you might think. I found HP wherever I was able. From gear and enchantments to artifacts and companions. This is an Open World PvP build as much as it is a Domination build, and I’m not above pumping my augment companion with steroids *cough cough* hit points. The silly thing that’s easily neglected is how the new BiS Purified Black Ice gear came with a tremendous pool of Maximum Hit Points. This gear alone racks a crazy 5000 HP when fully empowered with Black Ice. And don’t forget those shiny new Domination tenacity blues with 900 HP on a belt piece. [Dominator’s Cloak] comes from accomplishing 5/10 PvP Campaign achievements, and it’s the first epic neck piece to show up in the game with Maximum Hit Points and Tenacity. Where rings are concerned, defense slots are a bliss. The [Sigil of the Great Weapon] artifact is worth ranking up as it gives 1,600 Maximum Hit Points as a final stat. Similarly, [Vanguard’s Banner] has 1,200 HP that gets maxed out at epic rank. These artifacts are solid for this build. Click the attachments below for more details about them. This is my “Maximum” HP in OPvP if I am to spec in a certain way: (46,249). You might have already guessed, this isn’t a do-all be-all copy-paste build. It’s very customisable as to how you best see your rogue performing most efficiently. In Domination PvP I lose my augment companion, and my HP falls down to 40,250. I am not complaining. And just for kicks and giggles, if I were to have Rank 10 Radiant Enchantments, my HP would look like this: Weaknesses? I can’t think of any outside of relatively low damage output. However, by comparison to PermaStealth, the possibility of equipping Vorpal and Plaguefire enchantments can in fact compensate for this issue. The build initially suffers from lack of critical chance but this was overcome by stacked Dexterity, Executioner feats and a Master Infiltrator class feature. Strong Points This build puts great emphasis to defense and deflect. Disagree that a TR can be extremely durable as iron? When a GWF has unstoppable we have Stealth, and it takes about one encounter slot to be able to restealth nearly as often as a GWF builds Determination. But you can’t underappreciate Stealth. Stealth is our most distinct feature. It defines the class. Even if you were not to remain hidden forever, you can never neglect the importance of our class mechanic. In its own way, Stealth provides you 100% immunity to damage by allowing you to disengage from combat. Easily remove yourself from the foe’s effective range. Stealth allows you time to wait for cooldowns and, more importantly, it buffs your encounter powers and gives combat advantage that is equal to 15% more damage. Endless Assault: Wasn’t this a defensive build with defensive encounters? Then what use would 6% more damage on encounters do? That is a good and valid question. I have a human character and has 3 extra points. I just so happen to like my Lashing Blade crits with Perfect Vorpal, and this Heroic Feat buffs it. You may freely switch this with Cunning Ambusher for 6% more damage after leaving stealth, but only if you were Human and have spare Heroic points. Cruelty’s Reward: Dude, why! No reason. It was an eeny-meeny-miny-moe. This build has no use for Shocking Execution so Devastating Shroud was off the table. Thrill of the Kill was meh… Cruelty’s Reward won the day because it was the most useless of the three. You have to progress to the Executioner tree anyway and sadly, you have to pick one of three feats that are of no value to you.PS: You might be better off choosing Thrill of the Kill because Cruelty’s Reward has the same icon as Overrun Critical, and it makes things confusing when you’re trying to do an auto crit. Speed Swindle: them slower, you faster. It’s absolutely your choice to swap this for Nimble Blade, which is about 4.2% of your damage output. You will have zero benefit from Cunning Stalker or Underhanded Tactics. Berserk Vitality: epic must have. Since you have 40,000 HP, this feat will grant you 1,000 Temp HP every 20 seconds. Healing depression? Not too worried about it. Every twenty seconds you would have Shadow Strike off cooldown. At certain times you will be able to proc this by combat advantage from stealth. 1,500-3,000 Temp HP per minute is not a bad deal! Self Healing, Temp HP & Regeneration Now that we have gone through the basics, let’s find out what makes it incredibly tanky. You sure can’t live off of 40K HP, damage resistance and deflection alone. The key factor is outhealing the damage you take through set bonuses, temporary HP and regeneration. Self Healing You have many sources of self-healing. You will have them all. Two of these are set bonuses, Purified Absorption and Purified Siphon, both proc from Black Ice gear. The third one is lifesteal.Purified Absorption: The way that this buff works is somewhat similar to barkshield. Only, unlike Barkshield, taking damage does not deplete the charge until it has shielded you for a total of 800 damage every 3 seconds. If a charge is not fully depleted in 3 seconds, you will be healed per charge for 600 HP (300 after HD). Interestingly this shield behaves against DoT much the same way Barkshield does. Let’s say you receive 500 damage much lower than the shield value, you will see a damage floater of 0, and the subsequent DoT will all tick for 0 damage. Often enough, Purified Absorption will activate on Bilethorn poison so that it ticks for 0 damage and does not harm your stealth meter! Purified Absorption has an uptime of 15 seconds every 60 seconds. It has a lowered proc chance when in cooldown and has 100% chance to activate when not in cooldown. Purified Siphon: This buff does exactly what the tooltip says. It has an activation chance and cooldown similar to Purified Absorption. Its heals, while affected by healing depression, is multiplied by the number of nearby enemies. This heals between 1500-3000 HP if it activates on a single target, 2400-4800 on two targets, and 3300-6600 on three targets. Realistically you would be lucky to proc it on two targets. The latter becomes a possibility when you are being focused. Lifesteal with Endless Consumption: When you steal health from your Life Steal stat, it has a chance to steal 3 times as much. Does not seem to have an internal cooldown and procs quite often. Healing with Impossible to Catch: Yes! ITC can heal! HOW? It’s a loopy heal that involves ITC’s deflection, Fey Thistle and Lifesteal. By now you already know that ITC when activated out of stealth grants you 100% chance to deflect all damage. I’ve emphasized in a past thread how you should use ITC against fast-hitting low-damage DoT powers. This is just all the more reason why. ITC procs Fey Thistle and Fey Thistle in turn procs Lifesteal. Since reflect from Fey Thistle can be mitigated, you can count on 300-350 damage, 31-37 HP healed by lifesteal (see my lifesteal % above), and 100 HP healed when Endless Consumption activates. If you take 10 hits in ITC, you would be healed for 310-370 HP. Considering that you take 75% less damage in ITC, mitigate 20% damage after average Armor Penetration, 370 HP can go a long way. Did you catch on that you were also reflecting 3,000 damage? Gold star! Healing by Deflect: This works the same as explained above. Makes stacking deflect on a TR all the more delicious doesn’t it? When you deflect a DoT you would reflect as many times as it ticks, healing you with lifesteal in the process. Now, bilethorn… Oh, I got your attention eh? GG. Waters of Elah’zad: More important than just staying alive, this artifact will irritate your enemies out of their wits. With all this wall of text about self-healing and lifesteal, it would take 3 people around 2 minutes to even bring you to half health. My artifact keybind is F1. Battle Potion of Major Healing: You should not be above using battle potions, because, what else would you do with that glory? Hit this lovely thing when you find yourself taking more damage than you can heal but not in a position to pop an artifact. Soulforged Armor: Just to be overly annoying, if your enemies somehow manage to bring you down, rise from the dead, spam stealth and disengage from combat. Either grab a field potion or sit someplace to catch your breath. Troll the node again when it is convenient for you. Temp HP Greater Purified Tempered Enchantment: Affected by healing depression and comes with a one minute cooldown, but even then, this overload enchantment grants you 2750 Temp HP and 800 deflect. Your choices of overload enchantment vary between defense, deflect and lifesteal and they all come with temporary hit points. Equipping two of these in your overload slots will grant you two activations per minute. Overload slots appear to have separate cooldowns no matter what you put in them. Berserk Vitality: just to reiterate, epic must have. Because you have 40,000 HP, this feat will grant you 1,000 Temp HP every 20 seconds. Healing depression? Not too worried about it. Every twenty seconds you would have Shadow Strike off cooldown. At times you will be able to proc this from stealth. Regeneration Regeneration is still a valuable stat despite healing depression. Do remember that two factors affect Regeneration: Maximum Hit Points and your Regeneration stat. At 40,000 HP, 1,400 Regeneration heals you for 1,983 HP once every 3 seconds. Halved by HD, this is still a reliable source of healing in battle. You can easily stack regeneration as a TR by equipping [Rings of Preservation] from the Pegasus Seal Traders. If you are not stacking Regeneration, alternate these rings with [Ancient Priest’s Ring of Burning Light] for 1200 more HP, 300 defense and 300 deflect. Lurker’s Assault: Did they think HR was the only class that can self heal with a daily power? Lurker’s Assault has no heal mechanic to it whatsoever, but if you are spec’d for regen, remember that being out of combat for 10 seconds will remove healing depression. Cast Shadow Strike, enter Lurker mode and finish with another Shadow Strike to prolong stealth. If you are able to sit someplace nearby where the enemy will not hurt you (even better while contesting a node), HD will wear off and you will have 20-30 seconds to regenerate. During the first 10 seconds you will regenerate 3,000 HP, and up to 10,000 before stealth ends, considering the diminishing behavior of Regeneration as you get closer to full health. This is more than Forest Meditation heals an HR under Healing Depression. Evasion Dodge: You have 3 dodge rolls. Purified Black Ice gear gives 150 Stamina Gain as a two-parts set bonus. With a boon from the Icewind Campaign, you can reach 400 Stamina Gain. Additionally, you have 10% faster Stamina regeneration from Swift Footwork. Why take damage? Avoid getting hurt in the first place. Smoke Bomb: In the core build’s rotation this encounter plays an integral role along with ITC and Shadow Strike. This is the third encounter that fills your power tray in the default setup. You may change this out to adapt a different setup, but it is the ideal encounter to use when contesting nodes against many people. Even with low recovery you can easily rotate these three powers seamlessly with little marginal error. Open World PvP & Companions Things are getting more and more interesting in Caer-Konig. Open World PvP is all about having the right companions and using your environment to your advantage. As a Reflect TR, OPvP is my element! I gain two additional sources of reflect, as well as control effects when taking damage. I recommend these companions: I have them all besides the Snow Leopard which hasn’t come out yet. Such a shame I can only pick five of my favorites. I love Minion Bear. It’s adorable and gives HP. Evoker is worth ranking up to Epic. The Reflect TR is originally aimed towards an immortality build. When I was first unboxing this sweet new toy, the package came with an HP charger, batteries–lots of batteries, Purified Black Ice and all sorts of protective gear. The warranty sticker said “No warranties, this item is unbreakable.” Power Loudout [Impossible to Catch] For all the goodies we already know about it, and then some. [Shadow Strike] Stealth being a class mechanic offers immunity in its own way, if timed properly. [Smoke Bomb] One of the best, if not THE best, CC in the game. [Clouds of Steel] Knives. Knives! [Sly Flourish] More reliable source of damage. [Duelist Flurry] More damage. [Skillfull Infiltrator] A must have for 15% movement speed, 3% deflect and 3% critical chance. [Tenacious Concealment] Protects your stealth meter. [Whirlwind of Blades] Your strongest spike AoE damage. Use wisely. [Lurker’s Assault] A Combat TR’s insurance policy. Domination Role Contest nodes against multiple enemies. Clear home node where the enemy PermaStealth lurks. Control enemies targeting your allies. Facetank damage while ranged allies eliminate targets off node. Spike AoE damage in order to kill off straglers. Spike Damage Dealer Though your overall damage output may be low, dealing huge damage spikes is not a farfetched idea. You are a TR after all. You’ll need two items, a ring and a new primary artifact: [Competing Ring of Heartiness]: Believe it or not you get these for 900 glory in the first ToB merchant from the left. It has HP, deflection and tenacity as a stat, and offense slots. For offense slots, go for Azure enchantments. You will need higher critical chance for this setup. [Sigil of the Devoted]: Is a free daily once every two minutes. You will be using Whirlwind of Blades, hence the need for critical chance. [Tactics] Use this instead of Tenacious Concealment for faster 15% Action Point gain. [Lashing Blade] Replace Smoke Bomb with this power. Auto crit it every time from stealth. Tips Whirlwind of Blades crits individually. Different from common AoE powers, which either crit or not on all targets, WoB rolls a separate random number for each target hit. It means the more target you hit, the better odds you will deal critical damage. Your critical chance is, of course, taken into calculation. This is a trivia in RNG. Versus Fighter Setup in writing Versus PermaStealth Setup The Reflect TR can be tweaked solely for the purpose of defeating PermaStealth. You will need a few things from the current META: Path of the Blades: The most effective encounter power against Stealth. Replace Shadow Strike with this power when fighting PermaStealth TR. So Why not use Shadow Strike? You benefit the least out of this power against a Bilethorn-stacking TR. Against another class maybe you can blink in and out of Stealth, but not if they were stacking Bilethorn on you. The setup is mainly ITC+PoB and a third power of your choice. [Plague Fire Enchantment]: PermaStealth has low to average defense but it’s up to you if debuff adds a good flavor. The DoT on PF comes second only to Bilethorn. Alternately, Flaming Enchantment may as well serve this purpose. [Bilethorn Enchantment]: This has been and always will be the best way to unstealth a TR. There is an important logic explained below why unstealthing the TR is your primary concern. Realize that weapon enchantment choices do not jeopardize the build because you perform a defensive role. Amongst all TR META, I believe this one offers you the most freedom of choice when it comes down to weapon enchantments. Countering As you are a combat-type that has shorter Stealth you would lose when you try to fight fire with fire. Fight fire with water. Douse the fire first and go from there. By this logic, you might as well slot out[Tenacious Concealment] for another passive. Personally I wouldn’t, but to each their own. Suffice to say, you would not be entering Stealth often but that is the point I am getting at. In almost everything between defenses and offensive, combat-type TR outperforms a PermaStealth TR if they were to play out of stealth. Your primary concern is draining his stealth meter so he doesnt get Combat Advantage, has lower damage, lower critical severity, decreased movement speed, unable to land Duelist Flurry, reduced Action Point gain. The list goes on. A PermaStealth TR out of Stealth is a fish out of the water. Just add salt. But it can be fatal to underestimate your opponents. Whisperknife TR can also be built as PermaStealth and surprise you with burst damage. Skill will always be a determining factor*. Tips Reflect builds are inherently good in countering PermaStealth in the way that stealth works. With increased deflection chances and ITC, you will have a reliable source of reflect damage to take an enemy out of stealth. Let the TR unstealth himself. When a TR drops PoB and immediately enters Stealth, this attack benefits from Combat Advantage. However, this also gives you the chance to step into ITC, reflecting 5 seconds/PoB ticks as well as Clouds of Steel. With proper timing you can use his weapon against him. Purified Absorption will nullify damage over time effects. When it activates, you have a chance every 3 seconds over 15 seconds to absorb all Bilethorn DoT for 0 damage. There is an odd behavior to it where you still sometimes deflect 0 damage, thus reflecting Bilethorn with Fey Thistle and healing you over Lifesteal for as many times as the BT ticked. Videos & Updates I’m such a slob when recording matches and my machine isn’t up to par either, but I make do. This is the first video I ever made in my life so go easy on the comments! That said, the Reflect TR is just as much an immortality build as any. In this video I demonstrate all of the above theories and whatnot. I was fortunate enough to have fought single matches, 2v1, 3v1, and even 4v1 all in the same game! And it was no ordinary mismatched PuGstomp. The enemy was in fact great–perhaps too great that their perma made two GWF in my team quit. However, this video was not about PuG teams but rather performing the intended role of a Reflect TR in domination: contesting. I would leave soulforged, halfdead enemies that are easy-pickings to my teammates, moving from node to node capturing bases, controlling the battlefield and occasionally scoring a kill. It was incredibly fun to play. Enjoy!
{ "pile_set_name": "Pile-CC" }
Cahill: Costa the next Drogba Drogba said farewell to the Blues for a second time on Sunday as Jose Mourino???s side capped their Premier League title celebrations with a 3-1 win over Sunderland at Stamford Bridge. The Ivorian, who previously left the club after helping win the Champions League with the decisive spot-kick in 2012, was carried off the pitch by his team-mates after two spells totalling nine years in west London. It has been an emotional goodbye and a move borne out of the Ivorian’s desire to give youth a chance, with centre-back Cahill confident they have just the man to replace him in Costa. The 26-year-old’s first season at Stamford Bridge has been injury-disrupted, but his 21-goal haul has highlighted what a fine striker they have on their hands. “I know it’s the second time Didier’s been here but obviously it’s sad that he’s played his last game for the club,” said Cahill. “He said a few words before we left the hotel, it was only brief but it was good. “I’m sure one day we’ll see him back at the club. I don’t think he’s gone forever but probably from a playing point of view that was his last game. “They’re big shoes to fill but Diego couldn’t have started his Chelsea career any better. “He’s had a couple of injuries but nevertheless his goalscoring ratio has been phenomenal. “He’ll be a big player here and with Diego in the team you’re a far better side.” Costa will no doubt have an integral role to play if Chelsea are to retain the title next season. Jose Mourinho’s men comfortably won the championship, but the Blues manager has already hammered home the difficulties they face next season. “He’s told us it will be a lot harder to win it next season, he’s drilling that into us and as players that’s a good thing,” Cahill added on the club’s official website, www.chelseafc.com. “It’s important for us to take his advice as someone who’s been there and done it and no doubt it will be tough because teams always want to beat you when you’re champions, like Man City have found this season. “You don’t need to be told it’s hard. I know how hard it’s been this season, even though we’ve been at the top all the way through. “I’m sure other teams will strengthen in the summer and that will make it even harder for us.???
{ "pile_set_name": "Pile-CC" }
Weather Forecast Bronco athletes seeing results of summer’s weight program Written by Wauneta Breeze Thursday, 19 July 2012 20:28 By Diane Stamm The Wauneta Breeze New Bronco head football coach Joseph Frecks hasn’t coached a game for Wauneta-Palisade yet, but he’ll enter the season with some idea who he’ll be working with after becoming acquainted with the students at Wauneta-Palisade through the summer’s weight lifting program. With the idea of trying something different this year, Frecks and varsity coaches Michelle Harchelroad, volleyball; Dave Kuhlen and Betsy Johanson, boys and girls basketball; and Dawn Doetker, track, sat down in May and divided athletes into four teams. Teams were selected with the hope that upperclassmen would be leaders and role models for their younger teammates. The coaches wanted to see as many kids participate as possible. “We’ve been happy with the number of kids attending,” said Frecks. “The seniors and juniors have been stepping it up and setting a good tone.” The program has averaged around 15 athletes per day with some sessions seeing 20 students. Frecks feels that it has helped that the workouts are gender specific. He said the girls are excited to have their own workout. Girls have been lifting in Wauneta in the evenings. Boys have spent their mornings in Palisade. Each athlete earns a point for a completed workout. The team with the most points at the end of the summer will win a prize, as will the top individual. Frecks said there is a tentative plan to hold a barbeque at the completion of the program. The coaches and Superintendent Randy Geier have been dedicated to getting the kids excited and have done a great job supervising, according to Frecks. As of July 10, Team Black is leading in the standings with 64 points. Teams Red and White each have 54 points and Team Blue has 53.
{ "pile_set_name": "Pile-CC" }
can you follow me to the car dealership at lunch tomorrow at lunch so i can drop off the tahoe to get fixed?
{ "pile_set_name": "Enron Emails" }
Score! Hero, from the award winning makers of Score! World Goals, Dream League Soccer & First Touch Soccer. BE THE HERO! Pass, Shoot & Score your way to legendary status, as you explore the dramatic career of your HERO player over 460 challenging levels! Immersive free flowing 3D Score! Gameplay lets you control the action. Split defences with precise through balls, or bend shots into the top corner, putting you in control for an unrivalled mobile soccer experience. 87 / 100104.35 Feel like an NFL Superstar in Madden NFL 20. Be the Face of an NFL franchise where the decisions you make matter in your journey to become an NFL Superstar in ‘FACE OF THE FRANCHISE: QB1’. Feel the emotion, personality, and power of NFL Superstars with ‘SUPERSTAR X-FACTOR’, an all-new abilities progression system that reveals special abilities for today’s most exciting NFL Superstars heightening the level strategy and excitement in every game. WSC Real 08 promises to be the most authentic Snooker experience ever created, with a host of groundbreaking new features which immerse you in the shoes of a pro like never before. Create your own Snooker personality and get ready to compete at the very top in the Official game of World Snooker! Break Time: The National Pool Tour is a pocket billiards (pool) video game released for the Nintendo Entertainment System. There are four unique challenges in the game, eight-ball, nine-ball, rotation and straight pool. All four are allegedly played according to the professional (i.e. world standardized) rules. 60 / 10013.0 Powered by Frostbite™, EA SPORTS™ FIFA 20 for PC brings two sides of The World’s Game to life - the prestige of the professional stage and an all-new, authentic street football experience in EA SPORTS VOLTA. FIFA 20 innovates across the game, FOOTBALL INTELLIGENCE unlocks an unprecedented platform for gameplay realism, FIFA Ultimate Team™ offers more ways to build your dream squad and EA SPORTS VOLTA returns the game to the street with an authentic form of small-sided football.
{ "pile_set_name": "Pile-CC" }
Window coverings come in many different configurations. Many window coverings are adjustable in various different ways, such as including adjustable height for a lower portion of the shade, such as a bottom rail. Such adjustable shades can be lifted or lowered to cause the shade to alternatively block a greater or lesser portion of the window. Lift cords are provided that can be manipulated to control the position of the bottom of the shade. Other cords are often utilized to adjust an angle at which slats or other structures within the window are oriented. Such cords may extend down from different portions of the shade, depending on the configuration of the shade. One shade in particular which is adjustable is shown in FIG. 1 and exists within the prior art. This shade includes lift cords which extend from a top rail down through the shade or other window covering to a bottom rail. In the bottom rail they come together and pass through a cord brake which holds the cords in position and holds the bottom rail where desired, except when a button is pushed to allow height adjustment of the bottom rail. This prior art shade depicted in FIG. 1 has the cords extending down from the cord brake in the middle of the bottom rail. Such a configuration for this particular shade, and perhaps other shades, is not always the most desirable orientation. This orientation causes the cords to block somewhat the view out through the window when the shade is partially or fully raised. In general, it would be more desirable if these cords extended down from one edge of the shade so that the window would not be blocked by the cords in any fashion. Also, having the cords angled over to some form of cord holder off to the side of the shade would decrease a length that the cord would dangle down from the bottom rail. Cords can present danger to children, pets and others, and so are best kept sufficiently high so that children cannot handle them. Also, keeping them sufficiently elevated can reduce the possibility of children being able to play with the shades and potentially damage them. Accordingly, a need exists for some form of cord management system which can hold cords which would otherwise extend from a portion of the shade which is not desired over to a different portion of the shade where location of the exposed cords is more desirable, and with potentially less of the cords extending downwardly therefrom.
{ "pile_set_name": "USPTO Backgrounds" }
Introduction ============ Pancreatic cancer (PC) is one of the most lethal forms of cancer, with a 5-year survival rate of less than 5%.[@b1-ott-11-619] Although surgical resection of the primary tumor is currently the first selected treatment for PC and offers the best survival rate, \~80% of the patients are not candidates for surgical resection because at the time of appearance of the first symptoms, most PC patients will have advanced-stage disease.[@b2-ott-11-619]--[@b4-ott-11-619] Even in PC patients who qualify for radical resection, which is now the only potential cure, the 5-year survival rate is only 25%, owing to the high incidence of undiscovered metastatic lesions.[@b5-ott-11-619],[@b6-ott-11-619] For patients presenting with advanced PC, chemotherapy and radiation therapy are the most commonly used frontline clinical strategies. However, the overall survival of these patients remains poor, as the highly heterogeneous and aggressive pancreatic tumors easily develop resistance, highlighting the dire need for other treatment options.[@b7-ott-11-619] In recent years, Iodine-125 (^125^I) seed implantation, a form of radiotherapy, has been accepted as a useful and minimally invasive interventional modality and provides a new treatment option for unresectable PC. The local tumor control is improved with fewer complications.[@b8-ott-11-619],[@b9-ott-11-619] In this procedure, ^125^I radioactive seed is permanently implanted into the tumor or region of interest. This miniature radioactive source continuously delivers low doses of X-rays and γ-rays, irradiates the G2- and M-phase tumor cells, and destroys double-stranded DNA to inhibit their proliferative ability, leading to the ultimate death of the cells. Because the radiation dose of ^125^I seed decreases rapidly with increasing distance from the source, a large proportion of radioactive dose is localized to the tumor region and damage to the surrounding normal tissues is avoided, thereby achieving conformal radiation therapy.[@b10-ott-11-619] Recently, the clinical efficacies of ^125^I seed implantation have been encouraging, especially in pain relieving and local tumor control.[@b11-ott-11-619]--[@b14-ott-11-619] Wang et al[@b15-ott-11-619] have reported that in a clinical investigation of ^125^I seed implantation as a salvage modality for unresectable PC, the local control of tumor was achieved in 85.7% (24/28) of patients, and a good to medium pain relief was achieved in 94.1% (16/17) of patients. The median survival was 10.1 months (95% CI: 9.0--10.9). To date, computed tomography (CT) and ultrasound are the most commonly used imaging modalities to guide the procedure of ^125^I seed implantation. Because of the advantages of direct vision, real-time dynamic imaging, and no radiation, ultrasound is now widely used in the percutaneous delivery of ^125^I seeds in the treatment of PC, with an improvement in accuracy and a relative reduction of complications. Precise implantation of ^125^I seeds and even radioactive dose distribution in three-dimensional (3D) space are the preconditions for clinical effectiveness. However, at present, even dose distribution of seed implantation is often affected by the operator's experience and the lack of 3D information of the tumor and the adjacent tissues or vessels, yielding incomplete coverage of the tumors and failed local control. In order to solve this problem, more and more researchers are trying to bring in the application of 3D image processing and analysis technology, 3D visualization and computer-aided technology, in the treatment of tumor. Therefore, our team and Hokai company (Zhuhai Hokai Biomedical Electronics Co., Ltd., Zhuhai, China) have developed a 3D visualized seed planning and navigation system. This 3D system with rapid image processing and image fusion technologies is able to visualize the 3D space relationship between tumors and surrounding structures, guide the path and position of needle insertion, and display 3D distribution of the radioactive dose. This study aimed to evaluate the effectiveness, safety, and patient survival of ultrasound-guided ^125^I seed implantation in the management of PC with or without the assistance of this 3D visualized seed planning and navigation system. Patients and methods ==================== Patients -------- From December 2010 to November 2016, 25 patients with unresectable pancreatic cancer who met our inclusion criteria and underwent ultrasound-guided ^125^I seed implantation in the Department of Interventional Ultrasound, General Hospital of People's Liberation Army were reviewed. Twelve patients (with 13 lesions) who underwent the procedure received the assistance of the 3D visualized seed planning and navigation system (hereinafter 3D group), and 13 patients (with 14 lesions) did not (hereinafter 2D group). This retrospective study was approved by the Chinese PLA General Hospital Institutional Review Board and all patients provided informed written consent. Of the 13 patients in 2D group, 23% (3/13) had jaundice, 69% (9/13) suffered from pain, and 38% experienced (5/13) weight loss. Two patients had chemotherapy, one had molecular-targeted therapy, two had high-intensity focused ultrasound (HIFU), one had transcatheter arterial chemoembolization, and one had percutaneous transhepatic cholangial drainage (PTCD) before the procedure. After the procedure, one patient in 2D group received two cycles of concurrent chemotherapy and molecular-targeted therapy, and another patient received immunotherapy two times (dendritic cell-cytokine-induced killers). According to the clinical TNM staging, five patients were diagnosed with stage II disease, six had stage III disease, and two had stage IV disease. Of the 14 lesions in 2D group, eight were located in the head, two in the neck, and four in the body or tail of the pancreas. Of the 12 patients in 3D group, 42% (5/12) had jaundice, 69% (9/12) suffered from pain, 50% experienced (6/12) weight loss, and 25% (3/12) had nausea. One patient had surgery, one had radiotherapy, two had chemotherapy, one had molecular-targeted therapy, one had HIFU, and two had PTCD before the procedure. Five patients were diagnosed with stage II disease, three had stage III disease, and four had stage IV disease. Of the 13 lesions in 3D group, nine were located in the head and two in the body or tail of the pancreas, and two metastatic lesions were located in the liver. Nine patients of the 2D group and eight patients of the 3D group had pathological diagnosis and four patients of each group were clinically diagnosed with pancreatic cancer based on clinical characteristics and imaging features. Nine patients of the 2D group and eight patients of the 3D group accepted ^125^I seed implantation procedure once, while four patients of each group received additional procedures for one or several times because of the progression of the lesions after at least 1-month of follow-up. One patient in 2D group and one patient in 3D group failed to follow-up 6 months post-treatment. Summaries of the patients' characteristics and tumor characteristics of both groups are presented in [Table 1](#t1-ott-11-619){ref-type="table"}. Inclusion and exclusion criteria -------------------------------- Inclusion criteria for the patients of 3D or 2D group in our study were as follows: 1) lesion diameter ≤7 cm; 2) patients with unresectable lesions or cannot tolerate surgery; 3) local anesthesia can be tolerated; and 4) platelet count \>40×10^9^/L, prothrombin activity \>40%, prothrombin time \<25 s. Exclusion criteria were as follows: 1) evidence of widespread tumor metastasis; 2) no safe needle insertion path under ultrasound guidance; 3) lesion diameter \>7 cm; 4) patients with cachexia or refractory ascites; 5) severe hemorrhagic tendency not improved after blood transfusion or use of hemo-statics; 6) patients with acute pancreatitis; and 7) patients with severe cardiovascular disease or mental illness. Treatment planning protocol --------------------------- For the 3D group, Digital Imaging and Communications in Medicine data obtained from CT scans of the PC patients were used to do the preoperative treatment planning for ^125^I seed implantation procedure with assistance of the developed 3D visualized seed planning and navigation system. The system assisted the doctors in 3D reconstruction of the tumor, surrounding tissues, and vessels; calculation of the required number of ^125^I seeds; and planning of the needle insertion path. ^125^I radioactive seed (29.6 MBq, 0.8 mCi) (Beijing Atom and HighTechnique Industries Inc, Beijing, China) has a half-life of 59.4 days with a low energy level of 27.4 KeV and the seed distance of 1 cm.[@b16-ott-11-619] The matched peripheral dose (MPD) was 120 Gy and D90\> MPD; D90 is defined as the dose such that at least 90% of the tumor volume received the reference dose. The preoperative treatment planning for seed implantation is shown in [Figure 1](#f1-ott-11-619){ref-type="fig"}. For the 2D group, CT scans and ultrasound were done before the procedure to evaluate the detailed tumor location and safe path for needle insertion. The implanted seed number was calculated by the formula: seed number = (length + width + height) ÷ 3×5. Ultrasound-guided ^125^I seed implantation for pancreatic cancer ---------------------------------------------------------------- Before the procedure, a detailed understanding of the treatment history was required. For patients with obstructive jaundice, PTCD was necessary. Anticoagulant or antiplatelet drugs should be discontinued for 5--7 days. Preoperative examination of blood routine, liver and kidney function, blood coagulation, pancreatin, and CA19-9 level should be done. One day before the procedure, gastrointestinal preparation and intravenous infusion of somatostatin (0.25 mg/h) were performed. The seed implantation procedure was performed in our department, and local anesthesia was used. Patient's position was dependent on the location of the tumors. Electrocardiography monitoring was used when necessary during the procedure. Conventional gray scale ultrasound or contrast-enhanced ultrasound (CEUS) was used to evaluate the lesion size, find a safe puncture path, and guide the procedure. An 18-gauge needle was placed into the tumor lesions and the radioactive seeds were implanted using a Mick applicator and spaced at intervals of 1.0 cm using the same needle.[@b17-ott-11-619] After the seed implantation, the needle was withdrawn and then the puncture point was sterilized with alcohol. The presence of abnormal effusion or hematoma around the treated lesion was checked with ultrasound. Patient follow-up ----------------- Postoperative evaluation was performed. According to the preoperative and postoperative CT scans (at 1, 2, and 6 months post-treatment), whether there was a "cold zone" of the radioactive dose, whether the distribution of seeds was as planned, or whether there was a shift of seeds was assessed. If the radioactive dose coverage of the tumor was incomplete, the complementary ^125^I seed implantation was done within 5 days. The follow-up included laboratory tests (blood count, pancreatin, and CA19-9 level), routine physical examination, CEUS, or abdominal CT imaging at 1, 2, 3, and 6 months post-treatment and then at 6-month intervals for both groups. Follow-up was closed at the time of death or the last follow-up date which was March 1, 2017. Survival was calculated from the date of treatment to the date of death or last follow-up. Definition of tumor response ---------------------------- Tumor response was assessed according to the revised Response Evaluation Criteria in Solid Tumors (RECIST) guideline.[@b32-ott-11-619] Briefly, there are four levels of the response: 1) complete remission (CR) was defined as disappearance of all target lesions and any pathological lymph node (whether target or non-target) must show a reduction in short axis to \<10 mm; 2) partial response (PR) was defined as at least a 30% decrease in the sum of diameters of target lesions, taking as reference the baseline sum of diameters, time ≥4 weeks; 3) stable disease (SD) was defined as neither sufficient shrinkage to qualify for PR or sufficient increase to qualify for PD, taking as reference the smallest sum of diameters while on study; 4) progressive disease (PD) was defined as at least a 20% increase in the sum of diameters of target lesions, taking as reference the smallest sum of diameters while on study, or the occurrence of one or more new lesions. In addition to the relative 20% increase, the sum must also demonstrate an absolute increase of at least 5 mm. The local control rate was defined as the proportion of patients with a CR or PR. Statistics analysis ------------------- SPSS 20.0 (SPSS Inc, Chicago, IL, USA) was used to perform the statistical analysis. Comparison between 2D and 3D groups was conducted by using Pearson's *χ*^2^ test or Fisher's exact test. Overall survival rate and the univariate analysis to identify predictors of survival were calculated by using the Kaplan--Meier method and compared by the log-rank test. Data were presented by average ± standard deviation. A *P*-value \<0.05 was considered to be statistically significant. Results ======= Patient characteristics ----------------------- As shown in [Table 1](#t1-ott-11-619){ref-type="table"}, there were no significant differences between 2D group and 3D group with regard to sex, age, lesion diameter, primary tumor location, treatment times (number of seed implantations), clinical staging, and pathology of the tumor. Treatment parameter and local control ------------------------------------- The seed implantation procedures proceeded well in both groups, and no major complications occurred during the procedure. The number of implanted ^125^I seeds in 2D group ranged from 3 to 57, and the average number was 18.59±2.167. The average number of needle insertions was 5.059±0.4794 (ranged from 2 to 12 times). The number of implanted seeds in 3D group ranged from 5 to 42, and the average number was 15.50±1.653. The average number of needle insertions was 4.423±0.4936 (ranged from 2 to 11 times). In 2D and 3D groups, the implantation procedure was performed successfully in one session in 45.5% of patients (10/22) and 80.0% of patients (16/20), respectively. The rest of the patients in the two groups had to accept additional ^125^I seed implantation within 5 days after the first implantation, owing to the unclear images of ultrasound caused by too much gas coming into the lesions while inserting the needle or incomplete dose coverage of lesions by ^125^I seeds showed by postoperative CT scans. Therefore, the one-time treatment success rate of 2D and 3D groups was 45.5% and 80.0%, respectively. As shown in [Table 2](#t2-ott-11-619){ref-type="table"}, there was no significant difference in the number of implanted seeds and needle insertions between 2D and 3D groups (*P*\>0.05). However, one-time treatment success rate of the 3D group was significantly higher than the 2D group (*P*\<0.05), and the proportion of added seeds in the second session within 5 days in 3D group was significantly lower than that in 2D group (*P*=0.034). Patients of both groups were followed up for 1 month after the procedure to evaluate the tumor response. According to RECIST criteria, among the 14 lesions in 2D group, the number of CR, PR, SD, and PD cases were 1, 4, 8, and 1, respectively. Among the 13 lesions in 3D group, CR, PR, SD, and PD cases were 1, 9, 3, and 0, respectively. Therefore, the short-term local control rate in the 3D group was significantly higher than in the 2D group (*P*\<0.05) ([Table 2](#t2-ott-11-619){ref-type="table"}). The follow-up and tumor responses of a patient in 3D group after the ^125^I implantation procedure are shown in [Figure 2](#f2-ott-11-619){ref-type="fig"}. Survival -------- The Kaplan--Meier survival curve shows that the survival rate of 3D group was significantly higher than 2D group (*P*=0.026) ([Figure 3](#f3-ott-11-619){ref-type="fig"}). The median survival time of 2D and 3D groups was 5.00 months (95% CI: 0.76--9.24) and 10.8 months (95% CI: 0.00--28.40), respectively. The median survival of all the 25 patients was 7.10 months (95% CI: 4.43--9.77). Univariate analysis ------------------- The influence of patient and tumor-related factors on survival is shown in [Table 3](#t3-ott-11-619){ref-type="table"}. The results of univariate analysis revealed that the survival of PC patients was significantly correlated with treatment times (*P*=0.043). Therefore, those PC patients whose tumors do not grow fast and have the chance to receive more ^125^I implantation procedures might survive longer. Pain relief ----------- Pain is one of the most common symptoms of PC.[@b17-ott-11-619] Among the 13 patients in 2D group, nine patients suffered from pain before ^125^I seed implantation. Seven patients (7/9, 77.8%) achieved good to medium pain relief post-treatment and three patients achieved complete pain relief, and it occurred on days 2, 4, and 5 after the procedure, respectively. Among the 12 patients in 3D group, nine of them suffered from pain. Eight patients (8/9, 88.9%) achieved pain relief and five achieved complete pain relief, and it occurred on days 1, 3, 4, 5, and 7, respectively. There was no significant difference between the two groups in pain relief rate. Complications ------------- No vital structures around the lesions were injured during the procedure and no severe intraoperative or postoperative complications occurred in all patients. During the procedure, five patients (5/13, 38.5%) had mild pain and a small amount of hemorrhage was observed in one patient (1/13, 7.7%) in 2D group. The hemorrhage stopped after the intravenous infusion of thrombin. In 3D group, two patients (2/12, 16.7%) experienced mild pain and no one had hemorrhage. After the procedure, three patients (3/13, 23.1%) in 2D group and two patients (2/12, 16.7%) in 3D group had postoperative fever. The body temperature decreased to normal by using oral antipyretics. One patient (1/12, 8.3%) in 3D group suffered from postoperative nausea and turned to be better after treatment. No seed displacement and obvious leukocyte decreasing were observed. There was no significant difference between intraoperative (*P*=0.202) and postoperative complications (*P*=1.000) in the two groups. Discussion ========== PC is one of the five most lethal malignancies in the world, and the overall survival has not been significantly improved in the past 30 years.[@b1-ott-11-619],[@b18-ott-11-619] Although there are a lot of advances in radiotherapy, chemotherapy, combined therapy, and targeted therapy, the therapeutic effects of these nonsurgical therapies are not satisfactory. Conventional radiotherapy for locally advanced PC may prolong survival, and the 1- and 2-year survival rates are 30% and 10%, respectively.[@b19-ott-11-619],[@b20-ott-11-619] The therapeutic effects of new options in radiotherapy such as stereotactic body radiation therapy (SBRT), 3D conformal radiotherapy, intensity-modulated radiotherapy, intraoperative radiation therapy, high-dose rate radiation, or low-dose rate have all been explored in treating unresectable PC. Some reports indicated that SBRT combined with chemotherapy might be useful in treating PC patients, achieving a median survival time of 10.6--14.3 months with acceptable complications;[@b21-ott-11-619]--[@b23-ott-11-619] however, some researchers still believe the benefits of SBRT are questionable. Nagai et al reviewed 198 patients with unresectable PC and concluded that intraoperative radiotherapy followed by gemcitabine (GEM)-based chemotherapy was the recommended treatment strategy for unresectable PC.[@b24-ott-11-619] Ogawa et al[@b25-ott-11-619] reported that the median survival time for 144 patients treated with intraoperative radiotherapy with or without external beam radiotherapy, was 10.5 months. Zhang et al[@b26-ott-11-619] performed a meta-analysis comparing the therapeutic effects of GEM alone and radiotherapy combined with GEM for PC patients and found out that the clinical efficacy of radiotherapy combined with GEM was no better than GEM alone. But Chen et al[@b27-ott-11-619] reported that the 6-, 12-, and 18-month survival rate of combined radiochemotherapy was higher than radiotherapy or chemotherapy alone, despite the higher possibility of treatment-related toxicity. Molecular-targeted therapies have shown promising effects for killing PC cells in vitro and in animal experiments, but the results of several clinical trials of targeted therapies have not shown any clinical benefit.[@b28-ott-11-619]--[@b31-ott-11-619] Recently, a new treatment modality, ^125^I seed implantation, has been accepted as an effective, minimally invasive, local-regional, and interventional therapy for locally advanced PC. Treatment Planning System (TPS) is a software system that can assist the operators to do the preoperative planning of ^125^I seed implantation. However, there are some disadvantages of the existing TPS systems. Most of the domestic TPS systems are just a set of computer software, which can only be used to do the preoperative treatment planning while ignoring the connection and coordination between the intraoperative implantation and preoperative treatment plan, and perform no function in positioning and orientation. TPS developed abroad have considered the above-mentioned factors, but the positioning and orientation hardware has been designed based on the treatment site, ie, prostatic cancer; therefore, it is difficult to be expanded to treat tumors in other body parts, such as liver or pancreas. Although some commercial navigation systems have emerged recently, none of them has reached a wide clinical application, especially in the area of interstitial brachytherapy. In this study, we use our self-developed 3D visualized seed planning and navigation system to assist the operators to perform the ^125^I seed implantation procedure for PC patients. This system can acquire a 3D visualization of the patient's anatomy by reconstructing the images acquired from magnetic resonance or CT scans, identify safe and operable needle trajectories, and calculate the number of seeds needed so as to achieve the calculated dosimetric goals. The results of this study comparing the outcomes between the 3D and 2D group indicate the potential value of this 3D system in clinical application. However, since the patient number in this preliminary study is quite small, larger patient cohort and randomized control trial are still needed to validate the results of the study and the clinical value of this 3D system. In addition, the 3D system remains to be optimized in many aspects. In the near future, we shall focus more on the improvement of the real-time navigation guidance accuracy and the smooth connection among preoperative treatment planning, intraoperative navigation, and postoperative evaluation for seed implantation. We would like to thank Professor Zhigang Cheng and Professor Jie Yu for their kind assistance in the acquisition of original data. This work was funded by the National Natural Science Foundation of China (numbers 81471683 and 81671710). **Disclosure** All of the authors report no conflicts of interest in this work. ![The preoperative treatment planning for ^125^I seed implantation. (**A**) Preoperative treatment planning using the 3D visualized seed planning and navigation system and (**B**) preoperative dose volume histograms. A total of 90% of the tumor target received 125.24 Gy (D90=125.24 Gy), and 97.22% of the tumor target received 100% of the prescribed dose (V100=97.22%, red dashed line). D90 and D80 represent the dose such that at least 90% or 80% of the tumor volume received the reference dose, respectively. V80--V100 are the volumes that received 80%--100% reference dose, respectively.\ **Abbreviations:** ROI, region of interest; vol, volume; Ref, reference; 3D, three-dimensional; Gy, gray.](ott-11-619Fig1){#f1-ott-11-619} ![Images from a 63-year-old male patient diagnosed with moderately differentiated pancreatic adenocarcinoma. (**A**) Preoperative PET imaging; the white arrows indicate the tumor. (**B**--**E**) 1-, 3-, 6-, and 12-month CT scans, respectively, of this patient post-procedure. The lesion apparently shrunk, and the enhanced CT showed there was no activity.\ **Abbreviations:** PET, positron emission tomography; CT, computed tomography.](ott-11-619Fig2){#f2-ott-11-619} ![Cumulative overall survival rates in 3D group and 2D group. The survival rate of 3D group is significantly higher than that of 2D group (*P*=0.026).\ **Abbreviations:** 3D, three-dimensional; 2D, two-dimensional.](ott-11-619Fig3){#f3-ott-11-619} ###### Baseline characteristics of patients in 3D and 2D groups Characteristics 2D group 3D group *P*-value ------------------------------------------------- ------------ ------------ ----------- Sex 1.000  Male 9 8  Female 4 4 Age, years 0.867  ≥70 5 5  \<70 8 7 Mean age ± standard deviation 68.00±9.14 67.73±8.68 Lesion diameter 0.880  Mean tumor diameter (cm) ± standard deviation 4.63±1.28 4.15±1.02   ≤3 cm 3 3   \>3 cm to ≤5 cm 6 7   \>5 cm to ≤7 cm 5 3 Primary tumor location 1.000  Head 8 9  Neck 2 0  Body and/or tail 4 2  Liver 0 2 Treatment times 1.000  1 9 8  \>1 4 4 Clinical staging 0.464  II 5 5  III 6 3  IV 2 4 Pathology 0.688  Adenocarcinoma 9 7  Neuroendocrine carcinoma 0 1  Unknown 4 4 History of treatment  Surgery 0 1  Radiotherapy 0 2  Chemotherapy 2 2  Immunotherapy 0 0  Molecular-targeted therapy 1 1  Minimally invasive local treatment (TACE/HIFU) 3 1  PTCD 1 2 Symptoms  Jaundice 3 5  Pain 9 9  Weight loss 5 6  Nausea 0 3 **Abbreviations:** TACE, transcatheter arterial chemoembolization; HIFU, high-intensity focused ultrasound; PTCD, percutaneous transhepatic cholangial drainage; 3D, three-dimensional; 2D, two-dimensional. ###### Parameters of seed implantation procedure and local control rate Characteristics 2D group 3D group *P*-value --------------------------------------------------------- ------------- ------------ ----------- Number of seeds, mean ± standard deviation 18.59±2.167 15.50±1.65 0.287 Number of needle insertions, mean ± standard deviation 5.06±0.48 4.42±0.49 0.366 Proportion of added seed number (%) -- -- 0.034 One-time treatment success rate (%) 45.5 80.0 0.029 Local control rate (%) 35.7 76.9 0.038 Patients who had CR and PR response after the treatment 5 of 14 10 of 13 **Note:** Data presented as mean ± standard deviation, percentage, or *P*-value. **Abbreviations:** CR, complete remission; PR, partial response; 3D, three-dimensional; 2D, two-dimensional. ###### Single factor analysis of prognostic factors for overall survival Variable *χ*^2^ value *P*-value ------------------ -------------- ----------- Group 4.974 0.026 Sex 0.062 0.803 Age 0.002 0.969 Treatment times 4.017 0.043 Lesion diameter  ≤3 cm 3.956 0.228  \>3 cm to ≤5 cm -- --  \>5 cm to ≤7 cm -- -- Clinical staging  II 2.528 0.283  III -- --  IV -- -- Pathology  Adenocarcinoma 0.563 0.754  Neuroendocrine -- --  Unknown -- -- Tumor response  SD + PD 3.422 0.064  CR + PR -- -- **Abbreviations:** SD, stable disease; PD, progressive disease; CR, complete remission; PR, partial response.
{ "pile_set_name": "PubMed Central" }
One of the things I found made teaching Spanish to my kids easier was that I was a teacher and understood language learning. Even the most motivated parents, with perfect language skills, do not always know how to create situations where children can learn Spanish when it is not the majority language. Although language learning is complicated, and every situation is different, a basic understanding of what works is a big help. Much of what I say here coincides with Stephen Krashen’s theories on language acquisition and other research in the field. If you would like to read more about how children learn language, Krashen’s work is a good place to start. Comprehensible language Children learn new language when it is in a context that makes the meaning clear. Visuals clues (pictures, objects, gestures, facial expressions) and a child’s understanding of the world can clarify new language to help a child understand. Books can be wonderful sources of comprehensible language because the world of the story creates a limited context, and the pictures and storyline combine to make the meaning of the text clear. What it means for you As a parent (or a teacher), you are a primary source of comprehensible language. Talk about everything you do and describe what your child is doing. Comment on what you see and hear around you. Read to your child, and provide as many situations as possible where language is combined with physical, hands-on learning and supported by visual and situational clues. Natural language Children need to hear and read Spanish used naturally, in complete and related sentences. Language is much more than vocabulary. It is a complex system and to learn how the parts fit together, children need to be exposed to the whole, not just individual pieces. Of course you can teach vocabulary, but that is only a small part of what children need to acquire language. What it means for you Provide as much whole language at the appropriate level as possible. Talk to your child in Spanish using complete sentences. Read to your child every day. (See 10 Best Strategies for Reading to Kids in Spanish.) When choosing Spanish language books, apps, and activities, look for products that use the words in full sentences and combine sentences to communicate real information. Relevant, meaningful language To learn a language children must engage in real communication. The content of the message has to be important to them; it has to carry meaning that is relevant to the situation and their lives. Ideally, children need to understand and express themselves, but in low-stress situations. What it means for you Provide as many opportunities as possible for children to act upon what they understand. Also, find situations where they need to express themselves in Spanish. When your child speaks Spanish to you, make every effort to reinforce the power of the language by focusing on the content and reacting positively. Level of language For children to acquire language, they have to be exposed to new structures and vocabulary. However, it is important that this happen through many small steps. The level of the input should engage and slightly challenge a child, but if it is too high, a child will not be able to retain or process what she is hearing or reading. What it means for you As a primary source of comprehensible language, you need to keep your child’s level in mind. Often, as kids grow, there is a tendency for us to move to materials that are age appropriate, but are too complicated for them to learn from. It can be a challenge to find high-interest activities and materials at the correct language level for kids in elementary and middle school. Combining different types of materials helps with this. For example, continue to read picture books to your child, although they might seem “babyish,” but look for popular, age-appropriate music in Spanish. Also, many games and activities that are not primarily language-based let you adjust the level of Spanish that you speak to your child. For example, playing games like checkers or chess, doing jigsaw puzzles or cooking together you can provide lots of comprehensible input at the correct level as your child does something she enjoys. Repetition and exposure to language Acquiring language is a complicated, long-term process. It depends on repeated exposure, both in the short term and over time. To learn and remember a new word, children must hear it used in a meaningful context many times. To learn and acquire complex grammatical structures takes even more exposure. What it means for you The time that it takes to truly acquire a language is both a challenge and a godsend. Consistency matters a lot, but we have time to try, shift strategies, adapt what we are doing to ever-changing kids, and try again. Because repeated exposure is essential, when you do not know what to do, do something you have done before. Break out old books, games and movies. There is more learning left in them than you think. I love this list of simple, clear and practical tips. It sounds so relevant to lots of different languages. My wife and I are bringing up our son using both English and Welsh and the pointers here sound really helpful. Thank you! Thank you for this clear message, and the useful tips. I agree that for children you have to use the right materials for them to learn the language, in a proficient, but also fun way. I am not a Spanish teacher, but I ran a Spanish Language School in Spain, and now we have set up online courses for children, along with qualified Spanish native teachers. We put a lot of emphasis on communication, and use interactive learning materials. A lot of fun to do, and very rewarding to see children succeed picking up the language! Wow! This is really, really great advice! I love the point about relevant language, something we can so easily take for granted, but so important for children to be able to grasp the language we are trying to teach! I agree with everything you are saying in this article. I am a true believer that the more relevant the language being learnt, the easier the child learns. Teachers have often focused on the fun aspect for children but I think the “interest” level also needs to be maintained. Out with the old style of teaching grammatical structures. In with the fun and interactive new methods of teaching. Leave the technical teaching for us to get confused with later in life, if we have to at all 😉
{ "pile_set_name": "Pile-CC" }
Kyle Busch ran third, followed by reigning series champion James Buescher and Ryan Blaney. “To beat Kyle Busch and Brad Keselowski, two of the best drivers on four wheels right now, is pretty special,” Dillon said. “I want to be like them some day.” Dillon took his time tracking down Busch in the closing laps and picked his spot with 25 to go. “My car just took off at the end,” Dillon said. “I knew I was faster, so I just really tried not to kill my car, kill my tires, and it finally came to us. I got a good run through (Turns) 1 and 2 and got by him in 3 and 4. It (Dillon’s No. 3 Chevrolet) turned into a rocket ship there at the end. “I wasn’t that great in the beginning and the middle, but (crew chief) Marcus (Richmond) and the guys kept digging and kept digging.” Rookie Darrell Wallace Jr. spun in Turn 3 on Lap 86, racing in close quarters underneath the No. 29 of Blaney, to cause the fifth caution on Lap 86. Wallace had led a race-high 54 laps to that point but had to take his No. 54 Toyota to the garage for repairs. Wallace, who had perhaps the fastest truck in the race, was disappointed but philosophical. “I though I had it, and I think if he (Blaney) wasn’t there and already gone that I might have saved it and just lost more positions,” Wallace said. “Just hard racing. I’m still trying to figure these (trucks) out. I’m a rookie—that’s what the yellow stripes are for (on the bumpers of rookies’ cars and trucks).” The accident left Busch, Wallace’s car owner, in charge of the proceedings, at least for a while. Busch pulled away from Blaney after a restart on Lap 91 and held an advantage of 1.035 by the time the race reached Lap 100. But Bryan Silas’ spin in Turn 4 slowed the field again on Lap 108, giving the lead-lap cars a chance to pit and pick up enough fuel to finish the race. Busch fought off a challenge from Blaney on Lap 118, forcing the 19-year-old driver into the outside wall. Blaney damaged the right side of his truck but was able to hold the fifth position. Moments after the contact, Dillon began to mount his challenge and eventually passed Busch, whose truck had developed a drastically loose handling condition, on Lap 125. Keselowski passed Busch for the runner-up spot on Lap 138 but had nothing for Dillon in the final 12 circuits.
{ "pile_set_name": "Pile-CC" }
[**A proposal for nonabelian (0,2) mirrors**]{} Wei Gu$^1$, Jirui Guo$^2$, Eric Sharpe$^1$ [cc]{} ------------------------- $^{1}$ Dep’t of Physics Virginia Tech 850 West Campus Dr. Blacksburg, VA 24061 ------------------------- & -------------------------------------------- $^2$ Dep’t of Physics Center for Field Theory & Particle Physics Fudan University 220 Handan Road 200433 Shanghai, China -------------------------------------------- [[email protected]]{}, [[email protected]]{}, [[email protected]]{} $\,$ In this paper we give a proposal for mirrors to (0,2) supersymmetric gauged linear sigma models (GLSMs), for those (0,2) GLSMs which are deformations of (2,2) GLSMs. Specifically, we propose a construction of (0,2) mirrors for (0,2) GLSMs with $E$ terms that are linear and diagonal, reducing to both the Hori-Vafa prescription as well as a recent (2,2) nonabelian mirrors proposal on the (2,2) locus. For the special case of abelian (0,2) GLSMs, two of the authors have previously proposed a systematic construction, which is both simplified and generalized by the proposal here. August 2019 Introduction ============ One of the outstanding problems in heterotic string compactifications is to understand nonperturbative effects due to worldsheet instantons. For type II strings and (2,2) worldsheet theories, these effects are well-understood, and are encoded in quantum cohomology rings and Gromov-Witten theory. In principle, there are analogues of both for more general heterotic theories, but there are comparatively many open questions. For example, in a heterotic $E_8 \times E_8$ compactification on a Calabi-Yau threefold with a rank three bundle, the low-energy theory contains states in the ${\bf 27}$ and ${\bf \overline{27}}$ representations of $E_6$, with cubic couplings appearing as spacetime superpotential terms. On the (2,2) locus (the standard embedding, where the gauge bundle equals the tangent bundle), for the case of the quintic threefold, those couplings have the standard form [@Strominger:1985ks; @Candelas:1990rm] $${\bf \overline{27}}^3 \: = \: 5 \: + \: \sum_{k=1}^{\infty} n_k \frac{k^3 q^k}{1 - q^k} \: = \: 5 \: + \: 2875 \, q \: + \: 4876875 \, q^2 \: + \: \cdots,$$ where the $n_k$ encode the Gromov-Witten invariants. These are computed by three-point functions in the A model topological field theory on the worldsheet. Off the (2,2) locus, for more general gauge bundles, these couplings have a closely analogous form: a classical contribution plus a sum of nonperturbative contributions, without any perturbative loop corrections [@Wen:1985jz; @Dine:1986zy; @Dine:1987bq; @Silverstein:1995re; @Berglund:1995yu; @Beasley:2003fx]. As a result, we know that more general heterotic versions of the Gromov-Witten invariants exist, but they have only ever been computed on the (2,2) locus. Their more general expressions are an unsolved open problem. For heterotic versions of quantum cohomology rings, comparatively more is known. The heterotic analogue is a quantum-corrected ring of sheaf cohomology groups [@Distler:1987ee] of the form $H^{\bullet}(X, \wedge^{\bullet} {\cal E}^*)$, which was introduced in [@Katz:2004nn; @Adams:2005tc; @Sharpe:2006qd; @Guffin:2007mp], and has since been computed for toric varieties [@McOrist:2007kp; @McOrist:2008ji; @Donagi:2011uz; @Donagi:2011va; @Closset:2015ohf], Grassmannians $G(k,n)$ [@Guo:2015caf; @Guo:2016suk], and flag manifolds [@Guo:2018iyr], all for the case that the gauge bundle is a deformation of the tangent bundle. (Cases involving more general gauge bundles are not currently understood.) See for example [@McOrist:2010ae; @Guffin:2011mx; @Melnikov:2012hk; @Melnikov:2019tpl] for reviews. Historically, Gromov-Witten invariants in (2,2) supersymmetric theories were first computed using mirror symmetry, and so one might hope that a (0,2) supersymmetric version of mirror symmetry might aid in such developments. This is one of the motivations to understand (0,2) mirrors (see e.g. [@Blumenhagen:1996vu; @Blumenhagen:1996tv] for some early work). To date, there has been significant progress on understanding (0,2) mirror symmetry, but many results are still limited (and certainly heterotic Gromov-Witten invariants are not yet known). For example, for the case of reflexively-plain polytopes, and bundles that are deformations of the tangent bundle, a generalization of the Batyrev construction of ordinary Calabi-Yau mirrors exists, see [@Melnikov:2010sa; @Bertolini:2018qlc; @Bertolini:2018usi]. In this paper, we shall propose what is ultimately a (0,2) analogue of the Hori-Vafa construction [@Hori:2000kt; @Morrison:1995yh], which is to say, a mirror construction for two-dimensional gauge theories, resulting in a Landau-Ginzburg model. For abelian theories, there has been nontrivial work in this area in the past [@Adams:2003zy; @Chen:2016tdd; @Chen:2017mxp; @Gu:2017nye]. This work has included ansatzes for various special cases of toric varieties [@Chen:2016tdd; @Chen:2017mxp], as well as a more systematic proposal for abelian theories [@Gu:2017nye]. The proposal in this paper will both extend such constructions to nonabelian[^1] (0,2) GLSMs, as well as give a simpler, more straightforward, presentation in abelian cases than that in [@Gu:2017nye]. We do not claim to have a proof of the construction; we only give the proposal and describe some consistency tests. We begin in section \[sect:proposal\] by describing our proposal. As many subtleties of nonabelian mirrors have already been extensively discussed in [@Gu:2018fpm; @Chen:2018wep; @Gu:2019zkw], here we focus solely on the novel aspects introduced by (0,2) supersymmetry. In section \[sec:justification\], we justify this proposal, by giving formal arguments for why it correctly reproduces quantum sheaf cohomology relations and correlation functions in the original theory. We do not, however, claim to have a proof. In section \[sect:specialize\], we specialize to abelian theories. In particular, the ansatz here simplifies and generalizes the ansatz two of the authors previously discussed in [@Gu:2017nye]. In the next several sections, we discuss concrete examples. We begin in section \[sect:pnpm\] by giving a detailed analysis of mirrors to ${\mathbb P}^n \times {\mathbb P}^m$. We verify correlation functions in the original theory, construct lower-energy Landau-Ginzburg theories in the style of (2,2) Toda duals to projective spaces, discussing subtleties that arise in their construction, explicitly verify correlation functions in those lower-energy theories, and also compare to previous (0,2) mirrors for these spaces in [@Chen:2016tdd]. In section \[sect:hirzebruch\] we perform analogous analyses for (0,2) mirrors to Hirzebruch surfaces, constructing lower-energy theories and comparing to results in [@Chen:2017mxp]. In section \[sect:previous\] we compare to the previous systematic proposal for (0,2) mirrors to abelian theories by two of the authors [@Gu:2017nye]. The ansatz presented here is both more general and rather simpler, and we also argue that when we restrict to (0,2) deformations of the form considered in [@Gu:2017nye], our current proposal gives the same results as [@Gu:2017nye]. In section \[sect:grassmannian\], we discuss our first nonabelian examples, GLSMs for (0,2) deformations of Grassmannians $G(k,N)$. These are two-dimensional $U(k)$ gauge theory with matter in copies of the fundamental representation. We construct lower-energy Landau-Ginzburg models, analogues of (2,2) Toda duals, that generalize the Grassmannian mirrors discussed in [@Gu:2018fpm], and explicitly verify that quantum sheaf cohomology rings [@Guo:2015caf; @Guo:2016suk] are reproduced. We also explicitly verify that correlation functions are correctly reproduced in a few tractable examples. In section \[sect:flag\] we briefly discuss (0,2) deformations of flag manifolds, generalizations of Grassmannians that are also described by two-dimensional nonabelian gauge theories. We verify that quantum sheaf cohomology rings [@Guo:2018iyr] are reproduced. Finally, in section \[sect:hypersurfaces\], we briefly discuss (0,2) mirrors to theories with hypersurfaces. The rest of the paper is concerned with mirrors to theories without a (0,2) superpotential; in this section, we discuss how the result is modified to take into account a (0,2) superpotential, and also discuss how the mirror ansatz reproduces some conjectures regarding hypersurface mirrors in [@McOrist:2008ji]. Proposal {#sect:proposal} ======== In this section, we will describe our ansatz for mirrors to (0,2) supersymmetric[^2] GLSMs which are deformations of (2,2) supersymmetric GLSMs. Our ansatz will apply to both abelian and nonabelian theories, but with a restriction on the form of the functions $E = \overline{D}_+ \Psi$, which we shall describe in a moment. For simplicity, in this section we will assume the original gauge theory has no superpotential, and will discuss mirrors to theories with (0,2) superpotentials in section \[sect:hypersurfaces\]. We do not claim a physical proof of this proposal, though in later sections we will provide numerous consistency tests. We will consider (0,2) deformations encoded in $\overline{D}_+ \Psi$ which can be arbitrary holomorphic functions of the chiral superfields – any product compatible with gauge representations is permissible. In our proposal, we make two restrictions on the forms for which we consider mirrors, one more restrictive than the other: - We assume that $\overline{D}_+ \Psi$ is linear in chiral superfields, rather than a more general holomorphic function of chiral superfields. This may sound very restrictive, but in fact, it has been argued that only linear terms contribute to A/2-twisted GLSMs[^3] – nonlinear terms are irrelevant. (This was conjectured in [@McOrist:2008ji]\[section 3.5\], [@Kreuzer:2010ph]\[section A.3\], and rigorously proven in [@Donagi:2011uz; @Donagi:2011va] for abelian GLSMs. It also is a consequence of supersymmetric localization [@Closset:2015ohf], and see in addition [@Donagi:2014koa]\[appendix A\].) - We assume that $\overline{D}_+ \Psi$ is also diagonal, meaning, for theories which are deformations of (2,2) theories, that for any Fermi superfield $\Psi$, $\overline{D}_+ \Psi$ is proportional to the chiral superfield with which it is partnered on the (2,2) locus. On the (2,2) locus, the $\overline{D}_+ \Psi$ are both linear and diagonal, and there exist nontrivial (0,2) deformations which are also linear and diagonal. The constraints above, that $\overline{D}_+ \Psi$ be both linear and diagonal, imply the form $$\overline{D}_+ \Psi_{i} = E_{i}(\sigma) \Phi_{i}.$$ Now that we have stated the restrictions, we give the proposal. Let us consider a (0,2) GLSM with connected[^4] gauge group $G$ of dimension $n$ and rank $r$, chiral fields $\Phi_i$ and Fermi fields $\Psi_i$ in a (possibly reducible) representation $R$ for $i=1, \cdots, N= {\rm dim}\, R$. If $\mathcal{W}$ is the Weyl group of $G$, then the proposed mirror theory is a $\mathcal{W}$-orbifold of a (0,2) Landau-Ginzburg model given by the following matter fields: - $r$ chiral fields $\sigma_a$ and $r$ Fermi fields $\Upsilon_a$, $a=1,\cdots,r$, - chiral fields $Y_{i}$ and Fermi fields $F_{i}$ where $i=1,\cdots,N$, - $n-r$ chiral fields $X_{\tilde{\mu}}$ and $n-r$ Fermi fields $\Lambda_{\tilde{\mu}}$, following the same pattern as the (2,2) nonabelian mirror proposal [@Gu:2018fpm]. For linear and diagonal $\overline{D}_+ \Psi$ as above, the proposed (0,2) superpotential of the mirror Landau-Ginzburg orbifold is $$\label{superpotential} \begin{split} W=&\sum_{a=1}^r \Upsilon_a \left( \sum_{i=1}^N \rho^a_i Y_{i} \: - \: \sum_{\tilde{\mu}=1}^{n-r} \alpha_{\tilde{\mu}}^a \ln X_{\tilde{\mu}} \: - \: t_a \right) \\ & + \sum_{i=1}^N F_{i}\left( E_{i}(\sigma)-\exp(-Y_{i})\right) \: + \: \sum_{\tilde{\mu}=1}^{n-r}\Lambda_{\tilde{\mu}}\left(1 \: - \: \sum_{a=1}^r \sigma_a \alpha_{\tilde{\mu}}^a X_{\tilde{\mu}}^{-1} \right), \end{split}$$ where $\rho_i^a$ is the $a$-th component of the weight $\rho_i$ of representation $R$, and $\alpha_{\tilde{\mu}}$, $\tilde{\mu}=1, \cdots, n-r$ are the roots of $G$. In later sections, we will slightly modify the index structure above, to be more convenient in each case, just as in [@Gu:2018fpm; @Chen:2018wep; @Gu:2019zkw]. For example, if the matter representation $R$ consists of multiple fundamentals, we will break $i$ into separate color and flavor indices. The Weyl orbifold group acts on the superpotential above in essentially the same form as discussed in detail in [@Gu:2018fpm; @Chen:2018wep; @Gu:2019zkw], so we will be brief. In broad brushstrokes, the orbifold group acts by a combination of exchanging fields and multiplying by signs. In the present case, such actions happen on pairs $(Y_i, F_i)$, $(X_{\tilde{\mu}},\Lambda_{\tilde{\mu}})$, $(\sigma_a, \Upsilon_a)$ simultaneously. For example, if $Y_i$ is swapped with $Y_j$, then simultaneously $F_i$ is swapped with $F_j$. If $Y_i$ is multiplied by a sign, then simultaneously $F_i$ is multiplied by a sign. It is then straightforward to show that the superpotential above is invariant under the orbifold group, following the same arguments as in [@Gu:2018fpm; @Chen:2018wep; @Gu:2019zkw]. Furthermore, because the $\Lambda_{\tilde{\mu}}$ terms have the same form as on the (2,2) locus, the part of the excluded locus corresponding to $X_{\tilde{\mu}}$ poles is the same as on the (2,2) locus, and so, for mirrors to connected gauge groups, the fixed points of the Weyl orbifold do not intersect non-excluded critical loci. In passing, another part of the excluded locus is defined by the fact that $\exp(-Y)$ is nonzero for finite $Y$, and that part of the excluded locus will change as the $\exp(-Y)$’s are now determined by the $E$’s. Most of the superpotential above is simply the (0,2) version of the (2,2) mirrors of [@Hori:2000kt; @Gu:2018fpm; @Chen:2018wep; @Gu:2019zkw], with the exception of the $F E$ terms in the second line. For a (2,2) supersymmetric mirror, each of those $E$’s would be $$E_{i}(\sigma) \: = \: \sum_{a=1}^r \rho_i^a \sigma_a.$$ Allowing for more general $E$’s encodes the (0,2) deformation. We should also observe that in the original (0,2) gauge theory, those $E$’s are not in the superpotential; the fact that they appear in the mirror (0,2) superpotential is as one expects for mirror symmetry. Just as in [@Gu:2018fpm], we omit the Kähler potential from our ansatz, partly because it is not pertinent to the tests we will perform. For abelian (0,2) GLSMs, detailed discussions of dualities and corresponding Kähler potentials can be found in [@Adams:2003zy]. The constraints implied by the Fermi fields imply the operator mirror map $$\begin{aligned} \label{mirror map} \exp(-Y_{i}) & = & E_{i}(\sigma), \\ X_{\tilde{\mu}} & = & \sum_{a=1}^r \alpha^a_{\tilde{\mu}} \sigma_a,\end{aligned}$$ as well as the constraints $$\sum_{i=1}^N \rho^a_i Y_{i} \: - \: \sum_{\tilde{\mu}=1}^{n-r} \alpha_{\tilde{\mu}}^a \ln X_{\tilde{\mu}} \: = \: t_a.$$ Exponentiating the constraints and applying the operator mirror map, we get the relations $$\left[ \prod_i E_i(\sigma)^{ \rho_i^a } \right] \left[ \prod_{\tilde{\mu}} X_{\tilde{\mu}}^{ \alpha^a_{\tilde{\mu}} } \right] \: = \: q_a.$$ Just as in the (2,2) case [@Gu:2018fpm section 3.3], and as we will see in more detail in section \[sec:justification\], the factor $$\left[ \prod_{\tilde{\mu}} X_{\tilde{\mu}}^{ \alpha^a_{\tilde{\mu}} } \right]$$ just contributes a phase, so that these relations reduce to $$\label{qsc} \prod_i E_{i}(\sigma)^{\rho^a_i} = \tilde{q}_a,$$ for suitably phase-shifted $\tilde{q}_a \propto q_a$, which are precisely the quantum sheaf cohomology relations for these theories (see [*e.g.*]{} [@Closset:2015ohf]). Justification {#sec:justification} ============= In this section, we will provide a few general tests of the (0,2) mirror proposal of the previous section. Specifically, we will see in greater detail how the quantum sheaf cohomology ring relations arise in these theories, and we will reproduce the one-loop effective (0,2) superpotential of [@McOrist:2008ji] and also argue how correlation functions in these theories reproduce those of the original gauge theories, in cases in which vacua are isolated. Our arguments in this section will be somewhat formal, but in concrete examples in later sections we will verify these properties explicitly. Integrate out $X_{\tilde{\mu}}$, $\Lambda_{\tilde{\mu}}$ -------------------------------------------------------- First, following [@Gu:2018fpm], to better understand the properties of this theory, we integrate out the fields $X_{\tilde{\mu}}$ and $\Lambda_{\tilde{\mu}}$. The Hessian of $X_{\tilde{\mu}}$ is $$H_X \: = \: \prod_{\tilde{\mu}} \left( \sum_{a=1}^r \sigma_a \alpha_\mu^a \right)^{-1},$$ which generates a factor in the path integral measure which vanishes along the excluded locus, exactly the same as in (2,2) mirrors [@Gu:2018fpm]. The equations of motion of $X_{\tilde{\mu}}$ are $$X_{\tilde{\mu}} \: = \: \sum_{a=1}^r \sigma_a \alpha^a_{\tilde{\mu}}.$$ Therefore, integrating out $X_{\tilde{\mu}}$ and $\Lambda_{\tilde{\mu}}$ amounts to eliminating the terms proportional to $\Lambda_{\tilde{\mu}}$ and $\ln X_{\tilde{\mu}}$ in and shifting the FI parameters $t_a$ to $\tilde{t}_a$, just as happens in (2,2) mirrors [@Gu:2018fpm], reproducing a phase discussed in [@Hori:2013ika section 10]. For example, for each $U(k)$ factor of the gauge group, $$\alpha_{\tilde{\mu}}^a \: = \: \alpha_{bc}^a \: = \: \delta_c^a-\delta_b^a$$ for $a,b,c=1,\cdots,k$ and $b \neq c$ and thus $$\sum_{\tilde{\mu}} \alpha_{\tilde{\mu}}^a \ln X_{\tilde{\mu}} \: = \: \sum_{b \neq c} \alpha_{bc}^a \ln\left( \sigma_c - \sigma_b \right) \: = \: \sum_{b \neq a} \ln \left( \frac{\sigma_a-\sigma_b}{\sigma_b-\sigma_a} \right) \: = \: (k-1) \pi i$$ from the equation of motion. Therefore, after integrating out $X_{\tilde{\mu}}$ and $\Lambda_{\tilde{\mu}}$, the superpotential reduces to $$\label{superpotential-} \tilde{W}=\sum_{a=1}^r \Upsilon_a \left( \sum_{i=1}^N \rho^a_i Y_{i} - \tilde{t}_a \right) \: + \: \sum_{i=1}^N F_{i}\left( E_{i}(\sigma)-\exp(-Y_{i})\right)$$ through a redefinition $\tilde{t}_a$ of $t_a$. The equations of motion of $\sigma_a$ and $Y_{i}$ derived from then gives the mirror map and the expected quantum sheaf cohomology relations . Correlation functions --------------------- In this section, we will compare correlation functions in the B/2-twisted Landau-Ginzburg model just defined  with corresponding A/2 model correlation functions, in cases with isolated Coulomb branch vacua, and along the way, recover the one-loop effective (0,2) superpotential of [@McOrist:2008ji] along the Coulomb branch. Now, for a (0,2) superpotential of the form $W = F^i J_i$ with isolated vacua, correlation functions are schematically of the form [@Melnikov:2007xi] $$\langle f \rangle \: = \: \sum_{\rm vacua} \frac{ f }{ \det \partial_i J_j },$$ closely related to formulas for correlation functions in (2,2) Landau-Ginzburg models involving determinants of matrices of second derivatives of the superpotential. Thus, we need to compute some analogues of Hessians. The Hessian of $Y_{i}$ is $$H_Y = \prod_i \exp(-Y_{i}) = \prod_i E_{i}(\sigma),$$ which is nonzero at generic points on the Coulomb branch. From , integrating out $Y_{i}$ and $F_{i}$ reduces  to $$\label{superpotential--} W_{\rm eff} \: = \: \sum_{a=1}^r \Upsilon_a J^a_{\rm eff} \: = \: \sum_{a=1}^r \Upsilon_a \left( -\sum_{i=1}^N \rho^a_i \ln E_{i}(\sigma) - \tilde{t}_a \right),$$ which is the same as the effective superpotential on the Coulomb branch of the original GLSM. Consequently, assuming isolated vacua, for any operator $\mathcal{O}(\sigma)$, the B/2 correlation functions of our proposed Landau-Ginzburg mirror are [@Melnikov:2007xi] $$\begin{aligned} \langle\mathcal{O}(\sigma)\rangle & = & \frac{1}{|\mathcal{W}|} \sum_{J^a_{\rm eff}=0} \frac{\mathcal{O}(\sigma)}{\left( \det_{a,b} \partial_b J^a_{\rm eff} \right) H_X H_Y}, \\ & = & \frac{1}{|\mathcal{W}|} \sum_{J^a_{\rm eff}=0} \frac{\mathcal{O}(\sigma) \prod_{\tilde{\mu}} \left( \sum_{a=1}^r \sigma_a \alpha_{\tilde{\mu}}^a \right)}{\left( \det_{a,b} \partial_b J^a_{\rm eff} \right) \left(\prod_i E_{i}(\sigma)\right)},\end{aligned}$$ which is the same as the A/2 correlation function computed from the original GLSM [@Closset:2015ohf equ’n (3.63)]. (The factor of $1/| {\mathcal W}|$ reflects the Weyl orbifold, which acts freely on the critical locus, as in [@Gu:2018fpm], so that twisted sectors do not enter this computation, at least for mirrors to theories with connected gauge groups.) Specialization to abelian theories {#sect:specialize} ================================== Let’s consider a GLSM with gauge group $U(1)^r$. The chiral field $\Phi_i$ and Fermi field $\Psi_i$ have charge $Q^a_i$ under the $a$-th $U(1)$, for $i=1, \cdots, N$. Assuming linear and diagonal (0,2) deformations, as discussed before, these fields satisfy $$\overline{D}_+ \Psi_i \: = \: \sum_{a=1}^r E_i^a \sigma_a \Phi_i,$$ where $E_i^a=Q_i^a$ on the (2,2) locus. In the abelian case, the fields $X_\mu$ and $\Lambda_\mu$ are absent in the mirror theory. The matter content of the mirror Landau-Ginzburg model thus consists of chiral fields $\sigma_a, Y_i$ and Fermi fields $\Upsilon_a, F_i$, $a=1,\cdots,r, i=1,\cdots,N$. The superpotential is $$W \: = \: \sum_{a=1}^r \Upsilon_a \left( \sum_{i=1}^N Q_i^a Y_i - t^a \right) \: + \: \sum_{i=1}^N F_i \left( \sum_{a=1}^r E_i^a \sigma_a - \exp(-Y_i) \right).$$ Following the argument of section \[sec:justification\], it is easy to see that the mirror map is $$\exp(-Y_i) \: = \: \sum_{a=1}^r E_i^a \sigma_a$$ and the effective superpotential is $$W_{\rm eff} \: = \: \sum_{a=1}^r \Upsilon_a J^a_{\rm eff} \: = \: \sum_{a=1}^r \Upsilon_a \left( -\sum_{i=1}^N Q_i^a \ln \left(\sum_{b=1}^r E_i^b \sigma_b\right) - t^a \right),$$ which reproduces the expected correlation functions $$\langle \mathcal{O}(\sigma) \rangle \: = \: \sum_{J^a_{\rm eff}=0} \frac{\mathcal{O}(\sigma)}{\left( \det_{a,b} \partial_b J^a_{\rm eff} \right) H_Y},$$ where $$H_Y \: = \: \prod_{i=1}^N \left(\sum_{a=1}^r E_i^a \sigma_a \right).$$ Example: ${\mathbb P}^n \times {\mathbb P}^m$ {#sect:pnpm} ============================================= Setup {#sect:pnpm:UV} ----- In this section we will compare to proposals for (0,2) mirrors to ${\mathbb P}^n \times {\mathbb P}^m$ with a deformation of the tangent bundle, as discussed in [@Chen:2016tdd]. In this case, a general deformation of the tangent bundle is described as the cokernel $$0 \: \longrightarrow \: {\cal O}^2 \: \stackrel{E}{\longrightarrow} \: {\cal O}(1,0)^{n+1} \oplus {\cal O}(0,1)^{m+1} \: \longrightarrow \: {\cal E} \: \longrightarrow \: 0,$$ where $$E \: = \: \left[ \begin{array}{cc} Ax & B x \\ C y & D y \end{array} \right],$$ where $x$, $y$ are vectors of homogeneous coordinates on ${\mathbb P}^n$, ${\mathbb P}^m$, respectively, and where $A$, $B$ are constant $(n+1) \times (n+1)$ matrices, and $C$, $D$ are constant $(m+1) \times (m+1)$ matrices. In this language, the (2,2) locus corresponds for example to the case that $A$ and $D$ are identity matrices, and $B = 0 = C$. Physically, in the corresponding (0,2) GLSM, we can write $$\overline{D}_+ \Lambda_i \: = \: \left( A_{ij} \sigma + B_{ij} \tilde{\sigma} \right) x_j, \: \: \: \overline{D}_+ \tilde{\Lambda}_j \: = \: \left( C_{jk} \sigma + D_{jk} \tilde{\sigma} \right) y_k,$$ and so we have $$E_{ij}(\sigma, \tilde{\sigma}) \: = \: (A \sigma + B \tilde{\sigma})_{ij}, \: \: \: \tilde{E}_{jk}(\sigma, \tilde{\sigma}) \: = \: (C \sigma + D \tilde{\sigma})_{jk}.$$ The (0,2) mirror ansatz of this paper is only defined for diagonal $E$’s, so we shall assume the matrices $A$, $B$, $C$, $D$ are diagonal: $$\begin{aligned} A & = & {\rm diag}\left( a_0, \cdots, a_n \right), \\ B & = & {\rm diag}\left( b_0, \cdots, b_n \right), \\ C & = & {\rm diag}\left( c_0, \cdots, c_m \right), \\ D & = & {\rm diag}\left( d_0, \cdots, d_m \right).\end{aligned}$$ We also define $$E_i(\sigma, \tilde{\sigma}) \: = \: a_i \sigma + b_i \tilde{\sigma}, \: \: \: \tilde{E}_i(\sigma, \tilde{\sigma}) \: = \: c_i \sigma + d_i \tilde{\sigma}.$$ Following the (0,2) mirror ansatz given earlier, we take the (0,2) mirror to be defined by the superpotential $$\begin{aligned} W & = & \Upsilon_1 \left( \sum_{i=1}^n Y_i \: - \: t_1 \right) \: + \: \Upsilon_2\left( \sum_{j=0}^m \tilde{Y}_j \: - \: t_2 \right) \nonumber \\ & & \: + \: \sum_{i=0}^n F_i \left( E_i(\sigma, \tilde{\sigma}) \: - \: \exp\left( - Y_i \right) \right) \: + \: \sum_{j=0}^m \tilde{F}_j \left( \tilde{E}_j(\sigma, \tilde{\sigma}) \: - \: \exp\left( - \tilde{Y}_j \right) \right). \label{eq:pnpm:mirror1}\end{aligned}$$ As a first consistency test, let us verify that this produces the quantum sheaf cohomology ring of ${\mathbb P}^n \times {\mathbb P}^m$. First, we integrate out the $\Upsilon_i$, which gives the usual constraints $$\label{eq:pnpm:constr1} \prod_{i=0}^n \exp\left( - Y_i \right) \: = \: q_1, \: \: \: \prod_{j=0}^m \exp\left( - \tilde{Y}_j \right) \: = \: q_2.$$ Integrating out the $F_i$, $\tilde{F}_j$ gives the operator mirror maps $$\exp\left( - Y_i \right) \: = \: E_i(\sigma, \tilde{\sigma}), \: \: \: \exp\left( - \tilde{Y}_j \right) \: = \: \tilde{E}_j(\sigma, \tilde{\sigma}),$$ and combining these with the constraints (\[eq:pnpm:constr1\]), one immediately has $$\det(A \sigma + B \tilde{\sigma}) \: = \: \prod_i E_i(\sigma, \tilde{\sigma}) \: = \: q_1, \: \: \: \det(C \sigma + D \tilde{\sigma}) \: = \: \prod_j \tilde{E}_j(\sigma, \tilde{\sigma}) \: = \: q_2,$$ which are precisely the quantum sheaf cohomology ring relations for this model [@McOrist:2007kp; @McOrist:2008ji; @Donagi:2011uz; @Donagi:2011va; @Closset:2015ohf]. Correlation functions in the UV {#sect:p1p1:2pt:uv} ------------------------------- Before going on to integrate out some of the fields, let us take a moment to explicitly compute two-point B/2-model correlation functions in the case of the mirror to ${\mathbb P}^1 \times {\mathbb P}^1$. (As we already know the chiral ring matches that of the A/2 model, computing the two-point correlation functions suffices to determine all of the B/2-model correlation functions.) Correlation functions for the ${\mathbb P}^1 \times {\mathbb P}^1$ model were computed in [@Closset:2015ohf]\[section 4.2\]. We repeat the highlights here for completeness. The two-point correlation functions have the form $$\langle \sigma \sigma \rangle \: = \: - \frac{\Gamma_1}{\alpha}, \: \: \: \langle \sigma \tilde{\sigma} \rangle \: = \: + \frac{\Delta}{\alpha}, \: \: \: \langle \tilde{\sigma} \tilde{\sigma} \rangle \: = \: - \frac{\Gamma_2}{ \alpha},$$ where $$\begin{array}{lr} \gamma_{AB} \: = \: \det(A+B) - \det A - \det B, & \gamma_{CD} \: = \: \det(C+D) - \det C - \det D, \\ \Gamma_1 \: = \: \gamma_{AB} \det D - \gamma_{CD} \det B, & \Gamma_2 \: = \: \gamma_{CD} \det A - \gamma_{AB} \det C, \\ \Delta \: = \: (\det A)(\det D) - (\det B)(\det C), & \alpha \: = \: \Delta^2 - \Gamma_1 \Gamma_2. \end{array}$$ We can compute correlation functions in the present mirror B/2-twisted Landau-Ginzburg model with superpotential (\[eq:pnpm:mirror1\] using the methods of [@Melnikov:2007xi]. Specializing to $n=m=1$, we have six functions $J_i$, corresponding to the coefficients of $\Upsilon_{1,2}$, $F_{1,2}$, $\tilde{F}_{1,2}$, and six fields $\sigma$, $\tilde{\sigma}$, $Y_{0,1}$, $\tilde{Y}_{0,1}$. The resulting matrix of derivatives $(\partial_i J_j)$ has the form $$(\partial_i J_j) \: = \: \left[ \begin{array}{cccccc} 0 & 0 & 1 & 1 & 0 & 0 \\ 0 & 0 & 0 & 0 & 1 & 1 \\ a_0 & b_0 & \exp\left( - Y_0 \right) & 0 & 0 & 0 \\ a_1 & b_1 & 0 & \exp\left( - Y_1 \right) & 0 & 0 \\ c_0 & d_0 & 0 & 0 & \exp\left( - \tilde{Y}_0 \right) & 0 \\ c_1 & d_1 & 0 & 0 & 0 & \exp\left( - \tilde{Y}_1 \right) \end{array} \right],$$ and then correlation functions have the form $$\langle f(\sigma,\tilde{\sigma}) \rangle \: = \: \sum_{ J=0 } \frac{ f(\sigma, \tilde{\sigma}) }{ \det (\partial_i J_j ) },$$ where the sum is over the solutions of $\{ J_i = 0 \}$. It is straightforward to compute that the resulting correlation functions precisely match those listed above from the A/2 model [@Closset:2015ohf]\[section 4.2\]. More nearly standard expressions {#sect:pnpm:IR} -------------------------------- More nearly standard expressions for Landau-Ginzburg mirrors do not involve $\sigma$ fields, so in this section, we shall integrate out these fields to derive expressions for mirrors of a more nearly standard form. We will encounter some interesting subtleties. Specifically, some other expressions for possible (0,2) mirrors to ${\mathbb P}^n \times {\mathbb P}^m$ are in [@Chen:2016tdd; @Gu:2017nye]. Those expressions have precisely $n$ $Y$’s and $m$ $\tilde{Y}$’s, so we first integrate out the $\Upsilon_i$, eliminating $Y_0$, $\tilde{Y}_0$: $$\exp\left( - Y_0 \right) \: = \: q_1 \prod_{i=1}^n \exp\left( + Y_i \right), \: \: \: \exp\left( - \tilde{Y}_0 \right) \: = \: q_2 \prod_{j=1}^m \exp\left( + \tilde{Y}_j \right).$$ Next, we can either integrate out some of the Fermi fields $F_i$, $\tilde{F}_j$, and then integrate out $\sigma$’s, or we can integrate out $\sigma$’s first, and then some of the Fermi fields. This order-of-operations ambiguity does not exist in (2,2) theories. The results are independent of choices, as one should expect, but we illustrate both methods next, to illustrate various subtleties in both the analysis and the normalization of the results. In later analyses in this paper, we will be much more brief. ### First method {#sect:pnpm:first} Having integrating out the $\Upsilon_i$, our strategy in this approach is to next integrate out some $F$, $\tilde{F}$ (as many as $\sigma$’s), and then use the resulting constraints to eliminate $\sigma$’s. The expressions in [@Chen:2016tdd; @Gu:2017nye] have as many $F$’s as $Y$’s, so we need to integrate out one $F$ and one $\tilde{F}$. This will mean solving for $\sigma$ and $\tilde{\sigma}$ in terms of other variables. There are a number of ways to proceed, and indeed, one expects that there will be many equivalent but different-looking expresions for $\sigma$, $\tilde{\sigma}$ in terms of $Y_i$ and $\tilde{Y}_j$. To pick one, we choose an index $i$ and $j$ such that the expressions we get from integrating out the corresponding $F$ and $\tilde{F}$, namely $$\exp\left( - Y_i \right) \: = \: E_i(\sigma, \tilde{\sigma}), \: \: \: \exp\left( - \tilde{Y}_j \right) \: = \: \tilde{E}_j(\sigma, \tilde{\sigma}),$$ can be inverted to solve for $\sigma$, $\tilde{\sigma}$ in terms of $Y_i$, $\tilde{Y}_j$. Put another way, using an index $I$ to denote either $i$ or $j$, and writing, schematically, $$E_I(\sigma,\tilde{\sigma}) \: = \: S_I^{\alpha} \sigma_{\alpha},$$ we pick two indices $I$ such that the resulting $2 \times 2$ matrix $S$ is invertible. (Here we are deliberately making contact with the notation used in [@Gu:2017nye].) Suppose, for example, that the two equations $$\label{eq:pnpm:f0ft0:1} \exp\left( - Y_0 \right) \: = \: E_0(\sigma, \tilde{\sigma}), \: \: \: \exp\left( - \tilde{Y}_0 \right) \: = \: \tilde{E}_0(\sigma, \tilde{\sigma}),$$ can be inverted to solve for $\sigma$, $\tilde{\sigma}$. Let us do this explicitly, and examine the result. From our earlier discussion, $$E_0(\sigma, \tilde{\sigma}) \: = \: a_0 \sigma + b_0 \tilde{\sigma}, \: \: \: \tilde{E}_0(\sigma, \tilde{\sigma}) \: = \: c_0 \sigma + d_0 \tilde{\sigma}.$$ Assuming that $$\Delta_0 \: \equiv \: \det \left[ \begin{array}{cc} a_0 & b_0 \\ c_0 & d_0 \end{array} \right] \: \neq \: 0,$$ we first integrate out $F_0$, $\tilde{F}_0$ to get the constraints (\[eq:pnpm:f0ft0:1\]), and then these equations to find $$\begin{aligned} \sigma & = & \frac{1}{\Delta_0} \left( d_0 \exp\left( - Y_0 \right) \: - \: b_0 \exp\left( - \tilde{Y}_0 \right) \right), \\ \tilde{\sigma} & = & \frac{1}{\Delta_0} \left( - c_0 \exp\left( - Y_0 \right) \: + \: a_0 \exp\left( - \tilde{Y}_0 \right) \right).\end{aligned}$$ Then, after finally integrating out $\sigma$ and $\tilde{\sigma}$, the (0,2) superpotential reduces to $$\begin{aligned} W & = & \sum_{i=1}^n F_i \left( a_i \sigma + b_i \tilde{\sigma} - \exp\left( - Y_i \right) \right) \: + \: \sum_{j=1}^m \tilde{F}_j \left( c_j \sigma + d_j \tilde{\sigma} - \exp\left( - \tilde{Y}_j \right) \right), \\ & = & \sum_{i=1}^n F_i \Biggl[ \frac{ \left( a_i d_0 - b_i c_0 \right) }{\Delta_0} q_1 \prod_{i'=1}^n \exp\left( + Y_{i'} \right) \: + \: \frac{ \left( - a_i b_0 + b_i a_0 \right)}{\Delta_0} q_2 \prod_{j'=1}^m \exp\left( + \tilde{Y}_{j'} \right) \nonumber \\ & & \hspace*{3.0in} \: - \: \exp\left( - Y_i \right) \Biggr] \nonumber \\ & & \: + \: \sum_{j=1}^m \tilde{F}_j \Biggl[ \frac{ \left( c_j d_0 - d_j c_0 \right)}{\Delta_0} q_1 \prod_{i'=1}^n \exp\left( + Y_{i'} \right) \: + \: \frac{ \left( - c_j b_0 + d_j a_0 \right)}{\Delta_0} q_2 \prod_{j'=1}^m \exp\left( + \tilde{Y}_{j'} \right) \nonumber \\ & & \hspace*{3.0in} \: - \: \exp\left( - \tilde{Y}_j \right) \Biggr]. \label{eq:pnpm:first}\end{aligned}$$ Before going on, there is a subtlety we should discuss, that will become important when comparing correlation functions between the UV and lower-energy theories. Specifically, when we integrated out $\sigma$ and $\tilde{\sigma}$, one effect is to multiply the path integral by a constant. Specifically, after integrating out $F_0$ and $\tilde{F}_0$, we had constraints which schematically appear in the B/2 model path integral in the form $$\int d \sigma d \tilde{\sigma} \, \delta\left( a_0 \sigma + b_0 \tilde{\sigma} - \exp\left( - Y_0 \right) \right) \delta\left( c_0 \sigma + d_0 \tilde{\sigma} - \exp\left( - \tilde{Y}_0 \right) \right).$$ Then, integrating over $\sigma$, $\tilde{\sigma}$ generates a factor of $$\frac{1}{a_0 d_0 - b_0 c_0} \: = \: \frac{1}{\Delta_0}$$ from the Jacobian. This will multiply correlation functions in the lower-energy theory, and we will see later in subsection \[sect:pnpm:corrfns:ir\] that this will be required in order for the lower-energy-theory’s correlation functions to match the UV correlation functions. ### Second method As a consistency test, and to illuminate the underlying methods, we will now rederive the same result via a different approach. Having integrated out the $\Upsilon_i$, our strategy in this approach is to next integrate out the $\sigma_a$. This will generate constraints on the $F$, $\tilde{F}$, which we will use to write some in terms of the others. (This is the opposite order of operations from the previous approach.) The result of this method will be an expression for the (0,2) mirror that is not of the form described in [@Chen:2016tdd; @Gu:2017nye], and also does not respect symmetries of the parametrization. We restrict to ${\mathbb P}^1 \times {\mathbb P}^1$ for simplicity. Integrating out $\sigma_a$, we have the constraints $$\begin{aligned} \sum_{i=0}^n a_i F_i \: + \: \sum_{j=0}^m c_j \tilde{F}_j & = & 0, \\ \sum_{i=0}^n b_i F_i \: + \: \sum_{j=0}^m d_j \tilde{F}_j & = & 0.\end{aligned}$$ Solving for $F_0$, $\tilde{F}_0$, we find $$\begin{aligned} F_0 & = & - \frac{1}{\Delta_0} \left[ \sum_{i=1}^n (a_i d_0 - b_i c_0) F_i \: + \: \sum_{j=1}^m (c_j d_0 - c_0 d_j) \tilde{F}_j \right], \\ \tilde{F}_0 & = & - \frac{1}{\Delta_0} \left[ \sum_{i=1}^n (a_0 b_i - b_0 a_i) F_i \: + \: \sum_{j=1}^m (d_j a_0 - b_0 c_j) \tilde{F}_j \right]\end{aligned}$$ where $$\Delta_0 \: = \: a_0 d_0 - b_0 c_0.$$ Plugging this back into the (0,2) superpotential, we have $$\begin{aligned} W & = & - \sum_{i=0}^n F_i \exp\left( - Y_i \right) \: - \: \sum_{j=0}^m \tilde{F}_j \exp\left( - \tilde{Y}_j \right), \\ & = & - \sum_{i=1}^n F_i \Biggl[ \exp\left( - Y_i \right) \: - \: \frac{(a_i d_0 - b_i c_0)}{\Delta_0} q_1 \prod_{k=1}^n \exp\left( + Y_k \right) \nonumber \\ & & \hspace*{1.5in} \: - \: \frac{ (a_0 b_i - b_0 a_i)}{\Delta_0} q_2 \prod_{k=1}^m \exp\left( + \tilde{Y}_k \right) \Biggr] \nonumber \\ & & - \sum_{j=1}^m \tilde{F}_j \Biggl[ \exp\left( - \tilde{Y}_j \right) \: - \: \frac{ (c_j d_0 - c_0 d_j) }{\Delta_0} q_1 \prod_{k=1}^n \exp\left( + Y_k \right) \nonumber \\ & & \hspace*{1.5in} \: - \: \frac{ (d_j a_0 - b_0 c_j}{\Delta_0} q_2 \prod_{k=1}^m \exp\left( + \tilde{Y}_k \right) \Biggr]. \label{eq:p1p1:mirror1}\end{aligned}$$ This precisely matches the superpotential (\[eq:pnpm:first\]) derived from integrating out fields in a different order, as expected. As in the first ordering, there is a subtlety we have glossed over, a multiplicative factor arising when integrating out some of the fields. Here, the factor arises when integrating out $F_0$, $\tilde{F}_0$, for the same reasons as before: schematically, the B/2 model path integral measure contains a factor of the form $$\int d F_0 d \tilde{F}_0 \, \delta( a_0 F_0 + b_0 \tilde{F}_0 + \cdots) \, \delta( c_0 F_0 + d_0 \tilde{F}_0 + \cdots),$$ which again generates a numerical factor[^5] of $\Delta_0^{-1}$ that multiplies correlation functions, and which will be important in subsection \[sect:pnpm:corrfns:ir\]. Correlation functions in the lower-energy theory {#sect:pnpm:corrfns:ir} ------------------------------------------------ Next, we compute correlation functions in the new theory, for the case of ${\mathbb P}^1 \times {\mathbb P}^1$, obtained after integrating out fields, and compare to the results for correlation functions computed in the UV theory, before integrating out fields. We will see an important subtlety. Using the mirror (0,2) superpotential (\[eq:p1p1:mirror1\]), and the operator mirror map $$\begin{aligned} \sigma & = & \frac{1}{\Delta_0} \left( d_0 \exp\left( - Y_0 \right) \: - \: b_0 \exp\left( - \tilde{Y}_0 \right) \right), \\ & = & \frac{1}{\Delta_0} \left( d_0 q_1 \exp\left( + Y_1 \right) \: - \: b_0 q_2 \exp\left( + \tilde{Y}_1 \right) \right), \\ \tilde{\sigma} & = & \frac{1}{\Delta_0} \left( a_0 \exp\left( - \tilde{Y}_0 \right) \: - \: c_0 \exp\left( - Y_0 \right) \right), \\ & = & \frac{1}{\Delta_0} \left( a_0 q_2 \exp\left( + \tilde{Y}_1 \right) \: - \: c_0 q_1 \exp\left( + Y_1 \right) \right),\end{aligned}$$ where $$\Delta_0 \: = \: a_0 d_0 \: - \: b_0 c_0,$$ using the methods of [@Melnikov:2007xi], we find that the two-point functions computed from the mirror above are all $\Delta_0$ times the A/2 model correlation functions in [@Closset:2015ohf]\[section 4.2\], reviewed in section \[sect:p1p1:2pt:uv\], or in other words, $$\langle \sigma \sigma \rangle_{\rm mirror} \: = \: - \Delta_0 \frac{\Gamma_1}{\alpha}, \: \: \: \langle \sigma \tilde{\sigma} \rangle_{\rm mirror} \: = \: + \Delta_0 \frac{\Delta}{\alpha}, \: \: \: \langle \tilde{\sigma} \tilde{\sigma} \rangle_{\rm mirror} \: = \: - \Delta_0 \frac{\Gamma_2}{ \alpha},$$ However, we still need to take into account the subtlety discussed in subsection \[sect:pnpm:IR\]. Specifically, when deriving the (0,2) Landau-Ginzburg model above from the UV presentation, we had to perform changes-of-variables when integrating out fields, with the effect that low-energy correlation functions should be multiplied by factors of $1/\Delta_0$. Taking that subtlety into account, and dividing out the extra $\Delta_0$ factors, we find that the correct two-point functions precisely match both those of the A/2 model [@Closset:2015ohf]\[section 4.2\], as well as those of the original (UV) theory described in subsection \[sect:pnpm:UV\]. It is also straightforward to compute four-point functions. Their values in the A/2 model are given in [@Chen:2016tdd]\[appendix A.1\]. When one computes them in the (lower-energy) Landau-Ginzburg model above, not taking into account the subtlety discussed above, one finds that the Landau-Ginzburg correlation functions are $\Delta_0$ times the A/2 model correlation functions. Taking into account the subtlety above, the overall factor of $1/\Delta_0$ multiplying all correlation functions, fixes the four-point functions also. In any event, once one knows that the two-point functions and the quantum sheaf cohomology relations match, all of the higher-point functions are guaranteed to match. Comparison to other (0,2) mirrors {#sect:pnpm:compare} --------------------------------- Now, let us compare to the (0,2) mirrors in [@Chen:2016tdd; @Gu:2017nye], for brevity just for the case of ${\mathbb P}^1 \times {\mathbb P}^1$. As a matter of principle, these mirrors need not necessarily match – there could be multiple different UV theories describing the same IR physics. Nevertheless, in special families, we will see that there is a match. For example, in [@Chen:2016tdd]\[section 4.2\], it was argued that one (0,2) Landau-Ginzburg model those B/2 correlation functions correctly match those of the corresponding A/2 theory on ${\mathbb P}^1 \times {\mathbb P}^1$ had superpotential $$W \: = \: F_1 J_1 \: + \: \tilde{F}_1 \tilde{J}_1,$$ where $$\begin{aligned} J_1 & = & a X_1 \: - \: \frac{q_1}{X_1} \: + \: b \frac{ \tilde{X}_1^2}{ X_1 } \: + \: \mu \tilde{X}_1, \\ \tilde{J}_1 & = & d \tilde{X}_1 \: - \: \frac{q_2}{\tilde{X}_1} \: + \: c \frac{ X_1^2 }{\tilde{X}_1} \: + \: \nu X_1,\end{aligned}$$ with $$\mu \: = \: \det(A+B) - \det A - \det B, \: \: \: \nu \: = \: \det(C+D) - \det C - \det D,$$ and operator mirror map $$\sigma \: = \: X_1, \: \: \: \tilde{\sigma} \: = \: \tilde{X}_1.$$ These expressions have the good property that they are in terms of determinants of the matrices $A$, $B$, $C$, $D$, and so respect global symmetries of the original theory. For that matter, the A/2 correlation functions only depend upon those determinants, which is explicit in the mirrors constructed in [@Chen:2016tdd]. For purposes of comparison, for ${\mathbb P}^1 \times {\mathbb P}^1$, the superpotential (\[eq:p1p1:mirror1\]) takes the form $$\begin{aligned} W & = & - F_1 \left[ \exp\left( - Y_1 \right) \: - \: q_1 \frac{ ( a_1 d_0 - b_1 c_0 ) }{\Delta_0} \exp\left( + Y_1\right) \: - \: q_2 \frac{ ( b_1 a_0 - a_1 b_0)}{\Delta_0} \exp\left( + \tilde{Y}_1\right) \right] \nonumber \\ & & \: - \: \tilde{F}_1 \left[ \exp\left( - \tilde{Y}_1 \right) \: - \: q_1 \frac{ ( c_1 d_0 - d_1 c_0)}{ \Delta_0} \exp\left( + Y_1 \right) \: - \: q_2 \frac{ ( d_1 a_0 - c_1 b_0 ) }{\Delta_0} \exp\left( + \tilde{Y}_1 \right) \right]. \nonumber \\ & &\end{aligned}$$ On the face of it, this clearly does not match the mirror proposal of [@Chen:2016tdd], and in fact, is not even written in terms of global-symmetry-invariant determinants of $A$, $B$, $C$, $D$. Nevertheless, as we have seen, it does reproduce the same correlation functions. One could imagine using global symmetry transformations to rotate to $a_0 = d_0=1, b_0=c_0 = 0$, the case considered in [@Gu:2017nye]\[section 5.1\], in which case the result above reduces to $$\begin{aligned} W & = & - F_1 \left[ \exp\left( - Y_1\right) \: - \: q_1 a_1 \exp\left( + Y_1 \right) \: - \: q_2 b_1 \exp\left( + \tilde{Y}_1 \right) \right] \nonumber \\ & & \: - \: \tilde{F}_1 \left[ \exp\left( - \tilde{Y}_1\right) \: - \: q_1 c_1 \exp\left( + Y_1 \right) \: - \: q_2 d_1 \exp\left( + \tilde{Y}_1 \right) \right].\end{aligned}$$ In this case, $$a \: = \: a_1, \: \: \: b \: = \: 0 \: = \: c, \: \: \: d \: = \: d_1, \: \: \: \mu \: = \: b_1, \: \: \: \nu \: = \: c_1,$$ with operator mirror map $$\sigma \: = \: q_1 \exp\left( + Y_1 \right), \: \: \: \tilde{\sigma} \: = \: q_2 \exp\left( + \tilde{Y}_1 \right).$$ If we change variables as $$\exp\left( - Y_0 \right) \: = \: q_1 \exp\left( + Y_1 \right), \: \: \: \exp\left( - \tilde{Y}_0 \right) \: = \: q_2 \exp\left( + \tilde{Y}_1 \right),$$ then we can rewrite the superpotential as $$\begin{aligned} W & = & - F_1 \left[ q_1 \exp\left( + Y_0 \right) \: - \: a_1 \exp\left( - Y_0 \right) \: - \: b_1 \exp\left( - \tilde{Y}_0 \right) \right] \nonumber \\ & & \: - \: \tilde{F}_1 \left[ q_2 \exp\left( + \tilde{Y}_0 \right) \: - \: c_1 \exp\left( - Y_0 \right) \: - \: d_1 \exp\left( - \tilde{Y}_0 \right) \right],\end{aligned}$$ which precisely matches the (0,2) mirror in [@Chen:2016tdd] for the case $a_0 = d_0 = 1$, $b_0 = c_0 = 0$. We will return to this case, which also arose in [@Gu:2017nye], in a more systematic analysis in section \[sect:previous\]. Example: Hirzebruch surfaces {#sect:hirzebruch} ============================ In this section we will compare to proposals for (0,2) mirrors to Hirzebruch surfaces with a deformation of the tangent bunde, as discussed in [@Chen:2017mxp]. Our analysis will follow the same form as that for the mirror to ${\mathbb P}^n \times {\mathbb P}^m$, so we will be comparatively brief. A Hirzebruch surface ${\mathbb F}_n$ can be described by a GLSM with gauge group $U(1)^2$ and matter fields $x_0$ $x_1$ $w$ $s$ ---------- ------- ------- ----- ----- $U(1)_1$ $1$ $1$ $n$ $0$ $U(1)_2$ $0$ $0$ $1$ $1$ A deformation ${\cal E}$ of the tangent bundle is described mathematically as the cokernel $$0 \: \longrightarrow \: {\cal O}^2 \: \stackrel{*}{\longrightarrow} \: {\cal O}(1,0)^2 \oplus {\cal O}(n,1) \oplus {\cal O}(0,1) \: \longrightarrow \: {\cal E} \: \longrightarrow \: 0,$$ where $$* \: = \: \left[ \begin{array}{cc} A x & Bx \\ \gamma_1 w & \beta_1 w \\ \gamma_2 s & \beta_2 s \end{array} \right],$$ and $x = [x_0, x_1]^T$. In principle, additional nonlinear deformations are also possible, but as they do not contribute to quantum sheaf cohomology rings (see section \[sect:proposal\]), we omit them here. The (2,2) locus corresponds to the case $A = I$, $B = 0$, $\gamma_1 = n$, $\beta_1 = 1$, $\gamma_2=0$, $\beta_2=1$. For a general (0,2) theory (with linear diagonal deformations), the $E$’s take the form $$\overline{D}_+ \Lambda_{x, i} \: = \: ((\sigma A + \tilde{\sigma} B) x)_i, \: \: \: \overline{D}_+ \Lambda_w \: = \: (\gamma_1 \sigma + \beta_1 \tilde{\sigma}) w, \: \: \: \overline{D}_+ \Lambda_s \: (\gamma_2 \sigma + \beta_2 \tilde{\sigma}) s,$$ where the $\Lambda$’s are the Fermi superfield partners to the bosonic chiral fields. Our mirror construction applies to diagonal deformations, so we only consider the case that $$\begin{array}{cc} \overline{D}_+ \Lambda_{x,0} \: = \: ( a_0 \sigma + b_0 \tilde{\sigma}) x_0, & \overline{D}_+ \Lambda_{x,1} \: = \: ( a_1 \sigma + b_1 \tilde{\sigma}) x_1, \\ \overline{D}_+ \Lambda_w \: = \: (\gamma_1 \sigma + \beta_1 \tilde{\sigma}) w, & \overline{D}_+ \Lambda_s \: = \: (\gamma_2 \sigma + \beta_2 \tilde{\sigma}) s. \end{array}$$ From our ansatz, the mirror Landau-Ginzburg model has fields - $\sigma, \tilde{\sigma}$, - $(Y_{0,1}, F_{0,1})$, corresponding to $(x_{0,1}, \Lambda_{x,0-1})$ of the A/2 model, - $(Y_w, F_w)$, corresponding to $(w, \Lambda_w)$ of the A/2 model, - $(Y_s, F_s)$, corresponding to $(s, \Lambda_s)$ of the A/2 model, and superpotential $$\begin{aligned} W & = & \Upsilon_1 \left( Y_0 + Y_1 + n Y_w - t_1 \right) \: + \: \Upsilon_2 \left( Y_w + Y_s - t_2 \right) \nonumber \\ & & \: + \: F_0 \left( a_0 \sigma + b_0 \tilde{\sigma} - \exp\left( - Y_0 \right) \right) \: + \: F_1 \left( a_1 \sigma + b_1 \tilde{\sigma} - \exp\left( - Y_1 \right) \right) \nonumber \\ & & \: + \: F_w \left( \gamma_1 \sigma + \beta_1 \tilde{\sigma} - \exp\left( - Y_w \right) \right) \: + \: F_s \left( \gamma_2\sigma + \beta_2 \tilde{\sigma} - \exp\left( - Y_s \right) \right).\end{aligned}$$ The operator mirror map is defined by the constraints imposed by the $F$’s: $$\begin{aligned} \exp\left( - Y_0 \right) & = & a_0 \sigma + b_0 \tilde{\sigma}, \\ \exp\left( - Y_1 \right) & = & a_1 \sigma + b_1 \tilde{\sigma}, \\ \exp\left( - Y_w \right) & = & \gamma_1 \sigma + \beta_1 \tilde{\sigma}, \\ \exp\left( - Y_s \right) & = & \gamma_2 \sigma + \beta_2 \tilde{\sigma},\end{aligned}$$ and using the mirror D-term relations imposed by the $\Upsilon$’s, namely $$\exp\left( - Y_0 - Y_1 - n Y_w \right) \: = \: q_1, \: \: \: \exp\left( - Y_w - Y_s \right) \: = \: q_2,$$ we quickly derive the quantum sheaf cohomology (chiral ring) relations $$\left( a_0 \sigma + b_0 \tilde{\sigma} \right) \left( a_1 \sigma + b_1 \tilde{\sigma} \right) \left( \gamma_1 \sigma + \beta_1 \tilde{\sigma} \right)^n \: = \: q_1, \: \: \: \left( \gamma_1 \sigma + \beta_1 \tilde{\sigma} \right) \left( \gamma_2 \sigma + \beta_2 \tilde{\sigma} \right) \: = \: q_2,$$ or equivalently $$\det \left( A \sigma + B \tilde{\sigma} \right) \left( \gamma_1 \sigma + \beta_1 \tilde{\sigma} \right)^n \: = \: q_1, \: \: \: \left( \gamma_1 \sigma + \beta_1 \tilde{\sigma} \right) \left( \gamma_2 \sigma + \beta_2 \tilde{\sigma} \right) \: = \: q_2, \label{eq:fn:qsc}$$ which precisely match the known quantum sheaf cohomology ring relations for this case [@McOrist:2007kp; @McOrist:2008ji; @Donagi:2011uz; @Donagi:2011va]. Next, we integrate out some of the fields to find a lower-energy effective Landau-Ginzburg description of the same physics. If we integrate out $F_0$, $F_w$, we get the constraints $$\begin{aligned} a_0 \sigma \: + \: b_0 \tilde{\sigma} & = & \exp\left( - Y_0 \right), \\ \gamma_1 \sigma \: + \: \beta_1 \tilde{\sigma} & = & \exp\left( - Y_w \right),\end{aligned}$$ which can be solved to give $$\begin{aligned} \sigma & = & \frac{1}{\Delta_0} \left( \beta_1 \exp\left( - Y_0 \right) \: - \: b_0 \exp\left( - Y_w \right) \right), \label{eq:fn:opmirror1} \\ \tilde{\sigma} & = & \frac{1}{\Delta_0} \left( a_0 \exp\left( - Y_w \right) \: - \: \gamma_1 \exp\left( - Y_0 \right) \right), \label{eq:fn:opmirror2}\end{aligned}$$ for $$\Delta_0 \: = \: a_0 \beta_1 - b_0 \gamma_1.$$ Using the $\Upsilon$ constraints to eliminate $Y_0$, $Y_w$, we have $$\begin{aligned} \exp\left( - Y_w \right) & = & q_2 \exp\left( + Y_s \right), \\ \exp\left( - Y_0 \right) & = & q_1 \exp\left( + Y_1 \right) \exp\left( + n Y_w \right) \: = \: (q_1 q_2^{-n} ) \exp\left( + Y_1 \right) \exp\left( - n Y_s \right),\end{aligned}$$ and finally plugging in we get the lower-energy effective superpotential $$\begin{aligned} W & = & F_1 \left( a_1 \sigma + b_1 \tilde{\sigma} - \exp\left( - Y_1 \right) \right) \: + \: F_s \left( \gamma_2 \sigma + \beta_2 \tilde{\sigma} - \exp\left( - Y_s \right) \right), \\ & = & F_1 \left( \frac{ (a_1 \beta_1 - b_1 \gamma_1 ) }{\Delta_0} \exp\left( - Y_0 \right) \: + \: \frac{ (-a_1 b_0 + b_1 a_0 ) }{\Delta_0} \exp\left( - Y_w \right) \: - \: \exp\left( - Y_1 \right) \right) \nonumber \\ & & \: + \: F_s \left( \frac{ ( \gamma_2 \beta_1 - \beta_2 \gamma_1)}{\Delta_0} \exp\left( - Y_0 \right) \: + \: \frac{ ( - \gamma_2 b_0 + \beta_2 a_0 ) }{\Delta_0} \exp\left( - Y_w \right) \: - \: \exp\left( - Y_s \right) \right), \nonumber \\ & = & F_1 \biggl[ \frac{ (a_1 \beta_1 - b_1 \gamma_1 ) }{\Delta_0} (q_1 q_2^{-n} ) \exp\left( + Y_1 \right) \exp\left( - n Y_s \right) \: + \: \frac{ (-a_1 b_0 + b_1 a_0 ) }{\Delta_0} q_2 \exp\left( + Y_s \right) \nonumber \\ & & \hspace*{1.5in} \: - \: \exp\left( - Y_1 \right) \biggr] \nonumber \\ & & \: + \: F_s \biggl[ \frac{ ( \gamma_2 \beta_1 - \beta_2 \gamma_1)}{\Delta_0} (q_1 q_2^{-n} ) \exp\left( + Y_1 \right) \exp\left( - n Y_s \right) \: + \: \frac{ ( - \gamma_2 b_0 + \beta_2 a_0 ) }{\Delta_0} q_2 \exp\left( + Y_s \right) \nonumber \\ & & \hspace*{1.5in} \: - \: \exp\left( - Y_s \right) \biggr]. \label{eq:fn:mirror:ir}\end{aligned}$$ To be clear, because of the change of variables we performed in constraints above, to match A/2 correlation functions, correlation functions in this model must be multiplied by a factor of $1/\Delta_0$, just as in our analysis in subsection \[sect:pnpm:IR\]. As a consistency check, let us quickly verify from the mirror (\[eq:fn:mirror:ir\]) above, plus the operator mirror map (\[eq:fn:opmirror1\]), (\[eq:fn:opmirror2\]), that the quantum sheaf cohomology relations are obeyed. Briefly, $$\begin{aligned} a_0 \sigma + b_0 \tilde{\sigma} & = & (q_1 q_2^{-n}) \exp\left( + Y_1 \right) \exp\left( - n Y_s \right) \: \: \: \mbox{ from the operator mirror map}, \\ a_1 \sigma + b_1 \tilde{\sigma} & = & \exp\left( - Y_1 \right) \: \: \: \mbox{ from the $F_1$ constraint}, \\ \gamma_1 \sigma + \beta_1 \tilde{\sigma} & = & q_2 \exp\left( + Y_s \right) \: \: \: \mbox{ from the operator mirror map}, \\ \gamma_2 \sigma + \beta_2 \tilde{\sigma} & = & \exp\left( - Y_s \right) \: \: \: \mbox{ from the $F_s$ constraint},\end{aligned}$$ hence $$\begin{aligned} \left(a_0 \sigma + b_0 \tilde{\sigma} \right) \left( a_1 \sigma + b_1 \tilde{\sigma} \right) \left( \gamma_1 \sigma + \beta_1 \tilde{\sigma} \right)^n & = & q_1, \\ \left( \gamma_1 \sigma + \beta_1 \tilde{\sigma} \right) \left( \gamma_2 \sigma + \beta_2 \tilde{\sigma} \right) & = & q_2,\end{aligned}$$ which are precisely the quantum sheaf cohomology ring relations (\[eq:fn:qsc\]) for this case. Now, consider the mirror in the special case that $a_0 = 1$, $b_0 = 0$, $\beta_1 = 1$, $\gamma_1 = n$, in other words, that they take their values on the (2,2) locus. In this case, $\Delta_0 = 1$, and the mirror above becomes $$\begin{aligned} W & = & F_1 \left[ \left(a_1 - n b_1\right) (q_1 q_2^{-n}) \exp\left( + Y_1 \right) \exp\left( - n Y_s \right) \: + \: b_1 q_2 \exp\left( + Y_s \right) \: - \: \exp\left( - Y_1 \right) \right] \nonumber \\ & & \: + \: F_s \left[ \left( \gamma_2 - n \beta_2 \right) (q_1 q_2^{-n} ) \exp\left( + Y_1 \right) \exp\left( - n Y_s \right) \: + \: \beta_2 q_2 \exp\left( + Y_s \right) \: - \: \exp\left( - Y_s \right) \right]. \nonumber \\\end{aligned}$$ Using the operator mirror map, we can write this more simply as $$\begin{aligned} W & = & F_1 \left[ a_1 \sigma \: + \: b_1 \tilde{\sigma} \: - \: \exp\left( - Y_1 \right) \right] \nonumber \\ & & \: + \: F_s \left[ \gamma_2 \sigma \: + \: \beta_2 \tilde{\sigma} \: - \: \exp\left( - Y_s \right) \right].\end{aligned}$$ Now, we can perform a change of variables to relate this to the ${\mathbb F}_n$ mirror described in [@Chen:2017mxp]\[section 4.2\], [@Gu:2017nye]\[section 5.2.1\]. To relate to their notation, if we define $X_1$, $X_3$ by $$\begin{aligned} \sigma & = & X_1 \: = \: \exp\left( - Y_0 \right), \\ \tilde{\sigma} & = & X_3 - n X_1 \: = \: \exp\left( - Y_w \right),\end{aligned}$$ then the (0,2) superpotential above becomes $$\begin{aligned} W & = & F_1 \left[ a_1 X_1 \: + \: b_1 \left( X_3 - n X_1 \right) \: - \: \frac{ q_1 }{ X_1 X_3^n } \right] \nonumber \\ & & \: + \: F_s \left[ \gamma_2 X_1 \: + \: \beta_2 \left( X_3 - n X_1 \right) \: - \: \frac{q_2}{X_3} \right].\end{aligned}$$ For the case we are considering ($a_0 = 1$, $b_0 = 0$, $\gamma_1 = n$, $\beta_1 = 1$), $$\begin{aligned} a & = & \det A \: = \: a_1, \\ b & = & \det B \: = \: 0, \\ \mu_{AB} & = & b_1,\end{aligned}$$ the coefficient of $F_1$ can be identified with the $J_1$ in [@Chen:2017mxp]\[section 4.2\], [@Gu:2017nye]\[section 5.2.1\], and their $J_2$ is $n J_1$ plus the coefficient of $F_s$. After a trivial linear rotation of $F_1$, $F_s$, we see that this change of variables identifies, in this case, the (0,2) mirror superpotential to ${\mathbb F}_n$ above, derived from our general ansatz, with that discussed in [@Chen:2017mxp; @Gu:2017nye]. This matching was not necessary – there can be different UV representations of the same IR physics – but it is certainly satisfying. We will discuss a more general form of this construction in section \[sect:previous\]. Comparison to previous abelian proposal {#sect:previous} ======================================= A proposal was made for a systematic mirror construction in abelian (0,2) GLSMs in [@Gu:2017nye]. The proposal of this paper both generalizes and simplifies the proposal given there. In this section, we will explicitly relate our ansatz to that discussed there. (Special cases have already been discussed, in sections \[sect:pnpm:compare\] and \[sect:hirzebruch\].) Briefly, the proposal in [@Gu:2017nye] considered abelian (0,2) GLSMs with $E$’s that are both linear and diagonal, as here, but with two additional restrictions: - To compute the mirror, one picked an invertible submatrix $S$ of the charge matrix, - and the (0,2) deformations vanished for $E$’s corresponding to rows of $S$. The physics of the resulting mirror was independent of choices, but nevertheless this was a more restrictive mirror than that given in this paper. We will outline a derivation of the construction in [@Gu:2017nye] from the mirror in this paper, but first, with the benefit of hindsight, let us outline in general terms how they are related. - In the proposal of this paper, to generate a lower-energy Landau-Ginzburg model, we may for example integrate out a subset of the $F$ Fermi fields, and solve for the $\sigma_a$. This procedure only works if the corresponding submatrix of the $E$’s is invertible, and so, broadly speaking, corresponds to a choice of invertible submatrix. - Assuming that the $E$ submatrix chosen above is the same as on the (2,2) locus removes the necessity of keeping track of overall numerical factors multiplying partition functions and correlation functions, the subtlety discussed in [*e.g.*]{} subsection \[sect:pnpm:first\]. Next, we shall outline a derivation of the ansatz of [@Gu:2017nye] from the proposal of this paper. First, they wrote their linear diagonal $\overline{D}_{+} \Psi_i$ in terms of deformations $B_{ij}$ off the (2,2) locus, as $$E_i \: = \: \sum_j \sum_a \left( \delta_{ij} + B_{ij} \right) Q_i^a \sigma_a.$$ For these $E_i$, our ansatz (\[superpotential\]) can be written as $$\begin{aligned} W & = & \sum_{a=1}^r \Upsilon_a \left( \sum_{i=1}^N Q_i^a \sigma_a \: - \: t_a \right) \nonumber \\ & & \hspace*{0.5in} \: + \: \sum_{i=1}^N F_i \left( \sum_a Q_i^a \sigma_a \: + \: \sum_j B_{ij} Q^a_j \sigma_a \: - \: \exp\left( - Y_i \right) \right).\end{aligned}$$ Now, in the ansatz of [@Gu:2017nye], one picks an invertible submatrix $S$ of the charge matrix, and for $i$ corresponding to a column of $S$, $B_{ij} = 0$. As a result, for those $i$, the $F_i$ terms are simply $$F_i \left( \sum_a Q^a_i \sigma_a \: - \: \exp\left( - Y_i \right) \right),$$ and so we have a constraint that relates, for those $i$, $$\sum_a Q^a_i \sigma_a \: = \: \exp\left( - Y_i \right),$$ or equivalently, in the notation of [@Gu:2017nye], $$\sum_a S^a_{i_S} \sigma_a \: = \: \exp\left( - Y_i \right).$$ Solving for $\sigma_a$, we have $$\sigma_a \: = \: \sum_{i_S} \left( S^{-1} \right)_{a i_S} \exp\left( - Y_{i_S} \right),$$ and plugging back in, our (0,2) superpotential becomes $$\begin{aligned} W & = & \sum_{a=1}^r \Upsilon_a \left( \sum_{i=1}^N Q_i^a \sigma_a \: - \: t_a \right) \nonumber \\ & & \: + \: \sum_{i=1}^N F_i \left( \sum_a Q_i^a \sigma_a \: + \: \sum_{a, j, i_S} B_{ij} Q^a_j \left( S^{-1} \right)_{a i_S} \exp\left( - Y_{i_S} \right) \: - \: \exp\left( - Y_i \right) \right),\end{aligned}$$ which is precisely the (0,2) superpotential of [@Gu:2017nye]. Example: Grassmannians {#sect:grassmannian} ====================== So far all of our examples have involved abelian GLSMs. We next turn to a nonabelian example. The Grassmannian $G(k,N)$ is described by a $U(k)$ GLSM with chirals $\Phi^a_i$ and Fermis $\Psi^a_i$ in N copies of the fundamental representation, $a \in \{1,\cdots,k\}$, $i \in \{1,\cdots,N\}$. For linear and diagonal (0,2) deformations off the (2,2) locus [@Guo:2015caf] $$\overline{D}_+ \Psi^a_i \: = \: \left(\sigma^a_b + B_i^j \left( {\rm Tr} \, \sigma \right) \right) \Phi^b_j,$$ where $B$ is diagonal, $B={\rm diag}(b_1,\cdots,b_N)$. The mirror theory consists of chiral fields $\sigma_a, Y_{ia}, X_{\mu\nu}$ and Fermi fields $\Upsilon_a, F_{ia}, \Lambda_{\mu\nu}$ with $a,\mu,\nu=1,\cdots,k, i=1,\cdots,N$ and $\mu \neq \nu$, in the notation of [@Gu:2018fpm]. For the fundamental representation of $U(k)$, the $a$-th component of the weight associated with $Y_{ib}$ is $$\rho^a_{ib} = \delta^a_b$$ and the roots are given by $$\alpha_{\mu\nu}^a = \delta_\nu^a-\delta_\mu^a,$$ therefore the superpotential reads $$\begin{split} W=&\sum_{a=1}^k \Upsilon_a \left( \sum_{i=1}^N Y_{ia} + \sum_{\mu \neq a}(\ln X_{a\mu} - \ln X_{\mu a}) - t \right) \\ &+ \: \sum_{i=1}^N \sum_{a=1}^k F_{ia} \left( \sigma_a + b_i \left(\sum_b \sigma_b\right) - \exp(-Y_{ia}) \right) \: + \: \sum_{\mu \neq \nu} \Lambda_{\mu\nu} \left( 1+\frac{\sigma_\mu - \sigma_\nu}{X_{\mu\nu}} \right), \end{split} \label{eq:gkn:genlw}$$ which gives the operator mirror map $$\exp(-Y_{ia}) \: = \: \sigma_a + b_i \left(\sum_b \sigma_b \right).$$ Next, we compute the excluded locus. From the $X_{\mu \nu}$ poles, since $X_{\mu \nu} = \sigma_{\nu} - \sigma_{\nu}$ along the critical locus, we have $$\sigma_a \: \neq \: \sigma_b$$ for $a \neq b$. That part is the same as on the (2,2) locus. From the fact that $\exp(-Y) \neq 0$, the $F_{ia}$ coefficients imply that $$\sigma_a \: + \: b_i \left( \sum_c \sigma_c \right) \: \neq \: 0,$$ for all $a$ and $i$, which is a deformation of what one gets on the (2,2) locus. Let us take a moment to examine the second excluded locus condition further. If we sum over $\sigma_a$, we get $$\left( 1 + k b_i \right) \left( \sum_c \sigma_c \right) \: \neq \: 0$$ for all $i$, hence for example $$1 + k b_i \: \neq \: 0$$ for all $i$. This condition is closely related to a constraint that arises on the $B_i^j$ in order for the gauge bundle defined by the $\overline{D}_+ \Psi$ to be a bundle, and not some more general sheaf. Specifically, it was shown in [@Guo:2016suk]\[theorem 3.3\] that the $B$’s define a bundle, and not a sheaf, if and only if there do not exist $k$ eigenvalues of $B$ that sum to $-1$. The excluded locus condition we have just derived on the Coulomb branch implies that none of the $B$ eigenvalues equals $-1/k$, which is closely related. Next, let us recover the A/2 model. Upon integrating out $X_{\mu\nu}$ and $Y_{ia}$, we get $$W_{\rm eff} \: = \: \sum_{a=1}^k \Upsilon_a \left( -\ln \prod_{i=1}^N \left(\sigma_a + b_i \left(\sum_b \sigma_b\right)\right) - t \right)$$ and $$H_X \: = \: \prod_{\mu \neq \nu} (\sigma_\mu - \sigma_\nu)^{-1},$$ $$H_Y \: = \: \prod_{i=1}^N \prod_{a=1}^k \left(\sigma_a + b_i \left(\sum_b \sigma_b \right) \right),$$ which reproduce the A/2 correlation functions of the $U(k)$ GLSM $$\langle\mathcal{O}(\sigma)\rangle \: = \: \frac{1}{k!} \sum_{J^a_{\rm eff}=0} \frac{\mathcal{O}(\sigma)}{\left( \det_{a,b} \partial_b J^a_{\rm eff} \right) H_X H_Y}.$$ Next, we shall integrate out some of the fields to construct a lower-energy Landau-Ginzburg model in the pattern of [@Gu:2018fpm]\[section 4.1\]. Beginning with the (0,2) superpotential (\[eq:gkn:genlw\]), integrating out the $\Upsilon_a$ gives the constraints $$\sum_{i=1}^N Y_{ia} \: + \: \sum_{\mu \neq a} \ln \left( \frac{ X_{a \mu} }{ X_{\mu a} } \right) \: = \: t.$$ Using these to eliminate $Y_{N a}$, we have $$Y_{Na} \: = \: - \sum_{i=1}^{N-1} Y_{ia} \: - \: \sum_{\mu \neq a} \ln \left( \frac{ X_{a \mu} }{ X_{\mu a} } \right) \: = \: t,$$ and so we define $$\begin{aligned} \Pi_a & = & \exp\left( - Y_{N a} \right), \\ & = & q \left[ \prod_{i=1}^{N-1} \exp\left( + Y_{i a} \right) \right] \left[ \prod_{\mu \neq a} \frac{ X_{a \mu} }{ X_{\mu a} } \right],\end{aligned}$$ which happens to match the $\Pi_a$ defined in the (2,2) mirror of $G(k,N)$ in [@Gu:2018fpm]\[section 4.1\]. Next, we integrate out $F_{N a}$, which gives constraints $$\sigma_a \: + \: b_N \left( \sum_c \sigma_c \right) \: = \: \exp\left( - Y_{N a} \right) \: = \: \Pi_a.$$ These equations can be solved to give $$\sigma_a \: = \: \frac{1}{1 + k b_N} \left[ \left(1 + (k-1) b_N \right) \Pi_a \: - \: b_N \sum_{c \neq a} \Pi_c \right].$$ Plugging this back in, we get our expression for a mirror Landau-Ginzburg theory: $$\begin{aligned} W & = & \sum_{i=1}^{N-1} \sum_{a=1}^k F_{i a} \left( \sigma_a + b_i \left( \sum_c \sigma_c \right) \: - \: \exp\left( - Y_{ia} \right) \right) \nonumber \\ & & \: + \: \sum_{\mu \neq \nu} \Lambda_{\mu \nu} \left( 1 \: + \: \frac{ \sigma_{\mu} - \sigma_{\nu} }{ X_{\mu \nu} } \right), \\ & = & \sum_{i=1}^{N-1} \sum_{a=1}^k F_{i a} \left[ \frac{1}{1 + k b_N} \left( \left(1 + (k-1) b_N + b_i \right) \Pi_a \: + \: (b_i - b_N) \sum_{c \neq a} \Pi_c \right) \: - \: \exp\left( - Y_{ia} \right) \right] \nonumber \\ & & \: + \: \sum_{\mu \neq \nu} \Lambda_{\mu \nu} \left( 1 \: + \: \frac{ \Pi_{\mu} - \Pi_{\nu} }{ X_{\mu \nu} } \right).\end{aligned}$$ As in earlier discussions, we have glossed over a subtlety: when integrating out the $F_{N a}$, we omitted a Jacobian factor of $$\det({\rm Jac})^{-1} \: = \: \det\left[ \begin{array}{cccc} 1+b_N & b_N & \cdots & b_N \\ b_N & 1+b_N & \cdots & b_N \\ \vdots & & & \vdots \\ b_N & b_N & \cdots & 1+b_N \end{array} \right]^{-1} \: = \: \frac{1}{1 + k b_N},$$ which should be multiplied into correlation functions in order to match against A/2 results. As a consistency check, when all the $b_i = 0$, the (0,2) superpotential above reduces to $$\begin{aligned} W & = & \sum_{i=1}^{N-1} \sum_{a=1}^k F_{i a} \left( \Pi_a \: - \: \exp\left( - Y_{ia} \right) \right) \: + \: \sum_{\mu \neq \nu} \Lambda_{\mu \nu} \left( 1 \: + \: \frac{ \Pi_{\mu} - \Pi_{\nu} }{X_{\mu \nu} } \right),\end{aligned}$$ which is precisely the (0,2) expansion of the (2,2) mirror superpotential $$W \: = \: \sum_{i=1}^{N-1} \sum_{a=1}^k \exp\left( - Y_{ia} \right) \: + \: \sum_{\mu \neq \nu} X_{\mu \nu} \: + \: \sum_{a=1}^k \Pi_a$$ computed in [@Gu:2018fpm]\[section 4.1\]. Next, we will derive the quantum sheaf cohomology relations from this lower-energy Landau-Ginzburg model. The $\Lambda_{\mu \nu}$ imply the constraints $$X_{\mu \nu} \: = \: \Pi_{\nu} - \Pi_{\mu}$$ along the critical locus, and similarly from the $F_{ia}$, $$\begin{aligned} \exp\left( - Y_{ia} \right) & = & \frac{1}{1 + k b_N} \left( \left(1 + (k-1) b_N + b_i \right) \Pi_a \: + \: (b_i - b_N) \sum_{c \neq a} \Pi_c \right), \\ & = & \sigma_a \: + \: b_i \left( \sum_c \sigma_c \right)\end{aligned}$$ along the critical locus. Plugging into the definition of $\Pi_a$, we have $$\Pi_a \: = \: q \left[ \prod_{i=1}^{N-1} \exp\left( + Y_{ia} \right) \right] (-)^{k-1},$$ hence $$\Pi_a \prod_{i=1}^{N-1} \left[ \sigma_a \: + \: b_i \left( \sum_c \sigma_c \right) \right] \: = \: (-)^{k-1} q,$$ or more simply $$\det\left( I \sigma_a + B ({\rm Tr}\, \sigma) \right) \: = \: \prod_{i=1}^{N} \left[ \sigma_a \: + \: b_i \left( \sum_c \sigma_c \right) \right] \: = \: (-)^{k-1} q,$$ This is precisely the physical description of the quantum sheaf cohomology ring relation in the A/2 model on $G(k,n)$ with the tangent bundle deformation described above [@Guo:2015caf], as expected. Thus, we see this mirror correctly duplicates the quantum sheaf cohomology ring. Now, let us perform some consistency checks by computing correlation functions in the mirror Landau-Ginzburg model above in two simple examples and comparing to known results. Our first example is the special case of $G(1,3) = {\mathbb P}^2$. This has no mathematically nontrivial tangent bundle deformations, but nontrivial parameters can still enter the GLSM and appear in correlation functions, and so it will give a nontrivial test. In this case, the (0,2) superpotential above reduces to $$\begin{aligned} W & = & \sum_{i=1}^2 F_{i} \left[ \frac{1}{1+b_3} \left( 1 + b_i \right) \Pi \: - \: \exp\left( - Y_{i} \right) \right],\end{aligned}$$ with $$\Pi \: = \: q \prod_{i=1}^2 \exp\left( + Y_i \right), \: \: \: \sigma \: = \: \frac{1}{1 + b_3} \Pi.$$ The matrix of derivatives of the superpotential terms is $$(\partial_i J_j) \: = \: \frac{1}{1+b_3} \left[ \begin{array}{cc} (1+b_1) \Pi \: + \: (1 + b_3) \exp\left( - Y_1 \right) & (1+b_1) \Pi \\ (1+b_2) \Pi & (1+b_2) \Pi \: + \: (1 + b_3)\exp\left( - Y_2 \right) \end{array} \right],$$ and using the methods of [@Melnikov:2007xi], we find $$\langle \sigma^2 \rangle \: = \: \frac{1}{(1+b_1) (1+b_2) }, \: \: \: \langle \sigma^5 \rangle \: = \: \frac{q}{(1+b_1)^2 (1+b_2)^2 (1+b_3) }.$$ These are exactly $(1+b_3)$ times the A/2 correlation functions for this model given in [@Guo:2015caf]\[section 4.1\], which are $$\langle \sigma^2 \rangle \: = \: \frac{1}{(1+b_1) (1+b_2)(1+b_3) }, \: \: \: \langle \sigma^5 \rangle \: = \: \frac{q}{(1+b_1)^2 (1+b_2)^2 (1+b_3)^2 }.$$ As predicted, we multiply the (lower-energy) Landau-Ginzburg model correlation functions by $1/(1+b_3)$ to get the A/2 model correlation functions. Next, consider the case of $G(2,3) = {\mathbb P}^2$. This model, mirror to a $U(2)$ gauge theory, again has no mathematically nontrivial tangent bundle deformations, but will also serve as a test of correlation functions, as nontrivial parameters do enter the GLSM and appear in correlation functions. Briefly, one now constructs a matrix of derivatives of the functions multiplying $F_{11}$, $F_{12}$, $F_{21}$, $F_{22}$, $\Lambda_{12}$, $\Lambda_{21}$, with respect to $Y_{11}$, $Y_{12}$, $Y_{21}$, $Y_{22}$, $X_{12}$, $X_{21}$, and using the methods of [@Melnikov:2007xi], we find $$\begin{aligned} \langle \sigma_1^2 \rangle & = & \frac{1 + 2 b_3}{\Delta} \left( -1 - 2 I_2 - 2 I_1 \right), \\ \langle \sigma_1 \sigma_2 \rangle & = & \frac{1 + 2 b_3}{\Delta} \left( 2 + 2 I_2 + 2 I_1 \right), \\ \langle \sigma_2^2 \rangle & = & \frac{1 + 2 b_3}{\Delta} \left( -1 - 2 I_2 - 2 I_1 \right),\end{aligned}$$ where, following the notation of [@Guo:2015caf], $$\begin{aligned} I_1 & = & \sum_i b_i, \\ I_2 & = & \sum_{i < j} b_i b_j, \\ I_3 & = & b_1 b_2 b_3, \\ \Delta & = & 2 \prod_{i < j} \left( 1 + b_i + b_j \right).\end{aligned}$$ The correlation functions above are precisely $(1+2 b_3)$ times the A/2 model correlation functions computed in [@Guo:2015caf], precisely as expected from the normalization subtlety discussed in section \[sect:pnpm:IR\]. Example: Flag manifolds {#sect:flag} ======================= In this section, we will briefly outline mirrors to flag manifolds. The GLSM describing the flag manifold $F(k_1,k_2,\cdots,k_n,N)$ is a quiver gauge theory with gauge group $U(k_1) \times \cdots \times U(k_n)$ [@Donagi:2007hi]. For each $s=1,\cdots,n-1$, there is a chiral multiplet $\Phi_{s,s+1}$ and a Fermi multiplet $\Psi_{s,s+1}$ transforming in the fundamental representation of $U(k_s)$ and in the antifundamental representation of $U(k_{s+1})$. There are also chiral multiplets $\Phi_{n,n+1}^i$ and Fermi multiplets $\Psi_{n,n+1}^i$ transforming in the fundamental representation of $U(k_n)$ for $i=1,\cdots,N$. The $E$-terms of this theory are given by [@Guo:2018iyr] $$\begin{split} &\overline{D}_+ \Psi_{s,s+1} \: = \: \Phi_{s,s+1} \Sigma^{(s)} \: - \: \Sigma^{(s+1)} \Phi_{s,s+1} \: + \: \sum_{t=1}^n u^s_t \left({\rm Tr}\, \Sigma^{(t)} \right) \Phi_{s,s+1}, \\ &\quad s=1,\cdots,n-1, \\ &\overline{D}_+ \Psi_{n,n+1}^i \: = \: \Phi_{n,n+1} \Sigma^{(n)} \: + \: \sum_{t=1}^n \left({\rm Tr}\, \Sigma^{(t)}\right) {A_t}_j^i \Phi_{n,n+1}^j, ~i,j=1,\cdots,N. \end{split}$$ The matrices $A_t$ are assumed to be diagonal in this paper, i.e. $${A_t}_j^i = A_{ti} \delta^i_j.$$ The mirror theory is a Landau-Ginzburg model consisting of chiral fields $$\sigma_{a_s}^{(s)},~ {Y^{(s)}}^{a_s}_{b_s},~ X^{(s)}_{\mu_s\nu_s}$$ and Fermi fields $$\Upsilon_{a_s}^{(s)},~ {F^{(s)}}^{a_s}_{b_s},~ \Lambda^{(s)}_{\mu_s\nu_s}$$ for $s=1,\cdots,n$, $a_s=1,\cdots,k_s$, $b_s=1,\cdots,k_{s+1}$, $\mu_s,\nu_s=1,\cdots,k_s$ and $\mu_s \neq \nu_s$ where $k_{n+1}=N$. The superpotential is $$\begin{split} W=&\sum_{s=1}^n\sum_{a_s=1}^{k_s} \Upsilon^{(s)}_{a_s} \left( \sum_{b_s=1}^{k_{s+1}} {Y^{(s)}}^{a_s}_{b_s} - \sum_{\alpha_s=1}^{k_{s-1}}{Y^{(s-1)}}^{\alpha_s}_{a_s} + \sum_{\mu_s \neq a_s}(\ln X^{(s)}_{a_s\mu_s} - \ln X^{(s)}_{\mu_s a_s}) - t_s \right) \\ &+ \: \sum_{s=1}^n \sum_{a_s=1}^{k_s} \sum_{b_s=1}^{k_{s+1}} {F^{(s)}}^{a_s}_{b_s} \left( {E^{(s)}}^{a_s}_{b_s}(\sigma) - \exp\left(-{Y^{(s)}}^{a_s}_{b_s}\right) \right) \\ & + \: \sum_{s=1}^n \sum_{\mu_s \neq \nu_s} \Lambda^{(s)}_{\mu_s\nu_s} \left( 1+\frac{\sigma^{(s)}_{\mu_s} - \sigma^{(s)}_{\nu_s}}{X^{(s)}_{\mu_s\nu_s}} \right), \end{split}$$ where $k_0=0$, $${E^{(s)}}^{a_s}_{b_s}(\sigma) \: = \: \sigma^{(s)}_{a_s} \: - \: \sigma^{(s+1)}_{b_s} \: + \: \sum_{t=1}^n u^s_t {\rm Tr}\, \sigma^{(t)}$$ for $s=1,\cdots,n$, $a_s=1,\cdots,k_s$, $b_s=1,\cdots,k_{s+1}$ and $${E^{(n)}}^{a_n}_{b_n}(\sigma) \: = \: \sigma^{(n)}_{a_n} \: + \: \sum_{t=1}^n A_{tb_n} {\rm Tr} \, \sigma^{(t)}$$ for $a_n=1,\cdots,k_n$ and $b_n=1,\cdots,N$. Again, integrating out $X^{(s)}_{\mu_s\nu_s}$ and $\Lambda^{(s)}_{\mu_s\nu_s}$ shifts the FI parameters $$t_s \rightarrow t_s + (k_s-1) \pi i.$$ Hypersurfaces {#sect:hypersurfaces} ============= So far, our examples have involved mirrors to GLSMs without a superpotential. One can add a superpotential to the original theory, following the same prescription as [@Gu:2018fpm]; namely, one assigns R-charges to the fields, and then takes the mirrors to fields with nonzero R charges, following the same pattern as in [@Gu:2018fpm]. For example, if a chiral field $\phi$ of the original theory has R-charge $r$, then the fundamental field in the mirror is $$X \: \equiv \: \exp\left( - (r/2) Y \right),$$ and the theory has a ${\mathbb Z}_{2/r}$ orbifold. As a result, the mirror (0,2) theory does not depend upon the details of the original superpotential, only upon R-charges. For (2,2) theories, such statements are standard, but in (0,2) theories, they have come to be believed only somewhat more recently [@McOrist:2008ji], and only as statements about GLSM descriptions. In any event, the point is that our mirror construction implicitly reproduces the conjecture of [@McOrist:2008ji] that A/2-twisted GLSMs are independent of precise superpotential terms, and depend only upon R-charges. Conclusions =========== In this paper we have described an extension of the nonabelian mirror proposal of [@Gu:2018fpm] from two-dimensional (2,2) supersymmetric theories to (0,2) supersymmetric theories. The result is a simple systematic ansatz which both generalizes and simplifies previous approaches to Hori-Vafa-style (0,2) abelian mirrors [@Adams:2003zy; @Chen:2016tdd; @Chen:2017mxp; @Gu:2017nye], and also applies to nonabelian cases [@Gu:2018fpm; @Chen:2018wep; @Gu:2019zkw]. We have given general arguments for why this ansatz reproduces correlation functions and quantum sheaf cohomology rings, and have checked in detail in specific examples of mirrors in abelian and nonabelian theories. Acknowledgements ================ We would like to thank Z. Chen and I. Melnikov for useful discussions. W.G. would like to thank the math department of Tsinghua University for hospitality while this work was completed, and E.S. would like to thank the Aspen Center for Physics for hospitality while this work was completed. The Aspen Center for Physics is supported by National Science Foundation grant PHY-1607611. E.S. was partially supported by NSF grant PHY-1720321. [199]{} A. Strominger, “Yukawa couplings in superstring compactification,” Phys. Rev. Lett.  [**55**]{} (1985) 2547-2550. P. Candelas, X. C. De La Ossa, P. S. Green and L. Parkes, “A pair of Calabi-Yau manifolds as an exactly soluble superconformal theory,” Nucl. Phys. B [**359**]{} (1991) 21-74 \[AMS/IP Stud. Adv. Math.  [**9**]{} (1998) 31-95\]. X. G. Wen and E. Witten, “World sheet instantons and the [Peccei-Quinn]{} symmetry,” Phys. Lett.  [**166B**]{} (1986) 397-401. M. Dine, N. Seiberg, X. G. Wen and E. Witten, “Nonperturbative effects on the string world sheet,” Nucl. Phys. B [**278**]{} (1986) 769-789. M. Dine, N. Seiberg, X. G. Wen and E. Witten, “Nonperturbative effects on the string world sheet, 2,” Nucl. Phys. B [**289**]{} (1987) 319-363. E. Silverstein and E. Witten, “Criteria for conformal invariance of (0,2) models,” Nucl. Phys. B [**444**]{} (1995) 161-190, [hep-th/9503212]{}. P. Berglund, P. Candelas, X. de la Ossa, E. Derrick, J. Distler and T. Hubsch, “On the instanton contributions to the masses and couplings of E(6) singlets,” Nucl. Phys. B [**454**]{} (1995) 127-163, [hep-th/9505164]{}. C. Beasley and E. Witten, “Residues and world sheet instantons,” JHEP [**0310**]{} (2003) 065, [hep-th/0304115]{}. J. Distler and B. R. Greene, “Aspects of (2,0) string compactifications,” Nucl. Phys. B [**304**]{} (1988) 1-62. S. H. Katz and E. Sharpe, “Notes on certain (0,2) correlation functions,” Commun. Math. Phys.  [**262**]{} (2006) 611-644, [hep-th/0406226]{}. A. Adams, J. Distler and M. Ernebjerg, “Topological heterotic rings,” Adv. Theor. Math. Phys.  [**10**]{} (2006) 657-682, [hep-th/0506263]{}. E. Sharpe, “Notes on certain other (0,2) correlation functions,” Adv. Theor. Math. Phys.  [**13**]{} (2009) 33-70, [hep-th/0605005]{}. J. Guffin and S. Katz, “Deformed quantum cohomology and (0,2) mirror symmetry,” JHEP [**1008**]{} (2010) 109, [arXiv:0710.2354]{}. J. McOrist and I. V. Melnikov, “Half-twisted correlators from the Coulomb branch,” JHEP [**0804**]{} (2008) 071, [arXiv:0712.3272]{}. J. McOrist and I. V. Melnikov, “Summing the instantons in half-twisted linear sigma models,” JHEP [**0902**]{} (2009) 026, [arXiv:0810.0012]{}. R. Donagi, J. Guffin, S. Katz and E. Sharpe, “A mathematical theory of quantum sheaf cohomology,” Asian J. Math.  [**18**]{} (2014) 387-418, [arXiv:1110.3751]{}. R. Donagi, J. Guffin, S. Katz and E. Sharpe, “Physical aspects of quantum sheaf cohomology for deformations of tangent bundles of toric varieties,” Adv. Theor. Math. Phys.  [**17**]{} (2013) 1255-1301, [arXiv:1110.3752]{}. C. Closset, W. Gu, B. Jia, E. Sharpe, “Localization of twisted $N=(0,2)$ gauged linear sigma models in two dimensions,” JHEP 1603 (2016) 070, [arXiv:1512.08058]{}. J. Guo, Z. Lu, E. Sharpe, “Quantum sheaf cohomology on Grassmannians,” Commun.Math.Phys. [**352**]{} (2017) 135-184, [arXiv:1512.08586]{}. J. Guo, Z. Lu and E. Sharpe, “Classical sheaf cohomology rings on Grassmannians,” J. Algebra [**486**]{} (2017) 246-287, [arXiv:1605.01410]{}. J. Guo, “Quantum sheaf cohomology and duality of flag manifolds,” [arXiv:1808.00716]{}. J. McOrist, “The revival of (0,2) linear sigma models,” Int. J. Mod. Phys. A [**26**]{} (2011) 1-41, [arXiv:1010.4667]{}. J. Guffin, “Quantum sheaf cohomology, a precis,” Mat. Contemp.  [**41**]{} (2012) 17-26, [arXiv:1101.1305]{}. I. Melnikov, S. Sethi and E. Sharpe, “Recent developments in (0,2) mirror symmetry,” SIGMA [**8**]{} (2012) 068, [arXiv:1209.1134]{}. I. V. Melnikov, [*An introduction to two-dimensional quantum field theory with (0,2) supersymmetry,*]{} Lect. Notes Phys.  [**951**]{}, Springer Nature Switzerland, 2019. R. Blumenhagen, R. Schimmrigk and A. Wisskirchen, “(0,2) mirror symmetry,” Nucl. Phys. B [**486**]{} (1997) 598-628, [hep-th/9609167]{}. R. Blumenhagen and S. Sethi, “On orbifolds of (0,2) models,” Nucl. Phys. B [**491**]{} (1997) 263-278, [hep-th/9611172]{}. I. V. Melnikov and M. R. Plesser, “A (0,2) mirror map,” JHEP [**1102**]{} (2011) 001, [arXiv:1003.1303]{}. M. Bertolini, “Testing the (0,2) mirror map,” JHEP [**1901**]{} (2019) 018, [arXiv:1806.05850]{}. M. Bertolini and M. R. Plesser, “A (0,2) mirror duality,” [arXiv:1812.01867]{}. K. Hori and C. Vafa, “Mirror symmetry,” [hep-th/0002222]{}. D. R. Morrison and M. R. Plesser, “Towards mirror symmetry as duality for two-dimensional abelian gauge theories,” Nucl. Phys. Proc. Suppl.  [**46**]{} (1996) 177-186, [hep-th/9508107]{}. A. Adams, A. Basu and S. Sethi, “(0,2) duality,” Adv. Theor. Math. Phys.  [**7**]{} (2003) 865-950, [hep-th/0309226]{}. Z. Chen, E. Sharpe and R. Wu, “Toda-like (0,2) mirrors to products of projective spaces,” JHEP [**1608**]{} (2016) 093, [arXiv:1603.09634]{}. Z. Chen, J. Guo, E. Sharpe and R. Wu, “More Toda-like (0,2) mirrors,” JHEP [**1708**]{} (2017) 079, [arXiv:1705.08472]{}. W. Gu, E. Sharpe, “A proposal for (0,2) mirrors of toric varieties,” JHEP [**1711**]{} (2017) 112, [arXiv:1707.05274]{}. W. Gu, E. Sharpe, “A proposal for nonabelian mirrors,” [arXiv:1806.04678]{}. Z. Chen, W. Gu, H. Parsian and E. Sharpe, “Two-dimensional supersymmetric gauge theories with exceptional gauge groups,” [arXiv:1808.04070]{}. W. Gu, H. Parsian and E. Sharpe, “More nonabelian mirrors and some two-dimensional dualities,” [arXiv:1907.06647]{}. K. Rietsch, “A mirror symmetry construction for $q H^*_T(G/P)_q$,” Adv. Math. [**217**]{} (2008) 2401-2442, [math/0511124]{}. C. Teleman, “The role of Coulomb branches in 2d gauge theory,” [arXiv:1801.10124]{}. M. Kreuzer, J. McOrist, I. V. Melnikov and M. R. Plesser, “(0,2) deformations of linear sigma models,” JHEP [**1107**]{} (2011) 044, [arXiv:1001.2104]{}. R. Donagi, Z. Lu and I. V. Melnikov, “Global aspects of (0,2) moduli space: toric varieties and tangent bundles,” Commun. Math. Phys.  [**338**]{} (2015) 1197-1232, [arXiv:1409.4353]{}. J. Distler and S. Kachru, “(0,2) Landau-Ginzburg theory,” Nucl. Phys. B [**413**]{} (1994) 213-243, [hep-th/9309110]{}. J. Distler, “Notes on (0,2) superconformal field theories,” Trieste HEP Cosmology 1994:0322-351, [hep-th/9502012]{}. K. Hori and M. Romo, “Exact results in two-dimensional (2,2) supersymmetric gauge theories with boundary,” [arXiv:1308.2438]{}. I. V. Melnikov and S. Sethi, “Half-twisted (0,2) Landau-Ginzburg models,” JHEP [**0803**]{} (2008) 040, [arXiv:0712.1058]{}. R. Donagi, E. Sharpe, “GLSM’s for partial flag manifolds,” J. Geom. Phys. [**58**]{} (2008) 1662-1692, [arXiv:0704.1761]{}. [^1]: Specifically, on the (2,2) locus, this will reduce to the nonabelian mirrors proposal described in [@Gu:2018fpm; @Chen:2018wep; @Gu:2019zkw]. Other proposals have appeared in the math community in e.g. [@rietsch1; @teleman], as reviewed in [@Gu:2018fpm]\[section 4.9, appendix A\]. [^2]: For introductions to (0,2) GLSMs and (0,2) Landau-Ginzburg models, we recommend [@Distler:1993mk; @Distler:1995mi]. [^3]: For A/2-twisted nonlinear sigma models, this story is not settled, not least because we know of no simple way to distinguish the UV linear from UV nonlinear deformations in the IR. [^4]: It is very straightforward to extend this proposal to $O(k)$ gauge theories in the same fashion as the (2,2) case, discussed in [@Gu:2019zkw], but we shall not discuss any examples of $O(k)$ (0,2) mirrors in this paper. [^5]: Tracing through this a bit more carefully, the numerical factor arises from the delta functions, which arose from bosonic fields ($\sigma$’s), hence the numerical factor is $\delta_0^{-1}$ instead of $( \Delta_0^{-1} )^{-1} = \Delta_0$ as one might have expected from a fermionic integral.
{ "pile_set_name": "ArXiv" }
The present invention relates to a process for producing a water-absorbent resin. In detail, this invention relates to a process for producing a water absorbent resin, which has high absorption capacity and in which water-soluble ingredients are contained in only a small amount. The water-absorbent resin has been so far used for various kinds of water-absorbent materials such as a paper diaper (or a disposable diaper), physiological articles, a soil water-retentive agent. As a water-absorbent resin of this type, there have been known a hydrolysis product of a starch-acrylonitrile graft copolymer, a neutralized product of a starch-acrylic acid graft copolymer, a crosslinked product of acrylic acid or an acrylate polymer, a partially crosslinked product of polyethylene oxide, a crosslinked product of carboxymethylcellulose and the like. Why the crosslinked polymer is used as a water-absorbent resin is to prevent conversion into a sol by its infinite swelling in absorbing water followed by swelling. In the above-described crosslinked polymers, a crosslinked polymer obtained by copolymerizing a water-soluble monoethylenic unsaturated monomer such as acrylic acid in the presence of a crosslinking agent is of low cost as raw materials, superior in water-absorbent properties, and needs not to care about decomposition, so that it is a main current of the water-absorbent resin. Preferable crosslinking agents so far known are N,N'-methylenebis(meth)acrylamide, N-methylol(meth)acrylamide, (poly)ethylene glycol di(meth)acrylate or (poly)propylene glycol di(meth)acrylate (refer to U.S. Pat. No. 4,351,922), glycerol tri(meth)acrylate, trimethylolpropane tri(meth)acrylate, triallylamine, triallyl cyanurate, triallyl phosphate, di(2-acryLoyloxyethyl) acid phosphate (refer to JP-B-62-56888), glycidyl (meth)acrylate, polyethylene glycol diglycidyl ether (refer to U.S. Pat. No. 4,351,922), glycerol and the like. The real situation of conventional water-absorbent resins produced by using the aforementioned crosslinking agents is that, as the absorption capacity becomes higher, the amount of water-soluble ingredients becomes larger. If such a water-absorbent resin having a large amount of water-soluble ingredients is used for a diaper and the like during a long time, there is a problem that a slime generates on the diaper surface, and another problem that the liquid permeability becomes bad and thereby, the water-absorbent capacity and liquid-dispersing character decrease, so that a leak easily occurs. Conversely, if reduction of the water-soluble ingredients in a water-absorbent resin is intended by increase of the amount of a crosslinking agent, the water-absorbent capacity decreases and an usable range of the water-absorbent resin is limited.
{ "pile_set_name": "USPTO Backgrounds" }
Personality and the occupational stressor-strain relationship: the role of the Big Five. The role of the Big Five traits in the occupational stressor-strain relationship was investigated among 211 managers. Direct, mediated, and moderated effect models were used to investigate whether the Big Five affect strain directly (independently of stress), indirectly (via stress and coping), or interactively with stress. Personality, stress, coping, and strain variables were measured and analyzed with path analysis and hierarchical regression. The Neuroticism-physical strain relationship was partially mediated by perceived role conflict and substance use, and the Neuroticism-psychological strain relationship was mediated by perceived stress. Extraversion had a direct, positive effect on physical and psychological strain, and there was preliminary support for a moderating role of Conscientiousness in the perceived stressor-strain relationship. Agreeableness and Openness were unrelated to strain.
{ "pile_set_name": "PubMed Abstracts" }
For many, home décor is a luxury, not a necessity. How you present and promote your products in a way that not only differentiates from the competition, but convinces people that they should buy them requires going the extra mile. By using a variety of strategies to developing your brand, you should be able to sell your quality home décor products. Presentation When selling home décor, presentation is everything. To sell décor at a competitive price, you must provide the illusion of luxury. A cobalt blue vase sitting on an Eames-style sidebar looks much better than the same vase sitting on a shelf with a hodgepodge of other similar products. Give your home décor items as much space as possible, and frame them with complementary items, rather than multiples of the same. This will help your customer imagine how the item will lend her house a similar panache. The same holds true if you are selling home décor online. You'll need to take professional quality photos of your home décor products. Place the items in a setting with complementary and equally attractive items, or photograph them alone, against a sophisticated plain backdrop. The lighting should be excellent. Everything surrounding your product should be of excellent quality. Instead of price stickers, have tags printed that tell the story of how the product was conceived and produced. Have attractive bags and tissue paper in your shop, or ship things out well-wrapped with a signature sticker and card. Personalize your contact with customers by writing notes to online or catalog buyers when possible. Customers will remember this treatment and are more likely to become repeat buyers. Promotion Stores are competing for attention like never before. You need to set your home décor products apart from the others being sold. Develop a way to brand your home décor products. Some décor is marketed as minimalistic, some as sophisticated, some as affordable. You will not be able to appeal to every segment of the population, so choose which segment is most likely to love your décor items and market to them. Choose a niche that is not oversaturated. If it is, see if you can put more of a unique spin on it. Branding expert Vincent Grimaldi points out that "brand is a combination of attributes...that influences a thought-process in the mind of an audience and creates value." With this in mind, consider every aspect of how you market your décor and how your efforts are creating that value. You should promote your home décor products online and off. Every business should have a website, and you can promote your products by making a Facebook fan page for them, or posting photos that you have taken of them on Flickr to get people's attention. If possible, send samples of your products to key individuals at home and fashion publications. Just one or two mentions in a major print magazine or popular fashion blog can jumpstart your business. About the Author Elise Wile has been a writer since 2003. Holding a master's degree in curriculum and Instruction, she has written training materials for three school districts. Her expertise includes mentoring, serving at-risk students and corporate training.
{ "pile_set_name": "Pile-CC" }
Breakpoint What is 'Breakpoint' Breakpoint, for load mutual funds, is the dollar amount for the purchase of the fund's shares that qualifies the investor for a reduced sales charge (load). The purchase may either be made in a lump sum or by staggering payments within a prescribed period of time. The latter form of investment purchase in a fund must be documented by a letter of intent. BREAKING DOWN 'Breakpoint' For example, suppose that an investor plans to invest $95,000 in a front-end loadmutual fund and faces a sales charge of 6.25%, or $6,125. If a breakpoint of $100,000 exists with a lower sales charge of 5.5%, the investor should be advised to invest an additional $5,000. If the investor can add another $5,000 to the investment, he or she would benefit from a lower breakpoint sales charge of $5,500, or a savings of $625 on this transaction. Mutual funds are required to give a description of these breakpoints and the eligibility requirements in the fund prospectus. By reaching or surpassing a breakpoint, an investor will face a lower sales charge and save money. Any investor purchase of fund shares that occurs just below a breakpoint is considered unethical and in violation of NASD rules.
{ "pile_set_name": "Pile-CC" }
Leh, January 25 (Scoop News) –Like other parts of the country, the 3rd “National Voters Day” was observed today at Leh District with wide-ranging programs including sensitizing voters, EPIC distribution, Ice Hockey exhibition match, Quiz programs and conduct of Mock Poll. The main function was organized in Leh Conference Hall where Chief Executive Councilor, LAHDC, Leh Rigzin Splabar presided over the function as chief guest.Addressing a large number of students, CEC Rigzin Spalbar said that voting power gives youths a sense of citizenship, empowerment, pride and participation and also inspire them to exercise their franchise, when the occasion comes. It was aimed “to provide the unrepresented youth of the country an opportunity to give vent to their feelings and help them become a part of the political process,” Rigzin quipped. The Addl. Deputy Commissioner Leh Tsering Moprup who is also the District Election Officer, Leh mentioned about the amendment in Article 326 where under the qualifying age of a new voter has been reduced from 21 years to 18 for the larger interest of the Indian democratic set up. He urged the new voters to fully understand the importance of their voting rights and use the power of vote for progress and integrity of our nation.Sonam Dorjey, Incharge, CEO, Leh while speaking on the occasion highlighted some important chapters of Indian constitution and urged the young voters and students to become responsible citizens using their voting franchise for only right cause.The Tehsildar Leh, Tsering Motup who is the Assistant Electoral Registration Officer welcoming the chief guest and the participants gave a detail summery of National Voter’s Day. He stated that Leh district has recorded an addition of 2597 voters this year which include 1133 new voters.As a part of the National Voter’s day, Tashi Dolma, Electoral Registration Officer, Leh held a quiz competition among the students of various educational institutions in which the Changla team bagged 1st position.This year as a part of National Voters Day an awareness program along with Ice Hockey exhibition match was also played between the girls teams of SECMOL and Saichen Angel at Karzoo Ice Hockey Rink, Leh where large number of youth witnessed the match. The reports of holding Voters Day was also received from Nubra, Nyoma and Khaltsi where the SDMs have sensitized the public specially the new voters about the importance of voting rights. EPICs were also distributed among the newly eligible voters. ... Share this Story Comment On this Story Back Issuesk Issues If you are looking for Issues beyond today. You can simply use this calendar tool to view Issue of Scoop News for any particular Date.
{ "pile_set_name": "Pile-CC" }
[Dihydropyridines from the first to the fourth generation: better effects and safety]. Dihydropyridines are among the most widely used drugs for the management of cardiovascular disease. Introduced in the 1960s, dihydropyridines have undergone several changes to optimise their efficacy and safety. Four generations of dihydropyridines are now available. The first-generation (nicardipine) agents have proven efficacy against hypertension. However, because of their short duration and rapid onset of vasodilator action, these drugs were more likely to be associated with adverse effects. The pharmaceutical industry responded to this problem by designing slow-release preparations of the short-acting drugs. These new preparations (second generation) allowed better control of the therapeutic effect and a reduction in some adverse effects. Pharmacodynamic innovation with regard to the dihydropyridines began with the third-generation agents (amlodipine, nitrendipine). These drugs exhibit more stable pharmacokinetics, are less cardioselective and, consequently, well tolerated in patients with heart failure. Highly lipophilic dihydropyridines are now available (lercanidipine, lacidipine). These fourth-generation agents provide a real degree of therapeutic comfort in terms of stable activity, a reduction in adverse effects and a broad therapeutic spectrum, especially in myocardial ischaemia and potentially in congestive heart failure.
{ "pile_set_name": "PubMed Abstracts" }
Background ========== Anomalous origin of the left main coronary artery from the pulmonary artery (ALCAPA) is a rare but serious congenital anomaly that occurs in 0.5% of children with congenital heart disease. It may result from abnormal formation of the conotruncus or from persistence of pulmonary buds together with involution of the aortic buds that eventually form the coronary arteries^[@bib1]^. It predominantly presents in the first year of life, resulting in left ventricular ischemia and dysfunction. If uncorrected, the condition carries a very poor prognosis. Owing to the development of extensive collateral circulation, only a very small percentage of patients survive to adulthood, where various manifestations of myocardial ischemia (such as left ventricular dysfunction and mitral regurgitation) are usually present. However, sudden cardiac death may be the first presentation in this group^[@bib2]^. The management and longer-term outcomes have not been adequately defined, but anatomical surgical correction remains the best treatment modality for this subset of patients^[@bib3]^. Patient and methods =================== A 17 year-old male patient presented with sudden cardiac death (SCD) while playing football and was successfully resuscitated. There was no prior history of chest pain, shortness of breath or palpitations. He was then referred to our unit for further investigations and management. Electrocardiography revealed sinus rhythm and signs of left ventricular hypertrophy, without pathological Q waves. Two-dimensional color flow Doppler echocardiography revealed mildly dilated left ventricular dimensions with borderline global systolic function (ejection fraction = 50%) and mild mitral regurgitation (MR). The left main coronary artery (LMCA) was arising from the non-facing sinus of the pulmonary artery with flow reversal. Multi-slice computed tomography (MSCT) confirmed the diagnosis and the exact location of the orifice and proximal course of the anomalous coronary artery ([Fig. 1](#fig1){ref-type="fig"}a, [2](#fig2){ref-type="fig"}a & [3](#fig3){ref-type="fig"}a). The condition was surgically corrected by harvesting the button of anomalous left main coronary ostium with the surrounding wall of the non-facing sinus of the pulmonary artery, mobilizing the button with the left main coronary artery and reimplanting them in the anatomical position within the left sinus of Valsalva. Care was taken to perform the coronary transfer without tension, torsion or kinking. The postoperative course was smooth and the patient was discharged on the fifth postoperative day. Pre-discharge MSCT coronary angiography revealed a smooth takeoff of the LMCA from the aorta with no obstruction ([Fig. 1](#fig1){ref-type="fig"}b, [2](#fig2){ref-type="fig"}b & [3](#fig3){ref-type="fig"}b). Six months later, the patient was completely asymptomatic and had returned to his normal daily activities. Follow up echocardiography showed significant reverse remodeling with normal LV dimensions and ejection fraction, and no mitral regurgitation. No resting regional wall motion abnormalities were detected. A dobutamine stress echocardiogram was negative. Cardiac magnetic resonance imaging revealed mild subendocardial fibrosis in the basal and mid anteroseptal wall. What have we learned? ===================== While cardiomyopathies and channelopathies are responsible for the vast majority of SCD in young adults, coronary artery anomalies including ALCAPA should always be included in the differential diagnosis and workup of survivors. Albeit rare, it is important to remember that SCD may be the first presentation in the latter group. In the absence of widespread myocardial scarring, anatomic correction helps restore left ventricular function and myocardial perfusion, thus eliminating the substrate for further arrhythmias/SCD. ![Preoperative axial CT scan showing the origin of LMCA from pulmonary artery.](gcsp-2015-04-046-g001){#fig1} ![Postoperative axial CT scan showing the origin of LMCA from the aorta after it\'s re-implantation.](gcsp-2015-04-046-g002){#fig2} ![Preoperative coronal section of CT scan showing the origin of LMCA from pulmonary artery.](gcsp-2015-04-046-g003){#fig3} ![Postoperative coronal section of CT scan showing the origin of LMCA from the aorta after it\'s re-implantation.](gcsp-2015-04-046-g004){#fig4} ![Preoperative reconstructive 3D MSCT angiography showing the origin of LMCA from pulmonary artery.](gcsp-2015-04-046-g005){#fig5} ![Postoperative reconstructive 3D MSCT angiography subtracting the pulmonary artery showing the origin of LMCA from the aorta after it\'s re-implantation.](gcsp-2015-04-046-g006){#fig6}
{ "pile_set_name": "PubMed Central" }
Q: Using AWS Codecommit in an organisation We are planning to use AWS codecommit in our organisation. Our scenario is,we have a IAM user named "codeAdmin", who can create repositories. My question is how to handle the developers in the AWS codecommit. We have the following scenarios in consideration for every developer create a new IAM account (added under the required group) and then provide access to the required codecommit repositories. This way,if we have 30 developers,we need to create 30 IAM users. or to give each developer the acccessKey and accessId of a single IAM developer account. In this way,if we have 30 developers, we need to create only 1 IAM user and share the accessKeys/Ids to all. Which approach from the above is best suited? Or is there any other best practices to be followed?. A: Create separate iam user for each user is better. First, different users may have different permissions based on their experience and position. For example, maybe you only want admin user have the ability to delete the repository. Second, using different users can help your team distinguish which developers create a pull request, which developers comments on the pull request. If 30 developers share the same iam user, you won't know who make the comments, create pull request, merge the pull request because they are always the same user.
{ "pile_set_name": "StackExchange" }
If you wanted to get an early taste of Android 2.1 complete with HTC Sense, Hero owners can download the leaked ROM now. But you're probably OK waiting, since this new version is still "a disaster," according to our resident Android expert John Herrman. [XDA Developers via Engadget]
{ "pile_set_name": "Pile-CC" }
{ "index_name": "antv_g6", "start_urls": [ { "url": "https://g6.antv.vision/zh", "tags": [ "zh" ] }, { "url": "https://g6.antv.vision/en", "tags": [ "en" ] }, { "url": "https://g6.antv.vision/.*/en/", "tags": [ "en" ] }, { "url": "https://g6.antv.vision/.*/zh", "tags": [ "zh" ] } ], "stop_urls": [ "/demo/" ], "selectors": { "lvl0": { "selector": "header h2", "global": true, "default_value": "Documentation" }, "lvl1": "article h1, .banner-title", "lvl2": "article h2", "lvl3": "article h3", "lvl4": "article h4", "lvl5": "article h5", "text": "article p, article li, article table td, .banner-description" }, "strip_chars": "#", "conversation_id": [ "1023340198" ], "min_indexed_level": 1, "nb_hits": 14301 }
{ "pile_set_name": "Github" }
We've just texted you your top 3 quotes!* By clicking “Get a Quote Now”, you agree to our Privacy Policy and Terms of Use. You also agree to Health IQ and its agents contacting you with offers for insurance at the phone number you provided, including by text message, autodialed calls, and pre-recorded messages. You can buy a policy without agreeing to these terms by calling 1 (800) 549-1664. The exercise you already do can save you 25.5%* on your Life Insurance. That's because people who exercise have a 18% Lower risk of heart disease 28% Lower risk of all-cause mortality 45% Lower risk of cancer Enter Your Information to Get a Quote How many hours do you typically exercise in a week? Please answer all questions Verified and secured by By clicking “GET YOUR FREE QUOTE”, you agree to our Privacy Policy and Terms of Use. You also agree to Health IQ and its agents contacting you with offers for insurance at the phone number you provided, including by text message, autodialed calls, and pre-recorded messages. You can buy a policy without agreeing to these terms by calling 1 (800) 549-1664. Health IQ in the Press "People who work out and eat healthily shouldn't have to pay as much for life insurance." *Estimated rates and savings are non-binding, subject to change, and based on a hypothetical customer profile that may be different than yours. Your specific rate and savings will vary based on individual circumstances, including age, gender, height, weight, health, time of purchase and several other factors. Special rates are available for those who qualify based on health literacy and/or fitness, but not for profession or income. For more information on how we calculate estimated rates and savings, please see our Advertising Disclosures.
{ "pile_set_name": "Pile-CC" }
The general objective of this project is to provide support and care for the use of transgenic, severely compromised immunodeficient (SClD), knockout, and specific pathogen free (SPF) mice at Stony Brook University (SBU). The Institution has both short-term and long-term goals to improve animal care and services for the faculty. This project will purchase equipment, and perform minor renovations for equipment installation, to upgrade maximum isolation overflow housing of SPF mice. Twenty-two basic and clinically applied research laboratories, that conduct research in gene identification, mapping, analysis and regulation; bacterial and viral receptor regulation; targeted gene therapy; infectious disease pathogenesis; oncology; cerebral amyloid angiopathy; vaccine development; and membrane transport, currently house animals in this overflow space. The project will purchase and renovate two existing animal rooms to install twenty-five ventilated racks. Four mobile, Class 100 animal transfer stations will be purchased and used within the animal rooms for cage servicing and experimental procedures. This equipment will improve the care of animals and address expanding research program needs by creating high density housing space for SPF mice, improving environmental conditions at the cage level to safeguard and preserve animal health, reducing occupational health risks for animal care and research personnel and decreasing labor costs.
{ "pile_set_name": "NIH ExPorter" }
[Impacts of socioeconomic and environmental factors on self-reported prevalence of allergic rhinitis in eleven cities in China]. Recent findings suggest that environmental factors play important roles in the etiology of allergic rhinitis, however, data on the impacts of socioeconomic and environmental factors on self-reported prevalence of allergic rhinitis in China is sparse, which is the aim of this study. Telephone interviews were performed in 11 cities throughout the mainland of China, and the association between environmental factors and self-reported prevalence of allergic rhinitis were evaluated by multiple linear correlation tests. In total, there was no association between the adjusted self-reported prevalence of allergic rhinitis and socioeconomic factors such as GDP, GDP per capita, gross output value of industry and gross output value of industry per capita, while the adjusted self-reported prevalence of allergic rhinitis was positively correlated with the concentration of SO2, and no association was found between adjusted self-reported rate of allergic rhinitis and either meteorological factors including annual average temperature, annual average relative humidity, annual hours of sunshine and annual precipitation or other air pollution factors including NO2 and PMl0. The study demonstrates that the self-reported prevalence of allergic rhinitis in 11 cities in China was positively correlated with the concentration of SO2, and the strategy of prevention for allergic rhinitis could be conducted according to the results. Prevalence;
{ "pile_set_name": "PubMed Abstracts" }
Our lovely doggy is expecting a baby again! But it seems that the baby puppy is not in the right position in her womb. You will have to perform a Caesarean section, doctor. The surgery will help our doggys baby to be born safely. Be quick and careful and the surgery will go well. Mommy doggy is counting in you!
{ "pile_set_name": "Pile-CC" }
Hi All,1st Part of the Trilogy From the "Hidden Lakes Chain" in Montana.Located in the Beaverhead National Park it is Described as an "Extraordinary Place",The "Hidden Jewel" once Traversed by Lewis and Clark on their Historic Journey,Offers a Pristine Habitat.The State Record for a Rainbow Trout,Weighing 20 Pounds was held from 1952 until it was Broken in 1988.You are fishing for Jumping Whitefish,Rainbow,Red Rainbow,Rainbow Trout,Cutthroat,Cutthroat Trout,YSCutthroat Trout Plus Pleco,Mountain Whitefish and Rainbow Trout.Have Fun,Martin.
{ "pile_set_name": "Pile-CC" }
/* * Copyright (c) 2010, Oracle America, Inc. * Redistribution and use in source and binary forms, with or without * modification, are permitted provided that the following conditions are * met: * * * Redistributions of source code must retain the above copyright * notice, this list of conditions and the following disclaimer. * * Redistributions in binary form must reproduce the above * copyright notice, this list of conditions and the following * disclaimer in the documentation and/or other materials * provided with the distribution. * * Neither the name of the "Oracle America, Inc." nor the names of its * contributors may be used to endorse or promote products derived * from this software without specific prior written permission. * * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS * FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE * COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, * INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE * GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, * WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING * NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE * OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. */ /* fixincludes should not add extern "C" to this file */ /* * Rpc additions to <sys/types.h> */ #ifndef _RPC_TYPES_H #define _RPC_TYPES_H 1 typedef int bool_t; typedef int enum_t; /* This needs to be changed to uint32_t in the future */ typedef unsigned long rpcprog_t; typedef unsigned long rpcvers_t; typedef unsigned long rpcproc_t; typedef unsigned long rpcprot_t; typedef unsigned long rpcport_t; #define __dontcare__ -1 #ifndef FALSE # define FALSE (0) #endif #ifndef TRUE # define TRUE (1) #endif #ifndef NULL # define NULL 0 #endif #include <stdlib.h> /* For malloc decl. */ #define mem_alloc(bsize) malloc(bsize) /* * XXX: This must not use the second argument, or code in xdr_array.c needs * to be modified. */ #define mem_free(ptr, bsize) free(ptr) #ifndef makedev /* ie, we haven't already included it */ #include <sys/types.h> #endif #if defined __APPLE_CC__ || defined __FreeBSD__ # define __u_char_defined # define __daddr_t_defined #endif #ifndef __u_char_defined typedef __u_char u_char; typedef __u_short u_short; typedef __u_int u_int; typedef __u_long u_long; typedef __quad_t quad_t; typedef __u_quad_t u_quad_t; typedef __fsid_t fsid_t; # define __u_char_defined #endif #ifndef __daddr_t_defined typedef __daddr_t daddr_t; typedef __caddr_t caddr_t; # define __daddr_t_defined #endif #include <sys/time.h> #include <sys/param.h> #include <netinet/in.h> #ifndef INADDR_LOOPBACK #define INADDR_LOOPBACK (u_long)0x7F000001 #endif #ifndef MAXHOSTNAMELEN #define MAXHOSTNAMELEN 64 #endif #endif /* rpc/types.h */
{ "pile_set_name": "Github" }
6) Winning any tournament with a big field takes a huge amount of both luck skill, but the more events you play or satellite into, the better your chances of scoring big. At least 7 Waterloo players have had that “perfect storm” combination to win a big event: Steve Paul-Ambrose, Nenad Medic, Will “cutiepi314 or The Dreamer” Ma, Mike “Timex” McDonald, Matt “ch0ppy” Kay, Ryan “GotSkillz” Fisler SirWatts.
{ "pile_set_name": "Pile-CC" }
The present invention relates to stent deployment devices and methods for deploying stents. More particularly, the present invention concerns a stent deployment device and a method for deploying a stent within the alimentary tract using an endoscope. Endoscopes are effective devices for diagnosing and treating patients with minimal intervention and discomfort and are often used to explore and perform biopsies in such areas as the alimentary tract. In general, an endoscope has a flexible elongated tubular body equipped with a miniature television camera or other viewing device, a light, and a working lumen or channel. The working channel is used to store and deploy a variety of surgical tools for different endoscopic operations. A stent is a resilient device often used in anchoring vascular grafts and for supporting body openings during the grafting of vessels and tubes of the body during surgery. Also, stents are frequently used, without grafts, for supporting lumenal patency. More recently, artificial (woven or nonwoven polymeric) grafts are used in cardiac, vascular and nonvascular applications to provide extra support. Moreover, stents can be separated into self expanding and plastically deformed stents. A self expanding stent is deployed by its self expanding resilience. A plastically deformed stent is deployed by plastic deformation of the constituent material with a balloon or other such dilating instrument. Endoscopes are effectively utilized to deploy stents within a body cavity in a minimally invasive manner. In a conventional method, a stent is compressed to fit into the working channel of the endoscope and is delivered to the body cavity to be treated. However, storing a stent within the working channel of an endoscope causes several problems. First, there is a limitation on the size of the stent that can be compressed to fit in the working channel. Because the working channel of the endoscope is often relatively small, a large stent may not fit within the working channel. Thus, this method is not suitable for deploying large stents. Additionally, fitting a stent in the working channel often results in extreme deformation of the stent when it is deployed to the body cavity. Since stents are made of resilient material, compression within the working channel can cause the stent to become deformed and fail to return to its original shape if strained beyond a certain point. The more the stent gets strained, the more extreme the deformation is likely to be. Consequently, there is a need for stent deployment systems and methods that provide a solution to aforementioned problems and permit deployment of stents, regardless of size, into body cavities.
{ "pile_set_name": "USPTO Backgrounds" }
Improved Prediction of Blood-Brain Barrier Permeability Through Machine Learning with Combined Use of Molecular Property-Based Descriptors and Fingerprints. Blood-brain barrier (BBB) permeability of a compound determines whether the compound can effectively enter the brain. It is an essential property which must be accounted for in drug discovery with a target in the brain. Several computational methods have been used to predict the BBB permeability. In particular, support vector machine (SVM), which is a kernel-based machine learning method, has been used popularly in this field. For SVM training and prediction, the compounds are characterized by molecular descriptors. Some SVM models were based on the use of molecular property-based descriptors (including 1D, 2D, and 3D descriptors) or fragment-based descriptors (known as the fingerprints of a molecule). The selection of descriptors is critical for the performance of a SVM model. In this study, we aimed to develop a generally applicable new SVM model by combining all of the features of the molecular property-based descriptors and fingerprints to improve the accuracy for the BBB permeability prediction. The results indicate that our SVM model has improved accuracy compared to the currently available models of the BBB permeability prediction.
{ "pile_set_name": "PubMed Abstracts" }
It has been generally assumed that secretin is a physiological stimulant for pancreatic water and bicarbonate secretion. There is, however, no proof for this assumption. In fact, there is some recent evidence that it may be invalid. In order to qualify as physiologic stimulant, secretin has to be released after intake of a meal. Using a radioimmunoassay which increased sensitivity (6 pg/ml) and determining IRS concentrations in peripheral and portal venous serum we plan to investigate whether or not secretin is released after a meal in dogs and in human subjects. Existence of molecular heterogeneity has recently been demonstrated for secretin. In this study, we plan to separate different forms of secretin immunoreactivity by Sephadex Gel Filtration and by polyacrylamide gel electrophoresis and to study their physicochemical and immunochemical characteristics, their metabolic half-life and their biological activity. There is some evidence to suggest that ectopic secretin production by tumors exist in humans. We hope to obtain information on the incidence of ectopic secretin secretion, on the kind of tumor it is most frequently associated with and whether or not it is associated with a clinical syndrome by determining the secretin content in extracts obtained from solid tumors. Somatostatin may have therapeutic potential in insulin requiring diabetics, treatment of diabetic ketoacidosis, acromegaly and the Zollinger-Ellison syndrome. However, the tetradecapeptide also has serious unwanted side effects. We have recently demonstrated that somatostatin inhibits HCl stimulated release of secretin and pancreatic secretion of bicarbonate and enzymes. In this study we plan to investigate whether or not meal stimulated pancreatic exocrine secretion is similarly affected by somatostatin.
{ "pile_set_name": "NIH ExPorter" }
'use strict'; export interface ILyric { songId: string; chunks?: Array<{ /** * type: * c: origin lyric sentence */ type: string; text: string; point?: number; translation?: string; }>; };
{ "pile_set_name": "Github" }
Visual function before and after photorefractive keratectomy for myopia. To date, Snellen visual acuity and postoperative refraction have been used to evaluate the results of photorefractive keratectomy. However, other parameters, such as contrast sensitivity function and glare, may be affected by refractive surgery and lead to unsatisfactory visual performance. This prospective study is aimed at evaluating the effect of photorefractive keratectomy on contrast sensitivity function and glare. Static contrast sensitivity function, dynamic contrast sensitivity function, and glare sensitivity were evaluated in 22 myopic eyes before as well as 1, 3, and 6 months after photorefractive keratectomy. The eyes tested were divided into three groups, according to the amount of myopia: group I, from -4.00 to -8.00 diopters (D); group II, from -8.25 to -11.00 D; group III, from -11.25 to -20.00 D. Both static and dynamic contrast sensitivity function at the intermediate spatial frequencies were altered at 1 month after photorefractive keratectomy, with a trend toward recovery at 3 and 6 months postoperatively. Glare sensitivity was not significantly affected by surgery. Contrast sensitivity function and glare testing may show abnormalities in the presence of optimal visual and refractive results. These tests may result especially important for the evaluation of new refractive surgical procedures.
{ "pile_set_name": "PubMed Abstracts" }
Q: Dividing date/time elements displayed from sql call, into sperate divs? This sql call, <div class="dateOnAd"><?php print $row['dttm_modified']; ?></div> outputs: 2012-05-22 15:07:28. I need to figure out a way to divide the output into different divs <div class="example-date"> <span class="day">31</span> <span class="month">July</span> <span class="year">2009</span> </div> A: <div class="example-date"> <span class="day"><?php echo date('d', $row['ddtm_modified']); ?></span> <span class="month"><?php echo date('F', $row['ddtm_modified']); ?></span> <span class="year"><?php echo date('Y', $row['ddtm_modified']); ?></span> </div> You can read more about the date() function here: date.
{ "pile_set_name": "StackExchange" }
Senator, Pentagon Unit: U.S. Helped Al Qaeda, Predicted ISIS A Republican presidential contender is talking up U.S. complicity in the rise of Al Qaeda and its more radical successor ISIS, the Islamic State of Iraq and Syria. “ISIS exists and grew stronger because of the hawks in our party who gave arms indiscriminately,” U.S. Sen. Rand Paul of Kentucky (shown in a photo) alleged during an interview on MSNBC. “And most of those arms were snatched up by ISIS. These hawks also wanted to bomb [Syrian President Bashar al-Assad], which would have made ISIS's job even easier," he continued. "They created these people. ISIS is all over Libya because these same hawks in my party loved — they loved [former Secretary of State] Hillary Clinton’s war in Libya. They just wanted more of it." Separately, a 2012 memo released by the Pentagon’s Defense Intelligence Agency (DIA) suggests that the federal government at a minimum predicted that a group such as ISIS would arise in the Middle East. Some critics go farther and argue that the memo suggests a sinister secret plan by a well-positioned authorities to create chaos in the Middle East by fostering ISIS. Why? To foster hidden foreign policy goals such as toppling Assad, hurting Iran, relieving threats to Israel, opening the way for a Qatar gas pipeline to Europe, and increasing U.S. arms sales and other military goals. Meanwhile, former Deputy CIA Director Michael Morell said he did not know who U.S. Sen. John McCain of Arizona met in the adjoining photo, taken when McCain traveled to Syria in 2013. Morell was responding to question by the Justice Integrity Project at his news conference May 11 to promote his memoir The Great War of Our Time, which analyzes the war against Islamic militants. McCain, now chairman of the U.S. Armed Services Committee, was seeking then and now to boost U.S. military support for those opposing Assad's government. McCain has denied that he met ISIS leaders, as alleged by critics who have published the collage at right claiming that the man circled in red would become the top ISIS leader, "Caliph" Abu Bakr al-Baghdadi. Morell is a 33-year veteran of the CIA who retired in 2013 after serving as deputy director and twice holding the temporary post of director. He is urrently the senior intelligence analyst at CBS News among other his other pursuits. He is shown at right in our photo from the session. The public is left clueless when someone of his credentials punts on a tough question, as he did several times in his news conference broadcast by C-SPAN. For example, the near-certainty of informed researchers (reflected also in public opinion polls) that the Warren Commission performed a cover-up of the full facts of President Kennedy's murder illuminates the dangerous possibilities within current disputes. Attendees are primarily those with left and academic perspectives. Yet our project's research is non-partisan and prompts at least as many invitations from conservative broadcasters and audiences as from the left because every citizen needs better tools these days to understand the confusion widely disseminated on the biggest national issues. For such reasons, this column continues is overview of current mysteries by quoting sources from the right, left and center below. A 2011 photo of President Obama, former President Bush and their wives symbolizes the lockstep of Washington's military-intelligence-foreign affairs establishment, despite jockeying for domestic political advantage. Thus, Rand Paul positioned himself against both GOP rivals and Clinton with his comments. Similarly, Sen. Ted Cruz of Texas this week condemned Obama for not persuading congress to undertake military action against Assad in 2013 — when Cruz helped lead opposition to such intervention. Far more murky is whether the rise of Al Qaeda (which experts spell several different ways in English) and its ally/successor ISIS arose accidentally from initial U.S. armaments in the 1980s — or by the intention of a few sinister strategists embedded into government and able to manipulate outcomes largely in secret. The conservative transparency group Judicial Watch obtained the Defense Intelligence Agency's 2012 document as part of its litigation under the Freedom of Information Act (FOIA) for documents about Obama administration scandals, especially the 2012 militant murders of four U.S. diplomatic and security personnel in Benghazi. Fox News Insider reported the discovery May 18, saying, "Another 2012 DIA memo predicts the rise of ISIS and the establishment of a caliphate 17 months before President Barack Obama called ISIS “jay-vee.” The report by Catherine Herridge was a small part of a larger story headlined, Docs: Benghazi Planned in Advance to Coincide With 9/11 Anniversary. The story's main focus was: "Fox News has obtained documents which reveal what U.S. intelligence agencies knew about the Benghazi attack and weapons traveling from Libya to Syria back in 2012. A Defense Intelligence Agency memo from Sept. 16, 2012, concluded that the Benghazi terror attack was planned at least 10 days in advance to coincide with 9/11 and was in retaliation for a drone strike that killed an al Qaeda strategist. The memo was copied to the National Security Council, the State Department and the CIA." The report continued, "The intention was to attack the consulate and to kill as many Americans as possible to seek revenge for the [U.S.] killing of Aboyahiye (Alaliby) in Pakistan and in memorial of the 11 September 2001 attacks on the World Trade Center buildings,” the memo said. Judicial Watch obtained the memos by suing in federal court. “The Obama administration says it was a coincidence that [the Benghazi attack] occurred on 9/11. In fact, their intelligence said it wasn’t a coincidence, and in fact, specifically the attack occurred because it was 9/11,” Judicial Watch President Tom Fitton said. The Fox News report, supported by the adjoining graphic, continued: "A third DIA memo, dated Oct. 5, 2012, leaves no doubt that U.S. intelligence agencies knew that weapons were moving from Libya to Syria before the attack that killed four Americans. Former CIA Director Mike Morell recently dodged questions about these weapons in an interview with Bret Baier." Baier asked him: Were CIA officers tracking the movement of weapons from Libya to Syria? “Can’t talk about it,” Morell said. Our Presidential Puppetry: Obama, Romney and Their Masters described upon publication in late 2013 how the Obama administration had hidden from the public the secret program in Libya involving the CIA and State Department to facilitate arms smuggling by militants through Benghazi. The purpose was to help rebels in Syria in an operation that resulted in the deaths of U.S. Ambassador Christopher Stevens and three others. The Fox News report further confirmed the book segment and the continuing obfuscation of a major news story. Beyond Benghazi Even more scandals are apparent. Let's look at the DIA prediction regarding ISIS. Summarized below are commentaries from author and former Navy intelligence officer Wayne Madsen, Zero Hedge commentator Tyler Durden, and former State Department Foreign Service Officer Michael Springmann, who is now an author and attorney. Each has written for years that Al Qaeda was not simply an accidental outgrowth of careless and wrong-headed American foreign policy but instead a tool of ruthless and cynical leaders controlling key government officials in the dominant parties here and with allied governments. We start with the Wayne Madsen Report (WMR) May 26 column, DIA message confirms ISIL is a Western construct. This subscription site article is excerpted here by permission of its author, a Navy officer for 14 years, including service in Navy intelligence and a year's detail to the National Security Agency (NSA): A formerly SECRET NOFORN (No Foreign Dissemination) message, dated August 5, 2012, to the Defense Intelligence Agency (DIA) from a redacted U.S. government agency, provides more evidence that the Islamic State of Iraq and the Levant (ISIL), otherwise known as the Islamic State or "Da'ish," was a construct of U.S. intelligence. As WMR reported in the past, ISIL was also incubated and sustained by the Saudi, Qatari, Turkish, and Israeli intelligence services. The message, declassified as the result of a Freedom of Information Act request submitted by Judicial Watch, a conservative organization, indicates that the intelligence on ISIL was "not finally evaluated," which means it was not sanitized and editorialized by the political operatives within the U.S. intelligence community. The message leads off with the following: "The Salafist, the Muslim Brotherhood, and AQI [Al Qaeda in Iraq] are the major forces driving the insurgency in Iraq." The message goes on to state: "The West, Gulf countries, and Turkey support the [Syrian] opposition; while Russia, China, and Iran support the regime." The "regime" is the government of Syrian President Bashar al-Assad. The operative paragraph states that the "supporting powers to the opposition" want to establish "declared or undeclared Salafist principality in eastern Syria." Madsen, shown in a file photo, wrote much more about the memo, following up his reports last year that the United States and its allies have been hidden supporters of ISIS for strategic reasons. For now, however, we cite others for additional comment. "From the first sudden, and quite dramatic, appearance of the fanatical Islamic group known as ISIS," he wrote, "we suggested that the 'straight to beheading YouTube clip' purpose behind the Saudi Arabia-funded Islamic State was a simple one: use the Jihadists as the vehicle of choice to achieve a political goal: depose of Syria's president Assad, who for years has stood in the way of a critical Qatari natural gas pipeline, one which could dethrone Russia as Europe's dominant — and belligerent — source of energy." Durden continued: But it's one thing to speculate; it's something entirely different to have hard proof. And while speculation was rife that just like the CIA-funded al Qaeda had been used as a facade by the US to achieve its own geopolitical and national interests over the past two decades, so ISIS was nothing more than al Qaeda 2.0, there was no actual evidence of just this. That may all have changed now when a declassified secret US government document obtained by the public interest law firm Judicial Watch shows that Western governments deliberately allied with al-Qaeda and other Islamist extremist groups to topple Syrian dictator Bashir al-Assad. ... What wasn't clear is just how the US predetermined the current course of events in the middle east. Now, thanks to the following declassified report, we have a far better understanding of not only how current events in the Middle East came to be, but what was America's puppetmaster role leading up to it all. Here at the Justice Integrity Project, we reported in early March that Springmann's new book provides a shocking, timely, and credible circumstantial case that ties the U.S. training of Islamic radicals to our nation’s major foreign policy disasters in the Mideast during the past quarter century. “It’s past time to expose murder, war crimes and human rights violations by the United States of American and its ‘intelligence’ services,” Springmann says. He continues: Using the dubious claim of "national security," the United States, though the Central Intelligence Agency and the National Security Agency (NSA), has engaged in and/or organized coups and destabilization efforts around the world, most notably in the Middle East. From Libya to Iran, governments have been overthrown, politicians assassinated, and everyday citizens murdered — all with the knowledge of not only the president of the United States and the executive branch but with the legislative and judicial ones, as well. The essence of his first-hand experience is that he was required as chief visa officer in Saudi Arabia to issue what he regarded as illegal visas to large numbers of U.S.-backed Islamic fundamentalists transiting through Jeddah from multiple Islamic nations so they could visit the United States for secret purposes. Those purposes, Springmann later concluded, involved covert training at such locales as "The Farm," a CIA training facility in Williamsburg, Virginia. The trainees, he alleges, were vagabond Islamic mercenaries, revolutionists and jihadists — an "Arab-Afghan Legion" — who could be unleashed on America’s enemies. All of this, he argues in Visas for Al Qaeda, was without adequate consideration of the “blowback” to the United States from uncontrollable jihadists sometimes recruited from prisons and with the help of ultra-radical clerics. McCain, the Senate Armed Services Committee chairman, has campaigned relentlessly for years to advocate more wars and arms deals to solve global problems. At the same time, he is lionized by the media, as underscored by his track record as by far the current leader in terms of invitations to speak on the influential Sunday network news talk shows. The close ties between the important politicians and the media are illustrated by the White House photo at right taken on Feb. 18, 2015. It portrays the president working with Ben Rhodes, the deputy national security advisor for strategic communications (shown at far left), and Terry Szuplat, senior director for speech writing, on remarks prior to the White House Summit on Countering Violent Extremism. Rhodes has been a key strategist and speechwriter for the president on national security. His brother, David Rhodes, is the president of CBS News. Yet, as we reported earlier this year, no one apparently has grilled McCain in-depth to determine the facts behind some of his initiatives, such as his meeting in May 2013 with Islamists who allegedly morphed into Al-Qaeda and ISIS/ISIL leaders in Syria. McCain slipped across the Turkish-Syria border to meet with opponents of Syrian President Bashar Assad. The trip was arranged by Elizabeth O'Bagy, who accompanied him while working for the U.S. Institute for the Study of War, a hawkish NGO led by Kimberly Kagan. The latter is part of the neo-con/neo-lib pundit/scholar family that includes her husband, Frederick Kagan, his brother Robert Kagan, and the latter's wife, U.S. Ambassador to the European Union Victoria Nuland. Like McCain, the photogenic, Georgetown-educated "Dr." O'Bagy, 26, shown at left in a screen shot from Fox News, advocated the vital importance for U.S. taxpayers in ramping up American funding for the so-called Syrian "moderates" against the Assad government. She made the case, among other places, in a Wall Street Journal op-ed that identified her as a Ph.D. expert. McCain, Secretary of State John Kerry, the Wall Street Journal, and many others were eager to advance her career and messaging. Using one such platform, she described McCain as so eager to know his moderate friends that he undertook a "sleepover" with them. But she was exposed as falsely claiming doctorate status and as being a paid operative of the Free Syrian Army. She seemed, in other words, to be a phony and a propagandist although might be described more charitably as yet-another career-minded opportunist in a capital filled with them. Whatever the case, McCain promptly hired her as staff after the Institute for the Study of War fired her for the false claim of doctorate status. The situation got even more messy in 2014 when Rand Paul relied on a McCain claim that he had met "with ISIS" to denounce McCain's continuing advocacy for war spending against Syria. As reader comments to both newspapers pointed out, the newspapers' defense of McCain failed to resolve the factual questions. The most basic omission was the newspaper's failure to identify all the individuals in the photos with their affiliations. Critics of McCain allege current ISIS Caliphate leader Abu-Bakr Al Bagdadi (a pseudonym), for example, was in the 2013 photos. Michael Morell's response to my question at the Press Club, that he did not know the identity of McCain's meeting companions, suggests either secrecy or lack of curiosity. After the cameras went off, I mentioned to him that my questions stemmed from the commonplace Washington observation that in an agency "the number two guy runs everything." "I did run everything," he quipped, "but that doesn't mean I know everything." A Tale of Two Intelligence Careers Morell and Madsen have pursued different paths following their work in government intelligence. Madsen became a vice president at a defense contracting company, Computer Sciences Corp., following his Navy service. Then he became a public interest research fellow and commentator who has been increasingly critical of the defense-intelligence complex in recent years. As one step, he helped organize his Northern Virginia community in support of the unsuccessful John McCain for President campaign in 2000, for which he contributed $500. Madsen has a different take now, as reflected in his latest column, excerpted at length with his permission: The Western powers — the United States, Britain, France, and, more importantly, Israel — working in concert with the Gulf countries [Saudi Arabia, Qatar, United Arab Emirates, Kuwait, and Bahrain], as well as Turkey, according to U.S. intelligence, created ISIL to destroy the Shia-dominated nations of Syria and Iraq. The fall of Palmyra in Syria and Ramadi in Iraq are a result of this conspiracy of "supporting powers." The civil war in Yemen that has seen the very same "supporting powers," including Egypt, providing military forces to fight the Shi'a-aligned Houthi rebels is, like the civil wars in Syria and Iraq, of U.S. Saudi, Israeli, and Turkish design. Ultimately, Iran is the target for the "supporting powers" of ISIL and its allies. WMR has been reporting on the NATO and Gulf Arab support for ISIL since the group first raised its black and white caliphate flag in Syria. Syrian rebels, who later formed the core of ISIL, were photographed with Senator John McCain during a covert foray by his and his assistant, Elizabeth O'Bagy [also shown in the photo at right], into a rebel-held "safe haven" in Syria. Among those photographed with McCain was the future Islamic State caliph, Abu Bakr al-Baghdadi. In a three-part series in September 2014, WMR reported the following: "The deeper one digs into the operations surrounding the 'Islamic State of Iraq and the Levant' (ISIL), or, as it is variably called, 'Islamic State of Iraq and al-Sham' (ISIS), 'Al Dawlah' (the State), or 'Da'ish' (a concatenation of 'al-Dawla al-Islamiya fi Iraq wa al-Sham,' the more the Islamist insurgent group's links to Western and Israeli intelligence are revealed . . . There is every indication that ISIL has significant links to Israel. Although there are claims to the contrary, ISIL absorbed most of the ranks of the Al Qaeda-affiliated Jabhat al-Nusra (Al Nusra Front) Islamist insurgent group in Syria. Al Nusra Front has coordinated its seizure of Syrian army positions along the Golan Heights border with the Israeli Defense Force (IDF). Rather than hit back at Al Nusra positions on the Syrian side of the Golan frontier, the Israelis attacked Syrian army positions, giving a boost to the Syrian campaigns of Al Nusra in particular and ISIL in general. There are reports that the Israeli military has been given the coordinates of Syrian army and Hezbollah forces, as well as 'Committees for the Defense of the Homeland' militia forces of Alawites, Shi'as, Christians, and Druze, by Al-Nusra/ISIL to launch missile and drone attacks from the Israeli side of the border . . . The grand master of Israel's Zionist policies, former U.S. Secretary of State Henry Kissinger, recently stated that Iran was a bigger threat than ISIL. Prospective Democratic presidential candidate Hillary Clinton recently lavishly praised Kissinger in a review of his new book, 'World Order.'" Our September 2014 report continued: "ISIL/Al Nusra is enriching itself from ransom payments for hostages being received mostly from Qatar, a member of Obama's newly-formed 'coalition' to fight ISIL. The most recent ransom paid by Qatar to ISIL was for 45 Fijian peacekeepers captured by ISIL's Al Nusra allies in the Golan region of Syria bordering Israel. Qatar also paid ransom payments to Al Nusra-ISIL units for some Syrian nuns and captured Lebanese Army soldiers. Meanwhile, Saudi Arabia is, under Obama's 'coalition,' training so-called Free Syrian Army 'moderates' to fight ISIL/Al Nusra and the Assad government. In the past, the Saudis have conducted such training to radicalize Sunni Muslim volunteers for the Syrian civil war and funnel them to ISIL units in Syria and Iraq." His previous book, The Star and the Sword, was published last summer and was just as controversial. It alleges a secret alliance between Saudi Arabia and Israel facilitated by the United States. Because of such writing Madsen, once a frequent guest on U.S. network and cable news shows, is no longer invited. Morell, by contrast, is not simply a commentator on CBS News but on many shows because of his book. After leaving the CIA in 2013, Morell joined Beacon Global Strategies, started by Hillary Clinton’s “principal gatekeeper” — as described by the New York Times — Philippe Reines. The company serves as a sort of Clinton government-in-waiting. Thus, Morell’s statements become even that much more suspect due to a conflict of interest, while trying to protect Hillary Clinton’s bid for the White House. In other words, the future looks bright — unless you are not bothering to try to understand the news. From here, we cannot say we always understand complex foreign intrigues, especially in a timely way. But we do know enough to appreciate those who are at least asking questions and on occasion suggesting answers, especially on important topics. Contact the author This email address is being protected from spambots. You need JavaScript enabled to view it. Public Appearances 28pages.org, Rand Paul, Ron Wyden to Introduce 28 Pages Resolution in Senate, Brian McGlinchey, May 28, 2015. The growing, nonpartisan drive to declassify a 28-page finding on foreign government support of the 9/11 hijackers is about to take an enormous step forward with the introduction of a Senate resolution urging the president to release the material to the public. Dramatically compounding the issue’s visibility, the resolution is being introduced by high-profile Republican presidential hopeful Rand Paul of Kentucky. A spokesperson for Senator Paul told 28Pages.org that Oregon Democrat Ron Wyden will cosponsor the resolution, which will serve as the upper chamber’s companion to House Resolution 14. Paul will unveil the Transparency for the Families of 9/11 Victims Act at an outdoor Capitol Hill press conference on Tuesday, June 2 at 10 am, joined by Representatives Walter Jones (R,NC), Stephen Lynch (D, MA), Thomas Massie (R, KY) and former Democratic Senator Bob Graham. Update Insurge Intelligence via OpEdNews, The bin Laden death mythology, Nafeez Ahmed, July 3, 2015. The White House's story of how U.S. special forces hunted down and assassinated arch terrorist Osama bin Laden in his secret lair in Pakistan is unraveling. The official narrative of the bin Laden raid is that for over a decade, U.S. intelligence hunted for the terror chief until a surveillance/torture-enabled breakthrough tracked him to a secret compound in Abbottabad, Pakistan on May 1, 2011. The role of a former ISI officer in blowing the whistle on the ISI's protection of bin Laden in August 2010 brought his concealment out into the open and triggered high-level White House discussions on how to resolve the situation: to kill or not to kill? Declassified documents, official government reports and intelligence officials confirm that since before 9/11, and continuing for the decade after, the US intelligence community was systematically stymied from apprehending Osama bin Laden due to longstanding relationships with Saudi and Pakistani military intelligence. Despite specific intelligence available to elements of the US intelligence community on bin Laden's location in Pakistan, under the protection of US allies, no action was taken to apprehend bin Laden for years. That failure to act coincided with the launch of an anti-Iran US covert operations programme around 2005, pursued in partnership with Saudi Arabia, to finance Islamist Sunni militants including al-Qaeda affiliated groups. Washington Post, Secret CIA effort in Syria faces large funding cut, Greg Miller and Karen DeYoung June 12, 2015. Key lawmakers have moved to slash funding of a secret CIA operation to train and arm rebels in Syria, a move that U.S. officials said reflects rising skepticism of the effectiveness of the agency program and the Obama administration’s strategy in the Middle East. The House Intelligence Committee recently voted unanimously to cut as much as 20 percent of the classified funds flowing into a CIA program that U.S. officials said has become one the agency’s largest covert operations, with a budget approaching $1 billion a year. “There is a great deal of concern on a very bipartisan basis with our strategy in Syria,” said Rep. Adam B. Schiff (Calif.), the ranking Democrat on the intelligence panel. He declined to comment on specific provisions of the committee’s bill but cited growing pessimism that the United States will be in a position “to help shape the aftermath” of Syria’s civil war. Related News Coverage Huffington Post, Rand Paul: ISIS 'Exists And Grows Stronger' Because Of GOP Hawks, Sam Levine, May 27, 2015. Sen. Rand Paul (R-KY) (shown in file photo) on Wednesday blamed the rise of ISIS on hawkish members of the GOP who he said were too eager to intervene abroad. Paul, who is running for president, has worked to push back against the characterization that he is an isolationist and weak on foreign policy. On Wednesday, Paul said that those who said his kind of foreign policy was responsible for the rise of ISIS were wrong. Fox News Insider, Docs: Benghazi Planned in Advance to Coincide With 9/11 Anniversary, Catherine Herridge, May 18, 2015. Fox News has obtained documents which reveal what U.S. intelligence agencies knew about the Benghazi attack and weapons traveling from Libya to Syria back in 2012. A Defense Intelligence Agency memo from Sept. 16, 2012, concluded that the Benghazi terror attack was planned at least 10 days in advance to coincide with 9/11 and was in retaliation for a drone strike that killed an al Qaeda strategist. The memo was copied to the National Security Council, the State Department and the CIA. “The intention was to attack the consulate and to kill as many Americans as possible to seek revenge for the [U.S.] killing of Aboyahiye (Alaliby) in Pakistan and in memorial of the 11 September 2001 attacks on the World Trade Center buildings,” the memo said. Judicial Watch obtained the memos by suing in federal court. “The Obama administration says it was a coincidence that [the Benghazi attack] occurred on 9/11. In fact, their intelligence said it wasn’t a coincidence, and in fact, specifically the attack occurred because it was 9/11,” Judicial Watch President Tom Fitton said. Another 2012 DIA memo predicts the rise of ISIS and the establishment of a caliphate 17 months before President Barack Obama called ISIS “jay-vee.” A third DIA memo, dated Oct. 5, 2012, leaves no doubt that U.S. intelligence agencies knew that weapons were moving from Libya to Syria before the attack that killed four Americans. Former CIA Director Mike Morell recently dodged questions about these weapons in an interview with Bret Baier. Baier asked him: Were CIA officers tracking the movement of weapons from Libya to Syria? “Can’t talk about it,” Morell said. Wayne Madsen Report (WMR), DIA message confirms ISIL is a Western construct, Wayne Madsen, May 26, 2015 (Subscription required but quoted here with permission). A formerly SECRET NOFORN (No Foreign Dissemination) message, dated August 5, 2012, to the Defense Intelligence Agency (DIA) from a redacted U.S. government agency, provides more evidence that the Islamic State of Iraq and the Levant (ISIL), otherwise known as the Islamic State or "Da'ish," was a construct of U.S. intelligence. As WMR reported in the past, ISIL was also incubated and sustained by the Saudi, Qatari, Turkish, and Israeli intelligence services. Justice Integrity Project, Shocking New Book Links Illicit U.S. Visas To Terrorists, Current Wars, Andrew Kreig, March 2, 2015. A former State Department foreign service officer’s new book provides a shocking, timely, and credible circumstantial case that ties the U.S. training of Islamic radicals to our nation’s major foreign policy disasters in the Mideast during the past quarter century. The book is Visas for Al Qaeda: CIA Handouts That Rocked the World — An Insider's View. Author J. Michael Springmann (shown in a photo) is the former chief of the visa section at the U.S. consulate in Jeddah in Saudi Arabia. Consortium News, Obama's Strategic Shift, Robert Parry, May 21, 2015. It's finally dawning on President Barack Obama the grave dangers that have been created for the American Republic by decades of neoconservative dominance of U.S. foreign policy, but his moves in response to this dire threat remain hesitant and indecisive. The only game-saving play open to Obama now -- in response to recent Saudi-backed escalation of Sunni extremism in Syria and Iraq as well the new right-wing racist government in Israel -- may be to forge an alliance with Iran and Russia as a counterforce in the Middle East that could save Syria's relatively secular regime and reverse gains by the Islamic State inside Iraq.That, however, would require Obama finally taking control of his foreign policy and throwing out or at least sidelining many of the neocons and "liberal interventionists" whom he has tolerated and promoted. It's difficult to see how the likes of Assistant Secretary of State for European Affairs Victoria Nuland and Ambassador to the United Nations Samantha Power would fall in line behind the necessary moves to build such a pragmatic alliance. Accuracy in Media, Mike Morell Attempts to Repair His Damaged Credibility, Roger Aronoff and Bethany Stotts, May 19, 2015. Mike Morell, the former Deputy CIA Director and Acting CIA Director, is out with a new book, and has been making the rounds on virtually every TV network. This is supposed to be his time to set the record straight, but he has apparently decided not to do that. Instead, his truthful revelations are mixed in with obvious falsehoods, so it becomes difficult to distinguish one from the other. “One of the most striking aspects of Morell’s chapters on Benghazi is his dogged insistence that the attacks were simply the result of a mob spinning out of control,” writes Steven Hayes for The Weekly Standard. “But Morell maintains that the attacks were not planned and claims, repeatedly and bizarrely, that the attackers did not necessarily want to harm Americans.” After leaving the CIA in 2013, Morell joined Beacon Global Strategies, started by Hillary Clinton’s “principal gatekeeper” — as described by The New York Times — Philippe Reines. The company serves as a sort of Clinton government-in-waiting. Thus, Morell’s statements become even that much more suspect due to a conflict of interest, while trying to protect Hillary Clinton’s bid for the White House. Justice Integrity Project, Middle East Failures Illustrate Disastrous, Deceptive Bipartisan Foreign Policy, Andrew Kreig, May 27 2015. The U.S. foreign policy advocated by leaders of both major parties is experiencing serious setbacks in multiple nations, especially in the Middle East and Central Asia. Recent military losses in Iraq, Afghanistan and Yemen exemplify a joint Obama/Bush foreign policy disaster with no easy solutions. Catching Our Attention on other Justice, Media & Integrity Issues Courthouse News Service, CIA Search for JFK Records Mostly Sufficient, William Dotinga, June 8, 2015. A federal judge denied most of an attorney's bid for CIA records on the assassinations of John and Robert Kennedy, finding the agency had searched diligently enough to satisfy the law. Anthony Bothwell -- representing himself -- sued the CIA in November 2013 for denying his records request under the Freedom of Information Act relating to five people who he claims may have been involved in the Kennedy assassinations in 1963 and 1968. His initial FOIA request sought all records related to three people allegedly connected to JFK's assassination: Johnny Roselli, Jean Souetre and David Morales. As to RFK's assassination, Bothwell sought records Thane Eugene Cesar and Enrique Hernandez. The CIA denied Bothwell's request as to the JFK connections, saying that if any documents existed they would be exempt from release as "intelligence sources and methods information." For the two individuals allegedly connected to the Bobby Kennedy assassination, the agency said those records were "operational files" also exempted under FOIA. National Press Club, State Department official commends Club for freedom of the press advocacy, Ken Dalecki, May 19, 2015. The State Department's assistant secretary for public affairs commended the Press Club and President John Hughes for making press freedom a major theme this year and outlined steps the State Department is taking to protect journalists in increasingly hostile environments at a meeting of American Legion Post 20 on May 18. Douglas Frantz, a Pulitzer Prize-winning investigative reporter and editor before entering government service, said press freedom is an issue that is "professional and personal for me," after having covered conflicts from the first Gulf war to the fighting in Afghanistan. He said that for the first time journalists are being targeted rather than being killed or injured as collateral damage. Frantz said local and freelance reporters are especially vulnerable because they lack support from major news organization. He said the State Department will expand a program that has trained some 350 journalists before they entered hostile environments. The department is also working on a protocol under which foreign journalists would receive the same level of assistance from U.S. embassies that American journalists receive. Frantz said the procedures will be modeled on services offered by the U.S. embassy in Israel. He said that 90 percent of crimes against foreign journalists are never prosecuted, an issue that he said U.S. ambassadors soon will be required to raise during meetings with host country officials. Frantz conceded that press freedom is not the top priority in dealing with countries such as Iran, Egypt, Turkey and Russia, but that it continues to be an issue raised by Secretary of State John Kerry. He said human rights will be a major issue in any normalization of relations with Cuba. The assistant secretary said Russia poses a special threat due to what he called the "weaponization of propaganda," particularly lies aimed at large Russian-speaking populations in the Baltic states. He said the U.S., Germany and Great Britain are developing a cloud-based bank of popular Western programs translated into Russian for use by unbiased broadcasters on their stations. Frantz said Russian speakers would then stay tuned for fact-based news programs rather than the biased reporting on Russian stations airing popular programming. Ad Get New Articles by Email News Reports Note: Excerpts are from the authors' words except for subheads and occasional "Editor's notes" such as this. May 25 Washington Post, New electoral maps for Ohio and Michigan can wait, Supreme Court says, Robert Barnes, May 25, 2019 (print ed.). While they consider the question of partisan gerrymandering, the justices put lower-court decisions finding those states’ maps unconstitutional on hold. The Supreme Court on Friday put on hold lower-court decisions that said Ohio and Michigan had to come up with new electoral maps because of unconstitutional partisan gerrymandering. The decision was not surprising, because the justices are currently considering whether judges should even have a role in policing partisan gerrymandering. There were no noted dissents in the orders for either state. The Supreme Court in March heard arguments in similar cases from North Carolina, where judges found that Republicans had manipulated congressional maps to their advantage, and from Maryland, where Democratic lawmakers redrew a district that resulted in a loss for a longtime Republican congressman. While the Supreme Court regularly examines redistricting plans for signs of racial gerrymandering, it has never found a state’s plan so infected with partisan politics that it violates the rights of voters. The decision in the North Carolina and Maryland cases are expected before the end of June. With the decisions from Ohio and Michigan, federal courts in five states have struck down maps as partisan gerrymanders. The courts in the Ohio and Michigan decisions ordered the states to come up with new maps that could be used in the 2020 elections. May 24 UK's May Will Leave June 7 New York Times, Theresa May, Undone by Brexit, Will Step Down as Prime Minister, Stephen Castle, May 24, 2019. Mrs. May said she would resign after almost three years of trying and failing to lead Britain out of the European Union. Her departure is likely to set off a vicious contest to succeed her within the governing Conservative Party. Facing a cabinet rebellion, Theresa May announced on Friday morning her decision to leave office. She spoke briefly after meeting with Graham Brady, a powerful leader of backbench Conservative lawmakers. Standing in front of 10 Downing Street, Mrs. May, shown in a file photo at right, said it was in the “best interests of the country for a new prime minister” to lead Britain through the Brexit process. She announced plans to step down as the leader of the Conservative Party on June 7, with the process to replace her beginning the following week. “I feel as certain today as I did three years ago that in a democracy, if you give people a choice you have a duty to implement what they decide. I have done my best to do that,” she added. “I have done everything I can to convince MPs to back that deal. Sadly, I have not been able to do so.” Conservative lawmakers have been deeply frustrated by Mrs. May’s failure to deliver on Brexit, which became the government’s central — some would say its sole — preoccupation after the country voted to leave the union in a 2016 referendum. But the breaking point has come at an awkward moment, with President Trump scheduled to arrive in Britain on June 3 for a state visit and to take part in events to commemorate the 75th anniversary of the D-Day landings that preceded the end of World War II. Trump Empowers Barr for "Spying" Probe New York Times, Trump Gives Attorney General Sweeping Power in Review of 2016 Campaign Inquiry, Maggie Haberman and Michael S. Schmidt, May 24, 2019 (print ed.). The directive gives Mr. Barr immense leverage over the intelligence community and enormous power over what the public learns about the roots of the Russia investigation. President Trump took extraordinary steps on Thursday to give Attorney General William P. Barr, right, sweeping new authorities to conduct a review into how the 2016 Trump campaign’s ties to Russia were investigated, significantly escalating the administration’s efforts to place those who investigated the campaign under scrutiny. In a directive, Mr. Trump ordered the C.I.A. and the country’s 15 other intelligence agencies to cooperate with the review and granted Mr. Barr the authority to unilaterally declassify their documents. The move — which occurred just hours after the president again declared that those who led the investigation committed treason — gave Mr. Barr immense leverage over the intelligence community and enormous power over what the public learns about the roots of the Russia investigation. The order is a change for Mr. Trump, who last year dropped a plan to release documents related to the Russia ... Mission Statement Andrew Kreig's Twitter Broadcast Broadcast and lecture audiences can count on the Project's director to deliver blunt, entertaining and cutting-edge commentary about public affairs, with practical tips for the millions of Americans caught up in unfair litigation or regulation. Based in Washington, DC, Andrew Kreig is an accomplished fighter for the public interest. Learn from his decades of reporting, analysis and advocacy: • Shocking tales of recent corruption, deception and cover-up by both parties in communities ranging from small towns to world capitals; and• Practical how-to tips for reformers on action that brings real-world results. Midnight Writer News Podcast,'Presidential Puppetry' with Andrew Kreig, Host S.T. Patrick, Dec. 19, 2018 (Episode 105). Andrew Kreig, the director of the Justice Integrity Project and the author of Presidential Puppetry, joins S.T. Patrick to discuss presidential politics of the last 40 years. What should we have known about George H.W. Bush, Bill & Hillary Clinton, George W. Bush, John Kerry, John Edwards, and John McCain? Kreig takes a non-partisan approach to dissecting the pros, cons, misdeeds, and motivations of American presidential and vice-presidential candidates, dating back decades. In the interview, Kreig covers the Bush dynasty, why Reagan chose Bush in 1980, Bush and the October Surprise, the Willie Horton ad, The Election of 1992, Ross Perot’s deficiencies, what Fletcher Prouty still teaches us, the legitimacy of Bob Dole’s 1996 nomination, the value of Jack Kemp, Bush v Gore, The Two Johns: Kerry & Edwards, the real John McCain, and much more. Kreig also discusses current events with us, including the Corsi/Stone vs Mueller situation and the unbelievable resolution of the Jeffery Epstein trial in Palm Beach. Andrew Kreig can be read and followed at the Justice Integrity Project. Wiki Politiki, The Latest REAL News on the 9/11 Attacks and Finding Truth in a Sea of Lies, Steve Bhaerman, Dec. 18, 2018. An Interview with Andrew Kreig, Author, Attorney, Broadcaster and Founder of the Justice Integrity Project. Did you know that In a letter dated November 7, 2018, the U.S. Attorney for the Southern District of New York notified the Lawyers’ Committee for 9/11 Inquiry that he would comply with the provisions of 18 U.S.C. § 3332 requiring him to present to a special grand jury the Lawyers’ Committee’s reports filed earlier this year of unprosecuted federal crimes at the World Trade Center? You didn’t? That’s because mainstream media makes it its business to insure that anything that points to the nefarious doings of the real deep state is “none of its business.” The misinformation, disinformation and missing information that pollute corporate news have created the perfect field for “real” fake news to flourish.
{ "pile_set_name": "Pile-CC" }
Q: table view cell of custom class returning nil I am creating a table, and using this code to generate the cells: let cell2:iPRoutineSpecificCell = self.routineSpecificsTable.dequeueReusableCell(withIdentifier: "Cell2") as! iPRoutineSpecificCell The cell contains a label. When i say cell2.label.text = "Test" return cell2 I get the error: fatal error: unexpectedly found nil while unwrapping an Optional value I have this exact arrangement elsewhere in the app and it is working fine. Why is it not working this time? The only difference between the two views is that this one contains two tables. However, if i use: cell2.textLabel?.text = "Test" Then it works. Any help appreciated! A: Please remove this line from viewDidLoad method if you have-: self.tableView.registerClass(UITableViewCell.self, forCellReuseIdentifier: "cell")
{ "pile_set_name": "StackExchange" }
Q: Follower count number in Twitter How to get my followers count number with PHP. I found this answer here: Twitter follower count number, but it is not working because API 1.0 is no longer active. I have also tried with API 1.1 using this URL: https://api.twitter.com/1.1/users/lookup.json?screen_name=google but is is showing an error(Bad Authentication data). Here is my code: $data = json_decode(file_get_contents('http://api.twitter.com/1.1/users/lookup.json?screen_name=google'), true); echo $data[0]['followers_count']; A: If do it without auth (replace 'stackoverflow' with your user) $.ajax({ url: "https://cdn.syndication.twimg.com/widgets/followbutton/info.json?screen_names=stackoverflow" dataType : 'jsonp', crossDomain : true }).done(function(data) { console.log(data[0]['followers_count']); }); with php $tw_username = 'stackoverflow'; $data = file_get_contents('https://cdn.syndication.twimg.com/widgets/followbutton/info.json?screen_names='.$tw_username); $parsed = json_decode($data,true); $tw_followers = $parsed[0]['followers_count']; A: Twitter API 1.0 is deprecated and is no longer active. With the REST 1.1 API, you need oAuth authentication to retrieve data from Twitter. Use this instead: <?php require_once('TwitterAPIExchange.php'); //get it from https://github.com/J7mbo/twitter-api-php /** Set access tokens here - see: https://dev.twitter.com/apps/ **/ $settings = array( 'oauth_access_token' => "YOUR_OAUTH_ACCESS_TOKEN", 'oauth_access_token_secret' => "YOUR_OAUTH_ACCESS_TOKEN_SECRET", 'consumer_key' => "YOUR_CONSUMER_KEY", 'consumer_secret' => "YOUR_CONSUMER_SECRET" ); $ta_url = 'https://api.twitter.com/1.1/statuses/user_timeline.json'; $getfield = '?screen_name=REPLACE_ME'; $requestMethod = 'GET'; $twitter = new TwitterAPIExchange($settings); $follow_count=$twitter->setGetfield($getfield) ->buildOauth($ta_url, $requestMethod) ->performRequest(); $data = json_decode($follow_count, true); $followers_count=$data[0]['user']['followers_count']; echo $followers_count; ?> Parsing the XML might be easier in some cases. Here's a solution (tested): <?php $xml = new SimpleXMLElement(urlencode(strip_tags('https://twitter.com/users/google.xml')), null, true); echo "Follower count: ".$xml->followers_count; ?> Hope this helps!
{ "pile_set_name": "StackExchange" }
Q: Calling noConflict() after initialising bootstrap datepicker? I am trying to use noConflict() with bootstrap datepicker to avoid conflict with other jquery plugins. The bootstrap datepicker docs say: $.fn.datepicker.noConflict provides a way to avoid conflict with other jQuery datepicker plugins: var datepicker = $.fn.datepicker.noConflict(); // return $.fn.datepicker to previously assigned value $.fn.bootstrapDP = datepicker; // give $().bootstrapDP the bootstrap-datepicker functionality But that didn't work for me, because I was using it with a date range. The code's author had this to say: Oops! The date range code, itself, calls .datepicker, so you're right, it's broken when coupled with noConflict. For now, I suggest calling noConflict after initializing the range picker. But how do I do that? I tried this: $('#bookingform .input-daterange').datepicker({ ...options excluded for brevity... }); datepicker = $.fn.datepicker.noConflict(); And I've tried this: $('#bookingform .input-daterange').datepicker({ ...options excluded for brevity... }).noConflict(); But I can't seem to get it to work. Can anybody enlighten me as to what I'm doing wrong (or preferably how I can do it right)? Update: For those asking how I initialize a range picker: There doesn't appear to be code calling this specifically. Other than the demo code below, it relies on the bootstrap js. I think the range aspect might be based on the class .input-daterange but I'm not sure. This is the demo code: <div class="input-daterange input-group" id="datepicker"> <input type="text" class="input-sm form-control" name="start" /> <span class="input-group-addon">to</span> <input type="text" class="input-sm form-control" name="end" /> </div> $('#sandbox-container .input-daterange').datepicker({ format: "dd/mm/yyyy" }); A: Your first attempt is following the owner's directions exactly. Here's where it happens in the src: https://github.com/eternicode/bootstrap-datepicker/blob/master/js/bootstrap-datepicker.js#L1357-L1392 The code doesn't do anything asynchronous, so calling .noConflict on the next line should have done what the owner of the plugin suggested. Though, looking at the source, it seems that whatever bug caused your original issue is now fixed. .datepicker is not called from within the DateRangePicker class anymore.
{ "pile_set_name": "StackExchange" }
send us a message @webplatform to let us know you've done a page and if you'd like a review Ignore the master CSS properties spreadsheet We have compiled a rather large and hopefully exhaustive list of all existing CSS properties — this can be found at the master list - but you can ignore this. We have assigned each property a priority level, starting from Priority-0 and going down to Priority-4, where P0 is the highest priority for vital, commonly-used properties that every browser supports. P4, then, is considered the lowest level is for properties, because they're rarely-used, proprietary, have limited cross-browser support, or all of the above. We would like to start on the highest priority ones and work out way down. Choosing a property to work on So the first step is to have a look at which properties you would like to work on. I would suggest grabbing a group of related properties that would work well as unit to work on. So for example, I grabbed If not, then it is worth checking whether it exists at the wrong location. First try entering your property name in the WPD search box and see if a specific page turns up. The URL might be wrong — it might have "properties" swapped out for "Properties", or "Background-Image" swapped out for "background-image", or a forward slash on the end of the URL. These all make it a different URL, as Media Wiki has a number of quirks, including case-sensitive URLs. If it already exists in the wrong place, we need to move it into the right place, using the "Move" tool, found in the tools menu when you are logged in. You need to enter a new slug for it to sit at. If there is something already at the new location, it will warn you and ask if you want to delete it. Please don't! We don't want to risk losing valuable content, so make sure you move the existing content somewhere else before moving your chosen content there. A good way to deal with it is to just move the old page to a location of OLD:[slug], for example OLD:background-image. If the page does not exist at all, you need to create a new page, using the New Page creator tool at You can access this by navigating to the URL where you want the page created and clicking on the new page link. You need to use the "CSS Property" section to create a new page for your CSS property. change "css/properties/foo" to "css/properties/property-name" (in my case it would be "css/properties/background-image") and press the "Create CSS property page button" If you are adapting/modifying an existing page, and it has the wrong template assigned to it (you'll know because the edit form won't contain the correct fields) or no template at all (you'll get no edit form when pressing "Edit", just a single textarea containing course code), then the only way to move it to the correct form type is to edit the page source to give it the right form information to use. This often isn't that simple, so either talk to a Webplatform steward for help, or just create a new page and copy the existing information across to it. Entering data on the page Now you are ready to start gathering the data to enter into your page. I'd advise that you gather the data and record it offline first, just in case something stupid happens and you lose your edits. I'm not saying it will happen, but you never know with Wikis! So copy the following headings, put them into your text editor, then read below on how to fill them in. Custom page title Article summary Data table Initial value: Computed value: Inherited: Applies to: CSS Object Model property: Media: Animatable: Shorthand: (this currently doesn't exist in the CSS property form template but will be added soon. Note the related shorthand property, if one exists, in the notes section for now) Syntax Examples Usage Related specifications Related articles Compatibility table (You can ignore these for now. We're working on brining in the data manually.) Compatibility notes (Only add something if you think it's unique and isn't represented on sites like caniuse.com or developer.mozilla.org) After collecting all the information, you'll then need to go through the different form fields in the edit page and fill each one in. Researching information You should research the information for your article and how to verify its correct, using trustworthy sites like MDN, caniuse, quirksmode and relevant CSS specs. Review existing documentation from other sources and then read the relevant specs. If the sources all agree then you can accept the information as correct, but if they disagree you should do original research or ask for help from more knowledgeable members. When you have finished writing a page, you should get someone else to review it to verify its quality. Putting information that applies to multiple properties in separate pages NOTE: One important thing you should consider when entering information into your property pages is whether any of that information also applies to other CSS properties. If it does, then you should consider putting that information into a separate page, whether it is a concept, function or whatever. This way, you can save others a lot of time and repetition. So, in the case of my example, url() and *-gradient() functions are viable targets within the "css/functions" tree. I have created a page to cover url() at CSS images: url(), and linear and radial gradients are currently intended to be covered at Creating gradients in CSS. If you were describing background colors, rather than detail how RGBA/HSLA values work, you could instead point to pages within the "css/units" (whihc doesn't exist yet). If you find yourself using any other common jargon that's hard to classify & that readers might not be familiar with, create a link within the top-level "concepts" tree, e.g., "viewport," "vendor prefixes," or "standards mode." Readers may also benefit from links to tutorials on the subject available as "CSS learning material." (Other areas such as HTML, JavaScript, and SVG have their own learning material areas.) Summary information First of all, let's start with the summary information near the top of the page. Custom page title Enter the property name, for example background-image Top level summary Enter a very brief description of function, for example "The background-image property allows you to apply one or more background images to an element. These can be url() paths to image files, or CSS3 linear or radial gradients. For more information, consult Using CSS background images and Creating gradients in CSS." The data table This refers to the small fields below the Summary. Fill these data items in as exactly as you can. Initial value: none Computed value: As specified, but with URIs made absolute Inherited: no Applies to: all elements CSS Object Model property: backgroundImage Media: visual for now (you can't currently specify more than one) Animatable: yes Shorthand: background Percentages (ignore this) NOTE: computed values and initial values can often be hard to find by searching on your favorite search engine. A better way to find them out is often to create a very quick test (or even just go to an already-existing web page) and play with different values of said property, and see what the computed values are reported as (most browser dev tools, e.g. Opera Dragonfly, Chrome Dev Tools, report computed values.) Sometimes the computed values are not quite as simple as you'd think. For example with the color property, the computed value is always the hexadecimal equivalent, except in the case of translucent colours, where it is always the RGBa equivalent. Note: To check whether you property is animatable or not, write a simple test, or check out a list such as CSS animatable properties by Oli Studholme. Syntax and values Now on to the syntax and value explanations. You should provide a different syntax value all notable different value types, along with a nice detailed explanation, in the Values form fields. These values are then used to auto-populate the Syntax and Values sections of the page. Here, all the possible value types indicated in the syntax section should be expanded upon and explained clearly for example url(path/to/image.png) This value contains a path to an image that you want to apply to the element in question as a background image, using the CSS images syntax, as described at CSS images: url(). linear-gradient(to bottom, #f00, #aaa) Programmatically creates a gradient that travels from one side of the element to the other. For more on the syntax, read Creating gradients in CSS radial-gradient(50% 50%, circle, #f00, #aaa) Programmatically creates a gradient that radiates outwards from a specified point on the element's background. For more on the syntax, read Creating gradients in CSS. You can apply multiple background images to a single element (image files, gradients, or a mixture) by including all the image references in the property value, with each one separated by a comma. Images referenced earlier in the property value appear in front of images referenced later. Examples For the examples section, you should provide one or two brief examples that succinctly show how to do a real world implementation of the property being shown. You should show your HTML and CSS, and anything else relevant, in separate sections, as provided by the edit page. .one { background-image: url(images/icon.png); /* here we are applying a single background image to our first block level container element */ /* (could be anything, but it is a <div>in the live example. */ } .two { background-image: -webkit-linear-gradient(top,#aaa,#eee); background-image: -moz-linear-gradient(top,#aaa,#eee); background-image: -ms-linear-gradient(top,#aaa,#eee); background-image: -o-linear-gradient(top,#aaa,#eee); background-image: linear-gradient(to bottom,#aaa,#eee); /* Here we are applying a linear gradient to our second block level container. */ /* We have included a line with each different vendor prefix type, so that all supporting */ /* browsers will have something they can apply. This includes a prefixless version of the */ /* property, which uses the latest version of the syntax for the spec. As browsers update their */ /* implementations and drop their prefixes, tyhey can start to use this syntax instead, meaning */ /* that the code will still work. */ } .three { background-image: url(images/icon.png), -webkit-linear-gradient(top,#aaa,#eee); background-image: url(images/icon.png), -moz-linear-gradient(top,#aaa,#eee); background-image: url(images/icon.png), -ms-linear-gradient(top,#aaa,#eee); background-image: url(images/icon.png), -o-linear-gradient(top,#aaa,#eee); background-image: url(images/icon.png), linear-gradient(to bottom,#aaa,#eee); /* In this case we are applying both the background image and the gradient to our third block level container. */ } Live examples At a slightly later date, we are intending to integrate Dabblet with our site, so we will be able to have live examples running inside our references and tutorials. Until the live example viewer is properly implemented, we would suggest just showing the source code in the page for now, as instructed above. In my finished example page, I have hosted a live example at Github; feel free to host a live version at Github or another place if you feel like it. Usage (optional) The Usage section should contain notes that impart useful, practical knowledge about using the property in the real world. What do you really need to know when trying to use this property in production? For example "Background images in general have good support across browsers; there are a few things to take note of, however: Older browsers do not support multiple background images, SVG as background images or CSS gradients, so be careful when using these options to make sure that a fallback is provided that will make content readable on older browsers, such as a simple solid colour. When using multiple background images, the image at the start of the comma delimited list appears on top of ones later on. This might seem contrary to how CSS is expected to behave. Because gradients are still supported in some browsers with prefixes and some not, and some with a slightly older syntax, you should use multiple background gradient properties with different syntaxes, as shown in the below examples." Related specifications enter the most current specification the property is included in, AND the recommendation the property was included in, in the case of old properties that were included in CSS 1, 2.1, etc. Compatibility table You can ignore the compatibility table for now. (We're working on brining in the data manually.) Update the compatibility notes field only if you think it's unique and isn't represented on sites like caniuse.com or developer.mozilla.org. Compatibility notes Use the compatibility notes section to enter any useful specifics you have relating to browser compatibility. For example: Internal pages (put in the manual links' section) Useful external articles (put in the external links section) Anything else (put in the Manual sections section)= x y z External attribution Some of the existing pages will have content that comes from an external source. We are quite happy to overwrite/replace this information, to improve it, make it more consistent, and get rid of any licensing constraints that using that material brought with it. If there is external attribution specified, and you've just rewritten the page data. uncheck the external attribution options.
{ "pile_set_name": "Pile-CC" }
Relationship between pharmacokinetic parameters and occurrence of adverse events in clinical trials performed in Europe and United States for an angiotensin II receptor antagonist, telmisartan. The objective of this study was to clarify the relationship between the pharmacokinetic parameters of telmisartan and the occurrence of adverse events. In order to perform this study, a total of 1500 adverse events was collected from the eight clinical trials performed in Europe and the United States and the pharmacokinetic parameters (C(max) and AUC) were calculated with the parameters obtained from the population pharmacokinetic model which we have built. Using these data, the pharmacokinetic parameters (C(max) and AUC) were compared between subjects with or without the occurrence of adverse events. The Mann-Whitney test was performed to analyze ten adverse events selected based on the order of frequency. For eight of these ten adverse events, no significant between-group difference was observed in any pharmacokinetic parameter. For two adverse events, pain and sinusitis, the pharmacokinetic parameters, C(max) and AUC, were greater in subjects with adverse events as compared with those without adverse events, but the intersubject variability of pharmacokinetic parameters was large and there were many subjects in whom C(max) and AUC were high without any adverse event. These results suggest that there is no clear relationship between pharmacokinetic parameters of telmisartan and the occurrence of adverse events.
{ "pile_set_name": "PubMed Abstracts" }
UNITED STATES OF AMERICA MERIT SYSTEMS PROTECTION BOARD 2014 MSPB 50 Docket No. AT-0752-13-0507-I-1 Joshua R. Marcantel, Appellant, v. Department of Energy, Agency. July 15, 2014 Lawrence Berger, Esquire, Glen Cove, New York, for the appellant. Jonathan R. Buckner, Albuquerque, New Mexico, for the agency. BEFORE Susan Tsui Grundmann, Chairman Anne M. Wagner, Vice Chairman Mark A. Robbins, Member OPINION AND ORDER ¶1 The appellant has filed a petition for review of an initial decision that dismissed his appeal as untimely filed without a showing of good cause for the delay. For the following reasons, we DENY the petition for review and AFFIRM the initial decision. BACKGROUND ¶2 The following relevant facts are not in dispute. Effective March 14, 2013, the agency removed the appellant from his Nuclear Materials Courier position for failure to maintain a condition of employment, namely his “Q” access 2 authorization (security clearance). Initial Appeal File (IAF), Tab 6, Subtab 4b. The agency provided a certified mail return receipt, indicating that an individual, later determined to be the appellant’s father, had signed for the decision letter at the appellant’s address of record on March 16, 2013. Id. at 4. The appellant filed his Board appeal on April 29, 2013. IAF, Tab 1. The administrative judge issued an initial decision that dismissed the appeal as untimely filed without a showing of good cause for the delay. IAF, Tab 15, Initial Decision (ID). ¶3 The appellant has filed a petition for review and the agency has filed a response. Petition for Review (PFR) File, Tabs 1, 3. On review, the appellant appears to challenge only the administrative judge’s conclusion that the appeal was untimely filed. The appellant concedes that the agency mailed the decision letter to his address of record, but he argues that: (1) this address was his father’s house in LaFayette, Louisiana, and he did not reside there; (2) the appellant was at work at an off-shore oil rig in the Gulf of Mexico from March 5, 2013, until March 19, 2013; (3) the appellant returned to his actual residence in Knoxville, Tennessee on March 19, 2013; (4) his father was not his designated agent; and (5) his father did not notify him of the delivery until March 28, 2013, when he returned to his father’s house. PFR File, Tab 1 at 2-3. He contends that he rebutted the presumption of delivery because he did not receive the notice until March 28, 2013. Id. at 6. He further argues that the administrative judge conflated concepts under the Board’s applicable regulations concerning the time limit for filing an appeal. Id. at 4. ANALYSIS The appeal was untimely filed. ¶4 The appellant bears the burden to prove by preponderant evidence that his appeal was timely filed. 5 C.F.R. § 1201.56(a)(2)(ii). A removal appeal must be filed no later than 30 days after the effective date, if any, of the action being 3 appealed, or 30 days after the date of the appellant’s receipt of the agency’s decision, whichever is later. 5 C.F.R. § 1201.22(b)(1). ¶5 The Board’s regulation regarding an appellant’s obligation to keep the agency informed of his address for purposes of receiving an agency decision, 5 C.F.R. § 1201.22(b)(3), went into effect on November 13, 2012, and is applicable to this matter. See Merit Systems Protection Board Practices and Procedures, 77 Fed. Reg. 62350, 62352 (Oct. 12, 2012) (stating that the regulation became effective November 13, 2012). The regulation reads as follows: An appellant is responsible for keeping the agency informed of his or her current home address for purposes of receiving the agency’s decision, and correspondence which is properly addressed and sent to the appellant’s address via postal or commercial delivery is presumed to have been duly delivered to the addressee. While such a presumption may be overcome under the circumstances of a particular case, an appellant may not avoid service of a properly addressed and mailed decision by intentional or negligent conduct which frustrates actual service. The appellant may also be deemed to have received the agency’s decision if it was received by a designated representative or a person of suitable age and discretion residing with the appellant. 5 C.F.R. § 1201.22(b)(3). The rule also includes illustrative examples of circumstances in which an appellant may be deemed to have received an agency decision, including an appellant who fails to pick up mail delivered to his post office box and a roommate’s receipt of an agency decision. Id., Examples A, C. ¶6 The appellant, through his attorney, 1 stated below that he (the appellant) was working on an off-shore oil rig in the Gulf of Mexico at the time his removal 1 The appellant’s attorney explained below that the appellant had been working on an oil rig in the Gulf of Mexico and that he (the attorney) was unable to contact the appellant to obtain a sworn declaration attesting to his receipt of the agency’s decision letter. IAF, Tab 11 at 2-3. The statements of a party’s representative in a pleading do not constitute evidence. Hendricks v. Department of the Navy, 69 M.S.P.R. 163, 168 4 was effected. IAF, Tab 11 at 2. Although the appellant does not dispute that he provided his father’s address to the agency for the purpose of receiving correspondence, PFR File, Tab 1 at 4, he explained below that he did not return to his father’s address and did not personally receive the notice of decision until March 28, 2013, IAF, Tab 11 at 2. The appellant further asserted that April 29, 2013, was the first business day following the 30th day after service on March 28, 2013, and thus, his appeal was timely filed. Id. ¶7 We are not persuaded by the appellant’s arguments on review. In particular, the record does not support the appellant’s assertion that he rebutted the presumption that the letter was “delivered to the addressee” as set forth in 5 C.F.R. § 1201.22(b)(3) because he did not actually receive the letter or have notice of its contents until March 28, 2013. Importantly, the agency properly sent the decision letter to the appellant’s address of record, and the appellant’s father signed the certified mail return receipt for the notice on the appellant’s behalf on March 16, 2013. See IAF, Tab 6, Subtab 4b at 4. We find that this service constitutes receipt by the appellant pursuant to 5 C.F.R. § 1201.22(b)(3). ¶8 The appellant’s claim that he had “no notice of impending delivery,” PFR File, Tab 1 at 7, is inconsistent with the fact that he was on notice that the agency might render a decision on the proposed removal, which had been issued in October 2012, see IAF, Tab 6, Subtab 4f. Moreover, the record reflects that, due to the ongoing issues regarding his “Q” access authorization dating as far back as February 2012, the appellant secured employment on an off-shore oil rig in the Gulf of Mexico during the 2012-2013 time frame. See IAF, Tab 13 at 3; see also IAF, Tab 6, Subtabs 4g-4l (documentation regarding the revocation of the appellant’s access authorization and his indefinite suspension based on the revocation of his access authorization). Thus, having been aware that the agency (1995). Even if the appellant could prove the assertions made by his attorney, such assertions do not change our analysis of the timeliness issue. 5 would likely issue a decision on the proposed removal while he was working on the off-shore oil rig, the appellant provided his father’s address to the agency for correspondence, and he cannot now assert that the agency’s delivery of the decision letter to that address, and his father’s signature on the certified mail receipt, does not constitute effective receipt for purposes of the filing time limit in 5 C.F.R. § 1201.22. ¶9 The Board’s regulations further provide that “an appellant may not avoid service of a properly addressed and mailed decision by intentional or negligent conduct which frustrates actual service.” 5 C.F.R. § 1201.22(b)(3). Example A in the regulation highlights that an appellant may be deemed to have received an agency decision when he fails to pick up mail delivered to his post office box. Here, as noted above, the appellant used his father’s address as his address of record while working off-shore. The agency properly sent the notice to that address. The appellant returned to his home from the off-shore assignment on March 19, 2013, and then waited until March 28, 2013, before talking with his father and learning of the delivery of the letter. PFR File, Tab 1 at 1. Thus, regardless of appellant’s claims that his father was not his designated representative and that he did not reside with his father, PFR File, Tab 1 at 4-6, we find that he constructively received the letter on March 16, 2013, because his failure to timely retrieve or otherwise learn of his mail cannot be used to frustrate the actual service of the decision. 2 Moreover, even if we accept that the appellant was unable to receive the decision until his return on March 19, 2013, his April 29, 2013 Board appeal was still untimely filed by 10 days. 2 We have considered the appellant’s remaining arguments on review but none warrant a different outcome. 6 The appellant has not shown good cause for the delay in filing his appeal. ¶10 The Board may waive its regulatory filing time limit for good cause shown. 5 C.F.R. § 1201.22(c). To establish good cause for the untimely filing of an appeal, a party must show that he exercised due diligence or ordinary prudence under the particular circumstances of the case. Alonzo v. Department of the Air Force, 4 M.S.P.R. 180, 184 (1980). To determine whether an appellant has shown good cause, the Board will consider the length of the delay, the reasonableness of his excuse and his showing of due diligence, whether he is proceeding pro se, and whether he has presented evidence of the existence of circumstances beyond his control that affected his ability to comply with the time limits or of unavoidable casualty or misfortune which similarly shows a causal relationship to his inability to timely file his appeal. See Moorman v. Department of the Army, 68 M.S.P.R. 60, 62-63 (1995), aff’d, 79 F.3d 1167 (Fed. Cir. 1996) (Table). ¶11 The appellant has not demonstrated good cause. Importantly, a 14-day delay is not minimal. See Allen v. Office of Personnel Management, 97 M.S.P.R. 665, ¶ 8 (2004). Moreover, the appellant was represented by counsel. Even if we credit the appellant’s assertion that he returned to his father’s home on March 28, 2013, and thus, had no actual notice of the decision letter until that date, he has not sufficiently explained why he did not file a Board appeal within the first 2 weeks after receiving that correspondence. Indeed, if he had filed his appeal on or before April 15, 2013, timeliness would not have been an issue in this matter. Finally, he has presented no evidence of the existence of circumstances beyond his control that affected his ability to comply with the time limits or of unavoidable casualty or misfortune related to the filing of his Board appeal. ¶12 For these reasons, we affirm the administrative judge’s decision to dismiss the appeal as untimely filed with no showing of good cause for the delay. 7 ORDER ¶13 This is the final decision of the Merit Systems Protection Board in this appeal. Title 5 of the Code of Federal Regulations, section 1201.113(c) (5 C.F.R. § 1201.113(c)). NOTICE TO THE APPELLANT REGARDING YOUR FURTHER REVIEW RIGHTS You have the right to request review of this final decision by the United States Court of Appeals for the Federal Circuit. You must submit your request to the court at the following address: United States Court of Appeals for the Federal Circuit 717 Madison Place, N.W. Washington, DC 20439 The court must receive your request for review no later than 60 calendar days after the date of this order. See 5 U.S.C. § 7703(b)(1)(A) (as rev. eff. Dec. 27, 2012). If you choose to file, be very careful to file on time. The court has held that normally it does not have the authority to waive this statutory deadline and that filings that do not comply with the deadline must be dismissed. See Pinat v. Office of Personnel Management, 931 F.2d 1544 (Fed. Cir. 1991). If you need further information about your right to appeal this decision to court, you should refer to the federal law that gives you this right. It is found in Title 5 of the United States Code, section 7703 (5 U.S.C. § 7703) (as rev. eff. Dec. 27, 2012). You may read this law as well as other sections of the United States Code, at our website, http://www.mspb.gov/appeals/uscode/htm. Additional information is available at the court's website, www.cafc.uscourts.gov. Of particular relevance is the court's "Guide for Pro Se Petitioners and Appellants," which is contained within the court's Rules of Practice, and Forms 5, 6, and 11. 8 If you are interested in securing pro bono representation for your court appeal, you may visit our website at http://www.mspb.gov/probono for a list of attorneys who have expressed interest in providing pro bono representation for Merit Systems Protection Board appellants before the court. The Merit Systems Protection Board neither endorses the services provided by any attorney nor warrants that any attorney will accept representation in a given case. FOR THE BOARD: ______________________________ William D. Spencer Clerk of the Board Washington, D.C.
{ "pile_set_name": "FreeLaw" }
Q: Buscar apenas campos do formulário com valor diferente de 0 e colocar na variável PHP Tenho um formulário de orçamento com 70 produtos em que o usuario escolhe a quantidade de produtos que ele quer de cada um. Todos estão nomeados com id p1, p2...p70 e são inputs de tipo numero. <form method="post"> <input type="number" value="0" name="p1" id="p1"> <input type="number" value="0" name="p2" id="p2"> ... <input type="number" value="0" name="p70" id="p70"> </form> Preciso de uma função PHP que insira apenas os itens que forem diferentes de 0 (que é o valor padrão) em uma variável para montar um tabela que será exportada para excel. O que tenho é o seguinte: // Monta o cabeçalho da tabela $data = '<table><tbody><tr><td>CABEÇALHO</td></tr>'; // Traz cada linha que o valor é diferente de 0 if($_POST['form']['p1'] != '0'){ $data .= '<tr><td>'.$_POST["form"]["p1"].'</td></tr>'; } if($_POST['form']['p2'] != '0'){ $data .= '<tr><td>'.$_POST["form"]["p2"].'</td></tr>'; } // Coloca o rodapé e fecha a tabela $data .= '<tr><td>RODAPÉ</td></tr></tbody></table>'; O problema desse que fiz é que teria que ter 70 ifs, acredito que deva existir uma forma mais simples, mas não sei qual. A: <?php cabeçalho... foreach($_POST['form'] as $value){ $table .= ($value) ? '<tr><td>'.$value.'</td></tr>'; : ''; } footer... Se houver alterações na quantidade de itens, o código ainda tem de funcionar. A: Faz um loop de 1 a 70 criando as linhas em que o valor do $_POST seja diferente de 0: <?php $data = '<table><tbody><tr><td>CABEÇALHO</td></tr>'; for($x=1;$x<=70;$x++){ if($_POST['form']['p'.$x] != '0'){ $data .= '<tr><td>'.$_POST['form']['p'.$x].'</td></tr>'; } } $data .= '<tr><td>RODAPÉ</td></tr></tbody</table>'; ?>
{ "pile_set_name": "StackExchange" }
Sometimes, though, a joke just doesn't land, and in that case, if it truly offends, an apology is never a bad thing. Pete Davidson's Saturday Night Live apology to Lt. Commander Dan Crenshaw, for example, was completely necessary given the comment
{ "pile_set_name": "Pile-CC" }
Oregon Hill For the community in California formerly called Oregon Hill, see Greenville, Yuba County, California Oregon Hill is a historic working-class neighborhood in Richmond, Virginia. Oregon Hill overlooks the James River and Belle Isle, and provides access to Hollywood Cemetery. Due to the neighborhood's proximity to the Monroe Park Campus of Virginia Commonwealth University, the neighborhood is sometimes referred to as a student quarter because of its high college student population. William Byrd III established a rural estate on the property in 1758. Wealthy heiress Grace Arents helped build many institutions to serve the community. History In 1758, William Byrd III built his country house Belvidere on this hill, with views of the James River as well as Church Hill (Richmond, Virginia) and Shockoe Hill. Fire destroyed the house and gardens about a century later, by which time the neighborhood had transformed from an agricultural to industrial one. Construction of the James River and Kanawha Canal beginning in 1785 brought not only boatman, but merchants, millers and iron workers to the neighborhood. Important Quakers who lived in the Oregon Hill neighborhood included Robert Pleasants, and later Samuel Pleasants Parsons, who became superintendent of the Virginia Penitentiary, which once stood on Belvidere Street. As General Superintendent of the canal company, Parsons oversaw its expansion to Lynchburg, Virginia. In 1817, the Harvie family, which owned most of the neighborhood, subdivided it into lots, which were sold to blacks as well as whites. The Baker House, built by a "free person of color" on Belvidere Street circa 1850, was moved in the 1920s to 617 Cherry Street. The neighborhood's name refers to quips that employees moving there to be close to their workplace might as well be moving westward to Oregon. The Tredegar Iron Works and Albemarle Paper Company became major employers by the 1850s. In 1849, the Hollywood Cemetery was developed from what had been known as Harvie's Woods at the edge of the neighborhood. Most early buildings in the current historic district date from industrial expansion during Reconstruction following the Civil War, when state office buildings also replaced some single-family housing. Richmond annexed the neighborhood in 1869. The oldest surviving church building is the Pine Street Baptist Church, built in 1886. The city acquired the land which became Riverside Park, delimiting the neighborhood's southern edge, in 1889. The park keeper's house dates from 1900, but many of the walkways and other buildings were constructed by the Works Progress Administration in the 1930s. The park sustained substantial damage from tropical storm Gaston in 2004. In the early 1940s, the neighborhood saw a large fluxation of Jewish immigrants fleeing Eastern Europe. The population was extrapolated in the 1960s due to segregation laws. St. Andrew's Church started as a Sunday school mission of St. Paul's Episcopal Church in 1873. A brick structure replaced the original wood frame building in 1901. In 1894, Richmond philanthropist Grace Arents (niece of Lewis Ginter) established a kindergarten, which later expanded into St. Andrews School, and ultimately the St. Andrew's Church Complex. Around the same time, Sadie Cabaniss, superintendent of the nursing school at Old Dominion Hospital (now VCU School of Nursing), founded the Nurse's Settlement House, now known as the William Byrd Community House. All three continue to the current day, with separate but complementary missions among the neighborhood's (and metropolitan area's) working families. Today Oregon Hill is currently bordered by Cary St. to the north, Belvidere St. to the east, The James River and Canal to the south, and by the Hollywood cemetery and Linden St. to the west. It is located only a few blocks south of Virginia Commonwealth University. With generally low-rent townhouses, it is a popular place for students to rent houses or apartments. It is also known as a white working-class enclave. Recently, there has been much development throughout Oregon Hill. This development has occurred in several forms. Infill projects have erected houses in lots that were previously vacant due to fires or other demolition. Many old buildings have either been torn down and replaced with townhouses, or renovated. As of 2007, a new townhouse complex called The Overlook has been mostly completed and inhabited on the blocks overlooking the James River. Possibly one of the most important sites in this neighborhood is Moss's House. Restaurants in Oregon Hill include Mamma Zu and L'opossum, of which Tom Hanks has visited both. Up until the 1990s, original housing stock stood on and was inhabited in this area. It was demolished and the land stood vacant after 1997, during which time it was used as a riverside park overlooking the James. The complete demolition of all the houses on these 3 blocks was a source of bitter contention between the neighborhood and the Ethyl Corporation, which owned the land. Some original houses still look over the river to the west of this development. Due to the major development, and the accompanying rise in property taxes and general cost of living, many families who have lived in Oregon Hill for generations are selling their homes or finding their rents unaffordable. The northernmost blocks in the neighborhood, (the furthest from the James River), have become notorious for housing low-income Caucasian families, and illicit drug use has become rife. In 2013, there were 79 narcotic possession arrests on one block alone. Bordering to the north of the neighborhood is Fine Foods, a popular market offering a large variety of snacks and convenience goods, owned by a family of Sri Lankan immigrants who also live on the property. The business is best known for its vintage posters on display, featuring bikini models from various Super Bowls throughout the 1990s. Notable residents Boris Kodjoe, actor, lived there while attending Virginia Commonwealth University Members of the heavy metal band Lamb of God lived in the neighborhood while attending Virginia Commonwealth University, playing their earliest shows in basements throughout Oregon Hill. Caressa Cameron, 2010 Miss America Donnie Corker, cross-dresser, entertainer, entrepreneur and activist Christopher Poole, founder of 4chan, lived in the neighborhood while attending Virginia Commonwealth University Troy Daniels, shooting guard for the Charlotte Hornets, briefly lived in the neighborhood while playing for the VCU Rams Men's basketball team in 2010 Jay Pharoah, Saturday Night Live cast member, while attending VCU David Baldacci, best-selling novelist Mary Jackson, leader of the 1863 Richmond Bread Riot In popular culture In 1992, the country/rock band Cowboy Junkies released a song titled Oregon Hill, which features a description of the neighborhood. Avail, a punk/hardcore band based out of Richmond, often talks of Oregon Hill. The Oregon Hill area also serves as backdrop for Harbor on the Hill, a dystopian adventure novel published in 2011. Patricia Cornwell, mystery novelist, has written many books loosely based in and around the neighborhood for her Dr. Kay Scarpetta series. Oregon Hill is the first book of Howard Owen's Willie Black mystery series. As the New York Times Sunday Book Review said, "Owen has recruited his sick, sad and creatively crazy characters from a rough neighborhood cut off from the rest of the city when the expressway was built. If anyone is watching out for the forgotten citizens of Oregon Hill, it's Willie, who grew up there and speaks the local language, a crisp and colorful urban idiom..." Maps Wikimapia See also William Byrd Community House Hollywood Cemetery St. Andrew's Church Tredegar Iron Works References External links Maurice Duke oral history with section on Oregon Hill Oregon Hill: Best View in the City, Commonwealth Times April 30, 1976 by Donna Pugh Richmond Architectural Survey Collection 277 photographs and architectural surveys from the mid-1970s. VCU Libraries. Oregon Hill neighbors on Yahoo!Groups Oregon Hill on Myspace.com Facebook Groups: "Friends of Oregon Hill" Category:Historic districts on the National Register of Historic Places in Virginia Category:Neighborhoods in Richmond, Virginia Category:National Register of Historic Places in Richmond, Virginia Category:Federal architecture in Virginia Category:Victorian architecture in Virginia Category:Hills of Richmond, Virginia Category:Working-class culture in the United States
{ "pile_set_name": "Wikipedia (en)" }
Simulators are increasingly recognized as useful educational tools in healthcare[@CR1] for both technical and non-technical skills.[@CR2]-[@CR4] Within acute care specialties, these tools are also used for various training purposes, including simulating rare events[@CR5],[@CR6] and teaching technical skills[@CR7] or advanced life support algorithms.[@CR8] The simulation room is an ideal setting for teaching the principles of crisis resource management (CRM).[@CR9] In a simulated crisis, vital non-technical skills, such as task management, teamwork, situation awareness, and decision-making can be safely practiced. The ultimate goal of all CRM simulation training is to increase patient safety and result in better patient outcomes. Although numerous studies have been published on the topic, there is a need for a knowledge synthesis of the impact that simulation-based CRM training has on patient outcomes and on the performance of healthcare providers in the workplace. There have been previous systematic reviews on simulation-based education and non-technical skills. Gordon *et al*.[@CR10] investigated "any studies involving an educational intervention to improve non-technical skills amongst undergraduate or postgraduate staff in an acute health care environment." While their review addresses training for non-technical skills, their paper is neither specific to crisis scenarios nor to simulation. To examine CRM programs for postgraduate trainees (i.e., residents), Doumouras *et al*.[@CR11] summarized the design, implementation, and efficacy of simulation-based CRM training programs in the peer-reviewed literature. Nevertheless, this review included simulation-based training only for residents. Their findings supported the utility of CRM programs for residents and a high degree of satisfaction with perceived value reflected by robust resident engagement. They concluded, however, that "a dearth of well-designed, randomized studies preclude the quantification of impact of simulation-based training in the clinical environment." The existing literature does not address the downstream effects (i.e., transfer of learning and patient outcome) of CRM simulation-based education. To assess the impact of educational programs, Kirkpatrick's hierarchy[@CR12] can be used as a classification tool to communicate the level of learning outcome, and multiple levels are possible within a single study. In the original Kirkpatrick framework,[@CR12] learning outcomes resulting from educational interventions in healthcare are classified into four levels:[@CR13],[@CR14]Level 1 - Reaction: measures how learners perceive the educational intervention;Level 2 - Learning: measures acquisition of skills/knowledge/attitudes in a non-clinical setting (e.g., simulation labs);Level 3 - Behaviour: measures learners' behavioural changes in the professional setting, i.e., transfer of learning to the clinical setting; andLevel 4 - Results: measures the effect of learners' actions, i.e., improved patient outcomes. In our systematic review, we deliberately focused on the application of learning captured by Kirkpatrick Levels 3 (transfer of learning to the workplace) and 4 (patient outcome); therefore, we excluded studies that investigated only Kirkpatrick Level 1 and 2 outcomes that evaluate learners' reactions or learning, respectively. We aimed to include all healthcare professionals independent of their level of training or specialty. This systematic review was conducted to gain a better understanding of the impact that simulation-based CRM teaching has on transfer of learning to the workplace and on subsequent changes in patient outcomes. Methods {#Sec1} ======= The Preferred Reporting Items for Systematic Reviews and Meta-Analyses (PRISMA) Statement was used to guide the reporting of this review.[@CR15] Protocol {#Sec2} -------- A review protocol and a search strategy following PRISMA guidelines were compiled and revised by the investigators who together have expertise in systematic review methodologies, medical education, and clinical care. They are available from the corresponding author upon request. Eligibility criteria {#Sec3} -------------------- All studies included in this review met predetermined eligibility criteria. The study subjects were healthcare providers, including physicians, nurses, respiratory therapists, physician assistants, perfusionists, and paramedics. All levels of practice were included, from trainees (pre- and post-registration, undergraduate, and postgraduate) to staff. The following study designs were included in this review: randomized controlled trials (RCTs); quasi-randomized studies (where the method of allocating participants to groups is not strictly random); controlled before-and-after studies (observations measured in both an intervention and a control group before and after the intervention); interrupted time series (ITS) (observations at multiple time points before and after an intervention in a single cohort); cohort studies (following a defined group of people over time); and case control studies (a method that compares people with a specific outcome of interest with a control group that doesn't have the specific outcome). The intervention must include simulation-based CRM teaching. Interventions that did not explicitly mention the terms "CRM" or "crew resource management" but taught relevant non-technical skills during a medical crisis were also included. We excluded papers where we could not separate out teaching and/or assessment of technical skills from non-technical skills in an acute care context. Outcomes were assessed using a modified Kirkpatrick model of outcomes at four levels.[@CR13],[@CR16] Papers were included if they measured identifiable CRM skills at Levels 3 and 4, i.e., behavioural change in the workplace or patient outcome (see above). We excluded papers measuring Kirkpatrick Levels 1 and 2 outcomes because they focus simply on learner reactions and learning measured in a simulated environment. In addition, given the abundant literature on self-assessment inaccuracy,[@CR17],[@CR18] papers reporting solely self-assessment data and considered a Level 1 (reaction) outcome, were excluded. For the purpose of this systematic review, only studies that measured outcomes in humans (either healthcare providers or patients) were included; therefore, we excluded studies that measured only simulated outcomes. Only English and French language publications were included, and only published studies were included. Information sources {#Sec4} ------------------- The literature search was performed by an experienced librarian (L.P.) in close collaboration with the rest of the research team. The literature search was last performed on September 4, 2012 from MEDLINE^®^, EMBASE™, CINAHL, Cochrane Central Register of Controlled Trials, and ERIC. Literature search {#Sec5} ----------------- Searches were performed without year or language restrictions. Search terms included: crisis resource management, crisis management, crew resource management, teamwork, and simulation. Appropriate wildcards were used in the search to account for plurals and variations in spelling. The comprehensive search was intended to obtain: (i) all trials investigating crisis resource management with non-technical skills, soft skills, human factors, or only specific types of non-technical skills (leadership, communication, task management, decision-making, situation awareness, team work) applied to emergency/ high stakes situations independent of profession/discipline; (ii) all trials comparing simulation-based (virtual reality, screen simulator, low-fidelity simulator, high-fidelity simulator, human simulation) education *vs* any other method of education, including traditional training, in-job training, or no training; and (iii) all trials comparing one method of simulation-based education *vs* another method of simulation-based education (e.g. comparison of two different simulators). The detailed search strategy is available in Appendix [1](#Sec19){ref-type="sec"}. Study selection {#Sec6} --------------- All titles and abstracts identified in the literature search were independently reviewed for eligibility by two pairs of authors. Disagreements were recorded and resolved by discussion. The full text articles of potentially eligible abstracts were retrieved and reviewed by two authors independently (H.Q., L.F.). Disagreements were resolved by consensus agreement under the guidance of the third author (D.B. or S.B.). Data collection process and data items {#Sec7} -------------------------------------- Using a data extraction form with inclusion and exclusion criteria, two authors (H.Q. and L.B.) extracted data from included articles. The data extraction form collected general article information, year trial was conducted, study design, sample size, description of study participants, healthcare providers involved, type of case and environment, description of the intervention, nature of the comparison group, data on the primary outcome, methodological quality, and sample-size calculation. Risk of bias in individual studies {#Sec8} ---------------------------------- Two independent reviewers (H.Q. and L.F.) assessed each included study for risk of bias using the Effective Practice and Organisation of Care Group (EPOC) tool[@CR19] for RCT and ITS studies and the Newcastle-Ottawa Quality Assessment Scale[@CR20] for cohort studies, as appropriate. Synthesis of results {#Sec9} -------------------- A meta-analysis was not performed because of heterogeneity of study design and outcome measures; instead, a narrative summary was conducted. Results {#Sec10} ======= Study selection {#Sec11} --------------- The search yielded 7,455 publications, which resulted in 5,105 articles after the removal of duplicates. After screening the title and abstracts for the inclusion criteria, 4,646 articles were excluded, leaving 459 published articles. After review of the full text of these articles, another 450 were excluded based on the inclusion/exclusion criteria, resulting in nine articles included in this systematic review (Fig. [1](#Fig1){ref-type="fig"}).Fig. 1Search and selection of included studies. \*Languages other than English or French considered as Foreign Language Study characteristics {#Sec12} --------------------- Details on included study characteristics, participants, interventions, methods, and results are available in Tables [1](#Tab1){ref-type="table"}, [2](#Tab2){ref-type="table"}, and Supplementary Electronic Material (Appendices 2 and 3).Table 1Included studies with Kirkpatrick Level 3 outcomes (behavioural changes)Primary author (Year)Clinical context and participantsStudy designResultsConclusionsShapiro *et al.* (2004)4 Emergency Medicine Teams (1 team = 1 MD, 1 resident, 3 RNs)RCT -- teams randomized to simulation-enhanced CRM teaching or no extra teaching. Outcomes during real trauma activations were comparedSimulation group showed a non-significant improvement in the quality of team behaviour (*P* = 0.07); Control group showed no change in team behaviour during the two observation periods (*P* = 0.55)Simulation appears to be promising to improve CRM team behavioursKnudson *et al.* (2008)Trauma (18 surgical residents)RCT--subjects randomized to scenario-based didactic sessions or scenario-based, simulator-enhanced teaching. Outcomes during real trauma activations were comparedThe simulation group performed better than the didactic group at behavioural skills level (increased performance by around 9%) but no difference at technical skills levelSimulation may be more effective than didactic teaching for transfer of learning of CRM skillsBruppacher *et al.* (2010)Anesthesia (20 post-graduate trainees)RCT--subjects randomized to simulation teaching or didactic teaching. Outcomes during weaning from cardiopulmonary bypass in the operating room.The simulation group scored significantly higher than the seminar group at both post-test (Global Rating Scale: *P*\< 0.001; checklist: *P* \< 0.001) and retention test (Global Rating Scale: *P* \< 0.001; checklist: *P* \< 0.001)High-fidelity simulation-based training leads to improved patient care during cardiopulmonary bypass weaning when compared with interactive seminarsMiller *et al.* (2012)39 Trauma activations (various staff MDs, residents, RNs, technicians, pharmacists, clerks, and RTs in an ED)ITS - teamwork behaviours were observed during real trauma activations and compared over four periods: pre-test (baseline, didactic-based phase) and post-test (simulation and decay phase)CTS measurements for teamwork improved in 12 out of 14 domains during ISTS phase compared with baseline, whereas only one CTS improved during the didactic phase. All CTS measures returned to baseline during the decay phaseTeamwork and communication in the clinical setting may be improved during an *in situ* simulation program, but these potential benefits are lost if the simulation program is not continuedCapella *et al.* (2010)\*Trauma (114; 28 surgery residents, 6 faculty surgeons, 80 ED nurses)Uncontrolled Before-and-After study; Pre/post training intervention study design Compared clinical outcome and efficiency of care pre and post team trainingSignificant improvement from pre-training to post-training in all teamwork domain ratings (leadership, *P* = 0.003; situation monitoring, *P* = 0.009; mutual support, *P* = 0.004; communication, *P* = 0.001); and overall ratings (*P* \< 0.001)\ A significant decreased time was observed after the training for: arrival to CT scanner (26.4-22.1 min, *P* = 0.005), endotracheal intubation (10.1-6.6 min, *P* = 0.049), and operating room (130.1-94.5 min, *P* = 0.021)Structured trauma resuscitation team training augmented by simulation improves team performanceSteinemann *et al.* (2011)\*Trauma (137; 9 staff surgeons, 21 staff ED physicians, 24 residents, 3 physician assistants, 44 RNs, 23 RTs, 13 technicians)Uncontrolled Before-and-After study; Pre/post training intervention study design compared clinical outcome pre and post team training during actual trauma resuscitationsSignificant improvements in speed (reduction by 16% of mean overall ED resuscitation time, *P* \< 0.05) and completeness of resuscitation (76% increase in the frequency of near-perfect task completion, *P* \< 0.001)\ Significant increase in CRM performance scores from the pre-to post-training periods (T-NOTECHS score 16.7 to 17.7, *P* \< 0.05)A relatively brief (4 hr) simulation-based curriculum can improve clinical performance of multidisciplinary trauma teamsCRM = crisis resource management; CTS = Clinical Teamwork Score; ED = emergency department; ITS = interrupted time series; ISTS = *in situ* trauma simulation; MD = medical doctor; RCT = randomized controlled trial; RN = registered nurse; RT = respiratory therapist; T-NOTECHS = trauma non-technical skills\*Study includes both Kirkpatrick Level 3 and Level 4 outcomes. Please see Table [2](#Tab2){ref-type="table"} for details on Kirkpatrick Level 4 outcomesTable 2Included studies with Kirkpatrick level 4 outcomes (patient outcomes)Primary author (Year)Clinical context and participantsStudy designResultsConclusionsCapella *et al.* (2010)\*Trauma (114; 28 surgery residents, 6 faculty surgeons, 80 ED nurses)Uncontrolled Before-and-After study; Pre/post training intervention study design\ Compared clinical outcome and efficiency of care pre and post team trainingA significant decreased time was observed after the training for: arrival to CT scanner (26.4-22.1 min, *P* = 0.005), endotracheal intubation (10.1-6.6 minutes, *P* = 0.049), and operating room (130.1-94.5 min, *P* = 0.021)\ No significant difference was observed after the training for: intensive care unit LOS (5.5-6.3 days, *P* = 0.445), hospital LOS (7.6-6.3 days, *P* = 0.210), absence of complication rate (70.5-76.8, *P* = 0,113), and survival rate (86.9-91.5, *P* = 0,121) and times from arrival to FAST examination (8.3-9.6 min, *P* = 0.131) and time in the ED (186.1-187.4, *P* = 0.93)Structured trauma resuscitation team training augmented by simulation resulted in improved efficiency of patient care in the trauma baySteinemann *et al.* (2011)\*Trauma (137; 9 staff surgeons, 21 staff ED physicians, 24 residents, 3 physician assistants, 44 RNs, 23 RTs, 13 technicians)Uncontrolled Before-and-After study; Pre/post training intervention study design\ compared clinical outcome pre and post team training during actual trauma resuscitationsSignificant improvements in speed (reduction by 16% of mean overall ED resuscitation time, *P* \< 0.05) and completeness of resuscitation (76% increase in the frequency of near-perfect task completion, *P* \< 0.001) The mortality rate, mean ICU and hospital LOS were not significantly different before and after the training all *P* \> 0.05)A relatively brief (4 hr) simulation-based curriculum can improve clinical performance and patients' outcomesRiley *et al.* (2011)Obstetrics and perinatal (134 from 3 hospitals; 13 obstetricians, 23 family practitioners, 14 pediatricians, 65 registered nurses, 18 certified RNs anesthetist, 1 physician assistantRCT -- Cluster randomization of hospitals\ Randomized to simulation-based, didactic-based, or no intervention.\ Groups were compared using clinical outcome scores.A statistically significant and persistent improvement of 37% (*P* \< 0.05) in perinatal morbidity was observed between the pre- and post-intervention for the hospital exposed to the simulation program. There were no statistically significant differences in the didactic-only or the control hospitals (*P* \> 0.05).\ No significant change in the perception of culture of safety (*P* \> 0.05) at the three hospitalsInterdisciplinary *in situ* simulation training is effective in decreasing perinatal morbidity and mortality for perinatal emergencies Didactics alone were not effective in improving perinatal outcomesAndreatta *et al*. (2011)Pediatrics resuscitation (228, junior and senior pediatric medicine resident with code team members: RNs, medical students, pediatric hospitalists, pharmacists)Longitudinal cohort study for 4 years Observed patients' outcome as the training occurred over several yearsAfter the routine integration of the formal mock code program into residency curriculum, resuscitation survival rates significantly increased from 33% to 50% within 1 year, in increments that correlated with the increasing number of mock code events (r =0.87) and held steady for three consecutive yearsSimulation-based mock codes can provide a sustainable and transferable learning context for advanced clinical training and assessment that ultimately decreased mortality for pediatric resuscitationsPhipps *et al.* (2012)Obstetrics and perinatal (\~185; obstetricians, perinatologists, labour and delivery RNs, certified nurse midwives, anesthesiologists, certified RN anesthetists, resident physician /fellows)ITS - Patient outcomes were assessed using data collected quarterly for 8 quarters prior to initiating the program and for the 6 quarters after implementing the program hospital wide, multidisciplinary simulation -based CRM intervention was applied to assess clinical outcome data collected 8 quarters pre-interruption and 6 quarters post interruption.AOIs significantly decreased from 0.052 (95%CI: 0.048 to 0.055) at baseline to 0.043 (95%CI: 0.04 to 0.047). Overall, the frequency of event reporting and the overall perception of safety did not change significantly.\ No change in patient perception but were satisfied \> 90% even before the interventionUsing the combination of a didactic and simulation-based CRM training was noted to improve patient outcomesAOI = adverse outcome index; CT = computed tomography; CI = confidence interval; CRM = crisis resource management; ED = emergency department; ICU = intensive care unit; ITS = interrupted time series; LOS = length of stay; FAST = focused assessment with sonography for trauma; MD = medical doctor; RCT = randomized controlled trial; RN = registered nurse; RT = respiratory therapist\*Study includes both Kirkpatrick Level 3 and Level 4 outcomes. Please see Table [1](#Tab1){ref-type="table"} for details on Kirkpatrick Level 3 outcomes Training characteristics {#Sec13} ------------------------ Eight studies used a combination of didactic and simulation training approaches in teaching CRM principles,[@CR21]-[@CR28] and one study used only simulated mock codes.[@CR29] Evaluation of outcomes and assessment tools {#Sec14} ------------------------------------------- The Kirkpatrick model allows combining several levels into a single study. Two studies investigated Kirkpatrick Levels 3 and 4, with a measure of the performance of team crisis management in the workplace (Level 3) and a measure of patient outcome (Level 4).[@CR23],[@CR28] These studies were considered to be both Kirkpatrick Levels 3 and 4 in our analysis; however, in the total count, they were included only in Kirkpatrick Level 4 group. Four studies reached Kirkpatrick Level 3 at most, assessing transfer of learning to the workplace (i.e., participants' performance during real clinical context). Five studies reached Kirkpatrick Level 4 (patient outcome) at most. They considered mortality among the patients' clinical outcome data.[@CR23],[@CR24],[@CR26],[@CR28],[@CR29] One study also used a patient survey, which was not included in the analysis because it was considered to be self-assessment data.[@CR26] Other clinical performance scores included the Weighted Adverse Outcomes Score,[@CR24] resuscitation time,[@CR23],[@CR28] and length of stay.[@CR23],[@CR28] Effects of intervention {#Sec15} ----------------------- In terms of transfer of learning to the workplace (Kirkpatrick Level 3), all included studies but one[@CR21] (with *P* = 0.07) found a significant effectiveness of simulation-enhanced CRM training,[@CR23],[@CR28] including when compared with didactic teaching alone.[@CR22],[@CR25],[@CR27] Detailed results of the included studies are provided in Table [1](#Tab1){ref-type="table"} and Supplementary Electronic Material (Appendix 2). In terms of skill preservation, there are conflicting results among studies. In the study by Miller *et al*., transfer of CRM skills in the workplace was not retained after a month,[@CR25] while transfer was retained for at least five weeks in another study.[@CR27] In terms of patient outcomes (Kirkpatrick Level 4), all included studies found at least some improved patient outcomes after simulation CRM training,[@CR23],[@CR26],[@CR28],[@CR29] including when compared with didactic teaching alone.[@CR24] Surrogate measures used to approach patient outcomes can be grouped into four main categories: efficiency of patient care (time to perform), complications, length of stay, and survival/mortality. Detailed results of the included studies are provided in Table [2](#Tab2){ref-type="table"} and Supplementary Electronic Material (Appendix 3). Only one study found that simulation CRM training had a clearly significant impact on mortality for inhospital pediatric cardiac arrest, where survival rates increased from 33% to 50% within one year.[@CR29] Capella *et al.*[@CR23] and Steinemann *et al.*[@CR28] both found an improvement in efficiency of patient care after CRM simulation training but no effect on mortality (Supplementary Electronic Material- Appendix 3). Riley *et al.*[@CR24] observed a statistically significant and persistent improvement of 37% in perinatal outcome from pre- to post-intervention in the hospital exposed to the simulation program,[@CR24] while there was no statistically significant change in patient outcome in the two other hospitals (didactic-only, control with no intervention), showing the benefits of simulation CRM teaching. Phipps *et al.*[@CR26] found that the complication rate decreased significantly after teaching. Risk of bias {#Sec16} ------------ Overall, the studies included in this systematic review appear to be at intermediate or high risk of bias. In addition, many items remained unclear, including random sequence generation (selection bias), allocation concealment, baseline characteristics, contamination, and intervention independent of other changes, suggesting room for improvement in the way studies are reported. Figure [2](#Fig2){ref-type="fig"} shows a risk of bias summary for six studies using the EPOC tool,[@CR19] and Table [3](#Tab3){ref-type="table"} presents risk of bias for three studies using the Newcastle-Ottawa Quality Assessment Scale.[@CR20]Fig. 2Risk of bias summary. Other biases include large inter-rater reliability of 0.2 for part II outcome assessments[@CR23] and sampling bias.[@CR26] Green = low risk; yellow = intermediate risk or unclear; red = high riskTable 3Risk of bias summary for cohort studies analyzed according to the Newcastle-Ottawa Quality Assessment ScaleStudyCapella (2010)Andreatta (2011)Steinemann (2011)Selection 1) Representativeness of the exposed cohorta) Truly representative of the averageb) Somewhat representative of the average\*\*c) Selected group of users\*d) No description of the cohort 2) Selection of the non exposed cohorta) Drawn from the same community as the exposed cohortb) Drawn from a different sourcec) No description of the non exposed cohort 3) Ascertainment of exposurea) Secure record\*\*\*b) Structured interviewc) Written self reportd) No description 4) Demonstration that outcome of interest was not present at start of studya) Yes\*\*\*b) NoComparability 1) Comparability of cohorts on the basis of the design or analysisa) Study controls for design or analysisb) Study controls for any additional factorOutcome 1) Assessment of outcomea) Independent blind assessmentb) Record linkage\*\*\*c) Self reportd) No description 2) Was follow-up long enough for outcomes to occura) Yes\*\*\*b) No 3) Adequacy of follow up of cohortsa) Complete follow upb) Subjects lost to follow up unlikely to introduce bias\*\*c) Follow up rate \< % and no description of those lostd) No statement\*SummarySelection \*\*\*Selection \*\*\*Selection \*\*\*ComparabilityComparabilityComparabilityOutcome \*\*\*Outcome \*\*\*Outcome \*\*\*\* = satisfied, blank = unsatisfied Discussion {#Sec17} ========== Despite an abundance of existing literature on simulation-based education and CRM, we identified only nine articles that examined transfer of learning to the workplace by healthcare providers or changes in patient outcome after simulation-based CRM training. The vast majority of the literature has been limited to lower-level outcomes, such as reaction of participants and learning that has been measured using further simulation scenarios. This approach leaves the studies open to the criticism that learners may have been taught to perform well only in the simulator and not necessarily in real life. These findings are relevant to various stakeholders such as healthcare providers, researchers, educators, policy makers, healthcare institutions, and broader organizations. Although limited in quantity and quality, the literature suggests that simulation CRM training may have a significant impact on transfer of learning to the workplace and on patient outcome. Currently, no consensus exists on the learning outcomes unique to simulation (i.e., simulated patient outcome, simulated behaviours, etc...) and how best to assess these factors. For example, Kirkpatrick does not adequately capture studies like that of DeVita *et al.*[@CR30] where the main outcome measure was survival of the simulated patient. This may be because the Kirkpatrick model for evaluating learning interventions was not originally developed for simulation education.[@CR12] Although Kirkpatrick's model is most often used to appraise the quality of educational research, we agree with Yardley and Dornan[@CR31] that other frameworks may be relevant for appraising the quality of educational research. They write,[@CR31] "Aggregative or interpretive methods of evidence synthesis that mix qualitative with quantitative evidence, or synthesize qualitative evidence alone, give better knowledge support and start from constructionist rather than positivist epistemological assumptions." Medical education is pluralistic, and a positivist paradigm lens alone cannot capture its complexity. As a widely adopted framework specific to simulation education outcomes is presently lacking, it is important to recognize that the Kirkpatrick classification may not accurately capture all higher-level learning outcomes in simulation education. An ideal framework for simulation and education interventions would account for complexity of interventions, maintenance of behaviour changes, and differentiate between self- and external skill assessment and between simulated and real practice. The data from this review provide evidence that CRM simulation training can improve behaviour at the workplace; however, whether this kind of training directly improves patient outcome is not as clear. Various measures to approach patient outcomes were used in the papers included in our review, including patient care efficiency (time to perform), complications, length of stay, and mortality. While most would agree that complications, length of stay, and mortality are appropriate criteria to assess patient outcome, it is debatable whether patient care efficiency is appropriate. Only one study found that simulation CRM training had a clearly significant impact on mortality following inhospital pediatric cardiac arrest.[@CR29] This study was simply a cohort study in a single hospital with no control group, thus results may potentially be due to other concomitant hidden interventions, and therefore, no strong definitive conclusion can be made regarding the causal relationship between the teaching intervention and mortality. Only an RCT with a control group could show that the teaching intervention is the reason for better survival. The practical requirements for designing studies that examine improvements in patient outcome can be difficult due to the need for larger sample sizes and a control group. For example, one of the studies included in this review did not have a sample-size calculation, and this likely resulted in an underpowered study. All of the studies included in this review involved one time-limited intervention on a small number of subjects.[@CR21] It is possible that modification of patient outcome requires a whole series of interventions on many subjects. Finally, although CRM programs without simulation teaching have been linked to decreased surgical mortality,[@CR32] we could not find a multicentre RCT that evaluated simulation CRM training on patient outcome. Nevertheless, if we compare with other high-stake industries, like aviation, despite several studies showing an improvement in pilots' behaviour in the cockpit, studies showing the benefit of CRM pilot training on client safety are lacking.[@CR33] Another potential reason for our small sample size of studies may be the conservative nature of our inclusion criteria. The decision to include objectively measured change of behaviour at the workplace and to exclude self-assessment (Kirkpatrick Levels 1 and 2 -- reaction and knowledge and skills learning, respectively) may have limited our analysis; however, self-assessment is largely recognized as inaccurate for healthcare professionals.[@CR18],[@CR34] The initial literature search was performed without any language restriction. Nevertheless, we included studies published in English or French only. Of course, we cannot ignore that a few papers were excluded because they were published in other languages. Given that the vast majority of scientific journals are published in English and all high-impact factor journals are in English, in our view, it is unlikely that the conclusions of our review would be significantly different if more languages had been included. Overall, we found that the studies were at an intermediate or high risk of bias and reporting was suboptimal. First, there is clearly room for improvement in the approach used to report studies. For example, random sequence generation and allocation concealment were almost never reported properly in the included studies. We cannot determine if the studies were performed incorrectly or if "only" the reporting was poor. Second, it may be challenging to design studies on simulation-based CRM without risk of bias when investigating transfer of learning to the workplace and patient outcome. For example, when working in increasingly complex organizations, it is very difficult to ensure that risk of contamination is nonexistent and intervention is independent of other changes. We suggest that, as a field, the simulation community needs to commit to rigorous research reports. Also, larger and multicentre studies could balance the risk of contamination. In order to decrease the risk of bias as much as possible in future studies, we also suggest that researchers consider the risk of bias at an early stage when designing the protocol. Moving forward, larger sample sizes, more multicentre studies, and studies with less risk of bias are required to provide a precise measure of the effect that simulation-based education has on healthcare provider skills in the workplace and patient outcome. Other systematic reviews show that there is no need for more Kirkpatrick Level 1 (reaction) and Level 2 (learning) studies, since learners are virtually constantly positive toward simulation training[@CR10],[@CR11] and learning occurs when measured in a simulated environment.[@CR1] Frequency of retraining, skill retention, and instructional design remain research priorities in studies investigating Kirkpatrick Level 3 (transfer of learning at the workplace) and Level 4 (patient outcome) outcomes. Universally recognized rigorous assessment tools are necessary to compare the effect of various teaching interventions and to assess CRM regardless of the clinical context. Finally, simulation training is often underused, potentially due to its cost. Future research could better explore the cost-effectiveness of simulation CRM training. Conclusions {#Sec18} =========== A limited number of studies have examined the true impact of simulation-based CRM training on Kirkpatrick Level 3 (transfer of learning at the workplace) and Level 4 (patient outcome) outcomes. Based on the nine studies included, this systematic review illustrates that CRM skills acquired at the simulation centre are transferred to clinical settings and lead to improved patient outcomes. Given these findings, we suggest the need for an internationally recognized interprofessional simulation-based CRM training certification for healthcare professionals that would teach CRM independently of the clinical context. Findings from this review may help guide future research in CRM simulation-based education. Electronic supplementary material {#Sec20} --------------------------------- ###### Appendix 2 Kirkpatrick Level 3 studies (DOCX 22 kb) ###### Appendix 3 Kirkpatrick Level 4 studies (DOCX 27 kb) Appendix 1 Search strategy {#Sec19} ========================== Database: Ovid MEDLINE^®^ \<1950 to September Week 1 2012\>, Ovid MEDLINE^®^ In-Process & Other Non-Indexed Citations \<September 4, 2012\> Search Strategy: ------------------------------------------------------------ 1 simulat\$.mp. 2 "crisis resource management".tw. 3 (crisis adj management).tw. 4 "crew resource management".tw. 5 CRM.tw. 6 team\$.mp. 7 \*Clinical Competence/ 8 or/2-7 (126860) 9 1 and 8 (2817) 10 Animals/ not (Animals/ and Humans/) 11 9 not 10 This article is accompanied by an editorial. Please see Can J Anesth 2014; 61: this issue. **Author contributions** *Sylvain Boet* was the principal investigator responsible for the concept of this review. He wrote the protocol, wrote and revised the manuscript, and was responsible for coordination of the study and communication with all co-authors. *Andrea C. Tricco*, senior investigator, reviewed earlier versions of the protocol and critically reviewed earlier versions of the manuscript. *Sylvain Boet* and *Andrea C. Tricco* supervised all steps of the study. *M. Dylan Bould* and *Walter Tavares*, co-investigators, critically reviewed the protocol. *Lillia Fung* and *Haytham Qosa*, co-investigators, participated in data extraction. *Laure Perrier*, co-investigator, was responsible for the literature search. *Scott Reeves*, co-investigator, shared his methodological expertise. *Sylvain Boet,* *M. Dylan Bould,* *Lillia Fung,* *Haytham Qosa,* *Laure Perrier,* *Walter Tavares*, and *Andrea C. Tricco* participated in screening. *Sylvain Boet,* *M. Dylan Bould,* *Lillia Fung,* *Haytham Qosa,* *Laure Perrier, Scott Reeves*, and *Andrea C. Tricco* participated in interpretation of the data. *M. Dylan Bould, Lillia Fung, Haytham Qosa,* *Laure Perrier,* *Walter Tavares*, and *Scott Reeves* critically reviewed the final manuscript. Andrea C. Tricco is funded by a Canadian Institutes for Health Research (CIHR)/Drug Safety and Effectiveness Network New Investigator Award in Knowledge Synthesis Methodology. The authors thank Laura Bekes for her contribution to data extraction and Ashlee-Ann Pigford for her constructive review of the manuscript. Financial support {#d30e1626} ================= Supported by the Department of Anesthesiology of The Ottawa Hospital, University of Ottawa (Ottawa, ON, Canada). Conflicts of interest {#d30e1631} ===================== None declared.
{ "pile_set_name": "PubMed Central" }
Introduction ============ Metabolic engineering is a field that encompasses detailed metabolic analysis aiming at identifying targets for manipulation through recombinant DNA technology for the improvement and/or design of cells \[[@B1]\]. Metabolic engineering is principally concerned with understanding the regulation of metabolic systems as a whole. The term "central carbon metabolism" (CCM) describes the integration of pathways of transport and oxidation of main carbon sources inside the cell. In most bacteria, the main pathways of the CCM are those of the phosphotransferase system (PTS), glycolysis, gluconeogenesis, pentose phosphate (PP) pathway, and the tricarboxylic acid cycle (TCA) with the glyoxylate bypass. As a whole, the system has a complex structure and it is regulated by complex networks of reactions. The knowledge about regulation in CCM has great industrial relevance as it may allow the engineering of selected metabolic steps to reroute carbon fluxes toward precursors for industrially important metabolites \[[@B2]\]. This kind of metabolic engineering however is a difficult task as there is still significant lack of knowledge regarding the regulation of central carbon metabolism flux for many industrially important bacteria. *Escherichia coli* is by far the most extensively studied bacterium in this field. Most recently acquired knowledge provides fundamental insights into the regulation of fluxes in CCM through transcriptional control \[[@B3]\], a finding that may hold for other bacteria as well, and is expected to have a significant impact in industrial biotechnology. The field of metabolic engineering is broad and diverse and rapidly expanding and the reader will find in the literature a number of excellent reviews that cover the area from different perspectives. The present, aims to give an overview of the recent advances in engineering the CCM of the industrially important bacteria *E. coli*, *Bacillus subtilis*, *Corynobacterium glutamicum*, *Streptomyces* spp., *Lactococcus lactis* and other lactic acid bacteria. All of them are established producers of important classes of products, e.g. proteins, amino acids, organic acids, antibiotics, high-value metabolites for the food industry and also, promising producers of a large number of industrially or therapeutically important chemicals. Optimization or introduction of new cellular processes in these microorganisms is often achieved through manipulation of targets that reside at major points of central metabolic pathways. Only approaches that involve manipulations of such points will be discussed in this review. Escherichia coli ---------------- *E. coli*, a Gram-negative bacterium, is being used widely today in a large number of biotechnological processes. The ease of cultivation --it grows quickly in minimal media, as well as its ability to metabolize both pentoses and hexoses \[[@B4]\], have made it the bacterium of choice for research and over the years the wealth of information in genomics, proteomics and metabolism have led it to be regarded as the prime prokaryotic model \[[@B5]\]. Many feasible genetic tools have been developed and the cloning methodologies for *E. coli* developed for the production of foreign proteins established it as a "cell-factory". *E. coli* is the organism of choice for the expression of a wide variety of recombinant proteins for industrial, therapeutic and diagnostic applications. Apart from proteins, *E.coli* has been shown to be a suitable host for the production of many other valuable metabolites. The CCM of *E. coli* and specifically the metabolism of glucose are intensively studied and well known topics \[[@B6],[@B7]\]. Glucose metabolism starts with its uptake via the PTS and proceeds with several interconnected pathways with the major being: glycolysis, gluconeogenesis, the pentose-monophosphate bypass with the Entner-Dudoroff pathway, the TCA cycle with the glyoxylate bypass, anaplerotic reactions and acetate production and assimilation (Figure [1](#F1){ref-type="fig"}). The network controlling the carbon uptake integrates metabolism, signal transduction and gene expression \[[@B8]\]. The extensive knowledge gained on *E. coli* CCM \[[@B6]\] offers key advantages in metabolic engineering efforts that aim at achieving increased metabolite production. Such efforts have been focused intensively rather on the upper part of the carbon assimilation network, consisting of glycolysis and glyconeogenesis and their genetic and metabolic regulation. ![**Simplified representation of the central carbon metabolism of*E. coli*.**(A) glycolysis and gluconeogenesis, (B) anaplerotic reactions, (C) acetate formation and assimilation, (D) TCA cycle, (E) Glyoxylate shunt, (F) PP pathway. The dotted line arrow from oxaloacetate to pyruvate indicates the anaplerotic reaction catalysed by pyruvate carboxylase. The broken line arrows indicate the removal of metabolites.](1475-2859-11-50-1){#F1} The terminal stages of glycolysis in *E. coli* involve complex interplays. PEP conversion is coupled to two metabolic processes: PEP may give rise to pyruvate by pyruvate kinase (PK) in the PTS or it may give rise to oxaloacetate by the PEP carboxylase (*ppc*)-catalyzed anaplerotic reaction. Pyruvate, the end-product of glycolysis, is oxidized to acetyl-CoA and CO~2~ by the pyruvate dehydrogenase complex. Acetyl-CoA participates in a large number of reactions either as substrate or as product: it can enter the TCA cycle, it can be used in fatty acid and triglycerides biosynthesis and it can be used in acetate biosynthesis. Acetyl-CoA connects the glycolysis and the acetate metabolism pathways with the TCA cycle and the glyoxylate shunt. Acetyl-CoA is therefore a key factor in determining biomass formation, the redox balance and energy yield. Moreover, the acetate-acetyl-CoA node determines a large part of the control exerted by central metabolism on the performance of many microbial processes \[[@B9]\]. The final products of glycolysis PEP and pyruvate enter the TCA cycle via acetyl-CoA and via the formation of oxaloacetate by carboxylation. This route, referred to as anaplerosis, replenish the intermediates of the TCA cycle that were used for anabolic purposes. Under gluconeogenic conditions, the TCA cycle intermediates oxaloacetate or malate are converted to pyruvate and PEP by decarboxylation and this way the PEP-pyruvate-axaloacetate node provides the precursors for gluconeogenesis. Therefore, the metabolic link between glycolysis, gluconeogenesis and the TCA cycle is represented by the PEP-pyruvate-oxaloacetate node \[[@B6]\]. Key points of the above processes that represent main problems related to the use of *E. coli* as a cell factory are the following: a) PEP availability as a building block for the production of other valuable compounds is reduced; b) acetyl-CoA accumulation can affect the utilization of glucose by causing accumulation of pyruvate and enhancing acetate production; and c) acetate accumulation could lead to a serious waste of carbon as up to 1/3 of the glucose used could appear as acetate. Acetate co-production by *E. coli* in recombinant protein fermentations represents a serious problem that has been discussed by many authors \[[@B10]\]. Apart from the diversion of carbon that might otherwise be used in synthesis of biomass or the protein product, acetate production causes a number of other problems since it inhibits growth even at very low concentrations, e.g. 0.5 g/l \[[@B11]\], it inhibits protein formation \[[@B12]\], it affects proteins and genes involved in stress response and regulation processes \[[@B13]\], it interferes with methionine biosynthesis \[[@B14]\], it interferes with bacterial energetics as it dissipates the pH component of the membrane potential, and it causes pH control problems in fermentation \[[@B15]\]. It has been shown that acetate is more inhibitory to recombinant protein producing strains than to wild-type ones as the threshold growth rate for the onset of acetate production is lower in the first \[[@B16]\]. Thus, control of acetate formation is of paramount importance in recombinant protein production systems with *E. coli*. The rate at which acetate forms is directly related to the growth rate and the glucose consumption rate. Since in the common for *E. coli* operational mode of fed-batch culture, the growth rate is determined by the feeding rate of the limiting substrate, *E. coli* generates acetate when glucose is the limiting substrate and cells grow above a threshold growth rate \[[@B10]\]. In the applied fully aerobic conditions, the availability of oxygen is not related to the formation of acetate however, the rate of oxygen uptake is the factor that determines it and most process and genetic engineering strategies aim to facilitate the appropriate balance between growth rate and oxygen uptake. Acetate formation is influenced by operational aspects of *E. coli* processes e.g. feeding strategies in fed-batch fermentations, and by the composition of the culture medium. There have been many attempts to control acetate formation by process modifications that mainly aim to control the growth rate of the microorganism \[[@B10]\]. These approaches will not be discussed in the present review. Similarly, there have been many attempts to reduce acetate formation by genetic engineering that use different approaches and strategies. These strategies focus either on the uptake and consumption rates of glucose or on the flux from the central pathways to acetate or finally on the metabolic and regulatory mechanisms that lead to accumulation of acetate. Picon et al. \[[@B17]\] studied the effects of changes made in the glucose uptake capacity on the flux distribution to the desired end product β-galactosidase and to acetate. The lack of one of the components (IICB(Glc) protein) of the glucose-PTS reduced the growth rate significantly. However, β -galactosidase production had no effect on growth rate. The constructed strain directed more carbon into biomass and carbon dioxide, and less into acetate. β -galactosidase was produced in amounts not significantly different from the wild-type strain from half the amount of glucose. De Anda et al. \[[@B18]\] studied the effect of replacing the glucose-PTS with an alternate glucose transport activity on growth kinetics, acetate accumulation and production of two model recombinant proteins. The engineered strain maintained similar production and growth rate capabilities while reducing acetate accumulation. Specific glucose consumption rate was lower and product yield on glucose was higher in the engineered strain in fed-batch culture. Altogether, strains with the engineered glucose uptake system showed improved process performance parameters for recombinant protein production over the wild-type strain. The approach of Wong et al. \[[@B19]\] to reducing acetate accumulation was to disable the PEP:PTS (phosphoenelopyruvate:phosphotransferase system) by deleting the ptsHI operon in the wild-type *E. coli strain* GJT001. The mutation caused a severe reduction in growth rate and glucose uptake rate in glucose-supplemented minimal medium, which confirmed the mutation, and eliminated acetate accumulation. The mutant strain apparently metabolized glucose by a non-PTS mechanism followed by phosphorylation by glucokinase. The ptsHI mutant of GJT001 resulted in reduced acetate accumulation, which led to significant improvements in recombinant protein production in batch bioreactors. Lara et al. \[[@B20]\] worked with an *E. coli* strain lacking the PEP:PTS, at glucose concentrations of up to 100 g/L in batch mode and showed that high cell and recombinant protein concentrations are attainable in simple batch cultures by circumventing overflow metabolism through metabolic engineering. At the highest glucose concentration tested, acetate accumulated to a maximum of 13.6 g/L for the parental strain whereas a maximum concentration of only 2 g/L was observed for the engineered strain. This represents a novel and valuable alternative to classical bioprocessing approaches. The main route for acetate production is from acetyl-CoA through acetyl-phosphate by the two enzymes phosphotransacetylase (*pta*) and acetate kinase (*ack*). The second approach of redirecting the flow of carbon to acetate may involve the elimination of the activity of these two enzymes as described in the works of Bauer et al. \[[@B21]\], Hahm et al. \[[@B22]\], and Chang et al. \[[@B23]\]. In a similar approach, Kim and Cha \[[@B24]\] reported the use of an antisense RNA strategy to partially block the synthesis of *pta* and *ack* and the resulted improved recombinant protein production. However, in the recent work of Castano-Cerezo et al. \[[@B9]\], deletion of *pta* was shown to strongly affect the expression of several genes related to central metabolic pathways, as well as the ability of *E. coli* to grow on acetate under anaerobic conditions due to decreased acetyl-CoA synthetase, glyoxylate shunt and gluconeogenic activities. As the accumulation of pyruvate signals the onset of acetate formation, in the third approach that focuses on the metabolic and regulatory mechanisms that lead to accumulation of acetate, either pyruvate or the glycolytic products should be diverted to where carbon is needed: in the TCA cycle. Vemuri and co-workers \[[@B25]\] showed that several genes involved in the TCA cycle and respiration are repressed as the glucose uptake rate increases and deletion of the gene coding for the regulatory protein ArcA resulted in reduction of the produced acetate and increase of biomass due to the increased capacities of the TCA cycle and the respiratory chain. The diversion of carbon from acetate or its precursors to the TCA cycle can be accomplished by manipulating the expression levels of the anaplerotic enzyme PEP carboxylase. Overexpressing the native PEP carboxylase reduced acetate formation by 60 % in shake flasks cultures grown at low cell density and significantly increased biomass yield \[[@B26],[@B27]\]. However, PEP carboxylase (*ppc*) overexpression diminished the supply of PEP needed for the PTS-mediated uptake of glucose and decreased the growth rate of the organism. The anaplerotic function of PEP carboxylase was also shown to be fully restored by expression of pyruvate carboxylases in *ppc* mutants \[[@B28]\]. The result was an increased carbon flux to oxaloacetate during growth of *E. coli* on glucose under both aerobic and anaerobic conditions \[[@B28],[@B29]\]. Under aerobic conditions, the flux redirection resulted in a 50 % increase in yield of biomass while glucose uptake and specific growth rates remained unaltered. Similarly, March and co-workers \[[@B30]\] in their work with an *E. coli* strain containing pyruvate carboxylase (*pyc*) reported a 60 % decrease of acetate while the protein yield increased by 68 %, while Vemuri et al. \[[@B31]\] reported an 80 % reduction of acetate upon introduction of heterologous pyruvate carboxylase. Acetate formation is affected by the NADH/NAD ratio. Vemuri et al. \[[@B32]\] reported the complete elimination of acetate and a 10 % increase in protein yield in an *arcA* mutant by reducing the redox ratio through expression of the water-forming NADH oxidase from *Streptococcus pneumoniae*. The PEP-pyruvate-oxaloacetate node \[[@B6]\] is receiving increased attention and this is mostly driven by the need to manipulate the carbon flux through the node for improved production in various biotechnological processes. Such a case is the production of succinate by *E. coli* that involves extensive anaplerotic fluxes. Various metabolic engineering approaches have been implemented successfully, including everexpression of the native *ppc*\[[@B33]\], the NAD-dependent malic enzyme ScfA \[[@B34]\], a heterologous PEP carboxykinase (*pck*) \[[@B35]\], use of alternative glucose transport systems to increase energy efficiency by eliminating the need to produce additional PEP from pyruvate, a reaction that requires two ATP equivalents \[[@B36]\] and combined approaches such as overexpression of heterologous *pck* and inactivation of the PEP-dependent PTS \[[@B37]\]. Another strategy for the efficient conversion of glucose to pyruvate was to combine mutations to minimize ATP yield, cell growth and CO~2~ production with mutations to eliminate acetate production \[[@B38]\]. An important focus area for metabolic engineering of the PEP-pyruvate-oxaloacetate node is the production of aromatic compounds. The shikimic acid (SA) pathway is the common route leading to the biosysnthesis of aromatic compounds in bacteria as well as in several eukaryotic organisms and plants \[[@B39]\]. In *E. coli*, the first step in this pathway is the fusion of PEP precursors and erythrose-4P into 3-deoxy-D-arabinoheptulosonate-7P (DAHP) by the DAHP synthase \[[@B40]\]. Since PEP is also required for the PTS-glucose uptake and for anaplerosis, it is obvious that enhancing PEP availability is necessary for high-level production of aromatic compounds in *E. coli*. Metabolic engineering approaches that aimed successfully at increased PEP availability include inactivation of the PTS operon, installation of non-PTS glucose transporters like glucose facilitators, and transformation with plasmids that carry the *tktA* and *ppA* genes, coding for transketolase I and PEP synthase, respectively, in order to increase availability of the intermediates E4P and PEP \[[@B41]-[@B44]\]. Combining CCM modifications with SA pathway modifications, like partial or total blockage of the SA flux into chorismic acid (CHA), e.g. by inactivating *aroK* and *aroL* genes, resulted in significant increases in SA \[[@B45]\] or anthranilate accumulation \[[@B46]\]. The metabolic network of the TCA cycle and the glyoxylate bypass in *E. coli* has been the focus of various engineering strategies during the last decade due to the tremendous increase of interest for the efficient production of high-value platform chemicals and building blocks for bio-based polymers. Succinic acid is a platform chemical that can be converted to 1,4-butanediol, γ-butyrolactone, tetrahydrofuran, and other chemicals of industrial importance. Succinic acid formation occurs primarily through the reductive branch of the TCA cycle (fermentative pathway) during anaerobic conditions, and the glyoxylate bypass. However, due to insufficient reducing power, wild-type *E. coli* can produce only a small amount of acid (7.8 %) through the fermentative pathway \[[@B47],[@B48]\]. Succinic acid production was improved either by introducing genetically modified metabolic pathways that enhance key enzyme activity or by deleting or inhibiting competitive to succinic acid pathways \[[@B49]\]. Successful examples of the first strategy include the overexpression of *ppc*\[[@B33]\], of heterologous *pck*\[[@B35]\], of *pyc*\[[@B50]\], that led to significant increases -even 6.5-fold-in the production of succinate. A successful example of the second strategy involves the deactivation of *αdhE* (aldehyde dehydrogenase), *ldhA* (lactate dehydrogenase) and *αck-ptα* (acetate kinase-phosphate acetyltransferase) from the central metabolic pathway and activation of the glyoxylate bypass through the inactivation of *iclR* that encodes a transcriptional repressor protein of the glyoxylate bypass \[[@B51]\]. Lin et al. \[[@B47]\] constructed a mutant *E. coli* strain by deletion of *αck-ptα, iclR*, and *ptsG* genes and overexpression of the *ppc* gene and achieved high-level succinate production under aerobic conditions. The CCM includes also the pentose-phosphate (PP) pathway. In the oxidative branch of the pathway which supplies reducing power for cellular biosynthetic processes, NADPH is generated via oxidation of glucose-6-phosphate (G-6P) by G-6P dehydrogenase (G6PDH, encoded by *zwf*). The non-oxidative branch includes the interconversion of ribulose-5P, ribose-5P and xylulose-5P and the transfer of either a glycoaldehyde group or a dihydroxyacetone group among sugar phosphates by transketolase and transaldolase, respectively. Engineering the PP pathway has received attention either for the redirection of the carbon flux to mainstream glycolytic pathway or for overproduction of NADPH. Knocking out *zwf* resulted in a non-operational PP pathway and an increased TCA activity in the work of Zhao et al. \[[@B52]\]. Few studies however have been focused on G-6P dehydrogenase as a key enzyme that activates the PP pathway. Homologous co-overexpression of *zwf* and *glpX* (encodes for FBPase II) activated the PP pathway and increased the NADPH-dependent hydrogen production to 2.32-fold \[[@B53]\]. Overproduction of NADPH is of primal importance for various synthetic pathways e.g. for the efficient production of poly(3-hydroxybutyrate) (PHB). Since NADPH is mainly formed in the PP in *E. coli*, knocking out phosphoglucose isomerase (*pgi*) forced the carbon flow into the PP pathway and enhanced NADPH production but repressed cell growth \[[@B54]\]. Cell growth was recovered to some extend by introducing a NADPH-consuming pathway, such as the PHB synthetic pathway and efficient PHB production was achieved by appropriately controlling the glucose concentration of the substrate. Bacillus subtilis ----------------- *Bacillus* spp. are used industrially for the production of enzymes (amylases, lipases, proteases), vitamins, antibiotics, purine nucleotides, poly-γ-glutamic acid, [d]{.smallcaps}-ribose, PHB and other metabolites. *B. subtilis* is able to metabolize a wide range of carbohydrates, including monosaccharides (e.g., glucose, xylose), oligosaccharides (e.g., maltodextrins, cellodextrins), and polysaccharides (e.g., starch)- but not cellulose \[[@B55],[@B56]\]. *B. subtilis* has been an attractive host for the expression of foreign proteins (e.g. enzymes) on an industrial scale due to its ability to transport them out of the cell through secretion systems. The TCA cycle is one of the major routes of carbon catabolism in *B. subtilis*\[[@B57]\]. Anaplerotic reactions contribute to the flux through the TCA cycle. The reactions at the interface between the lower part of glycolysis and the TCA cycle were identified as an important metabolic subsystem in this organism \[[@B58]\]. *B. subtilis* is an important model microorganism in the field of metabolic engineering for the production of riboflavin \[[@B59]\]. The PP pathway and the pyruvate shunt were identified as major pathways of glucose catabolism in a recombinant riboflavin-producing *B. subtilis* strain \[[@B60]\]. Reactions connecting the TCA cycle and glycolysis, catalyzed by the malic enzyme and PEP carboxykinase were found to consume up to 23 % of the metabolized glucose. The overall flux distribution suggested that *B. subtilis* metabolism has an unusually high capacity for the reoxidation of NADPH. Under the conditions investigated \[[@B60]\], riboflavin formation in *B. subtilis* is limited by the fluxes through the biosynthetic rather than the central carbon pathways, suggesting a focus for metabolic engineering of this system. Therefore, overexpression of enzymes (e.g. G6PDH and 6PGDH) that facilitate the route of carbon flow towards the PP pathway increased the pool of ribulose-5P which is a precursor for riboflavin biosynthesis and led to increased riboflavin yields \[[@B61]-[@B63]\]. It is expected that *B. subtilis* will play an important role in the process of converting biomass into biocommodities \[[@B64],[@B65]\]. In this view, modifications of the heterofermentative and homofermentative metabolism of the organism have been reported recently, along with the construction of recombinant cellulolytic strains. Romero and co-workers \[[@B66]\] identified a key physiological role in LDH for glucose consumption under heterofermentative metabolism. By inactivating the *ldh* gene and eliminating butanediol biosynthesis, the resulting recombinant *B. subtilis* strain produced enthanol as the sole fermentation product. To increase L-lactate production, Romero-Garcia and co-workers \[[@B67]\] constructed the *B. subtilis* CH1 *alsS*^-^ strain that lacks the ability to synthesize 2,3-butanediol. Inactivation of the pathway that competed for pyruvate availability, led to a 15 % increase in L-lactate yield from glucose compared with the parental strain. Zhang et al. \[[@B68]\] proceeded in the direct production of lactate from cellulose as the sole carbon source without any other organic nutrient by recombinant cellulolytic *B. subtilis.* Overexpression of the endoglucanase BsCel5 enabled *B. subtilis* to grow on solid cellulosic materials as the sole carbon source for the first time. Furthermore, the specific activity of BsCel5 on regenerated amorphous cellulose (RAC) and its expression/secretion level in *B. subtilis* was increased by two-round directed evolution enhance. To increase lactate yield, the alpha-acetolactate synthase gene (*alsS*) in the 2,3-butanediol pathway was knocked out. Corynobacterium glutamicum -------------------------- The Gram-positive bacterium *C. glutamicum* was discovered 50 years ago as a natural overproducer of glutamate. Today, it is used for the industrial production of more than 2 million tons of amino acids (glutamate, lysine and tryptophan) per year \[[@B69]\]. Decades of intensive research triggered by the economical importance of the microorganism, highlighted its metabolism \[[@B70]-[@B73]\] and provided the complete genome sequence \[[@B74]\] along with efficient genomic approaches and metabolic engineering strategies aiming at novel and advanced bioprocesses. The recent review by Wittmann \[[@B69]\] provides a rich source of information on metabolic engineering strategies applied to *C. glutamicum* over the last years. The CCM in *C. glutamicum* involving glycolysis, the PP pathway, the TCA cycle and the anaplerotic and gluconeogenic reactions are intensively studied and well known topics today \[[@B69]\]. The PP pathway and its role in NADPH regeneration for lysine biosynthesis has been the subject of a number of important studies. The PP pathway in *C. glutamicum* is mainly regulated by the ratio of NADPH/NADP concentrations and the activity of G6PDH \[[@B75]\]. Together with G6PDH, 6PGDH and isocitrate dehydrogenase, they represent the main NADPH sources in this organism \[[@B76]\]. Intracellular metabolite concentrations and specific enzyme activities during lysine overproduction in two isogenic leucine auxotrophic strains, which differed only in the regulation of their aspartate kinases (a key enzyme of the lysine production pathway), were compared by Moritz et al. \[[@B76]\]. Analyses confirmed that NADPH regeneration in the PP pathway is essential for lysine biosynthesis in *C. glutamicum*. Marx et al. \[[@B77]\] constructed a phosphoglucose isomerase (*pgi*) mutant strain of *C. glutamicum* to redirect the carbon flux through the PP pathway. L-lysine production increased as well as by-product formation and growth rate, a common feature of *pgi* mutants due to disturbed metabolism of NADPH. Various approaches have aimed at increasing the flux through the PP pathway. Overexpression of the *fbp* gene, encoding fructose 1,6-bisphosphatase, increased lysine yield on glucose, sucrose and fructose up to about 40 % by enhancing the PP pathway flux by 10 % \[[@B78]\]. Another major target approached was the *zwf* gene, encoding G6PDH, the overexpression of which resulted in increased lysine production on different carbon sources \[[@B79]\]. Modification of the regulatory properties of the PP pathway enzymes led also to significant increases of the flux through the PP pathway \[[@B79]\]. Introduction of 12 defined genome-based changes in genes encoding central metabolic enzymes redirected major carbon fluxes as desired towards the optimal pathway usage predicted by in silico modelling in the work of Becker et al. \[[@B80]\]. The engineered *C. glutamicum* produced lysine with a high yield of 0.55 g /g glucose, a titer of 120 g /L lysine and a productivity of 4.0 g /L/h in fed-batch culture. The specific glucose uptake rate of the wild type was completely maintained during the engineering process, providing a highly viable producer. This is the first report of a rationally derived lysine production strain that may be competitive with industrial applications. For anaplerotic replenishment of the TCA cycle, *C. glutamicum* exhibits-in contrast to many other organisms- pyruvate carboxylase (*pyc*) and PEP carboxylase (*ppc*) as carboxylating enzymes \[[@B73]\]. In addition to the activities of the above C3-carboxylating enzymes, *C. glutamicum* possesses three C4-decarboxylating enzymes converting oxaloacetate or malate to PEP or pyruvate. The individual flux rates in this complex anaplerotic node were investigated by using ^13^ C\]-labelled substrates. The results revealed that both carboxylation and decarboxylation occur simultaneously in *C. glutamicum* and a high cyclic flux of oxaloacete via PEP to pyruvate was found \[[@B73]\]. The PEP-pyruvate-oxaloacetate node in *C. glutamicum* has been discussed extensively in the review by Sauer and Eikmanns \[[@B6]\]. Since a variety of amino acids originate their biosynthesis from the PEP-pyruvate-oxaloacetate node, the enzymes in this node and in particular the anaplerotic enzymes have been regarded as important targets for metabolic engineering of *C. glutamicum.* Overexpression of *pyc* resulted in seven-fold increase of glutamate production as well as increased lysine accumulation, while abolition of pyruvate carboxylase activity resulted in significantly lower amino acid formation \[[@B72]\]. "Genome-based strain reconstruction" confirmed the role of *pyc* in lysine production \[[@B81]\]. However, Koffas et al. \[[@B82]\] showed that overexpression of *pyc* increased growth but decreased the specific productivity of lysine. Simultaneous expression of aspartate kinase abolished the deficiency and yielded more than 250 % increase of the lysine specific productivity without affecting the growth rate or final cell density of the culture \[[@B83]\]. Another important reaction for the production of amino acids derived from the TCA cycle is the PEP-carboxykinase (*pck*) reaction. In contrast to the situation found with pyruvate carboxylase \[[@B81]\], abolition of the PEP carboxykinase activity led to an increase in glutamate production by 440 % and lysine production by 120 % while increasing its activity led to significantly reduced productivities (40 % and 20 %, respectively) \[[@B84]\]. Streptomyces spp ---------------- The fame of streptomycetes as efficient producers of antibiotics started with the discovery of actinomycin in 1940, followed by streptomycin in 1943 \[[@B85]\]. Today, two-thirds of the marketed microbial drugs are produced by streptomycetes. Bacteria of the genus *Streptomyces* have been extensively isolated since 1940 and today the chance of discovering new antibiotics from them is increasing. Secondary metabolic pathways have been until recently the obvious choice for investigations of strain manipulation and yield improvement in *Streptomyces*. During the last years, genetic manipulation of biosynthetic pathways offered new tools and perspectives. The Embden-Meyerhof-Parnas (EMP) pathway, the PP pathway and the TCA cycle are present in a number of *Streptomyces* species \[[@B86]\] but until recently, the enzymes controlling the primary metabolic pathways have been rather ignored. The productivity of secondary metabolites is mainly determined by the availability of biosynthetic precursors (e.g. acetyl-CoA and malonyl-CoA). Primary metabolism supplies these precursors and therefore, identification and engineering of the enzymes that regulate the carbon flux through the network of reactions of the CCM can increase the availability of precursors \[[@B87]\]. Moreover, metabolic flux rebalancing for precursor-directed biosynthesis provided novel products with improved properties \[[@B88]\]. Optimized metabolic flux distributions were calculated for the production of actinorhodin (ACT) \[[@B89]\] and the calcium dependent antibiotic daptomycin (CDA), both produced by *S. coelicolor*, for various nutrient limitations \[[@B90]\]. Performing metabolic flux analysis, Kim et al. \[[@B89]\] found that CDA production was concomitant with growth and production in batch culture was affected by the oxidative branch of the PP pathway, the shikimate biosynthesis, the oxoglutarate fluxes and nitrogen assimilation. Metabolic flux analysis in chemostat cultures of *S. lividans* grown on glucose or gluconate showed increased carbon flux through glycolysis and the PP pathway while the synthesis of both ACT and undecylprodigiosin (RED) was inverse to the flux through the PP pathway \[[@B91]\]. Deletions of either of two genes *zwf1* and *zwf2* coding for isoenzymes of the initial enzyme of the PP pathway G6PDH, resulted in more efficient utilization of glucose via glycolysis and increased acetyl-CoA precursor pools that led to four-fold increased production of both ACT and RED by *S. lividans*\[[@B92]\]. Ryu and co-workers \[[@B93]\] investigated the roles of key enzymes in central carbon metabolism in the context of increased ACT production by *S. coelicolor*. Genes encoding G6PDH (either *zwf1* or *zwf2*) and phosphoglucomutase (*pgm*) were deleted and those for the acetyl-CoA carboxylase (ACCase) were overexressed. G6PDH encoded by *zwf2* was found to play a more important role than the encoded by *zwf1* in determining the carbon flux to ACT. The *pgm*-deleted mutant produced abutant glycogen but was impaired in ACT production. Finally, overexpression of ACCase resulted in more rapid utilization of glucose and increased efficiency of its conversion to ACT. It was concluded therefore that the carbon storage metabolism plays a significant role in precursor supply for ACT production and that manipulation of the CCM can lead to increased ACT production by *S. coelicolor*. The first reported application of genetic engineering to channel precursor flux to improve clavulanic acid production by *S. clavuligerus* was that by Li and Townsend \[[@B94]\]. Clavulanic acid biosynthesis is initiated by the condensation of [l]{.smallcaps}-arginine and [d]{.smallcaps}-glyceraldehyde-3-phosphate (G3P). Two genes (*gap1* and *gap2*) whose protein products are distinct glyceraldehyde-3-phosphate dehydrogenases (GAPDHs) were inactivated in *S. clavuligerus* by targeted gene disruption. A two-fold increase in production of clavulanic acid was obtained when *gap1* was disrupted, and reversed by complementation. Addition of arginine to the cultured mutant further improved clavulanic acid production giving a greater than two-fold increase over wild type, suggesting that arginine became limiting for biosynthesis. Lactococcus lactis and other lactic acid bacteria ------------------------------------------------- Apart from their use as starter cultures in the industrial manufacture of fermented food products, lactic acid bacteria (LAB) are also used in a variety of industrial applications, e.g. production of lactic acid, antimicrobial peptides, stereoisomers of lactic acid, high-value metabolites involved in flavor, texture or health applications and probiotic products. Their industrial importance along with some characteristics, such as their small genome size (\~2-3 Mb) and simple energy and carbon metabolism, make them promising targets of metabolic engineering strategies. Such strategies have mainly focused either on rerouting of pyruvate metabolism to produce important fermentation end products \[[@B95],[@B96]\] or on the complex biosynthetic pathways leading to the production of exopolysaccharides and vitamins \[[@B97],[@B98]\]. Attempts to manipulate the central carbon metabolism in these bacteria are rather limited compared to the above. Among LAB, *Lactococcus lactis* is by far the most extensively studied organism. The relative simplicity of *L. lactis* metabolism that converts sugars to pyruvate via the glycolytic pathway (Figure [2](#F2){ref-type="fig"}) generating energy through substrate level phosphorylation, the availability of numerous genetic tools \[[@B99]\] and the knowledge of its complete genome sequence \[[@B100]\], make it an attractive target for metabolic engineering and the development of effective cell factories \[[@B101]\]. ![**Glycolysis, the sequence of enzymatic reactions in the conversion of glucose to pyruvate and finally, to fermentation products.**In red letters, are the enzymes involved. Highlighted, are the components exchanged between oxidation or reduction reactions. The number of the produced molecules is given, highlighted in green.](1475-2859-11-50-2){#F2} *L. lactis* shows homolactic metabolism when growing in rapidly metabolized sugars with more than 90 % of the metabolized sugar being converted to lactic acid. Deviation from homolactic fermentation is observed under aerobic conditions \[[@B102],[@B103]\] or during the metabolism of galactose or maltose \[[@B104],[@B105]\]. Regulation of glycolysis and the shift between different fermentation modes have attracted considerable attention and have been extensively studied \[[@B106]-[@B110]\]. Results reported by Andersen et al. \[[@B111]\] concerning the role of phosphofructokinase (PFK) on glycolytic flux in *L. lactis*, show that this enzyme plays an important role since glycolytic and lactate fluxes were decreased proportionally by a two-fold reduction of PFK activity. A key role was also attributed to PFK with regard to the glycolytic flux control by Neves et al. \[[@B103]\]. Papagianni and co-workers \[[@B112]\] showed that the control of the glycolytic flux resides to a large extend in processes outside the glycolytic pathway itself, like glucose transport and the ATP consuming reactions, and allosteric properties of key enzymes like PFK have a significant influence on the control. Extending their work, Papagianni and Avramidis \[[@B112],[@B113]\] constructed *L. lactis* strains with altered PFK activity, by cloning the *pfkA* gene from *Aspergillus niger* or its truncated version *pfk13* that encodes a shorter PFK1 fragment, and studied the effects of increased PFK activity on the glycolytic capacity of *L. lactis* and lactic acid production. The results demonstrated the direct effect of PFK activity on the glycolytic flux in *L. lactis* since a two-fold increase in specific PFK activity (from 7.1 to 14.5 U/OD~600~) resulted in a proportional increase of the maximum specific rates of glucose uptake (from 0.8 to 1.7 μMs^-1^ g CDW^-1^) and lactate formation (from 15 to 22.8 g lactate (g CDW)^-1^ h^-1^). It has been shown by Luesink et al. \[[@B114]\] that the glycolytic flux in *L. lactis* is also affected by the carbon catabolite protein (CcpA) which besides its role in catabolite repression also regulates sugar metabolism through activation of the *las* operon (encoding the glycolytic enzymes PFK and PYK, and LDH). Inactivation of the lactococcal *ccpA* gene resulted in a strongly reduced expression level of the *las* operon genes that resulted in a shift from homolactic to mixed acid fermentation \[[@B114]\]. The unique to LAB CcpA-mediated activation of the *las* operon genes has also been observed in *Lactobacillus plantarum* and *Streptococcus thermophilus*\[[@B99]\]. Because of its presence in milk and milk-based industrial media, lactose metabolism has been given considerable attention. In many lactococcal strains, the genes involved in lactose metabolism (*lac* operon) are plasmid encoded and the lactose mini-plasmid pMG820 is the best described so far \[[@B115]\]. The plasmid contains the genes involved in the lactose-PTS transport (*lacEF*), lactose-6P hydrolysis (*lacG*) and the tagatose-6P pathway (*lacABCD*) (Figure [3](#F3){ref-type="fig"}). In 1985, Thompson et al. \[[@B116]\] constructed by classical mutagenesis a double mutant of *L. lactis* that lacked both the glucokinase gene (*glk*) and the mannose-PTS system involved in glucose import. Growth of that strain on lactose involved the conversion of the galactose-6P moiety via the tagatose-6P pathway while the glucose moiety of the disaccharide remained unphosphorylated and secreted. The lack of the mannose-PTS in that strain prevented the subsequent utilization of the secreted glucose. Although the exact mechanism of the engineering is unclear because of the application of random mutagenesis, this early work by Thompson et al. \[[@B116]\] shows how the galactose and glucose metabolism in lactose grown *L. lactis* can be completely separated. ![**Metabolic pathways involved in carbohydrate metabolism in*Lactococcus lactis.***](1475-2859-11-50-3){#F3} Engineering of carbon distribution between glycolysis and sugar nucleotide biosynthesis is of special importance for the production of UDP-glucose and other activated sugars that serve as precursors for exopolysaccharide (EPS) biosynthesis. EPS from LAB have been given considerable attention recently as they contribute to the development of texture in fermented products; they provide health benefits to consumers (prebiotics) and also protect their producer organisms against bacteriophages and various environmental stresses \[[@B99]\]. UDP-glucose, the most important precursor in EPS biosynthesis, is generated from the glycolytic intermediate glucose-6P by a phosphoglucomutase (encoded by the *pgmU* gene). The intermediate product glucose-1P serves as building block for polymers and it is converted to UDP-glucose by a phosphorylase (encoded by the *galU* gene). Metabolic engineering strategies aiming at overproduction of UDP-glucose have focused on overexpression of the pathway involved genes *galU* and *pgmU*\[[@B117],[@B118]\]. However, decreased activity levels of the key glycolytic enzyme PFK resulted in increased UDP-glucose formation in *L. lactis* grown on glucose \[[@B117]\] but not on lactose \[[@B111]\], the latter indicating that the type of carbohydrate might affect the pathway flux. Conclusions =========== As shown in this review, significant improvement in engineering the central carbon metabolism in industrially important bacteria has been obtained during recent years. The examples presented, exemplify the power of metabolic engineering by applying different methods and approaches, e.g. inactivation, overexpression, redox engineering or even in some cases engineering global control. The quantitative assessment of metabolic fluxes through the central carbon metabolism and of the flux distribution at metabolic branch points, provide detailed information not only for single reactions but also for whole pathways of a variety of bacteria. This information is expanding rapidly by the use of genome-based approaches to new areas and the discovery of novel metabolites especially in the case of *Streptomycetes* and lactic acid bacteria. However, there is still lack of knowledge regarding the prediction of responses of these bacteria to various changes and different conditions. The goal remains to have a global overview of the metabolism of producer strains and accordingly to proceed in the construction of robust strains capable of efficiently producing the desired metabolites. In this view, it is expected that developing System Biology approaches that take into account the gathered information on central carbon metabolism regulation and connect it to global regulation along with improved computational approaches, will provide the opportunities to create efficient cell-factories tailor-made for the production of industrially important metabolites. Competing interests =================== The author declares that she has no competing interests.
{ "pile_set_name": "PubMed Central" }
Those calling for higher capital requirements for banks have the right objective of making financial institutions and the system stronger (everybody agrees with that objective). However, their proposals to increase capital don’t receive support from everyone because their approach is not a proven one. In a New York Times article on August 10, 2014, “When She Talk, Banks Shudder,” Prof. Anat Admati of Stanford University was quoted as offering an analogy of what’s wrong with banks today: “My comparison is to speed limits. Basically what we have here is the market has decided nobody else should be driving faster than 70 miles an hour and these are the biggest trucks with the most explosive cargo and they are driving at almost 100 miles an hour.”
{ "pile_set_name": "Pile-CC" }
An Unbiased View of Gold Rolex Presidential An Unbiased View of Gold Rolex Presidential This is often a wonderful example of a scarce Rolex Day Date in rose gold from your 1970's. The watch includes a champagne dial with the times in Portuguese. The watch arrives on an first Presidential band With all the exposed buckle. It really is challenging to locate these watches in rose gold. In addition to this, Rolex has the incredible ability to retain value. This features our prospects a unique opportunity. That is definitely the opportunity to purchase a watch from us, the Rolex Trade, and wear it for a few years preserving it in good problem, after which you can market it again to us for any several hundred bucks below they purchased it. Substantial kilns beneath scorching flames are accustomed to soften and blend the metals that happen to be then become cases and bracelets. Mainly because Rolex controls the production and machining of their gold, they are able to strictly assure not merely good quality, but the most beneficial looking pieces. The Day-Date are available which has a bewildering variety of dials, Primarily from your Seventies and early-Eighties when Rolex authorized retailers to promote watches which were by no means meant to be in the primary catalogue. There were dials in motor-turned clous de Paris, coloured lacquers, jasper, onyx, marble as well as lapis lazuli, all of which led to Rolex counting as clients heads of condition and worldwide celebs. Go get a real human lifestyle and stop staring at your time and energy piece asking yourself the way it can get back your runaway wife who ran to rid herself on the void life with a person who’s too chaotic Discovering items about his magic time piece. An ideal illustration of the requested resource couldn't be uncovered on this server. This mistake was generated by Mod_Security. Inverse watch snobs – we are legion in range – can’t this help but detect that about the Las Vegas Strip, every single corner store in need of Walgreens sells Rolex. To have a Rolex need to require a Lord with the Rings quest, not a maxed out line of credit rating. As the Leading on the internet location for pre-owned Rolex watches, we boast a crew of Rolex trained watchmakers and Rolex experts to be certain a easy approach when purchasing from or promoting to Bob’s Watches. This means you inquire: “..remember to could anyone inform me to make use of or make use of whatever this damn watch can perform.? Mounir – i agree with you absolutely that a $20 Casio will do a great position and hold extra correct time than any mechanical Rolex – everyone knows which the very well to do , would prabably hardly ever dress in a Casio , there isn't a prestige in carrying an affordable watch. Bob's Watches is devoted to providing the most beneficial price to our consumers. We have been so confident that you're going to acquire the most worth in your timepiece that we guarantee it. Contact nowadays to speak with certainly one of our Rolex watch expert by dialing 800-494-3708. As on the list of Country's leading on the internet retailer of pre-owned Rolex watches, we Men's Rolex President get lots of phone calls day after day from people who are planning to "promote a Rolex", "offer my Rolex", "selling a Rolex watch", and even "how you can provide my Rolex watch". Rolex never ever fully abandoned what you may perhaps connect with dress watches plus the Datejust, the Oyster’s successor, appeared at the conclusion of the war, its premise remaining simplicity and quality. The identify emanates from the instant date-adjust system that Rolex launched With all the watch, an exceedingly Wilsdorf contact in that it had been clever and marketable.
{ "pile_set_name": "Pile-CC" }
_BASE_: "../Base-RetinaNet.yaml" MODEL: WEIGHTS: "detectron2://ImageNetPretrained/MSRA/R-50.pkl" RESNETS: DEPTH: 50
{ "pile_set_name": "Github" }
# HOW TO ADD NEW TESTS # # There are three general cases when you need to add new test: # 1) Add new test to existing test case class. It can be done by adding new test_xxx method # to the existing child of unittest.TestCase. # - If test is common for dual and single core modes add it to test iplementation class (e.g. DebuggerTemplateTestsImpl) # - If test should be run only in dual or single core mode add it to the respective specialized test class (e.g. DebuggerBreakpointTests(Dual|Single) # 2) Add new test which requires new test case class. It can be done by adding new test class inherited from DebuggerTestsBase or one of its childs # 3) Add new test which requires new test module. The minimalistic template module is shown here. Create test module file. Use pattern 'test_*.py' for the name of file. # Copy contents of this file to new module and follow items 1-2. import logging import unittest import debug_backend as dbg from debug_backend_tests import * def get_logger(): return logging.getLogger(__name__) ######################################################################## # TESTS IMPLEMENTATION # ######################################################################## class DebuggerTemplateTestsImpl: """ Test cases which are common for dual and single core modes """ def test_something(self): pass ######################################################################## # TESTS DEFINITION WITH SPECIAL TESTS # ######################################################################## class DebuggerTemplateTestsDual(DebuggerGenericTestAppTestsDual, DebuggerTemplateTestsImpl): """ Test cases in dual core mode """ def test_something_special_for_dual_core_mode(self): pass class DebuggerTemplateTestsSingle(DebuggerGenericTestAppTestsSingle, DebuggerTemplateTestsImpl): """ Test cases in single core mode """ # no special tests for single core mode yet pass
{ "pile_set_name": "Github" }
Boron-Functionalized Graphene Oxide-Organic Frameworks for Highly Efficient CO2 Capture. The capture and storage of CO2 have been suggested as an effective strategy to reduce the global emissions of greenhouse gases. Hence, in recent years, many studies have been carried out to develop highly efficient materials for capturing CO2 . Until today, different types of porous materials, such as zeolites, porous carbons, N/B-doped porous carbons or metal-organic frameworks (MOFs), have been studied for CO2 capture. Herein, the CO2 capture performance of new hybrid materials, graphene-organic frameworks (GOFs) is described. The GOFs were synthesized under mild conditions through a solvothermal process using graphene oxide (GO) as a starting material and benzene 1,4-diboronic acid as an organic linker. Interestingly, the obtained GOF shows a high surface area (506 m2 g-1 ) which is around 11 times higher than that of GO (46 m2 g-1 ), indicating that the organic modification on the GO surface is an effective way of preparing a porous structure using GO. Our synthetic approach is quite simple, facile, and fast, compared with many other approaches reported previously. The synthesized GOF exhibits a very large CO2 capacity of 4.95 mmol g-1 at 298 K (1 bar), which is higher those of other porous materials or carbon-based materials, along with an excellent CO2 /N2 selectivity of 48.8.
{ "pile_set_name": "PubMed Abstracts" }
Transcending the impenetrable: how proteins come to terms with membranes. In the living cell, proteins are efficiently sorted to a whole range of subcellular compartments. In many cases, sorting specificity is mediated by short 'sorting signals' attached either permanently or transiently to the protein. At long last, a fairly coherent picture of the design and function of many such sorting signals is beginning to emerge.
{ "pile_set_name": "PubMed Abstracts" }
It should be used to connect to a s6-fdholderd daemon, which will store the file descriptor given by the user. Options -d fd : store descriptor number fd. By default, fd is 0 (i.e. the program's stdin will be stored). s6-fdholder-store replaces its stdin with fd before executing into s6-ipcclient s6-fdholder-storec. -T fdtimeout : the descriptor is stored with an expiration time of fdtimeout milliseconds, which means the s6-fdholderd daemon will close and get rid of the descriptor after that time. By default, fdtimeout is 0, which means infinite - no expiration time. -t timeout : if the operation cannot be processed in timeout milliseconds, then fail with an error message. Communications with the server should be near-instant, so this option is only here to protect users against programming errors (connecting to the wrong socket, for instance). Usage example will open a Unix domain socket, bind it to /tmp/mysocket and listen to incoming connections, then give it to a s6-fdholderd instance listening on /service/fdholderd/s, with no expiration date, with the "MYSOCKET" identifier. Another program will be able to retrieve the socket later, using s6-fdholder-retrieve.
{ "pile_set_name": "Pile-CC" }
Dance (Lollipop F album) DANCE is Taiwanese Mandopop quartet boyband Lollipop F's fifth studio Mandarin album. It was released on 20 October 2011 by Gold Typhoon (Taiwan). This album is the group's second release under the name "Lollipop F". There are four versions were released including Dance - LolliPARTY Version (DANCE - LolliPARTY 版), which includes with an interactive DVD, for Dance - Dancing City Version (DANCE - Dancing City 版), it comes with an air cushion and a pillow case randomly picked from four available designs, and for Dance - Let's Go! Champion Edition (DANCE - 一起衝冠軍盤), it comes with a bonus track - the new Lollipop F friendship anthem "We'll Go Together", plus 5 collectible photo cards randomly picked from a set of 20. The person who choreographed some of the dance moves on this album also worked for megastars like Ayumi Hamasaki, Koda Kumi and SMAP. Track listing References Category:2011 albums Category:Lollipop F albums Category:Gold Typhoon Taiwan albums
{ "pile_set_name": "Wikipedia (en)" }
11 N.Y.3d 715 (2009) MATTER OF BELANCE v. MANHATTAN BEER DISTRIBS. Court of Appeals of the State of New York. Decided January 20, 2009. Motion for leave to appeal denied.
{ "pile_set_name": "FreeLaw" }
Clinical Trials The NeuroTouch Simulation Study ID Number 13-0136 Within the past decade laparoscopic surgical simulation devices have played an increasingly important role in the "hands-on" training of General Surgery residents. These simulation tools have been classically designed to introduce residents to the fundamental techniques of General Surgery. However to date there has not been a simulation device specifically designed to address the unique surgical training requirements of neurosurgery residents. With the recent development of the NeuroTouch Simulation System a dedicated virtual neurosurgery training simulator a window of opportunity has been created to study the device's impact on the performance of neurosurgery residents in the operating room. With the recent acquisition of the NeuroTouch Simulator by our Department of Neurosurgery at Mount Sinai we are officially the first neurosurgery residency program in the United States to utilize this device in the training of its residents. We hypothesize that an individual's learning curve or the change in rate of learning for a given series of tasks as measured on NeuroTouch will predict surgical skill in the operating room. The NeuroTouch simulator offers a spectrum of sample practice tasks including brain tumor resection establishing hemostasis and ultrasonic aspiration. The National Research Council of Canada (NRC) along with a consortium of Canadian teaching hospitals is currently examining which of the aforementioned tasks best predict surgical performance in the operating room. In contrast our project will examine the correlation between learning and performance in the operating room. We hypothesize that an individual's learning curve as measured by serial exposure to a defined set of tasks on the NeuroTouch simulator will be the best predictor of surgical skill and confidence in the operating room. We plan to take a multi-disciplinary approach to the validation and data gathering portions of our study recruiting the help from various different clinical departments at Mount Sinai including Psychiatry and Biostatistics. Research participants will include volunteer medical students at Mount Sinai School of Medicine and residents and faculty in the Department of Neurosurgery at Mount Sinai. Our dedicated research team includes Neurosurgery faculty residents and staff. We anticipate the data collection and analysis portion of this project to take somewhere within the order of 1-2 years with a manuscript to follow.
{ "pile_set_name": "Pile-CC" }