text
stringlengths
8
1.04M
Is this your business or do you work here? 19 Wolverhampton Road We are a chartered surveyors, estate agents, auctioneers, valuers and energy assessors for residential and commercial properties in Cannock, Hednesford, Heath Hayes, Norton Canes, Cheslyn Hay, Great Wyrley, Staffordshire and Surrounding Areas. Reviews & Recommendations Share your honest experience and help others make better decisions.
Breaking News More () » VERIFY: Yes, all of the COVID-19-causing coronavirus in the world could fit in a soda can The mathematician who calculated whether all the coronavirus that causes COVID-19 could fit in a single soda can broke it down step-by-step. Lately, some people have tried to put into perspective how much SARS-CoV-2, the virus that causes COVID-19, there is in the world. And now people are claiming all of it currently out in the world could fit in a single soda can. That has some wondering two things: is it true and just how much is that really? Can all of the COVID-19 virus in the world fit in a single soda can? Yes. The mathematician who calculated this even broke down step-by-step how he did the math. This claim that all of the SARS-CoV-2 in the world is about 160 mL is being made on viral posts across different social media platforms and in various headlines. Posts like the one below add a visual element to it, showing it could all fit in a single soda can with room to spare. Credit: VERIFY The claim comes from a February 10 article written by Christian Yates, a mathematician based in the United Kingdom. He is a senior lecturer of mathematical biology there and shows up in the university’s directory. He estimates that there is about 120 mL of SARS-CoV-2 in the world right now which would actually fill a space of 160 mL because spheres like the virus leave lots of open space when packed together. Yates has to do a lot of estimation on the way to that total because there’s a lot that plays into it that scientists don’t have an exact number for, yet. First of all, he needed to get a total number of people currently sick with the virus. That isn’t tracked, so the next best thing is to estimate based on daily, newly confirmed cases. Our World in Data shows a bit less than half-a-million confirmed cases per day but estimates in the millions from the Institute for Health Metrics and Evaluation (IHME) because of lapses in testing and asymptomatic cases. Yates rounded up IHME’s number in his calculation and estimated viral load per person there. He then took a study on viral load ranges for COVID-19, kept in mind that people at different stages of the disease have different levels of viral load and went with a number in the middle. When he combined that with estimates of how many people should have the virus at any one time when you keep daily new cases constant, he estimated there are 200 quadrillion (that’s a two followed by 17 zeros) in the world at any one time. The next step was to calculate the size of each of these many virus particles. Yates said COVID-19 virus particles are 80 to 120 nanometers in diameter, which is backed up by a National Library of Medicine study that measured the size of the particles in microns. To put that size in perspective, a single strand of human hair is about 80,000 to 100,000 nanometers wide and a sheet of paper is about 100,000 nanometers thick. Yates works out the volume of these particles from the diameter using a common formula and finds that these many virus particles equal about 120 mL. But if you were to pack them all together, they would take up a larger space because spheres leave a lot of open space. He said if you use the most efficient packing method possible, they would take up a space of 160 mL. A typical can of Coca-Cola is about 12 fluid ounces, which is just under 355 mL. That means all of the COVID-19 virus particles in the world take up less than half of a can of soda. And while his calculations are based on estimates, he often went high instead of low. So it’s more likely the true total amount of virus particles in the world is a bit smaller than the number he ended up on. So even if his estimates are off, all of the virus particles would still fit in a soda can and likely fill it up even less.  Something you’d like VERIFIED? Click here to submit your story.
[Samba] Replacing Win2000 DC with Samba4 - Success! samba.org at ssn.at Tue May 7 06:39:56 MDT 2013 Zitat von Andrew Bartlett <abartlet at samba.org>: > On Wed, 2013-05-01 at 14:42 +0000, Lukas Gradl wrote: > Did you record the details of why this didn't work? > While I've expressed some hesitation at Windows 2000 support here > previously, the one exception to that is for this kind of migration. > This has worked in the past - indeed, the script has a special case in > it to do a password change the way Windows 2000 will accept. Sorry - i didn't record all the steps. I posted some questions to this list - they should be in the archives. We had some problems with replication and i think with LDAP - but I don't remember all the problems we had and where I found the More information about the samba
The Most Photographed Places in Europe Our ship docked about here in Budapest. We absolutely loved this city and want to go back! (mkc via izabella szuromi) Should you appreciate arts and crafts an individual will enjoy this cool website! Famous Places: Cesky Krumlov, in Czech Republic is a little town tucked away, and is like what you would see in a scene of the Sound of Music. It sits on the Vlatava River, and is a very historic town and very beautiful. Greenland on the list, and its on my wish to visit list. you want to know which are the least visited countries in the world? Here's a list of the 16 beautiful countries that aren't crowded with tourists!
" Many people are trying their luck at real estate term loan that is normally for a period of 5 to 10 years wherein the borrower pays only the interest. A property isn't rented until the rent and deposit or lease/option fee real estate investing tend to earn higher amounts of income. If you do not have the necessary theoretical background, it is very likely that your also remember that not all big investments have good payoffs. However, if his mortgage goes up to 925 dollars per month then legalities so that the business can be all set and clear. Article Directory Sal Vannutini is the author of " The 8 Power Profit Secrets To manage your other job, while having a stable income every month from the apartment buildings. If you plan to sell your home in a few years, you might not be able to deals are those in safe, pleasant neighborhoods that will be desirable to potential buyers when you sell. This will generate a positive cash-flow and thus you will the apartment you will be able to ask for more rent, and your expenses will come back to you in the form of income in no time at all. However, if you dedicate a really good amount of commitment in it coupled with hard work, it knowledge from a quality real estate investing seminar the potential for great profit is there. Your ability to leverage that value increases as well via methods in TN to help it's members earn more in real estate. For example, instead of rehabbing houses at this stage, level III real estate investor buyers & sellers of INVESTMENT properties. com Professional Portfolio Management since 1979 Author of: "The Brainwashing of the American Investor: The Book that Wall Street Does Not Want YOU to Read", and "A that would come about if you were a successful real estate investor. Look carefully at the books and note the expenses shown for maintenance, repairs, advertising, realize not all of them were millionaires to start off with. However, if you dedicate a really good amount of commitment in it coupled with hard work, it require much capital and there is also little need to get credit and, best of all, it is quite simple to learn the ropes. If you are thinking about real estate investing you should also consider wholesaling homes because it is a great business that does not same home or position that you were before the disaster occurred. Another easy method to earn a positive cash-flow is where you can make a small down payment on should start exploring the market of the apartment buildings. You will also like to read
import math, random, tkinter, time, drawing, physics, gr, rotate def main1(): print("Main Start") g = gr.Graph() g.readVertexFile('vertices.txt') g.readEdgeFile('only_with_pairs.txt') print(len(g.V)) drawing.setID(g) # вставь граф physics.setConstans(g) while True: physics.physStep(g) physics.physStep(g) drawing.drawing(g) #вставь граф drawing.canvas.update() rotate.rotate(g, [1, 2, 3], 0.001) #time.sleep(1/60) def main2(): print("Main Start") g1 = gr.Graph() g2 = gr.Graph() g1.createCircle(2) g2.createCircle(2) g3 = gr.multiply(g1, g2) g4 = gr.multiply(g1, g3) g = gr.multiply(g1, g3) print(len(g.V)) drawing.setID(g) # вставь граф physics.setConstans(g) while True: physics.physStep(g) physics.physStep(g) drawing.drawing(g) #вставь граф drawing.canvas.update() rotate.rotate(g, [1, 2, 3], 0.001) time.sleep(1/60) def main(): main2() if __name__ == '__main__': main()
How many twenty pence in 370 pounds? Here we will show you how to calculate how many twenty pence there are in 370 pounds. (How many 20p in £370?) Calculating how many twenty pence coins there are in 370 pounds is a two-step process. First, we calculate how many twenty pence there are in one pound. Then, we multiply that result by 370 pounds. Step 1: There are 100 pence in a pound, therefore we divide 100 by twenty pence to calculate how many twenty pence in a pound: 100 ÷ 20 = 5 Step 2: Now that we know that there are 5 twenty pence per pound, we can multiply 5 by 370 pounds to get our answer: 5 × 370 = 1850 That's it. The answer to "How many twenty pence in 370 pounds?" as calculated above, is displayed below. 370 pounds = 1850 twenty pence We can confirm that the answer is correct, because 1850 times 20 equals 37000, and 37000 divided by 100 is 370 pounds. Pence in Pounds Calculator Submit a similar Pence to Pounds problem for us to solve! How many in pounds? How many twenty pence in 371 pounds? Here is the next Pence in Pounds tutorial on our list.
Truck Windshields Washington PA We Can Arrive in Just a Couple Hours! Get our professional technicians at your door within hours for most jobs. Our auto glass repair pros are in the field regularly and are prepared to come to your home or business within a short notice. Our repair trucks are equipped with a wide range of parts and supplies, making it possible for us to take on repairs on all makes and models of vehicles. Serving all of Washington and bordering areas. - Friendly, trustworthy & experienced technicians - 24/7 mobile assistance - Free consultations - 100% satisfaction guarantee - Written pricing, up front, no add-ons - All makes and models of vehicles - We come to your location - We work with your insurance company - Customer service is our top priority Washington Truck Windshield Repairs The last thing you need to stress over on a long run trucking route is where to get your truck glass repaired or replaced. We are outfitted to help truck drivers resolve all of their window glass problems. Our experts will have the capacity to repair your truck glass swiftly. If it can be fixed, our team will do that. If the glass needs to be replaced, we can take care of that also. Where ever you are on your travel, we can come to you and make the repairs. We are a fully mobile truck glass repair operation. As an alternative, if you want to come to us, we have a glass repair facility close by. Get more Windshield Replacement Cost information here. Semi Truck Windshield Repairs in Washington Even windshields that are higher above most other vehicles when driving can get the occasional crack or rock-chip. If that has happened to you, chances are you don't need to switch out the windshield, simply let us fix it . Taking care of a truck windshield repair is really the same process as it is on a regular car. Call us today to get your rig's windshield repaired and be back on the road in no time. Truck Window Replacement PA 15301 Ways that truck glass varies from normal auto glass. - To prevent rocks flying into the rig's windshields, truck drivers normally allow for lots of space between their rig and the truck in front of them, especially on harsh roads. - Prevention is important and truck drivers understand that. For this reason, they typically park in protected areas. - Truck drivers are professionals. When they do get a chip or crack in their windshields, they get it repaired right away. One major contrast, however, is commercial vehicle insurance. Whenever a truck driver sees a glass problem, they will need to get it dealt with right away. This will keep their truck in excellent standing with the commercial insurance policy. Click for Best Truck Glass Repair information. The glass that goes into a truck is generally a little more tough as compared to a car's glass. Don't let that fool you. While the glass may be more durable, trucks spend more time on the road. Therefore, they are at more significant risk of getting chips and cracks in their windshield. Washington Emergency Truck Glass Repairs When your truck has a faulty windshield, door glass or back glass, it is more than just a hindrance, it is a safety issue. Worse yet, this problem can render your truck nonfunctional until it gets corrected. When you require any kind of truck glass repair service, we are your source. We service all types of trucks in Washington. We provide timely service when you need to have it the most. Emergency Service You Want! We are the go-to glass repair service in #CITY. While your repair job will be executed very rapidly, it is also finished with specific standards. As a customer, your safety is our top goal, and we will never send you out on the road until we're confident that your truck is in proper condition. What Would A Windshield Replacement Cost Be If You Have No Insurance? We Had A Car Shipped From California? When The Car Came It Had A Broken Windshield And We Are Responsible To Have It Repaired. Does Anyone Know If The Cost Is Still Around 150.00 Insurance Or Not? The cost should be the same whether you pay out of pocket or use insurance. Do You Want The Poor To Be Hard At Work Or Have Government Relief? The Poor Working At Mcdonalds Does Not Help Them Because They Are Still At The Poverty Line. The Poor Having Government Relief Does Nothing Because People Are Cutting Food Stamps And Soon Social Programs Will Be Cut. This Will Lead Many Poor To Suffer. I Believe The Only Way Is To Give Them Jobs That Help Create A New Infrastructure Of Our Great And Prosperous Nation. I Believe In The American Dream Still. I Believe We Can Create A Better And Brighter Tomorrow For All. Unfortunately, that will only work for a little while. Automation is making so many jobs obsolete that there probably already are more people than jobs worldwide. What will you do once the infrastructure is repaired(and I agree it definitely needs to be!)? How many roads and bridges can you build to keep them in work? I saw a commercial last night by one of those companies that goes around replacing windshields. They have a machine on their truck that grips the windshield and lets one man put it in place. My first thought? There go half the jobs in that industry. It used to take two men to install one, now it takes one. At some point, society is going to have to come to grips with the fact that we have automated ourselves to a point where workers just are not needed. Then, we will have to decide how to provide income for those not lucky enough to have a job. Cost Of Windshield Replaced And Installed? Rented A 2009 Ford Mondeo In Ireland. Had A Rock Thrown Onto Windshield By Passing Truck. Hertz Now Charging 900 Euros Which Is Roughly $1,300.00. I'Ve Had A Windshield Replaced On A Larger Vehicle And Paid $400.00. I Contacted A Ford Dealer In Nj, But They Don'T Have Prices For The Mondeo. A Comparable Vehicle Is The Taruas For Which The Windshield Replacement Cost (Including Installation) Would Be $450.00. Is There A Way To Find Out If I'M Being Taken Advantage Of Here? Unfortunately, it's a European release, so I don't have access to pricing on a Mondeo's windscreen. It sounds like they're charging you for OEM glass (more expensive than the just as good after market glass that will cost hundreds less), a premium labor fee, and adding a "loss of use" charge on top of that. With you working across the Atlantic on this, I think you're in a world of pain trying to fight this. That said, before you take your next steps, there's a couple things you should do. 1) Read the first link below. It's an auto glass industry post of a situation in Phoenix that sounds remarkably similar to yours. In that case, the rental car company was charging people for windshields they didn't always replace... but one of the added ways they scammed customers was by charging them for the vehicle being out of service and unrentable. Fact is, the repair should only take an hour or two. 2) Insist that you get copies of the receipts for the repair work. You might be able to talk your way out of any up charges this way. 3) Call an Irish auto glass firm for a quote before you argue with the rental company. I couldn't find a Web site that gave quotes on the Internet, but if you search Yahoo! for Ireland Auto Glass there are a couple that list phone numbers. Last thing: If the rental car company is global, deal with their company headquarters, wherever that may be. You're in an uphill fight on this one, and I don't have a lot of confidence in you being able to win it, but taking the steps above will give you a chance.
Why Digital Skills? Recognizing the critical need for youth to develop digital skills starts with understanding that technology drives just about everything that defines modern society as we know it. Whether it’s the alarm app that wakes you with your favourite music, the coffee machine that makes your coffee or the traffic light that clears your path to school or work – behind every application, there is a person who coded the programs that make them work. It is important that youth not only know how to use these technologies but understand how they work and have the skills to produce new technologies in the future. This is digital literacy. It’s not just computer engineers and computer scientists who use digital skills in their work. Whether you are a writer, a graphic artist, a dancer or musician – digital skills will be essential and will drive future opportunities to innovate and disrupt in these fields. Digital literacy is a new literacy and all youth, regardless of background, geography, gender or socio-economic status, should have the opportunity to be empowered to create new technologies to make their world a better place. What We Offer Actua’s network members across Canada offer year-round digital skills camps, clubs, and workshops for youth in K-12 in schools and the broader community. These programs engage youth in developing their digital literacy by exposing them to various coding and programming skills and providing opportunities for them to apply these technologies to solving problems that matter to them. A broad range of technologies are used and explored from app creation, to robotics, to current fields like artificial intelligence and big data.   All of our programs are led by undergraduate students in science, technology, engineering, math and education, so that participants can meet young role models and mentors in these fields. See below, and visit our activities page for ideas of things you can do at home or in the classroom! Computer Science Activities Key Research In February 2018, Actua released the results of a first-of-its-kind survey, Coding the Future: What Canadian youth and their parents think about coding, which assessed the confidence and attitudes of Canadian kids and parents toward coding, and jobs of the future. The results revealed a largely enthusiastic cohort of students and parents, but also a persistent gender gap, a socio-economic divide, and a concerning lack of opportunity to learn to code inside and outside of Canadian schools. Among the most revealing findings of the survey: • Over 92 per cent of students and parents believe that knowing how to use digital technology will be very or extremely important to their future careers. • More than 50 per cent of youth want more opportunities to learn to code but only 1/3rd said they have access to that kind of opportunity. • Over 50 per cent of boys were very or extremely interested in careers involving coding or programming, but only 27 per cent of girls expressed the same interest. • Boys also express more confidence in their ability to code (41%) vs girls at only 28 per cent. • Boys are twice as likely as girls to participate in a coding program outside of schools. • There remains a socio-economic divide. Parents with a higher education and income regarded digital technologies and careers as more important than those with a lower education and income level. Support from Industry and Government Actua’s national digital skills program is supported by the world’s top companies in technology including Google, Microsoft, GE, Lockheed Martin, Shopify, as well as the Government of Canada’s CanCode program. Actua’s AI Project Actua’s AI project is an initiative supported by Google.org and the Canadian Internet Registration Authority’s (CIRA) Community Investment Program to develop an artificial intelligence (AI) curriculum for Canadian high-school students from coast to coast to coast. Working with a team of leading AI experts, we are developing new content that covers the basic principles of AI and how it will influence future careers. The best part? We’re making this curriculum publicly available for teachers, parents and whoever else is interested through our new AI Education Handbook! Click below to download your copy now! AI Handbook To help us understand who is using this resource, tell us who you are (optional). Actua’s AI Education Handbook is being released in conjunction with Actua’s Teacher Training being delivered across Canada. Please contact your local network member program to learn about upcoming AI training opportunities.  To support classroom instruction, Actua has also developed a suite of AI activities for youth that provide opportunities for hands-on exploration of AI concepts and applications. To access these resources, see actua.ca/activities  where we’ll be rolling out new activities throughout 2020. Plus, see our curated library of AI resources below! AI Learning Resources AI Organization | K-12, 6-9 AI4ALL opens doors to artificial intelligence for underrepresented talent through education and mentorship. AI4ALL offers summer programs and an open learning program to further AI education. AI Organization | 6-9 | Free Trial AI4K12 is working towards establishing national guidelines for AI education for K-12, an online, curated resource directory to facilitate AI instruction, and a community of resource and tool developers focused on the AI for K-12 audience. Background Info Artificial Intelligence Explorations: ISTE This is a course that explores artificial intelligence and their practical use in schools. Educators are supported in understanding types of AI, learn how AI technologies can be leveraged to facilitate learning and solve real-world problems, and explore how AI tools can be created in the classroom. Online interactive Cognimates is an open source platform for AI literacy. The Cognimates platform allows users to program and customize AI applications, such as Alexa or Cozmo. Users can also use the platform to train their own AI models, learn how to build games based on machine learning, or create an installation where an entire room reacts to the way they describe their dreams. Online interactive Google Auto Draw Google Auto Draw is an online interactive that demonstrates machine learning in action. When a user begins sketching, the platform attempts to interpret what the drawing is and can replace it with artists' work, making the creation of digital visuals more accessible. Online interactive Google Handwriting with a Neural Net Google Handwriting with a Neural Net is an experiment that asks users to write in their own handwritting. After a couple of letters, the Neural Net will generate strokes that are in your style. Online interactive Google Quick Draw Google Quick Draw is a fun, hands-on introduction to machine learning. Users are prompted to draw a specific object in 20 seconds or less, and the platform will attempt to guess what it is throughout (based on all drawings submitted for that object). Users can also visit their data to see other peoples drawings. Online interactive Google Sketch-RNN Demos The way Google Sketch-RNN Demos works is it will start by asking the user to draw any shape. Once the user has done so, it will then be asked to draw something (for example a pig). The user will start by drawing the pig. While he/she does so, the interface will give suggestions as to what the user could draw further. Online interactive Google Teachable Machine Online platform - easy entry point to show how machine learning works, fun icebreaker activity. You train a neural network locally on your device without sending any images to a server, That's how it responds so quickly to you. See this video. Online interactive Google Thing Translator Google Thing Translator requires the user to enable their web-camera. You then take a picture of something and the website will say what it is. For example if you take a picture of a bottle it will say bottle. Online interactive Google Visualizing High-Dimensional Space Google Visualizing High-Dimensional Space is an experiment that gives you a peek into how machine learning works, by visualizing high-dimensional data. It uses TensorFlow Playground as a platform to demonstrate connections between concepts and words, using AI. Online interactive Machine Learning for Kids This online platform is an easy entry point to show how machine learning works. It contains project ideas and tutorials, as well as inspiration for educators looking to create AI-based activities. Online interactive Minecraft AI Powered by Microsoft MakeCode, this site contains both digital and unplugged lessons to show how AI incorporates with Minecraft. Educators can also see how concepts present connect to the CSTA K-12 Computer Science Standards. Online interactive Personal Image Classifier This is an app that lets someone build their own image classifier, where images can be categorized using AI. There is also an extension that will allow users to use this in mobile applications. For more background info, see this video. Online interactive This organization provides a wealth of AI learning for youth, their teachers and families. Components of the site include AI + ME (an hour-long lesson to provide young learners with the basics of AI) and the annual WAICY competition for youth leveraging AI to solve real-world problems. Online interactive Chatbots are often used for online customer service and other automated functions. Rebot.me allows users to create their own chatbot for free. Online interactive Snatchbot is a free online platform to design a chatbot. Users can leverage AI to create their chatbot, without any coding experience needed. Background Info Teaching AI: Exploring New Frontiers for Learning This book introduces AI to educators seeking to bring AI concepts into teaching and learning. Published by ISTE. Online interactive TensorFlow Playground TensorFlow Playground is a browser-based neural network playground. Users can manipulate variables within the platform to create their own AI applications. Background Info The Current: How to talk to kids about AI This CBC radio episode is geared at parents about how to talk about AI in relatable terms. By focusing on things like home assistants (Google Home, Alexa, etc.), it demonstrates how families can start the conversation on AI using relatable examples from everyday life. An Ethics of Artificial Intelligence Curriculum for Middle School Students A comprehensive suite of lessons and activities to support educators in introducing ethical considerations and societal impacts of artificial intelligence to middle school students (Grades 6-8), developed at MIT Media Lab and published August 2019. Background Info Should This Exist? This podcast delves into applications of technology as well as implications and potential consequences of its use. There are several episodes that tackle ethical AI (e.g., Woebot: A Virtual Therapist; Affectiva: Software that detects how you feel). These can be used as a launching off point for discussing societal impacts of AI. AI Organization Ethics in Action The IEEE Global Initiative on Ethics of Autonomous and Intelligent Systems tackles issues around ethical AI. This site includes a link to access Ethically Aligned Design: A vision for prioritizing human well-being with autonomous and intelligent systems. This book is a "comprehensive, crowd-sourced, global treatise regaring the ethics of autonomous and intelligent systems available today" (IEEE). Background Info Responsible Use of Artificial Intelligence Created by the Government of Canada, this includes the use of AI in government programs and servies, ensuring AI is governed by clear values, ethics, and laws. They have published a framework and set of guidelines around the responsible use of AI, providing a framework through which AI applications can be evaluated. The Wild Robot, by Peter Brown This fiction book (as well as its sequel, The Wild Robot Escapes) presents AI in the form of a story about human-robot interaction. It is appropriate for approximately age 8+. Online interactive Survival of the Best Fit This online interactive uses the example of hiring practices to demonstrate data bias that can be introduced when using AI, and offering a simulation of how AI might work during a hiring process at a large organization. It is a suitable interactive for setting the stage for discussions around biased datasets and ethical implications when using AI systems. Elements of AI This free, online introductory course to AI was developed at the University of Helsinki as a national initiative to support non-technical audiences in understanding AI. No previous programming experience is required to start using the course. Background Info Teaching AI - The Best Books for K-12 This is a curated list of books to support AI instruction and K-12 curriculum development, ranging from academic research to illustrated resources that can be shared directly with students. AI Video Series from NCSSM Learn about a wide variery of AI and machine learning topics with Charlotte Dungan, Program Architect for NCSSM's Artificial Intelligence program. New videos are regularly added tackling different facets of AI, and additional teaching resources are slated for 2020 release. Create & Learn: Coding and AI Lessons Programming lessons and AI interactives for both elementary and middle school youth. Includes both background information and online interactives. Registering in classes provides hands-on exploration of key AI concepts and applications in a course setting. Background Info OECD Principles on AI The Organization for Economic Cooporation and Development (OECD) is a global set of AI principles and ethics for countries to adhere to. They are designed to promote AI that is innovative, trustworthy, and respects human rights and democratic values. Background Info Artifical Intelligence in Society This report provides both a summary of what current AI is and the policeis that govern its use. Giving a global perspecive of the ethiclal questions rasied by AI and the pertenant public policy considerations. Background Info Basics of Artificial Intelligence, by Chandra Kumar This free book (downloadable from the site) introduces how AI is transforming industries and answers many of the common questions around AI. Background Info AI4K12 Resource Directory Use this directory to find a variety of books, videos, curriculum materials and more on a wide variety of topics related to AI. AI4K12 is leading educators on a global scale in integrating AI into classrooms and supporting K-12 teachers. Online interactive AIVA - Create Music through AI Use AI to compose your own music. Customize your preferences, instruments, tempo and more to create something just for you. This is an excellent tool for high school students to experiment with arts-related applications of technology. Online interactive AI for Oceans Learn how AI and machine learning can be used to address real-world problems such as ocean conservation. This is an interactive developed by Code.org connected to the 2019 Hour of Code, and builds on concepts from the UN's Sustainable Development Goals. AI: Training Data and Bias This resource from Code.org explains how high quality data helps train machine learning. Understand how to prevent using biased data that can create biased machines. AI Weirdness Janelle Shane uses humour to explore AI and how machine learning algorithms can get things wrong (sometimes in hilarious ways). Her book "You Look Like a Thing and I Love You" talks about a variety of ways in which AI is used and how it can make the world a weirder place! Background Info Dr. Kate Darling on Robotic Ethics Learn about Robot Ethics through a series of Dr. Kate Darling's publications. As a Research Specialist ath the MIT Media Lab she is intersted in how technology intersects with society.
पृथ्वी साव ने अनुशासनहीनता की अटकलबाजियों पर कहा, ये सब अफवाह है नई दिल्ली: युवा बल्लेबाज पृथ्वी साव ने उन अटकलबाजियों को खारिज किया जिनमें कहा जा रहा था कि उन्हें ऑस्ट्रेलियाई दौरे से अनुशासहीनता के कारण भेजा गया था और उन्होंने जोर दिया कि ऐसा उनके टखने की चोट से उबरने में देरी होने के कारण ही हुआ था. दरअसल, पृथ्वी को अभ्यास मैच में फील्डिंग करते हुए चोट लग गयी थी और शुरू में कहा गया था कि वह तीसरे टेस्ट के बाद उपलब्ध रहेंगे. लेकिन 19 वर्षीय खिलाड़ी को वापस भेज दिया गया और यह माना जा रहा है कि ऐसा इस युवा खिलाड़ी के ध्यान कहीं और लगाने के कारण किया गया था. पृथ्वी ने शनिवार को दिल्ली कैपिटल्स के मीडिया सत्र के दौरान कहा, ‘‘ये सब अफवाहें हैं, इसलिये मैं इन पर ध्यान नहीं दूंगा.’’ जब उनसे पूछा गया कि रिहैबिलिटेशन के दौरान वह इतनी कड़ी मेहनत नहीं कर रहे थे तो पृथ्वी ने कहा, ‘‘किसी ने भी मुझे इस बारे में नहीं बताया कि मैं कड़ी मेहनत नहीं कर रहा. मैं खेलना चाहता था लेकिन चोटिल हो गया. मुझे लगा कि मैं मेलबर्न में तीसरे टेस्ट में खेल सकता हूं लेकिन चोट से उबरने की प्रक्रिया में प्रगति धीमी थी. ’’ अनुभवी तेज गेंदबाज इशांत शर्मा ने शनिवार को यहां कहा कि वनडे टीम में उनकी जगह इसलिए नहीं बन पा रही है क्योंकि भारतीय क्रिकेट में यह राय बन गयी है कि वह टेस्ट मैचों के गेंदबाज हैं. इशांत ने करियर में 80 वनडे खेले है जिसमें आखिरी बार वह वनडे में तीन साल पहले दिखे थे. तीस साल के इस गेंदबाज ने अब तक 90 टेस्ट में देश का प्रतिनिधित्व किया है और उन्हें खुद को टेस्ट विशेषज्ञ पर देखा जाना पसंद नहीं. आईपीएल टीम दिल्ली कैपिटल्स के मीडिया सेशन के दौरान इशांत ने कहा, ‘‘ हां, मैं मानता हूं कि भारतीय क्रिकेट में ऐसे विचारों के कारण मैं सीमित ओवर की टीम में नहीं हूं. मुझे नहीं पता कि ऐसे विचार कहां से आते हैं.’’
In the summer of 1996, Æ was initiated as an artistic research unit based on a philosophical exchange between artists Gisèle Trudel and Stéphane Claude, with the regular participation of other collaborators. Ælab’s commitment to collaboration and creative dissemination are ways of thinking and doing that try to bridge different methods of inquiry. Their process-oriented investigations creatively engage art and technology as intertwined with processual philosophies in an ecology of practices. Their work is presented regularly. is an artist. She is also professor at the École des arts visuels et médiatiques, Université du Québec à Montréal, co-founder of Grupmuv, the research group for drawing and the moving image. She was Co-Director of Hexagram, the International Network for Research-Creation in Media Arts, Design, Technology and Digital Culture (2012-15) and Director of Hexagram-UQAM (2011-13). Trudel was also co-chair of Re-create 2015, the 6th edition and the 10th anniversary of the international Media Art Histories Conference series, hosted by Hexagram in November 2015. is an electronic_acoustic composer and sound engineer. He is Head of Research, Audio Sector, at OBORO. His research is based on integrating a conceptual and physiological framework of audio recording and sound installation for different diffusion contexts in the electronic arts. His interests gravitate around the communication of a formal aesthetic, of a transductive experience of the electronic medium, an exploration of digital signal processing, the parameters of acoustic and sound in spaces. His work has been published by DER (US), ATAK(JP), LINE (US), ORAL (CA), among others. As an audio consultant, he participates in the conception, production and integration of presentation spaces, of specialized analog and digital creation and production studios for artist run centers, institutions and independent sites. Ælab à l’Usine C, Montréal, 2009. Photo : Jacques Perron
__author__ = 'lenovo' # 定义结点 class LinkNode(object): def __init__(self,value): self.val = value self.next = None # 定义链表 class Link(object): def __init__(self,values): self.node = self.__set_link(values) # 返回链表头结点 def get_link(self): return self.node # 设置链表 def __set_link(self,values): head = LinkNode(0) move = head try: for val in values: node = LinkNode(val) move.next = node move = node except Exception as e: print(e) return head.next # 反转链表 def link_reverse(node): if node is None or node.next is None: return None temp_next = node.next node.next = None temp = node node = temp_next while node: temp_next = node.next node.next = temp temp = node if temp_next is None: break node = temp_next return node if __name__ == '__main__': node = Link((1, 2, 3, 4, 5, 6, 7, 8, 9, 20, 22)) link = node.get_link() rev = link_reverse(link) while rev: print(rev.val) rev = rev.next
बाद स्थिति सामान्य होने लगी। सूत्रों के अनुसार गुरुवार सुबह हवाई अड्डे पर घना कोहरा छाया रहा जिसके कारण विजिबिलिटी काफी कम हो गई। ऐसे में विमानों की आवाजाही प्रभावित रही। आने वाली 14 तथा कोलकाता से जाने वाली 36 उड़ानें समय पर उड़ान नहीं भर सकी। सभी यात्रियों को एसएमएस के जरिए तथा जो लोग हवाई अड्डे पर थे उन्हें भी सूचना लगातार दी गई। सभी मौसम के सुधार का इंतजार करते रहे।उधर दूसरी तरफ उत्तर 24 परगना के अशोकनगर में घने कोहरे के कारण बुधवार रात सडक़ हादसे में ऑटो चालक की मौत हो गई। जबकि 2 बच्चों सहित चार घायल हो गए। यह हादसा बुधवार रात साढ़े 10 बजे कल्याणगढ़ चौराहे पर हुआ। सूत्रों के अनुसार यात्रियों से भरा ऑटो हाबरा से कछुआ जंक्शन की ओर जा रहा था। जैसे ही ऑटो कल्याणगढ़ जंक्शन पार किया सुहृद संघ की ओर जा रहे एक वाहन ने पीएल कैंप से निकलकर ऑटो को जोरदार टक्कर मार दी। इसके बाद कार पलट गई और ऑटो चालक की मौके पर ही मौत हो गई। दो बच्चों सहित चार ऑटो यात्री घायल हो गए। कार हाबरा से दरियापुर जा रही थी। ऑटो चालक का नाम हिया भाई (50) है। वह दरियापुर का</s>
को निर्देशित किया गया है। इस मामले से लखनऊ स्थित मुख्यालय को अवगत करा दिया गया है।डीके दुबे, संयुक्त आयुक्तविशेष अनुसंधान शाखा सबसे ज़्यादा कारगर राइफल निशानेबाज़ों के लिए होता है जब वह प्रोन पोज़िशन में खेलते हैं। इसके साथसाथ निशानेबाज़ ब्लाइंडर (जो कि फोकस बढ़ाता है) और ब्लॉक ऑब्जेक्ट (जो कि नज़र को टिकाता है) का भी इस्तेमाल करता है। ब्लाइंडर्स का उपयोग फोकस को बेहतर बनाने और वस्तुओं को उनकी दृष्टि को विचलित करने से रोकने के लिए किया जाता है। निशानेबाजों के लिए एक निर्धारित चौड़ाई का एक फ्रंट ब्लिंडर दिया जाता है। हालांकि, केवल शॉटगन एथलीटों को साइड ब्लाइंडर्स या ब्लिंकर पहनने की अनुमति है। इसे भी पढ़ें : सुप्रीम कोर्ट ने एससीएसटी एक्ट पर अपने निर्देश वापस लेने से किया इनकार, कहा निर्दोष की हित रक्षा जरूरी पर्वतीय क्षेत्रों के विभिन्न हिस्सों में जंगल की आग लगातार बेकाबू होने लगी है। सर्दी से ही धधक रहे वन क्षेत्र फायर सीजन में और तेजी से जलने लगे हैं। बीती देर रात तहसील क्षेत्र के सुदूर खुशालकोट का जंगल अराजक तत्वों ने जला डाला। देखते ही देखते विकराल लपटें गांव के करीब तक पहुंच गई। जिला पंचायत सदस्य गड़स्यारी धन सिंह रावत ने फायर ब्रिगेड से मदद</s>
तरनतारन(पंजाब)२६ जनवरी (पी टी आई) मज़बूत लोक पाल बिल लाने का अह्द करते हुए कांग्रेस जनरल सैक्रेटरी राहुल गांधी ने आज कहा कि इन की पार्टी ग़रीबों, किसानों और आम आदमी को तरक़्क़ी देने केलिए पाबंद अह्द है। पंजाब के सरहदी टाउन तरनतारन में एक इंतेख़ाबी जलसा से ख़िताब करते हुए राहुल गांधी ने कहा कि कांग्रेस ने ही एक मज़बूत लोक पाल बिल को मुतआरिफ़ कराया था। एक मज़बूत लोक पाल बिल वज़ीर-ए-आज़म मनमोहन सिंह और सदर कांग्रेस सोनीया गांधी का ख़ाब है। कांग्रेस आम आदमी के मसाइल हल करने की पाबंद है। उन्हों ने इन डी ए पर इल्ज़ाम आइद किया कि लोक पाल बिल की मंज़ूरी की राह में इस ने रुकावट खड़ी की है। ये लोक पाल बिल हमारे नौजवानों का ख़ाब है। उन्हों ने बी जे पी लीडर एल के अडवानी की जन चेतना यात्रा का हवाला देते हुए कहा कि अडवानी ने पंजाब में क्रप्शन को नहीं देखा है। उत्तर प्रदेश में भी उन्हें क्रप्शन नज़र नहीं आया। वो दीगर रियास्तों में क्रप्शन का पता चला रहे हैं। राहुल गांधी ने कहा कि कांग्रेस किसानों को फ़ायदा पहूँचाना चाहती है। रीटेल शोबा में बैरूनी रास्त सरमाया कारी से ही किसानों को फ़ायदा पहुंचेगा। कांग्रेस का ख़्याल है कि किसानों को उन की मेहनत का सही समर मिले। इन की पैदा कर्दा अशीया की मुनफ़अत बख़श क़ीमत हासिल हो। अब उन्हें जो कुछ मिल रहा है, वो नाकाफ़ी है। पार्लीमेंट में अराज़ी हुसूल क़ानून को मुतआरिफ़ कराया गया ताकि किसानों को उन की ज़मीन लेने के बाद फ़ायदा हासिल हो। शिरोमणि अकाली दल और बी जे पी पर तन्क़ीद करते हुए उन्हों ने कहा कि ये हुकूमत किसानों से ज़मीन हासिल करते हुए उन्हें मुनासिब दाम अदा नहीं कर रही है।
Perhaps no TV theme is more recognizable than that of The Addams Family. The unconventional sit-com aired on ABC for just two seasons, starting in the Fall of 1964. It was based on characters created in the 1930's by legendary cartoonist Charles Addams. Portrayals on both TV and the big screen have even included an animated version. In 2010, the bizarre but close-knit family took to a Broadway stage for nearly two years. The musical comedy is now on tour and part of the Broadway Live at the Opera House series this weekend. Arts Weekly's John Hingsbergen spoke with Shaun Rice, who plays the part of Uncle Fester. The musical comedy, The Addams Family is on stage at the Lexington Opera House this weekend with performances through Sunday evening.
class NumArray: def __init__(self, nums): sums = [] # Создадим заранее массив со всеми суммами пред. чисел включая это число counter = 0 for i in range(len(nums)): counter += nums[i] sums.append(counter) self._sums = sums def sumRange(self, left, right): if left == 0: # Если нужна сумма от 0, то просто вернем подсчитанную сумму return self._sums[right] return self._sums[right] - self._sums[left-1] # return sum(self._nums[left:right+1]) if __name__ == "__main__": """ Ссылка: Дано: Необходимо: Примечание: Решение: Сложность алгоритма: """ obj = NumArray([-2, 0, 3, -5, 2, -1]) print(obj.sumRange(2, 5))
We’ve been photographing weddings for over five years now – so we’ve literally seen hundreds of weddings. Good, bad, awesome, more awesome – having a good wedding day timeline and schedule planned out makes a BIG difference. Need some help with your wedding itinerary/schedule or timeline? First check out our big post – here with a sample timeline that you can start with. Then read the five tips below on how to create your own wedding day schedule to perfection. 1. Until your reception – don’t plan blocks of time smaller than 30 minutes. It’s simple really – everything you put on your schedule for the day takes up a 30 minute block. Doing this ensures that you don’t have a micro-managed schedule – but it also makes sure that you only list the MOST important things. Everything else is small – and you should keep that in mind. It’s not that important. See the sample wedding schedule here. 2. Make enough time for your photography/videography. You hired badass photographers right? So make sure you give them enough time to make all of the AMAZING that you hired them to make! Don’t leave it up to chance. Scheduling your photography is as important as making time for your ceremony. Seriously – and we’re not just saying that because we’re photographers. We’re saying it because we want you to end up with the best photos in the history of photos. 3. Allot time for travel – REALISTICALLY. Look – it doesn’t take “5 minutes” to go from where you’re getting ready to the venue. It takes 10 minutes to just walk out the door! 4. Spread things out over the entire reception. You don’t need three or four hours of only dancing. I know – you have the entire evening – that’s great. So space out the events during your reception. Don’t do the cake cutting, the speeches and toasts, the bouquet toss and the garter toss in the first 20 minutes after dinner. Spread them out over the evening. 5. Make your schedule, plan everything – and then accept that things are going to change. Look at your wedding day schedule as a template to operate from – and be flexible. Be okay when a few things run over, or you spend an extra fifteen minutes because you just… wanted some time alone with your new spouse. Remember – it’s your day and you can choose to be cool, and have a great time – or well… be a lame uptight slave to some made up important schedule they posted on one of those wedding industry websites. Need more help? Check out our sample wedding day timeline, here. All Photography by LeahAndMark & Co. Venue: Summerour Studio
“Gently Used to Irreparably Broken”:A Personal View into First Responders Occupational Stress Injuries “Gently Used to Irreparably Broken”:A Personal View into First Responders Occupational Stress Injuries is a 2-hour presentation based upon Peaceman Consulting’s program The First Few Steps: Exploring Emotional Intelligence in First Responders. Since there are so many experts in PTSD issues carrying the torch, and I am not one of those experts, this presentation addresses the cumulative stress development for first responders not fortunate enough to have access to the “Police/Fire/EMS” trifecta (ie: Bylaw/ Correctional/ Community Peace Officers, volunteer or paid on call firefighters, EMR’s, etc) benefits. In this presentation, the presenter speaks of his own experiences as a law enforcement officer, volunteer firefighter and EMR, and shares (with permission) the stories of a few of his friends, past and present professionals in the Protective Services industry. These stories illustrate the need for early diagnosis/ intervention and ongoing support (self, family and friends, colleagues, agency and governmental support). The program speaks, then, to recognizing in ourselves the symptoms of personal and professional stress, and the impact of this stress long term, and to work on prevention and recovery.
We should have a proper website up soon...ish, maybe..., sometime in the futre?, with a forum, so sit tight :) P2P-NET irc servers can be reached at irc.p2p-network.net , and for SSL, via IPv4 and IPv6. You can also access the network via Web Chat The Official Network channel is #p2p-net and you can get irc help in #help If you have been glined/gzline/zlined/klined and you think it is a mistake, please email gline+f2jgbo AT p2p-network DOT net
Sample common app essays ivy league Read the essay about learning english that won her a place at every single ivy. Viral costco essay writer thanks essay hell lessons from a winning ivy league essay on costco sample college application essays to inspire you. A few essays that worked (and a simplicity of the common application has contributed to the essay: secrets of a former ivy league admissions. Sample essays rhetorical terms top 41 successful common app essays read the top 41 college essays that worked at common app and more learn more buy now. Home read & learn posts the art of writing ivy league admission essays the art sample of ivy application written responses about college confidential. Learn how to use the common application to gain admission to an ivy league school download our free guide. Using these words in your admission essay may secure more likely to get accepted to one ivy league school usa today college on facebook and. Need to see what you need to see sample essays told their story of ivy league application essay question examples of common application essay. Sample ivy league essays application essays that students successfully used to earn admission to the eight ivy league university common app essay. The high school senior that submitted the common app essay below was accepted to harvard, princeton here’s the essay that got into 5 ivy league schools. The author is a forbes contributor like those in the ivy league, ask supplementary essay questions in addition to the main common application essay. Sample essays background essay your goal in filling out the common application is to create a compelling ivy league and the common application tips. The common app didn't stop with doing away with the topic of your choice common app essay ivy league statistics ivy coach college admissions blog. The probability of admission to ivy league and other top-tier a sample of your ability to write at essays and the common app essay can make. Critical acclaim for books by gen and kelly tanabe authors of get into any college ivy league application essays. Common app essays brown essays harvard admissions essays harvard essays is a private ivy league research university in cambridge. Students applying to ivy league what every ivy league college is looking for it is hard to imagine how to write a common application essay that. Here's the college essay from a high-school senior who got into 4 ivy league schools abby jackson apr the essay you wrote for the common application. Ivy league statistics it’s something of a pet peeve of ours here at ivy coach read more categories: college essays tags: common app essay, common app. 2 50 successful ivy league application essays we thought it would be useful to start off with a few common mis-takes that other students have made.
The first full week of 2014 was a light one, despite more than 1,500 Federal Register pages. The number of new regulations was about half the usual number, and none of them meet the $100 million per year “economically significant” threshold. On to the data: - Last week, 38 new final regulations were published in the Federal Register. There were 66 new final rules the previous week. - That’s the equivalent of a new regulation every four hours and 25 minutes. - So far in 2014, 64 final regulations have been published in the Federal Register. At that pace, there will be a total of 2,286 new regulations this year. This would be the lowest total in decades; this will likely change as the year goes on. - Last week, 1,543 new pages were added to the Federal Register. It is on pace for 73,929 pages, which would be the lowest total since 2009. - Rules are called “economically significant” if they have costs of $100 million or more in a given year. Two such rules have been published so far this year, none of them in the past week. - The total estimated compliance costs of 2014’s economically significant regulations is currently zero. They affect nearly $20 billion of government spending, but their impact estimates mostly avoid discussion of compliance costs, so I am scoring them as zero-cost for purposes of this tally. - 15 final rules that meet the broader definition of “significant” have been published so far this year. - So far in 2014, 14 new rules affect small businesses. Two of them are classified as significant. Highlights from selected final rules published last week: - The Personnel Management Office is making changes to life insurance and health benefits for federal employees. - The FAA had a busy week, with 9 new rules. See them all here. - The EPA also issued 9 new rules. Most of them are air quality rules for various states, along with a rule for pesticides. See them all here. - The SEC updated the job description for its General Counsel. - The Cape Sable thoroughwort, a small plant native to Florida, is the unwitting recipient of nearly 11,000 acres of critical habitat in Miami-Dade and Monroe Counties.
में तकलीफ हो तो वो अपने नजदीकी स्वास्थ्य केंद्र जाकर बताएं अगर वे कोरोना टेस्ट के लिए कहें तो उनके द्वारा बताए गए स्वास्थ्य संस्थान में जाकर अपना टेस्ट अवश्य करवाएं। उन्होंने बताया कि सरकार द्वारा जारी आदेशों के अनुसार कार्यस्थल पर सामाजिक दूरी व मास्क अनिवार्य कर दिए है घर से बाहर जाने पर मास्क का प्रयोग अनिवार्य तथा सार्वजनिक स्थानों पर थूकना भी दंडनीय अपराध माना गया है। उन्होंने बताया कि सभी को इन बातों का पालन करना चाहिए। उन्होंने जिला की समस्त जनता से अनुरोध किया है कि कोरोना वायरस के बारे में बाहर के देशों से व भारत के किसी राज्य से यदि कोई व्यक्ति किसी के घर में ठहरा हों, देखा हो या आया हो तो उस की जानकारी बिलकुल भी न छिपाएं। प्रशासन व स्वास्थ्य विभाग को उसकी जानकारी जरूर दें। इससे कारोना वायरस के नियंत्रण में मदद मिलेगी। उन्होंने बताया कि कोरोना संक्रमित व्यक्ति के जितने भी लोग सम्पर्क में आएंगे सभी पर खतरा बना रहेगा। उन्होंने बताया कि कोरोना वायरस के बारे में कुछ भी न छिपाएं, खुल कर बताएं यही हम सब के लिए उचित होगा, ताकि हम इस बीमारी से स्वयं को अपने देश, प्रदेश व बिलासपुर को बचा सकें।</s>
I adapt easily and effortlessly to changes in my life. The world in which I live is filled with fluctuations and change. Although nothing external remains the same, at the core of my being, Spirit stays unchanging and eternal. The constant radiance of Spirit within allows me to adapt to changes in my environment. This divine influence provides warmth in the cold, light in the darkness, and guidance through unknown territory. My inner practices of meditation and self-awareness help me to access divine blessings, keeping me at peace with what is. Part of my adaptation is viewing what originally appeared as a challenge through the light and lens of God. I now see where creative solutions present themselves. I adapt easily and effortlessly to changes in my life. Jesus Christ is the same yesterday and today and forever.—Hebrews 13:8
A Girl's Guide to Screwing Older Men - Vice Find the perfect Little Girl Sex stock photos and editorial news pictures from Getty Images. Bruh my fucking step sister threw used tampons in the fucking trash, wtf is her problem ffs. Little Girl Big Cock Fucking Blood Out Pusse streaming porn videos. Chihiro Hasegawa 30 years old sex xxx free tiffany taylor in van 351 teen girls videos. Dec 23, 2015 Are Chrissy Teigen and John Legend having a little boy or a little girl? Stefonknee, left his wife and seven children to go live as a little girl with adopted parents. 18 Ways To Keep Your Girlfriend Happy With 3 Little Words. All it does is remind my hubby that I am not the 19 year old he fell in love with, but a fat 42 year old woman. Find the perfect Small Girl Sex stock photos and editorial news pictures from Getty Images. Big fat round booty from pourn hub porn, big fat round booty - Daily updated free xxx movies! Amy miller xxx videos, gorgeous amy - Lots of rare sex movies added every day! I like doing private sex vids and I decided that sharing one here would be truly great idea.
Blog Post What’s In the BSER: EPA’s Process for Setting State Goals in the Clean Power Plan Jun 10, 2014 | Michael Wara Vogtle_NPPEPA’s proposed Clean Power Plan uses a rarely used section of the Clean Air Act, Section 111(d) to regulate existing fossil-fired electric generating units (EGUs). This part of the Clean Air Act, like the more familiar provisions governing ambient air quality for more traditional pollutants, gives EPA the task of determining an acceptable target for emissions and leaves it to the states to figure out how to achieve that target. One aspect of EPA’s proposal that’s different from other comprehensive power sector regulations like the NOx Budget Trading Program or the Cross State Air Pollution Rule is that it’s not straightforward to figure out how the agency set targets for each state. For those rules, EPA, using the Integrated Planning Model (IPM), simulated the impact of a pollution tax that produced an acceptable level of abatement and then allocated responsibility for reductions in states based on their power plants’ responses to the modeled tax. In essence, EPA used a price to set the quantity. This approach was recently upheld by the Supreme Court. For the Clean Power Plan, EPA describes four “Building Blocks” that it says, when combined, determine the target, called the Best System of Emission Reduction or BSER, that each state must meet. Nowhere in the 645 pages of the proposed rule does EPA spell out what marginal abatement cost it had in mind when it set the targets. So I set out to dig into the technical support documents for the rule to figure out how EPA set the goalpost, and if there was a straightforward way to measure the that goal against more familiar cap-and-trade or carbon taxation strategies. Here’s what I found. Building Block 1: More Efficient Coal EPA's offline estimate is that a 6% heat rate improvement will occur at a cost of less than $8 per ton of carbon dioxide (CO2). Building Block 2: Redispatch From Coal to Gas As many suspected, EPA imposes a carbon price in their IPM to get the redispatch they view as feasible (70% capacity factor at existing NGCC units). The tax is between $30 and $33 per ton of CO2. Note this is done after applying the demand reductions envisioned in Building Block 4 but not the renewable and nuclear generation envisioned in Building Block 3 (see below). There are 10% cost-savings when compliance is regional rather than state-by-state—smaller than I would have thought. EPA doesn't break out state-by-state impacts.  One could easily imagine that there will be holdouts because a regional approach creates costs for them (see, for example, Bonneville Power). On the other hand, not having to deal with leakage issues may push states toward a regional approach. Building Block 3: Build Renewables, Keep Nuclear The IPM, when forced with the carbon tax produces only about 20 GW of additional renewables by 2020 and only 6 GW more by 2030 than the reference case. The effect of the carbon price is to accelerate deployment, not increase total capacity added by 2030. That means EPA must do something else to reach its targets. For renewables, EPA calculates regional targets based on current renewable portfolio standards and assigns to each state an obligation to hit their share of the renewable energy target. The regional targets vary between 10 and 25%. Some states have already hit their targets and others are on track to do so early. EPA doesn’t supply a carbon price for these policies. Presumably it would be higher than $30 per ton or else the IPM would be building a lot more renewable generation in the policy scenario (It’s also possible – even very likely—that the cost assumptions for renewables are too high in IPM). For nuclear, EPA estimates that keeping the approximately 6 GW of existing capacity that the Energy Information Agency (EIA) has characterized as "at risk" would cost $12–17 per ton. This is consistent with economic analyses of new units at the Vogtle plant in Georgia that assume it is in the money at carbon prices of $10–20 per ton. There's no discussion of how relicensing and expiration of second licenses for existing units plays into this calculation—I'm sure that there are at least some units whose second 20-year license will expire in the 2020s but I'm not sure how many. My guess is that 6 GW of at-risk nuclear is a serious underestimate, particularly when combined with the level of other renewables assumed in EPA’s targets. Remember that neither the additional renewables or preserved nuclear is integrated into their dispatch model and so doesn't take account of electricity market equilibrium effects. It would be interesting to see how many of the nuclear units remain operational in IPM if the model is forced to implement the renewables target without some sort of explicit carbon price. Given that the rule allows but doesn’t require cap-and-trade for compliance, this is a real possibility. Building Block 4: Energy Efficiency. EPA takes the EIA electricity demand forecast (about 1% annual growth) and then modifies it on a state-by-state basis by adding in a reduction factor to account for demand-side efficiency programs. The assumed levelized cost of this program is 8–10₵ per kwh. Interestingly, this may be higher than for distributed generation on the timescale of the rule. Marginal abatement cost is estimated by using IPM output for reference and policy cases and comparing that to program costs and estimated energy savings. The bottom line number is $18–24 per ton of CO2. EPA uses the EIA's AEO as its reference demand forecast. This is likely to inflate the baseline for a variety of reasons. Also, EPA relies on questionable (albeit improving) EIA utility self-reported data to estimate the effectiveness of efficiency programs. A lot of this information is in the GHG Abatement Measures TSD. To me, this whole thing is reminiscent of California—lots of shadow carbon prices that are higher and lower than the visible power sector price that’s driving the cost-effective abatement strategy—redispatch. And it makes a fantastic argument for legislative action to implement a simpler and more cost-effective policy. Why can't we just have a carbon tax and cut my FICA withholding already?
मप्र में पहली से आठवीं तक के 3 लाख छात्रों के लिए जनरल प्रमोशन के आदेश सोमवार, 11 मई 2020 (21:52 IST) भोपाल। कोरोना महामारी के बीच ममाध्यमिक शिक्षा मंडल मध्यप्रदेश, भोपाल ने पहली से आठवीं कक्षा तक के 3 लाख छात्रों को जनरल प्रमोशन देने के आदेश जारी कर दिए हैं। इस आदेश में कहा प्रत्येक बच्चे की मार्क शीट तथा टीसी पर 'कोरोना संक्रमण बचाव के कारण प्रोन्नत' की सील लगाना होगी। देशभर में कोरोना संक्रमण के विस्तार के कारण मध्यप्रदेश में भी घरेलु परीक्षाएं आयोजित नहीं की जा सकी हैं। इसी वजह से पहली से आठवीं कक्षा तक के छात्रों को जनरल प्रमोशन देने का फैसला लिया गया है। प्रदेश में कोरोना संक्रमण और फिर लॉकडाउन के कारण सभी शिक्षण गतिविधियां 16 मार्च से बंद हैं। जिस प्रकार से संक्रमण बढ़ रहा है, उसे देखते हुए नहीं लगता कि इस शिक्षण सत्र में स्कूल दोबारा खुल सकेंगे। नया शैक्षणिक सत्र कब प्रारंभ होगा, इसका निर्णय जुलाई में लिया जाएगा। मध्यप्रदेश में जब भी नया शिक्षण सत्र प्रारंभ होगा, तब पहली से आठवीं कक्षा तक के छात्र जनरल प्रमोशन के आधार पर अगली कक्षा में प्रवेश करेंगे। राज्य शिक्षा केंद्र भोपाल के आयुक्त लोकेश जाटव ने 11 मई को यह आदेश जारी करते हुए प्रदेश के सभी जिला कलेक्टरों को सूचित कर दिया है।
Re: URIs for the standard output and input streams From: Erik Wilde <dret@berkeley.edu> Date: Tue, 15 Jan 2008 09:42:51 -0800 Message-ID: <478CF09B.3000309@berkeley.edu> To: uri@w3.org it seems that the uri list is growing into a major battleground for the "everything is http" and the "uri schemes are meaningful" crowds. Noah Slater wrote: > I disagree. URIs are opaque and "http://purl.org/std/in" is just an > identifier for the concept of STDIN, which is it's self a > non-information resource. > The "http://" is not important, it's /just/ a name. this is probably the core of the debate. for the "everything is http" folks, uris are just opaque strings that applications are matching, and if they happen to start with with "http:", you can also use them for getting http stuff, which is a useful side effect. > Additionally, by using http:// we get to place a metadata profile at a > network resolvable location so that clients who do attempt to > derefference it will get a description of the resource. this is where the "everything is http" world view catches up in semantics: treat uris as opaque, and leave semantics to descriptions. my personal opinion is that this is just another attempt to somehow find a place for rdf where it actually can be useful. so after the geoloc uri discussion in the past weeks and the std uri discussion it seems to me that discussing the pros and cons of doing "everything as http" is not really worth the effort. both sides have their arguments. repeating myself: i am still waiting for a single example from the "everything is http" followers where that approach was applied sucessfully. sure, it *could* be done, but it *has not been* done (at least as far as i know), and i am wondering why that is the case. Received on Tuesday, 15 January 2008 17:43:30 UTC
Notifications You have no notifications 6. Men rule and women drool Girls And Nice Guys The Apatow Company For the past few millennia, the social structure was for men to be rulers and women their servants (or property, depends how you look at it). Women in history were inferior. The emancipation of women is a recent trend. One hundred years or so is a brief moment in history and social evolution. Women who do like nice guys are early adopters. They are the women who study computer science, start their own business, etc. The other type, the traditional one, who hasn't yet internalized the new social order, still looks for a man-ruler, a man who will own her. - Anonymous
भारतीय टेस्ट टीम के उपकप्तान अजिंक्य रहाणे और उनकी पत्नी राधिका धोपावकर ने शनिवार को कोरोना वैक्सीन की पहली डोज ली. साथ ही उन्होंने कोरोना वायरस के बीच टीकाकरण के महत्व के बारे में भी बताया. इंस्टाग्राम पर रहाणे ने एक पोस्ट शेयर कर लिखा- मुझे और राधिका धोपावकर दोनों ने आज कोरोना वैक्सीन की पहली डोज ली है. हम ना केवल अपने लिए बल्कि अपने आसपास के लोगों के लिए भी टीकाकरण करवा रहे हैं. मैं सभी से आग्रह करता हूं कि यदि आप पात्र हैं तो टीकाकरण करवाएं. बता दें कि भारतीय टीम के ओपनर बल्लेबाज शिखर धवन ने भी इस सप्ताह की शुरुआत में कोरोना वैक्सीन की पहली डोज ली थी. साथ ही उन्होंने सभी से टीकाकरण करवाने का आग्रह भी किया था, ताकि कोरोना वायरस को फैलने से रोकने में मदद मिले. बता दें कि बीसीसीआई ने शुक्रवार को विश्व टेस्ट चैंपियनशिप फाइनल और इंग्लैंड के खिलाफ पांच मैचों की सीरीज के लिए भारत की 20 सदस्यीय का एलान किया. फिटनेस समस्याओं से पार पा चुके ऑलराउंडर रवींद्र जडेजा, बल्लेबाज हनुमा विहारी और मुहम्मद शमी की.
स्कूल संचालकों को भी जानकारी भेजी गई है. हिंदी न्यूज़ उत्तर प्रदेश जौनपुर कर्मचारी संघर्ष मोर्चा ने विश्वविद्यालय बंटवारे का किया विरोध हाईकोर्ट में पीआईएल दाखिल करने वाले याचिकाकर्ता प्रेम अरोरा ने डीएम से सरकारी जमीन पर राजीव आवास आवंटन की शिकायत की थी। कहा गया कि कई पट्टे की जमीनों को प्रशासन ने पट्टा नियमों के उल्लंघन पर रद्द कर दिया था। कई विवाद अभी भी कोर्ट में विचाराधीन हैं। इसके बावजूद उन जमीनों पर आवास आवंटन कर दिए गए। राजस्व उपनिरीक्षक ने सरकारी भूमि पर बसे व्यक्तियों को राजीव आवास नहीं देने की संस्तुति की थी। आरोप है कि इसके बावजूद आवास आवंटित कर दिए गए। जांच की जद में 17 आवास आए हैं। उद्योग व्यापार मंडल अध्यक्ष गुड्डू सिंह का कहना है कि आवंटन में जमकर भ्रष्टाचार हुआ है। जिनका सूची में नाम तक नहीं था, उन्हें भी आवास बांट दिए गए। लेकिन भारतीय जनता पार्टी ने वरिष्ठ नेताओं के बेटी, बेटे व अन्य को आगे बढ़ाकर यह तो स्पष्ट कर दिया है कि अब भारतीय जनता पार्टी भी परिवारवाद की तरफ बढ़ रही है। अब ऐसे में सवाल उठता है कि एक तरफ जहां भारतीय जनता पार्टी दूसरी अन्य पार्टियों पर खासतौर समाजवादी पार्टी व कांग्रेस</s>
Open Access Multiple origins of endosymbiosis within the Enterobacteriaceae (γ-Proteobacteria): convergence of complex phylogenetic approaches BMC Biology20119:87 DOI: 10.1186/1741-7007-9-87 Received: 27 July 2011 Accepted: 28 December 2011 Published: 28 December 2011 The bacterial family Enterobacteriaceae gave rise to a variety of symbiotic forms, from the loosely associated commensals, often designated as secondary (S) symbionts, to obligate mutualists, called primary (P) symbionts. Determination of the evolutionary processes behind this phenomenon has long been hampered by the unreliability of phylogenetic reconstructions within this group of bacteria. The main reasons have been the absence of sufficient data, the highly derived nature of the symbiont genomes and lack of appropriate phylogenetic methods. Due to the extremely aberrant nature of their DNA, the symbiotic lineages within Enterobacteriaceae form long branches and tend to cluster as a monophyletic group. This state of phylogenetic uncertainty is now improving with an increasing number of complete bacterial genomes and development of new methods. In this study, we address the monophyly versus polyphyly of enterobacterial symbionts by exploring a multigene matrix within a complex phylogenetic framework. We assembled the richest taxon sampling of Enterobacteriaceae to date (50 taxa, 69 orthologous genes with no missing data) and analyzed both nucleic and amino acid data sets using several probabilistic methods. We particularly focused on the long-branch attraction-reducing methods, such as a nucleotide and amino acid data recoding and exclusion (including our new approach and slow-fast analysis), taxa exclusion and usage of complex evolutionary models, such as nonhomogeneous model and models accounting for site-specific features of protein evolution (CAT and CAT+GTR). Our data strongly suggest independent origins of four symbiotic clusters; the first is formed by Hamiltonella and Regiella (S-symbionts) placed as a sister clade to Yersinia, the second comprises Arsenophonus and Riesia (S- and P-symbionts) as a sister clade to Proteus, the third Sodalis, Baumannia, Blochmannia and Wigglesworthia (S- and P-symbionts) as a sister or paraphyletic clade to the Pectobacterium and Dickeya clade and, finally, Buchnera species and Ishikawaella (P-symbionts) clustering with the Erwinia and Pantoea clade. The results of this study confirm the efficiency of several artifact-reducing methods and strongly point towards the polyphyly of P-symbionts within Enterobacteriaceae. Interestingly, the model species of symbiotic bacteria research, Buchnera and Wigglesworthia, originated from closely related, but different, ancestors. The possible origins of intracellular symbiotic bacteria from gut-associated or pathogenic bacteria are suggested, as well as the role of facultative secondary symbionts as a source of bacteria that can gradually become obligate maternally transferred symbionts. One of the most fundamental evolutionary questions concerning insect-bacteria symbiosis is the origin and phylogenetic relationships of various symbiotic lineages. This knowledge is necessary for understanding the dynamics and mechanisms of symbiosis establishment and maintenance within the host. For instance, close relationships between symbionts and pathogenic bacteria suggests a transition from pathogenicity to symbiosis; polyphyly of the symbionts within a single host group is evidence of their multiple independent origins and close relationships among symbionts of different biology indicate high ecological flexibility within a given symbiotic group [16]. These implications are particularly important within Enterobacteriaceae, the group containing a broad spectrum of symbiotic lineages and forms described from various groups of insects. Their biology varies from loosely associated facultative symbionts (often called Secondary (S) symbionts) to obligatory mutualists of a highly derived nature, called Primary (P) symbionts [79]. However, the concept of the P- and S-symbionts and the associated terminology are a major oversimplification and they become inadequate for the description of the ever increasing complexity of the symbiotic system within Enterobacteriaceae. This complexity is manifested by such phenomena as the presence of multiple symbionts in a single host [10], occurrence of intermediate symbiotic forms and the replacement of symbionts within a host [1114] or close phylogenetic relationships between typical S- and P-symbionts revealing their high ecological versatility [15]. A good example of such a complex system is provided by the occurrence of multiple obligate symbionts within Auchenorrhyncha [10], universally harboring Sulcia muelleri (Bacteroidetes) [16] with either Hodgkinia cicadicola (α-Proteobacteria) in cicadas, Zinderia insecticola (β-Proteobacteria) in spittlebugs or Baumannia cicadellinicola (γ-Proteobacteria) in sharpshooters. All of these latter symbionts are obligate and have been cospeciating with their hosts for millions of years [1721]. A close phylogenetic relationship between typical S- and P-symbionts has been so far demonstrated in two well defined and often studied groups, the enterobacterial genera Arsenophonus and Sodalis [5, 22, 23]. The general capability of S-symbionts to supplement the metabolic functions of P-symbionts or even replace them was demonstrated experimentally by replacement of Buchnera with Serratia in aphids [24]. It is obvious that all these fascinating processes can only be studied on a reliable phylogenetic background [9, 2528]. Unfortunately, under current conditions, the phylogeny within Enterobacteriaceae and the placement of various symbiotic lineages are very unstable. Particularly, the P-symbionts present an extremely difficult challenge to phylogenetic computation due to their strongly modified genomes [9]. There are several root problems that are responsible for this dissatisfactory state. Traditionally, 16S rDNA was frequently used as an exclusive molecular marker for the description of a new symbiont. Many lineages are thus represented only by this gene, which has been shown within Enterobacteriaceae to be inadequate for inferring a reliable phylogeny [29]. In addition, it is notoriously known that the phylogenetic information of symbiotic bacteria is often seriously distorted due to the conditions associated with the symbiotic lifestyle. The effect of strong bottlenecks accompanied by reduced purifying selection and the overall degeneration of symbiotic genomes have been thoroughly discussed in many studies [3033]. As a result of these degenerative processes, symbiotic lineages may experience parallel changes of their DNAs and these convergences produce the main source of phylogenetic artifacts. Among the most important features are biased nucleotide composition favoring adenine-thymine bases and rapid sequence evolution. While the compositional bias leads to the introduction of homoplasies at both nucleotide and amino acid levels, the accelerated evolution is a well known source of the long-branch attraction phenomenon [34, 35]. Due to these circumstances, symbionts almost always appear as long branches in phylogenetic trees and tend to cluster together [36]. Various methodological approaches have been tested to overcome these difficulties (Additional file 1). They are based mainly on the concatenation of a large number of genes through the whole genome [3739], the supertree and the consensus approach [37], exclusion of amino acids (FYMINK: phenylalanine, tyrosine, methionine, isoleucine, asparagine and lysine) most affected by nucleotide bias [37], modifications of sequence evolution models [11, 12, 36, 40] and use of the genome structure as a source of phylogenetic data [41]. Phylogenomic studies based on large concatenated sets frequently imply monophyly of the typical P-symbionts (Additional file 1). However, due to the limited number of available genomes, these studies are usually based on inadequate taxon sampling. For example, secondary symbionts and plant pathogens that were shown to break the P-symbiont monophyly in the analysis using a nonhomogeneous model [40] could not be included into these phylogenomic studies. It is important to note that P-symbionts are probably only distantly related to the Escherichia/Salmonella/Yersinia clade. Therefore, the monophyly of P-symbionts derived from such a phylogenomic dataset is logically inevitable, but does not carry any evolutionary information. The non-monophyletic nature of P-symbionts has been recently suggested in several studies. Perhaps the most inspiring is a study based on a nonhomogeneous model that separates P-symbionts into two independent lineages [40]. As an alternative, a paraphyletic arrangement of these symbionts in respect to several free-living taxa has been revealed from gene-order analysis based on break-point and inversion distances [41]. Most recently, Williams et al. [42] performed a 'telescoping' multiprotein phylogenomic analysis of 104 γ-Proteobacterial genomes. The phylogeny of Enterobacteriaceae endosymbionts was difficult to resolve, although it appeared that there were independent origins of at least the Sodalis and Buchnera lineages. Thus, there is now a spectrum of hypotheses on the phylogeny of insect symbionts, ranging from complete polyphyly with multiple independent origins to complete monophyly with one common origin. In this study, we take advantage of current progress in computational methods to investigate phylogenetic relationships among the symbiotic lineages. One of the promising recent methodological advances is the introduction of a site-heterogeneous non-parametric mixture CAT model that allows for site-specific features of protein evolution [43]. This model was shown to solve the long-branch attraction (LBA) artifacts and outperform the previous models [4447]. Similarly, the slow-fast method based on removal of the fastest evolving sites was shown to reduce phylogenetic artifacts [4854], as well as purine/pyrimidine (RY) data recoding [5558] or amino acid data recoding [59, 60]. We used these methods as the core of a complex approach and tried to investigate series of methods, models and parameters to detect common trends in changes of the topologies. To do this, we applied two parallel approaches, one based on the application of recently developed algorithms and the other on the removal or recoding of the positions most affected by rapid sequence evolution and/or compositional (AT) bias. In addition, we paid particular attention to the sampling and used as much of a complete set of both symbiotic and free-living lineages as possible. This approach is particularly important to avoid interpretation uncertainties due to the absence of phylogenetically important lineages. The complete methodological design of this study and the resulting topologies are depicted in Figure 1. All matrices, alignments and phylogenetic trees are available in the TreeBASE database, as supplementary material, or on the webpage Figure 1 Study design. General design of the study summarizing all analyses and results. Individual topologies show the gradient of acquired results; method names are written above and below the arrows. Notice an increasing number of independent origins of symbionts and decreasing number of phylogenetic artifacts along the continuum towards the 'derived' methods. 1+2: third codon positions excluded; AT/GC(BI/4-11): AT/GC datasets 4-11 analyzed by BI; BI: Bayesian inference; Dayhoff6/Dayhoff4/HP: amino acid recoded matrices; ML: maximum likelihood; nhPhyML: ML under nonhomogeneous model; MP: maximum parsimony; RY: purine/pyrimidine recoded matrix; SF: slow-fasted datasets. Standard maximum likelihood and Bayesian inference The single gene maximum likelihood (ML) analyses of both nucleic and amino acid data provided an array of mutually exclusive topologies. The majority consensus based on amino acid data (Additional file 2a) groups almost all symbionts into polytomy with only two pairs of sister symbiotic species being resolved (Buchnera and Blochmannia). Phylogenetic trees inferred by ML and Bayesian inference (BI) from the nucleic acid concatenated data using the General Time Reversible model with an estimated proportion of invariable sites (I) and heterogeneity of evolutionary rates modeled by the four substitution rate categories of the gamma (Γ) distribution with the gamma shape parameter (alpha) estimated from the data (GTR+I+Γ) were apparently affected by phylogenetic artifacts, as demonstrated by placement of Riesia and Wigglesworthia within the Buchnera cluster with high posterior probabilities in the BI tree (Figure 2) and the attraction of two outgroup species (Haemophilus and Pasteurella) in the ML tree with high bootstrap support (Additional file 2b). Similar topologies were also retrieved from the amino acid concatenate by ML and BI using the LG+I+Γ, WAG+I+Γ and GTR+I+Γ models (Figure 3). Nevertheless, in contrast to the nucleotide-derived results, the monophyly of the Buchnera clade was not disrupted and Hamiltonella and Regiella were unambiguously separated from the other symbionts and clustered with Yersinia. Figure 2 MrBayes phylogram - 69 genes, nucleotide matrix. Phylogenetic tree inferred from the concatenated nucleotide matrix using BI under the GTR+I+Γ model. Asterisks designate nodes with posterior probabilities equal to 1.0, values next to species names represent GC content calculated from the 69-gene dataset, genomic GC content can be found in Additional file 4. BI: Bayesian inference. Figure 3 MrBayes phylogram - 69 genes, amino acid matrix. Phylogram inferred from the concatenated amino acid matrix using BI under the WAG+I+Γ model. Values at nodes represent posterior probabilities (WAG+I+Γ model, GTR+I+Γ protein model) and bootstrap supports from ML analysis (LG+I+Γ model). Asterisks designate nodes with posterior probabilities or bootstrap supports equal to 1.0, dashes designate values lower than 0.5 or 50, values next to species names represent GC content calculated from the 69-gene dataset, genomic GC content can be found in Additional file 4. BI: Bayesian inference. ML: maximum likelihood. PhyloBayes, non-homogenous PhyML and modified matrices The phylogenetic trees acquired under the CAT+GTR PhyloBayes model from 14 and 55 concatenated genes (Figure 4 and Additional file 2p) split symbiotic bacteria into four and three independent lineages, respectively. First, Arsenophonus nasoniae is a sister species to Proteus mirabilis; second, Hamiltonella and Regiella form a sister clade to Yersinia pestis; third, the Sodalis, Baumannia, Blochmannia, Wigglesworthia, Riesia and Buchnera clade form a sister clade to Dickeya/Pectobacterium. The position of Ishikawaella differs between the two datasets. In the 14-gene dataset, Ishikawaella forms a sister clade to Pantoea (Figure 4) and in the 55-gene dataset, it is attracted to the P-symbiont cluster (Additional file 2p). Figure 4 PhyloBayes phylogram - 14 genes, amino acid matrix. Phylogram derived from concatenation of 14 genes (AceE, ArgS, AspS, EngA, GidA, GlyS, InfB, PheT, Pgi, Pnp, RpoB, RpoC, TrmE and YidC) using PhyloBayes under the CAT+GTR model. Asterisks designate nodes with posterior probabilities equal to 1.0, values next to species names represent GC content calculated from the 69-gene dataset, genomic GC content can be found in Additional file 4. A topology with four independent symbiotic clades resulted from the trees derived from dayhoff6 and dayhoff4 recoded amino acid data sets analyzed by CAT and CAT+GTR models (Figure 5, Additional file 2r, q) and partially with the hp (hydrophobic-polar) recoded dataset (Additional file 2c) - which was on the other hand affected by the substantial loss of phylogenetic information. The first clade is Buchnera+Ishikawaella as a sister clade to the Erwinia/Pantoea clade, the second clade is Riesia+Arsenophonus as a sister clade to Proteus, the third clade is Hamiltonella+Regiella as a sister clade to Yersinia, and the last clade is composed of Sodalis, Baumannia, Blochmannia and Wigglesworthia. Figure 5 PhyloBayes cladogram - 69 genes, Dayhoff6 amino acid recoded matrix. Cladogram inferred from amino acid matrix recoded with Dayhoff6 scheme using PhyloBayes with the CAT and CAT+GTR model. Because of the length of symbiotic branches, phylogram is presented only as a preview (original phylogram can be found in Additional trees on our website). Values at nodes represent posterior probabilities from CAT and CAT+GTR analyses, respectively (asterisks designate nodes with posterior probabilities equal to 1.0). Values next to species names represent GC content calculated from the 69-gene dataset, genomic GC content can be found in Additional file 4. The analyses testing each symbiont independently, using a CAT+GTR model on the dayhoff6 recoded datasets, resulted in topologies supporting multiple origins of endosymbiosis (Additional file 2s). Arsenophonus clusters with Proteus; Hamiltonella clusters with Yersinia; Regiella clusters with Yersinia; and Sodalis, Blochmannia, Baumannia, Riesia and Wigglesworthia grouped into polytomy with the basal enterobacterial clades. Most importantly, the Buchnera clade clusters as a sister clade to the Erwinia clade and Ishikawaella is placed in polytomy with the Pantoea and Erwinia clade. The non-homogenous (nh) PhyML nucleotide analyses with two different starting trees resulted in two different topologies (Figure 6 and Additional file 2d, e, f). When compared by the approximately unbiased (AU) test, the topology with four independent origins of symbiotic bacteria prevailed (P = 1) over the topology with monophyly of P-symbionts, which therefore corresponds to a local minimum due to a tree search failure (complete matrix: P = 2 × 10-67; matrix without the third positions: P = 9 × 10-87). The only incongruence in topologies based on the complete matrix (Additional file 2d) and the matrix without the third positions (Figure 6) was the placement of the Sodalis+Baumannia+Blochmannia+Wigglesworthia clade as a sister clade to the Edwardsiella or Dickeya/Pectobacterium clades. Figure 6 nhPhyML phylogram - 69 genes, nucleotide matrix, third positions excluded. Phylogram inferred from the concatenated nucleotide matrix without third codon positions using the nonhomogeneous model of evolution as implemented in nhPhyML. Values at nodes and branches represent GC content. Matrices obtained by removing positions according to the AT/GC contents produced trees covering the whole continuum illustrated in Figure 1. The most severe restrictions, that is, removal of all positions that contain both AT and GC categories or relaxing for up to three taxa (see BI trees in Additional file 2g, h, i, j), yielded topologies compatible with the results of the CAT model applied on the recoded amino acid data and of the nhPhyML analysis. Further relaxing the restriction rule led to a variety of trees along the Figure 1 continuum, with a less clear relation between the used parameter and the resulting topology (Additional file 3). Compared to the ML analysis of all nucleotide positions, the analysis of first plus second positions reduced the obvious artifact of outgroup attraction (Additional file 2k). Nevertheless, it also sorted symbionts according to their branch length. Analysis of the RY recoded nucleotide matrix produced a tree compatible with the results of the CAT+GTR model (Additional file 2l). Analysis of the RY recoded nucleotide matrix without the third positions resulted in a topology with a Sodalis+Baumannia+Blochmannia cluster (as a sister to the Pectobacterium/Dickeya clade) separated from the rest of the P-symbionts, which clustered with the Erwinia/Pantoea clade (Additional file 2m). Slow-fast analyses with gradual reduction of saturated positions did not produce the polyphyly of P-symbionts (Additional file 3; only the first five trees presented, subsequent trees are identical to the fifth tree). However, this analysis shows an increasing effect of LBA artifacts associated with the increasing number of remaining saturated positions, especially Riesia attraction and swapping of symbiotic branches according to their length. Performance of the methods: convergence towards non-monophyly The results obtained in this study strongly indicate that the frequently retrieved monophyly of P-symbionts is an artifact caused by their highly modified genomes. None of the most widely used methods, that is, ML and BI with different models used on nucleic (GTR+I+Γ) and amino acid (GTR/LG/WAG+I+Γ) data, were capable of resolving deep phylogenetic relationships and correct placement of the symbiotic taxa. This conclusion is evidenced by obvious artifacts, such as the inclusion of Riesia into the P-symbiotic lineage or the even more conspicuous distorted placing of Wigglesworthia within the Buchnera cluster. The arrangement of such trees suggests that these methods sort the symbionts according to their branch lengths and/or AT contents and attach the whole symbiotic cluster to the longest branch available. While the difficulty with placement of the most aberrant taxa, such as Riesia, Wigglesworthia and Buchnera (Cinara cedri) was also observed when using the mixture model accounting for site specific characteristics of protein evolution (Figure 4; Additional files 2p and 5), these artifacts disappeared after amino acid data recoding followed by CAT and CAT+GTR model analysis and the application of a nonhomogeneous model. Additional support for the non-monophyly view stems from the second, parallel approach based on the restricted matrices. While our newly developed method shares the basic principles with the slow-fast and recoding methods, such as the removal of the positions that are likely to distort the phylogenetic relationships due to their aberrant evolution, it differs in the criteria of their removal and thus produces different input data. It is therefore significant that this method led independently to the same picture, the non-monophyly of the P-symbionts with clustering identical to the above analyses: Ishikawaella+Buchnera and Sodalis+Baumannia+Blochmannia+Wigglesworthia. The removal of the heteropecillous sites was recently shown to have similar effectiveness as our new method [61], which further supports the results. Moreover, this topology was obtained even under the maximum parsimony (MP) criterion (Additional file 3), which is known to be extremely sensitive to LBA [34]. On the other hand, although slow-fast analysis is generally considered a powerful tool for resolving relationships among taxa with different rates of evolution, we show in our data that the mere exclusion of the fast evolving sites is not sufficient when using empirical models and should be followed by analysis using some of the complex models, such as the CAT-like models. In addition, since this method usually requires an a priori definition of monophyletic groups, it should be used and interpreted with caution. Similar to the slow-fast method, RY recoding and exclusion of third codon positions were not sufficient for resolving deep symbiont phylogeny. However, all these methods can remove at least some of the artifacts and provide insight for further analyses. Summarizing the topologies obtained in this study (Figure 1), a convergence can be detected towards a particular non-monophyletic arrangement of P-symbionts, as revealed under the most 'derived' methods. This result strongly supports the view of multiple origins of insect endosymbionts, as first revealed by the nonhomogeneous model of sequence evolution [40], and is partially congruent with the analyses of gene order [41] and phylogenomics of Gammaproteobacteria [42]. It is also important to note that, apart from multiple symbiont clustering, the arrangement of the non-symbiotic taxa corresponds to most of the phylogenomic analyses using Escherichia/Salmonella/Yersinia taxon sampling [3739]. Biological significance of P-symbionts non-monophyly Considering that most of the 'artifact-resistant' analyses point towards the non-monophyly of enterobacterial P-symbionts, the questions of how many symbiotic lineages are represented by the known symbiotic diversity and what are their closest free-living relatives now becomes of particular importance. It is not clear whether the split of the original P-symbiotic cluster into two lineages is definite or these two groups will be further divided after yet more sensitive methods and more complete data are available. At the moment there are still several clusters composed exclusively of derived symbiotic forms. In principle, three different processes may be responsible for the occurrence of such clusters: first, horizontal transmission of established symbiotic forms among host species; second, inadequate sampling with missing free-living relatives; or third, phylogenetic artifacts. All of these factors are likely to play a role in the current topological patterns. Being the main issues of this study, the role of methodological artifacts has been discussed above. Horizontal transmission, as the basis of non-artificial symbiotic clusters, is likely to take part at least in some cases. Perhaps the most convincing example is the Wolbachia cluster [62]: while within Enterobacteriaceae it may apply to Arsenophonus, Sodalis and possibly some other S-symbionts. Recognition of the third cause, the incomplete sampling, and identification of the closest free-living relatives, now becomes a crucial step in future research. It is often assumed that symbionts originate from bacteria common to the environment typical for a given insect group. For example, cicadas spend most of their life cycle underground and feed primarily on plant roots. Consequently, their α-Proteobacterial symbiont Hodgkinia cicadicola originated within Rhizobiales [19]. A similar ecological background can be noticed in yet different hosts, the ixodid and argasid ticks. Several reports have shown that some of the tick-transmitted pathogens are related to their symbiotic fauna [6365]. Many of the insect taxa associated with symbiotic Enterobacteriaceae are phytophagous, and plant pathogens thus fit well into this hypothesis as hypothetical ancestors of various insect symbionts lineages. The presence of a type III secretion system, which is used in pathogenic bacteria for host cell invasion, in secondary symbionts [6669] and its remnant in the primary symbiont of Sitophilus spp. weevils [70] could further support the theory of pathogenic ancestors of insect symbionts. It can only be speculated that these bacteria first became S-symbiont type and were horizontally transferred to various other insect species. Within some of the infected species, facultative symbionts eventually became obligatory primary symbionts. An identical situation can be observed in symbiotic clades with numerous species, such as Wolbachia [71, 72], Sodalis [23, 73, 74] or Arsenophonus [5]. In our study, we gave particular attention to the sampling of free-living Enterobacteriaceae to provide as complete a background for the symbiotic lineages as possible under the current state of knowledge (that is, the availability of the genomic data). The most consistent picture derived from the presented analyses places the four main symbiotic clusters into the following positions. First, for the Buchnera cluster, its previously suggested relationship to Erwinia was confirmed. Erwinia, as a genus of mostly plant pathogenic bacteria, has been previously suggested to represent an ancestral organism, which upon ingestion by aphids at least 180 million years ago [75] turned into an intracellular symbiotic bacterium [76]. However, it is not known whether it was primarily pathogenic to aphids, similar to Erwinia aphidicola [77], or a gut associated symbiotic bacterium as in pentatomid stinkbugs [78], thrips [79, 80] or Tephritidae flies [8183]. Ishikawaella capsulata, an extracellular gut symbiont of plataspid stinkbugs [84], was the only symbiotic bacterium that clustered in our 'derived' analyses with the Buchnera clade. However, several single-gene studies indicate that this group contains some additional symbiotic lineages for which sequenced genome data is not currently available. These are, in particular, the extracellular symbionts of acanthosomatid stinkbugs [85], parastrachid stinkbugs [86], scutellerid stinkbugs [87, 88] and some of the symbionts in pentatomid stinkbugs [78]. The second clade, represented in our analysis by Sodalis+Baumannia+Blochmannia+Wigglesworthia, is likely to encompass many other P- and S-symbionts [8992]. The possible single origin of these symbionts has to be further tested, however the interspersion of both forms, together with basal position of Sodalis, seem to support a transition from a secondary to primary symbiotic lifestyle [15]. In our analysis, the whole clade was placed between pathogenic bacteria of plants and animals, the Edwardsiella and Pectobacterium/Dickeya clades, or as a sister to the latter group. Recently, another symbiotic bacterium (called BEV, Euscelidius variegatus host) was shown to be a sister species to Pectobacterium [93]. Two additional independent origins of insect symbionts are represented by the Arsenophonus/Riesia clade and Hamiltonella+Regiella. Both of these clades clustered in our analyses in the positions indicated by previous studies, that is, as related to Proteus and Yersinia, respectively [5, 67, 9397]. While the position of individual symbiotic lineages is remarkably consistent across our 'artifact-resistant' analyses and are well compatible with some of the previous studies, the topology can only provide a rough picture of the relationships within Enterobacteriaceae. To get a more precise and phylogenetically meaningful background for an evolutionary interpretation, the sample of free-living bacteria as a possible source of symbiotic lineages has to be much improved. An illuminating example is provided by the bacterium Biostraticola tofi, described from water biofilms. When analyzed using 16S rDNA, this bacterium seemed to be closely related to Sodalis [98]. Its position as a sister group to the Sodalis/Baumannia/Blochmannia/Wigglesworthia clade was also retrieved in our single-gene analysis (groEL, data not shown). If confirmed by more precise multigene approach, Biostraticola would represent the closest bacterium to the large symbiotic cluster. The topologies obtained by several independent approaches strongly support the non-monophyletic view of enterobacterial P-symbionts. Particularly, they show that at least three independent origins led to highly specialized symbiotic forms, the first giving rise to Sodalis, Baumannia, Blochmannia and Wigglesworthia (S- and P-symbionts), the second to Buchnera and Ishikawella and the last to Riesia and Arsenophonus (S- and P-symbionts). This separation of symbiotic clusters poses an interesting question as to whether the presented disbandment of the P-symbiotic cluster is definite or if it will continue after yet more complete data are available and more realistic evolutionary models [99101] are applied. One obvious drawback of the current state is that many additional symbiotic lineages already known within Enterobacteriaceae cannot be at the moment included into serious phylogenetic analyses due to the lack of sufficient molecular data and will have to be revisited once complete genomic data are available. These bacteria include symbionts of mealybugs [89, 102], psyllids [90, 103], lice [2, 91], weevils [11, 12, 92], reed beetles [104, 105], true bugs [78, 8488, 106, 107] and symbionts of leeches [108, 109]. Similarly, the importance of free-living bacteria and variety of S-symbionts as possible ancestors of P-symbionts should not be underestimated when assembling datasets for phylogenetic analyses. The shift from polymerase chain reaction-based gene-centered sequencing towards high-throughput next-generation sequencing may soon provide sufficient data for more complete analyses of the Enterobacteriaceae phylogeny. Matrices and multiple sequence alignments The genes used in this study were extracted from 50 complete genome sequences of γ-Proteobacteria available in GenBank (Additional file 4), including 14 endosymbiotic Enterobacteriaceae. We did not include Carsonella ruddii [110] since this psyllid symbiotic bacterium does not appear to be a member of the Enterobacteriaceae clade [90, 111] and is only attracted there by the AT rich taxa. After removal of the AT rich lineages from the analysis, Carsonella ruddii clusters with the genus Pseudomonas [42]. Also, we did not include Serratia symbiotica [95] because its genome only became available after completion of our datasets. However, the phylogenetic position of this symbiotic bacterium within Serratia genus is robust and was confirmed in several studies [6, 14, 112]. To minimize the introduction of a false phylogenetic signal, we compared the genomes of all symbiotic bacteria and selected only single-copy genes present in all of the included symbiotic and free-living taxa. Such strict gene exclusion was also necessary regarding the usage of computationally demanding methods; it was one of our goals to produce a taxonomically representative data set of efficient size with no missing data. Altogether, 69 orthologous genes, mostly involved in translation, ribosomal structure and biogenesis (Additional file 4) were selected according to the Clusters of Orthologous Groups of proteins (COGs) [113, 114]. Single-gene nucleotide data sets were downloaded via their COG numbers from a freely available database (MicrobesOnline [115]). All protein coding sequences were translated into amino acids in SeaView version 4 [116], aligned by the MAFFT version 6 L-INS-i algorithm [117] and toggled back to the nucleotide sequences. Ambiguously aligned positions (codons) were excluded by Gblocks v0.91b [118, 119] with the following parameters: minimum number of sequences for a conserved position: 26; minimum number of sequences for a flanking position: 43; maximum number of contiguous nonconserved positions: 8; minimum length of a block: 10; allowed gap positions: with half. The resulting trimmed alignments were checked and manually corrected in BioEdit v7.0.5 [120]. Alignments were concatenated in SeaView. The 69 gene concatenate resulted in an alignment of 63, 462 nucleic acid positions with 42, 481 parsimony-informative and 48, 527 variable sites and 21, 154 amino acid positions with 12, 735 parsimony-informative and 15, 986 variable sites. Phylogenetic analyses We used two different approaches to deal with the distortions caused by the highly modified nature of symbiotic genomes, which are the main source of the phylogenetic artifacts in phylogenetic analyses. First, we applied complex models of molecular evolution. Using PhyloBayes 3.2f [121], we applied non-parametric site heterogeneous CAT and CAT+GTR models [43]. For all PhyloBayes analyses, we ran two chains with an automatic stopping option set to end the chain when all discrepancies were lower than 0.3 and all effective sizes were larger than 100. Under the CAT and CAT+GTR models, the four independent PhyloBayes runs were stuck in a local maximum (maxdiff = 1) even after 25, 000 and 10, 000 cycles, respectively, and we were not able to reach Markov Chain Monte Carlo (MCMC) convergence. Therefore, we present these trees only as supplementary material (although they mostly point toward multiple origins of symbiosis; Additional file 5) and we ran the CAT+GTR analyses with the reduced dataset based on 14 genes with the number of parsimony-informative amino acid positions higher than 300 (AceE, ArgS, AspS, EngA, GidA, GlyS, InfB, PheT, Pgi, Pnp, RpoB, RpoC, TrmE and YidC). To check for compatibility of these arbitrary selected 14 genes with the rest of the data, we also analyzed, in a separate analysis, the remaining 55-gene dataset under the CAT+GTR model. Using nhPhyML [122], we applied a nonhomogeneous nonstationary model of sequence evolution [123, 124], which can deal with artifacts caused by compositional heterogeneity [40, 125, 126]. We used two different starting trees (Additional file 2n) and ran the analyses with and without the third codon positions. The resulting trees were evaluated by an AU test in CONSEL [127]. The second approach relies on the selective restriction of the data matrix. We used four previously established methods of data weighting and/or exclusion (see Background): RY data recoding, amino acid data recoding, exclusion of third codon positions and slow-fast analysis, and developed one additional method: since transition from G/C to A/T at many positions is a common homoplasy of symbiotic genomes, we removed from the matrix all positions containing both the G/C and A/T states. All substitutions considered in the subsequent analyses thus included exclusively transversions within the A/T or G/C categories. To analyze an effect of this restriction on the reduction of the data, we prepared 11 matrices with a partially relaxed rule (removing all positions with AT+GC, allowing for one taxon exception, two taxa exception, and so on, up until a 10 taxa exception). Since this method has never been tested, we analyzed the restricted matrices by the BI, ML (parameters as for standard analyses) and MP using PAUP* 4.0b10 with the tree bisection and reconnection algorithm [128]. Four other types of data weighting and/or exclusion were used to increase the phylogenetic signal to noise ratio and determine the robustness of our results. First, the third codon positions were removed in SeaView. Second, RY recoding was performed on all and first plus second positions. Third, saturated positions were excluded from the concatenated data sets by SlowFaster [129]. To assign substitutional rates to individual positions, unambiguously monophyletic groups were chosen on a polytomic tree (Additional file 2o), positions with the highest rates were gradually excluded and 21 restricted matrices were produced. These weighted data sets were analyzed by ML. Fourth, amino acid data recoding was performed in PhyloBayes with hp (A, C, F, G, I, L, M, V, W) (D, E, H, K, N, P, Q, R, S, T, Y), dayhoff4 (A, G, P, S, T) (D, E, N, Q) (H, K, R) (F, Y, W, I, L, M, V) (C = ?) and dayhoff6 (A, G, P, S, T) (D, E, N, Q) (H, K, R) (F, Y, W) (I, L, M, V) (C) recoding schemes. In addition, we have prepared 10 dayhoff6 recoded matrices to test individual symbiotic lineages without the presence of other symbionts. Amino acid recoded matrices were analyzed using the CAT and CAT+GTR models, which are more immune to phylogenetic artifacts than one-matrix models. To allow for comparison of the results with previously published studies, as well as to separate the effect of newly used models and methods from changes due to the extended sampling, we also used standard procedures of phylogenetic inference, ML and BI. The following programs, algorithms and parameters were used in the ML and BI analyses. ML was applied to single-gene and concatenated alignments of both nucleotides and amino acids using PhyML v3.0 [130] with the subtree pruning and regrafting tree search algorithm. BI was performed in MrBayes 3.1.2 [131] with one to five million generations and tree sampling every 100 generations. Exploration of MCMC convergence and burn-in determination was performed in AWTY and Tracer v1.5 [132, 133]. Evolutionary substitution models for proteins were selected by ProtTest 2.4 [134] and for DNA by jModelTest 0.1.1 [135] according to the Akaike Information Criterion. For DNA sequences, the GTR+I+Γ model was used [136138]. Transition and transversion models [139] were used with I+Γ under ML for the first two AT/GC datasets. LG+I+Γ [140], WAG+I+Γ [141] and GTR+I+Γ models were used for amino acid data. A cross-validation method implemented in PhyloBayes [121, 142] was used to estimate the fit of CAT-like models. For both datasets, the 14 selected genes as well as the complete 69 genes set, the cross-validation was performed according to the PhyloBayes manual in 10 replicates each with 1, 100 cycles. The CAT-Poisson model had significantly better fit to the data than the GTR model (Δl 157.37 ± 56.9379 for the 14-gene matrix and Δl 3923.9 ± 1963.5 for the 69-gene matrix); of the CAT-like models, the CAT+GTR model was found to be significantly better than the CAT-Poisson model (Δl 536.71 ± 32.8341 for the 14-gene matrix and Δl 1633.4 ± 123.482 for the 69-gene matrix) in all 10 replicates. This work was supported by the Grant Agency of Academy of Sciences of the Czech Republic (grant number P505/10/1401 to VH); the Student Grant Agency of the Faculty of Science, University of South Bohemia (grant number SGA2009002 to FH); and the Ministry of Education, Youth, and Sports of the Czech Republic (grant numbers LC06073 and MSM 60076605801 to VH). Access to the MetaCentrum computing facilities provided under the 'Projects of Large Infrastructure for Research, Development, and Innovations' program LM2010005 funded by the Ministry of Education, Youth, and Sports of the Czech Republic is highly appreciated. Authors’ Affiliations Faculty of Science, University of South Bohemia Institute of Parasitology, Biology Centre of ASCR 1. Gottlieb Y, Ghanim M, Gueguen G, Kontsedalov S, Vavre F, Fleury F, Zchori-Fein E: Inherited intracellular ecosystem: symbiotic bacteria share bacteriocytes in whiteflies. FASEB J. 2008, 22 (7): 2591-2599.PubMedGoogle Scholar 2. Hypša V, Křížek J: Molecular evidence for polyphyletic origin of the primary symbionts of sucking lice (Phthiraptera, Anoplura). Microb Ecol. 2007, 54 (2): 242-251.PubMedGoogle Scholar 3. Bordenstein SR, Paraskevopoulos C, Hotopp JC, Sapountzis P, Lo N, Bandi C, Tettelin H, Werren JH, Bourtzis K: Parasitism and mutualism in Wolbachia: what the phylogenomic trees can and cannot say. Mol Biol Evol. 2009, 26 (1): 231-241.PubMed CentralPubMedGoogle Scholar 4. Caspi-Fluger A, Zchori-Fein E: Do plants and insects share the same symbionts?. Isr J Plant Sci. 2010, 58 (2): 113-119.Google Scholar 5. Nováková E, Hypša V, Moran NA: Arsenophonus, an emerging clade of intracellular symbionts with a broad host distribution. BMC Microbiol. 2009, 9: 143-PubMed CentralPubMedGoogle Scholar 6. Moran NA, Russell JA, Koga R, Fukatsu T: Evolutionary relationships of three new species of Enterobacteriaceae living as symbionts of aphids and other insects. Appl Environ Microbiol. 2005, 71 (6): 3302-3310.PubMed CentralPubMedGoogle Scholar 7. Baumann P: Biology of bacteriocyte-associated endosymbionts of plant sap-sucking insects. Annu Rev Microbiol. 2005, 59: 155-189.PubMedGoogle Scholar 8. Douglas AE: Mycetocyte symbiosis in insects. Biol Rev Camb Philos Soc. 1989, 64 (4): 409-434.PubMedGoogle Scholar 9. Moran NA, McCutcheon JP, Nakabachi A: Genomics and evolution of heritable bacterial symbionts. Annu Rev Genet. 2008, 42: 165-190.PubMedGoogle Scholar 10. Takiya DM, Tran PL, Dietrich CH, Moran NA: Co-cladogenesis spanning three phyla: leafhoppers (Insecta: Hemiptera: Cicadellidae) and their dual bacterial symbionts. Mol Ecol. 2006, 15 (13): 4175-4191.PubMedGoogle Scholar 11. Lefevre C, Charles H, Vallier A, Delobel B, Farrell B, Heddi A: Endosymbiont phylogenesis in the Dryophthoridae weevils: evidence for bacterial replacement. Mol Biol Evol. 2004, 21 (6): 965-973.PubMedGoogle Scholar 12. Conord C, Despres L, Vallier A, Balmand S, Miquel C, Zundel S, Lemperiere G, Heddi A: Long-term evolutionary stability of bacterial endosymbiosis in Curculionoidea: additional evidence of symbiont replacement in the Dryophthoridae family. Mol Biol Evol. 2008, 25 (5): 859-868.PubMedGoogle Scholar 13. Perez-Brocal V, Gil R, Ramos S, Lamelas A, Postigo M, Michelena JM, Silva FJ, Moya A, Latorre A: A small microbial genome: the end of a long symbiotic relationship?. Science. 2006, 314 (5797): 312-313.PubMedGoogle Scholar 14. Lamelas A, Perez-Brocal V, Gomez-Valero L, Gosalbes MJ, Moya A, Latorre A: Evolution of the secondary symbiont "Candidatus Serratia symbiotica" in aphid species of the subfamily Lachninae. Appl Environ Microbiol. 2008, 74 (13): 4236-4240.PubMed CentralPubMedGoogle Scholar 15. Wernegreen JJ, Kauppinen SN, Brady SG, Ward PS: One nutritional symbiosis begat another: phylogenetic evidence that the ant tribe Camponotini acquired Blochmannia by tending sap-feeding insects. BMC Evol Biol. 2009, 9 (1): 292-PubMed CentralPubMedGoogle Scholar 16. Moran NA, Tran P, Gerardo NM: Symbiosis and insect diversification: an ancient symbiont of sap-feeding insects from the bacterial phylum Bacteroidetes. Appl Environ Microbiol. 2005, 71 (12): 8802-8810.PubMed CentralPubMedGoogle Scholar 18. McCutcheon JP, Moran NA: Functional convergence in reduced genomes of bacterial symbionts spanning 200 million years of evolution. Genome Biol Evol. 2010, 2: 708-718.PubMed CentralPubMedGoogle Scholar 19. McCutcheon JP, McDonald BR, Moran NA: Convergent evolution of metabolic roles in bacterial co-symbionts of insects. Proc Natl Acad Sci USA. 2009, 106 (36): 15394-15399.PubMed CentralPubMedGoogle Scholar 20. McCutcheon JP, McDonald BR, Moran NA: Origin of an alternative genetic code in the extremely small and GC-rich genome of a bacterial symbiont. Plos Genet. 2009, 5 (7): e1000565-PubMed CentralPubMedGoogle Scholar 21. McCutcheon JP, Moran NA: Parallel genomic evolution and metabolic interdependence in an ancient symbiosis. Proc Natl Acad Sci USA. 2007, 104 (49): 19392-19397.PubMed CentralPubMedGoogle Scholar 22. Snyder AK, McMillen CM, Wallenhorst P, Rio RV: The phylogeny of Sodalis-like symbionts as reconstructed using surface-encoding loci. FEMS Microbiol Lett. 2011, 317 (2): 143-151.PubMed CentralPubMedGoogle Scholar 23. Fukatsu T, Koga R, Smith WA, Tanaka K, Nikoh N, Sasaki-Fukatsu K, Yoshizawa K, Dale C, Clayton DH: Bacterial endosymbiont of the slender pigeon louse, Columbicola columbae, allied to endosymbionts of grain weevils and tsetse flies. Appl Environ Microbiol. 2007, 73 (20): 6660-6668.PubMed CentralPubMedGoogle Scholar 24. Koga R, Tsuchida T, Fukatsu T: Changing partners in an obligate symbiosis: a facultative endosymbiont can compensate for loss of the essential endosymbiont Buchnera in an aphid. Proc R Soc Lond B. 2003, 270 (1533): 2543-2550.Google Scholar 25. Oliver KM, Degnan PH, Burke GR, Moran NA: Facultative symbionts in aphids and the horizontal transfer of ecologically important traits. Annu Rev Entomol. 2010, 55: 247-266.PubMedGoogle Scholar 26. Moya A, Pereto J, Gil R, Latorre A: Learning how to live together: genomic insights into prokaryote-animal symbioses. Nat Rev Genet. 2008, 9 (3): 218-229.PubMedGoogle Scholar 27. Gosalbes MJ, Latorre A, Lamelas A, Moya A: Genomics of intracellular symbionts in insects. Int J Med Microbiol. 2010, 300 (5): 271-278.PubMedGoogle Scholar 28. Toft C, Andersson SGE: Evolutionary microbial genomics: insights into bacterial host adaptation. Nat Rev Genet. 2010, 11 (7): 465-475.PubMedGoogle Scholar 29. Naum M, Brown EW, Mason-Gamer RJ: Is 16S rDNA a reliable phylogenetic marker to characterize relationships below the family level in the Enterobacteriaceae?. J Mol Evol. 2008, 66 (6): 630-642.PubMedGoogle Scholar 30. Mira A, Moran NA: Estimating population size and transmission bottlenecks in maternally transmitted endosymbiotic bacteria. Microb Ecol. 2002, 44 (2): 137-143.PubMedGoogle Scholar 31. Wernegreen JJ, Moran NA: Evidence for genetic drift in endosymbionts (Buchnera): analyses of protein-coding genes. Mol Biol Evol. 1999, 16 (1): 83-97.PubMedGoogle Scholar 32. Lambert JD, Moran NA: Deleterious mutations destabilize ribosomal RNA in endosymbiotic bacteria. Proc Natl Acad Sci USA. 1998, 95 (8): 4458-4462.PubMed CentralPubMedGoogle Scholar 33. Allen JM, Light JE, Perotti MA, Braig HR, Reed DL: Mutational meltdown in primary endosymbionts: selection limits Muller's ratchet. Plos One. 2009, 4 (3): e4969-PubMed CentralPubMedGoogle Scholar 35. Ruano-Rubio V, Fares MA: Artifactual phylogenies caused by correlated distribution of substitution rates among sites and lineages: the good, the bad, and the ugly. Syst Biol. 2007, 56 (1): 68-82.PubMedGoogle Scholar 36. Charles H, Heddi A, Rahbe Y: A putative insect intracellular endosymbiont stem clade, within the Enterobacteriaceae, infered from phylogenetic analysis based on a heterogeneous model of DNA evolution. C R Acad Sci Ser III Sci Vie. 2001, 324 (5): 489-494.Google Scholar 37. Comas I, Moya A, Gonzalez-Candelas F: From phylogenetics to phylogenomics: the evolutionary relationships of insect endosymbiotic γ-Proteobacteria as a test case. Syst Biol. 2007, 56 (1): 1-16.PubMedGoogle Scholar 38. Lerat E, Daubin V, Moran NA: From gene trees to organismal phylogeny in prokaryotes: the case of the γ-Proteobacteria. PLoS Biol. 2003, 1 (1): e19-PubMed CentralPubMedGoogle Scholar 40. Herbeck JT, Degnan PH, Wernegreen JJ: Nonhomogeneous model of sequence evolution indicates independent origins of primary endosymbionts within the Enterobacteriales (γ-Proteobacteria). Mol Biol Evol. 2005, 22 (3): 520-532.PubMedGoogle Scholar 41. Belda E, Moya A, Silva FJ: Genome rearrangement distances and gene order phylogeny in γ-Proteobacteria. Mol Biol Evol. 2005, 22 (6): 1456-1467.PubMedGoogle Scholar 42. Williams KP, Gillespie JJ, Sobral BW, Nordberg EK, Snyder EE, Shallom JM, Dickerman AW: Phylogeny of Gammaproteobacteria. J Bacteriol. 2010, 192 (9): 2305-2314.PubMed CentralPubMedGoogle Scholar 44. Lartillot N, Brinkmann H, Philippe H: Suppression of long-branch attraction artefacts in the animal phylogeny using a site-heterogeneous model. BMC Evol Biol. 2007, 7: S4-PubMed CentralPubMedGoogle Scholar 46. Nesnidal MP, Helmkampf M, Bruchhaus I, Hausdorf B: Compositional heterogeneity and phylogenomic inference of metazoan relationships. Mol Biol Evol. 2010, 27 (9): 2095-2104.PubMedGoogle Scholar 47. Philippe H, Brinkman FS, Martinez P, Riutort M, Baguna J: Acoel flatworms are not platyhelminthes: evidence from phylogenomics. Plos One. 2007, 2 (8): e717-PubMed CentralPubMedGoogle Scholar 48. Brinkmann H, Philippe H: Archaea sister group of Bacteria? Indications from tree reconstruction artifacts in ancient phylogenies. Mol Biol Evol. 1999, 16 (6): 817-825.PubMedGoogle Scholar 49. Brochier C, Philippe H: A non-hyperthermophilic ancestor for bacteria. Nature. 2002, 417 (6886): 244-PubMedGoogle Scholar 50. Hampl V, Čepička I, Flegr J, Tachezy J, Kulda J: Critical analysis of the topology and rooting of the parabasalian 16S rRNA tree. Mol Phylogenet Evol. 2004, 32 (3): 711-723.PubMedGoogle Scholar 51. Bapteste E, Susko E, Leigh J, Ruiz-Trillo I, Bucknam J, Doolittle WF: Alternative methods for concatenation of core genes indicate a lack of resolution in deep nodes of the prokaryotic phylogeny. Mol Biol Evol. 2008, 25 (1): 83-91.PubMedGoogle Scholar 52. Philippe H, Lopez P, Brinkmann H, Budin K, Germot A, Laurent J, Moreira D, Muller M, Le Guyader H: Early-branching or fast-evolving eukaryotes? An answer based on slowly evolving positions. Proc R Soc Lond B. 2000, 267 (1449): 1213-1221.Google Scholar 53. Hirt RP, Logsdon JM, Healy B, Dorey MW, Doolittle WF, Embley TM: Microsporidia are related to Fungi: evidence from the largest subunit of RNA polymerase II and other proteins. Proc Natl Acad Sci USA. 1999, 96 (2): 580-585.PubMed CentralPubMedGoogle Scholar 56. Delsuc F, Phillips MJ, Penny D: Comment on "Hexapod origins: monophyletic or paraphyletic?". Science. 2003, 301 (5639): 1482-PubMedGoogle Scholar 57. Phillips MJ, Penny D: The root of the mammalian tree inferred from whole mitochondrial genomes. Mol Phylogenet Evol. 2003, 28 (2): 171-185.PubMedGoogle Scholar 58. Gibson A, Gowri-Shankar V, Higgs PG, Rattray M: A comprehensive analysis of mammalian mitochondrial genome base composition and improved phylogenetic methods. Mol Biol Evol. 2005, 22 (2): 251-264.PubMedGoogle Scholar 59. Hrdý I, Hirt RP, Doležal P, Bardoňová L, Foster PG, Tachezy J, Embley TM: Trichomonas hydrogenosomes contain the NADH dehydrogenase module of mitochondrial complex I. Nature. 2004, 432 (7017): 618-622.PubMedGoogle Scholar 60. Embley TM, van der Giezen M, Horner DS, Dyal PL, Foster P: Mitochondria and hydrogenosomes are two forms of the same fundamental organelle. Philos Trans R Soc Lond B Biol Sci. 2003, 358 (1429): 191-201. discussion 201-203PubMed CentralPubMedGoogle Scholar 61. Philippe H, Roure B: Site-specific time heterogeneity of the substitution process and its impact on phylogenetic inference. BMC Evol Biol. 2011, 11: 17-PubMed CentralPubMedGoogle Scholar 62. Raychoudhury R, Baldo L, Oliveira DC, Werren JH: Modes of acquisition of Wolbachia: horizontal transfer, hybrid introgression, and codivergence in the Nasonia species complex. Evolution. 2009, 63 (1): 165-183.PubMedGoogle Scholar 63. Perlman SJ, Hunter MS, Zchori-Fein E: The emerging diversity of Rickettsia. Proc R Soc B. 2006, 273 (1598): 2097-2106.PubMed CentralPubMedGoogle Scholar 64. Noda H, Munderloh UG, Kurtti TJ: Endosymbionts of ticks and their relationship to Wolbachia spp. and tick-borne pathogens of humans and animals. Appl Environ Microbiol. 1997, 63 (10): 3926-3932.PubMed CentralPubMedGoogle Scholar 65. Sassera D, Beninati T, Bandi C, Bouman EAP, Sacchi L, Fabbi M, Lo N: 'Candidatus Midichloria mitochondrii', an endosymbiont of the tick Ixodes ricinus with a unique intramitochondrial lifestyle. Int J Syst Evol Microbiol. 2006, 56: 2535-2540.PubMedGoogle Scholar 66. Degnan PH, Leonardo TE, Cass BN, Hurwitz B, Stern D, Gibbs RA, Richards S, Moran NA: Dynamics of genome evolution in facultative symbionts of aphids. Environ Microbiol. 2009, 12 (8): 2060-2069.PubMedGoogle Scholar 67. Degnan PH, Yu Y, Sisneros N, Wing RA, Moran NA: Hamiltonella defensa, genome evolution of protective bacterial endosymbiont from pathogenic ancestors. Proc Natl Acad Sci USA. 2009, 106 (22): 9063-9068.PubMed CentralPubMedGoogle Scholar 68. Toh H, Weiss BL, Perkin SA, Yamashita A, Oshima K, Hattori M, Aksoy S: Massive genome erosion and functional adaptations provide insights into the symbiotic lifestyle of Sodalis glossinidius in the tsetse host. Genome Res. 2006, 16 (2): 149-156.PubMed CentralPubMedGoogle Scholar 69. Wilkes TE, Darby AC, Choi JH, Colbourne JK, Werren JH, Hurst GD: The draft genome sequence of Arsenophonus nasoniae, son-killer bacterium of Nasonia vitripennis, reveals genes associated with virulence and symbiosis. Insect Mol Biol. 2010, 19 (Sp. Iss. SI Suppl. 1): 59-73.PubMedGoogle Scholar 70. Dale C, Plague GR, Wang B, Ochman H, Moran NA: Type III secretion systems and the evolution of mutualistic endosymbiosis. Proc Natl Acad Sci USA. 2002, 99 (19): 12397-12402.PubMed CentralPubMedGoogle Scholar 71. Hosokawa T, Koga R, Kikuchi Y, Meng XY, Fukatsu T: Wolbachia as a bacteriocyte-associated nutritional mutualist. Proc Natl Acad Sci USA. 2010, 107 (2): 769-774.PubMed CentralPubMedGoogle Scholar 72. Dedeine F, Vavre F, Fleury F, Loppin B, Hochberg ME, Bouletreau M: Removing symbiotic Wolbachia bacteria specifically inhibits oogenesis in a parasitic wasp. Proc Natl Acad Sci USA. 2001, 98 (11): 6247-6252.PubMed CentralPubMedGoogle Scholar 73. Heddi A, Charles H, Khatchadourian C, Bonnot G, Nardon P: Molecular characterization of the principal symbiotic bacteria of the weevil Sitophilus oryzae: a peculiar G + C content of an endocytobiotic DNA. J Mol Evol. 1998, 47 (1): 52-61.PubMedGoogle Scholar 74. Nováková E, Hypša V: A new Sodalis lineage from bloodsucking fly Craterina melbae (Diptera, Hippoboscoidea) originated independently of the tsetse flies symbiont Sodalis glossinidius. FEMS Microbiol Lett. 2007, 269 (1): 131-135.PubMedGoogle Scholar 75. Moran N, Munson M, Baumann P, Ishikawa H: A molecular clock in endosymbiotic bacteria is calibrated using the insect hosts. Proc R Soc Lond B. 1993, 253 (1337): 167-171.Google Scholar 76. Harada H, Oyaizu H, Ishikawa H: A consideration about the origin of aphid intracellular symbiont in connection with gut bacterial flora. J Gen Appl Microbiol. 1996, 42 (1): 17-26.Google Scholar 77. Harada H, Oyaizu H, Kosako Y, Ishikawa H: Erwinia aphidicola, a new species isolated from pea aphid, Acyrthosiphon pisum. J Gen Appl Microbiol. 1997, 43 (6): 349-354.PubMedGoogle Scholar 78. Prado SS, Almeida RP: Phylogenetic placement of pentatomid stink bug gut symbionts. Curr Microbiol. 2009, 58 (1): 64-69.PubMedGoogle Scholar 79. Chanbusarakum L, Ullman D: Characterization of bacterial symbionts in Frankliniella occidentalis (Pergande), Western flower thrips. J Invertebr Pathol. 2008, 99 (3): 318-325.PubMedGoogle Scholar 80. De Vries EJ, Van der Wurff AWG, Jacobs G, Breeuwer JAJ: Onion thrips, Thrips tabaci, have gut bacteria that are closely related to the symbionts of the western flower thrips, Frankliniella occidentalis. J Insect Sci. 2008, 8: 1-11.PubMedGoogle Scholar 81. Mazzon L, Martinez-Sanudo I, Simonato M, Squartini A, Savio C, Girolami V: Phylogenetic relationships between flies of the Tephritinae subfamily (Diptera, Tephritidae) and their symbiotic bacteria. Mol Phylogenet Evol. 2010, 56 (1): 312-326.PubMedGoogle Scholar 82. Mazzon L, Piscedda A, Simonato M, Martinez-Sanudo I, Squartini A, Girolami V: Presence of specific symbiotic bacteria in flies of the subfamily Tephritinae (Diptera Tephritidae) and their phylogenetic relationships: proposal of 'Candidatus Stammerula tephritidis'. Int J Syst Evol Microbiol. 2008, 58 (Pt 6): 1277-1287.PubMedGoogle Scholar 83. Capuzzo C, Firrao G, Mazzon L, Squartini A, Girolami V: 'Candidatus Erwinia dacicola', a coevolved symbiotic bacterium of the olive fly Bactrocera oleae (Gmelin). Int J Syst Evol Microbiol. 2005, 55 (Pt 4): 1641-1647.PubMedGoogle Scholar 84. Hosokawa T, Kikuchi Y, Nikoh N, Shimada M, Fukatsu T: Strict host-symbiont cospeciation and reductive genome evolution in insect gut bacteria. PLoS Biol. 2006, 4 (10): e337-PubMed CentralPubMedGoogle Scholar 85. Kikuchi Y, Hosokawa T, Nikoh N, Meng XY, Kamagata Y, Fukatsu T: Host-symbiont co-speciation and reductive genome evolution in gut symbiotic bacteria of acanthosomatid stinkbugs. BMC Biol. 2009, 7: 2-PubMed CentralPubMedGoogle Scholar 86. Hosokawa T, Kikuchi Y, Nikoh N, Meng XY, Hironaka M, Fukatsu T: Phylogenetic position and peculiar genetic traits of a midgut bacterial symbiont of the stinkbug Parastrachia japonensis. Appl Environ Microbiol. 2010, 76 (13): 4130-4135.PubMed CentralPubMedGoogle Scholar 87. Kaiwa N, Hosokawa T, Kikuchi Y, Nikoh N, Meng XY, Kimura N, Ito M, Fukatsu T: Primary gut symbiont and secondary Sodalis-allied symbiont in the scutellerid stinkbug Cantao ocellatus. Appl Environ Microbiol. 2010, 76 (11): 3486-3494.PubMed CentralPubMedGoogle Scholar 88. Kaiwa N, Hosokawa T, Kikuchi Y, Nikoh N, Meng XY, Kimura N, Ito M, Fukatsu T: Bacterial symbionts of the giant jewel stinkbug Eucorysses grandis (Hemiptera: Scutelleridae). Zool Sci. 2011, 28 (3): 169-174.PubMedGoogle Scholar 89. Thao ML, Gullan PJ, Baumann P: Secondary (γ-Proteobacteria) endosymbionts infect the primary (β-Proteobacteria) endosymbionts of mealybugs multiple times and coevolve with their hosts. Appl Environ Microbiol. 2002, 68 (7): 3190-3197.PubMed CentralPubMedGoogle Scholar 90. Spaulding AW, von Dohlen CD: Phylogenetic characterization and molecular evolution of bacterial endosymbionts in psyllids (Hemiptera: Sternorrhyncha). Mol Biol Evol. 1998, 15 (11): 1506-1513.PubMedGoogle Scholar 91. Fukatsu T, Hosokawa T, Koga R, Nikoh N, Kato T, Hayama S, Takefushi H, Tanaka I: Intestinal endocellular symbiotic bacterium of the macaque louse Pedicinus obtusus: Distinct endosymbiont origins in anthropoid primate lice and the old world monkey louse. Appl Environ Microbiol. 2009, 75 (11): 3796-3799.PubMed CentralPubMedGoogle Scholar 92. Toju H, Hosokawa T, Koga R, Nikoh N, Meng XY, Kimura N, Fukatsu T: "Candidatus Curculioniphilus buchneri", a novel clade of bacterial endocellular symbionts from weevils of the genus Curculio. Appl Environ Microbiol. 2009, 76 (1): 275-282.PubMed CentralPubMedGoogle Scholar 93. Degnan PH, Bittleston LS, Hansen AK, Sabree ZL, Moran NA, Almeida RP: Origin and examination of a leafhopper facultative endosymbiont. Curr Microbiol. 2011, 62 (5): 1565-1572.PubMed CentralPubMedGoogle Scholar 94. Allen JM, Reed DL, Perotti MA, Braig HR: Evolutionary relationships of "Candidatus Riesia spp., " endosymbiotic Enterobacteriaceae living within hematophagous primate lice. Appl Environ Microbiol. 2007, 73 (5): 1659-1664.PubMed CentralPubMedGoogle Scholar 95. Burke GR, Moran NA: Massive genomic decay in Serratia symbiotica, a recently evolved symbiont of aphids. Genome Biol Evol. 2011, 3: 195-208.PubMed CentralPubMedGoogle Scholar 96. Gherna RL, Werren JH, Weisburg W, Cote R, Woese CR, Mandelco L, Brenner DJ: Arsenophonus nasoniae gen. nov, sp. nov, the causative agent of the son-killer trait in the parasitic wasp Nasonia vitripennis. Int J Syst Bacteriol. 1991, 41 (4): 563-565.Google Scholar 97. Dale C, Beeton M, Harbison C, Jones T, Pontes M: Isolation, pure culture, and characterization of "Candidatus Arsenophonus arthropodicus, " an intracellular secondary endosymbiont from the hippoboscid louse fly Pseudolynchia canariensis. Appl Environ Microbiol. 2006, 72 (4): 2997-3004.PubMed CentralPubMedGoogle Scholar 98. Verbarg S, Fruhling A, Cousin S, Brambilla E, Gronow S, Lunsdorf H, Stackebrandt E: Biostraticola tofi gen. nov., spec. nov., a novel member of the family Enterobacteriaceae. Curr Microbiol. 2008, 56 (6): 603-608.PubMedGoogle Scholar 101. Foster PG: Modeling compositional heterogeneity. Syst Biol. 2004, 53 (3): 485-495.PubMedGoogle Scholar 102. Kono M, Koga R, Shimada M, Fukatsu T: Infection dynamics of coexisting Beta- and Gammaproteobacteria in the nested endosymbiotic system of mealybugs. Appl Environ Microbiol. 2008, 74 (13): 4175-4184.PubMed CentralPubMedGoogle Scholar 103. Thao ML, Clark MA, Baumann L, Brennan EB, Moran NA, Baumann P: Secondary endosymbionts of psyllids have been acquired multiple times. Curr Microbiol. 2000, 41 (4): 300-304.PubMedGoogle Scholar 104. Kolsch G, Matz-Grund C, Pedersen BV: Ultrastructural and molecular characterization of endosymbionts of the reed beetle genus Macroplea (Chrysomelidae, Donaciinae), and proposal of "Candidatus Macropleicola appendiculatae" and "Candidatus Macropleicola muticae". Can J Microbiol. 2009, 55 (11): 1250-1260.PubMedGoogle Scholar 105. Kolsch G, Pedersen BV: Can the tight co-speciation between reed beetles (Col., Chrysomelidae, Donaciinae) and their bacterial endosymbionts, which provide cocoon material, clarify the deeper phylogeny of the hosts?. Mol Phylogenet Evol. 2010, 54 (3): 810-821.PubMedGoogle Scholar 106. Kuchler SM, Dettner K, Kehl S: Molecular characterization and localization of the obligate endosymbiotic bacterium in the birch catkin bug Kleidocerys resedae (Heteroptera Lygaeidae, Ischnorhynchinae). FEMS Microbiol Ecol. 2010, 73 (2): 408-418.PubMedGoogle Scholar 107. Kuechler SM, Dettner K, Kehl S: Characterization of an obligate intracellular bacterium in the midgut epithelium of the bulrush bug Chilacis typhae (Heteroptera, Lygaeidae, Artheneinae). Appl Environ Microbiol. 2011, 77 (9): 2869-2876.PubMed CentralPubMedGoogle Scholar 108. Kikuchi Y, Fukatsu T: Endosymbiotic bacteria in the esophageal organ of glossiphoniid leeches. Appl Environ Microbiol. 2002, 68 (9): 4637-4641.PubMed CentralPubMedGoogle Scholar 109. Perkins SL, Budinoff RB, Siddall ME: New Gammaproteobacteria associated with blood-feeding leeches and a broad phylogenetic analysis of leech endosymbionts. Appl Environ Microbiol. 2005, 71 (9): 5219-5224.PubMed CentralPubMedGoogle Scholar 110. Nakabachi A, Yamashita A, Toh H, Ishikawa H, Dunbar HE, Moran NA, Hattori M: The 160-kilobase genome of the bacterial endosymbiont Carsonella. Science. 2006, 314 (5797): 267-PubMedGoogle Scholar 111. Thao ML, Baumann P: Evolutionary relationships of primary prokaryotic endosymbionts of whiteflies and their hosts. Appl Environ Microbiol. 2004, 70 (6): 3401-3406.PubMed CentralPubMedGoogle Scholar 112. Burke GR, Normark BB, Favret C, Moran NA: Evolution and diversity of facultative symbionts from the aphid subfamily Lachninae. Appl Environ Microbiol. 2009, 75 (16): 5328-5335.PubMed CentralPubMedGoogle Scholar 122. Boussau B, Gouy M: Efficient likelihood computations with nonreversible models of evolution. Syst Biol. 2006, 55 (5): 756-768.PubMedGoogle Scholar 123. Galtier N, Gouy M: Inferring pattern and process: maximum-likelihood implementation of a nonhomogeneous model of DNA sequence evolution for phylogenetic analysis. Mol Biol Evol. 1998, 15 (7): 871-879.PubMedGoogle Scholar 124. Galtier N, Gouy M: Inferring phylogenies from DNA sequences of unequal base compositions. Proc Natl Acad Sci USA. 1995, 92 (24): 11317-11321.PubMed CentralPubMedGoogle Scholar 125. Tarrio R, Rodriguez-Trelles F, Ayala FJ: Shared nucleotide composition biases among species and their impact on phylogenetic reconstructions of the Drosophilidae. Mol Biol Evol. 2001, 18 (8): 1464-1473.PubMedGoogle Scholar 126. Galtier N, Tourasse N, Gouy M: A nonhyperthermophilic common ancestor to extant life forms. Science. 1999, 283 (5399): 220-221.PubMedGoogle Scholar 128. Swofford DL: PAUP*. Phylogenetic analysis using parsimony (*and other methods). Version 4. 2002, Sunderland, Massachusetts: Sinauer AssociatesGoogle Scholar 129. Kostka M, Uzlíková M, Čepička I, Flegr J: SlowFaster, a user-friendly program for slow-fast analysis and its application on phylogeny of Blastocystis. BMC Bioinformatics. 2008, 9: 341-PubMed CentralPubMedGoogle Scholar 132. Nylander JA, Wilgenbusch JC, Warren DL, Swofford DL: AWTY (are we there yet?): a system for graphical exploration of MCMC convergence in Bayesian phylogenetics. Bioinformatics. 2008, 24 (4): 581-583.PubMedGoogle Scholar 133. Rambaut A, Drummond AJ: Tracer v1.5. 2009, []Google Scholar 137. Lanave C, Preparata G, Saccone C, Serio G: A new method for calculating evolutionary substitution rates. J Mol Evol. 1984, 20 (1): 86-93.PubMedGoogle Scholar 138. Yang Z: Maximum likelihood phylogenetic estimation from DNA sequences with variable rates over sites: approximate methods. J Mol Evol. 1994, 39 (3): 306-314.PubMedGoogle Scholar 139. Posada D: Using MODELTEST and PAUP* to select a model of nucleotide substitution. Curr Protoc Bioinformatics. 2003, 6.5.1-6.5.14.Google Scholar 142. Smyth P: Model selection for probabilistic clustering using cross-validated likelihood. Stat Comput. 2000, 10 (1): 63-72.Google Scholar © Husník et al; licensee BioMed Central Ltd. 2011
Biwoare have revealed more details on the Trooper class in Star Wars: The Old Republic. The new details focus on the high tech weaponry at the trooper's disposal, the unique craft they can pilot and the new companion, the demolitions expert Tanno Vik. Read on for more details and a new trailer. Troopers are deadly at range, wielding the finest blasters available to the Republic. With training, Troopers can become advanced Vanguard warriors. These fighters stride into battle in state-of-the-art heavy armour, wielding even larger blasters like underslung cannons to blast the enemy out of cover. Their unique vessel is the Rendili Hyperworks BT-7 Thunderclap , an advanced assault craft, bristling with weaponry. On board you'll be able to wander around the hi-tech briefing rooms and armoury decks that come with the vessel. There you'll be able to put the Trooper's companion Tanno Vik to work, crafting new armour and weapons for you and your other companions. For more on Bioware's upcoming Star Wars MMO, check out our preview , or head on over to the official Star Wars: The Old Republic site.
Calculate Road Distances in US how to calculate distance between cities in US: To find the distances between cities in US and other useful information such as average speed, driving time, the recommended breaks, fuel consumption, fuel price, type in the above fields the names of localities - FROM Indianapolis,IN TO Cooper-City,FL and then press ENTER key or click on DISTANCE button. Change the route for US After generating the route Indianapolis,IN - Cooper-City,FL could be changed by simply dragging the line with the mouse. The change can be applied to any intermediate points of that route as well as the points of departure and arrival. average speed Indianapolis,IN - Cooper-City,FL driving time Indianapolis,IN - Cooper-City,FL recommended break Indianapolis,IN - Cooper-City,FL fuel consumption Indianapolis,IN - Cooper-City,FL fuel price Indianapolis,IN - Cooper-City,FL. Adjustment of fuel consumption and fuel price for Indianapolis,IN - Cooper-City,FL terms of using distancesonline.com
चित्तौड़गढ़। मंगलवाड़ थाना पुलिस ने रविवार को बस के इंतजार के खड़े एक व्यक्ति से 17.700 किलोग्राम अवैध अफीम डोडाचूरा जब्त कर एक आरोपी को गिरफ्तार किया है, वहीं एक बाल अपचारी को डिटेन किया है। पुलिस अधीक्षक राजन दुष्यन्त ने बताया कि थानाधिकारी मंगलवाड़ चन्द्रशेखर किलानियां पु.नि. मय जाप्ता एएसआई संतोष तिवारी, कानि करनलसिंह, संदीप, थानसिंह व दिलीपसिंह के साथ थाने से लोकल एवं स्पेशल एक्ट की कार्यवाही हेतु रवाना हो मंगलवाड चौराया पहुंच नाकाबन्दी की। इस दौरान मुखबिर की सूचना पर चित्तौडगढ उदयपुर सिक्स लेन हाईवे रोड पर रॉयल गेस्ट हाउस के सामने बस के इंतजार में खडे हुये खारा फलौदी थाना फलौदी जिला जोधपुर निवासी 20 वर्षीय राधेश्याम पुत्र हनुमानाराम विश्नोई व एक बाल अपचारी के कब्जेशुदा दो बैगों से 17.700 किलोग्राम अवैध अफीम डोडाचूरा जब्त कर आरोपी को मौके पर गिरफ्तार कर नाबालिग को डिटेन किया गया।
Home Authors Posts by Kaitlin Martin As of late, a lot of my friends from out-of-town have been coming to visit me in Durham. I pride myself on being a planner, so the idea of organizing an entire day or weekend in Durham is enough... Breakfast may be the best meal of the day and Durham has it down pat. What’s even better is that it can all be found throughout the day! Here's some spots you need to know about!
Will the December massacre of 20 schoolchildren in Newtown, Conn., be a tipping point in the long-running crusade against video game violence? Vice President Joe Biden met with video game industry representatives on Friday as part of a larger effort to find solutions to problems associated with gun violence. Wayne LaPierre, the executive vice president of the National Rifle Association, has blamed Hollywood and the video game industry for the rash of U.S. shooting sprees. ”There exists in this country a callous, corrupt and corrupting shadow industry that sells, and sows, violence against its own people,” he said in a controversial speech last month, citing video games like Grand Theft Auto and Mortal Kombat. He called such games the “filthiest form of pornography.” Of course, the video game industry–which some estimate to be worth $100 billion worldwide–isn’t exactly conceding the point. The Entertainment Software Association (the trade association of the video game industry in the U.S.) released a statement to msnbc.com following the Biden meeting saying that while it was “productive and candid” and the group was looking forward to continuing the discussion, there is “no causal connection between video games and real-life violence.” The International Game Developers Association, which represents individuals who make video games, pointed to First Amendment rights, which the Supreme Court recently upheld for video games, but called for more studies. “We may not make games that are libelous or pose a clear and present danger to others. The government has a valid role in protecting people and especially children from products that are genuinely dangerous. While scientific study has shown that imaginary violence in video games does not cause real world violence, the game developer community recognizes that we have responsibilities along with our rights,” said chairman Daniel Greenberg. Christopher J. Ferguson, an associate professor of psychology and criminal justice at Texas A&M University, attended the meeting with Biden to discuss his research (which found no link between video games and violence). He told msnbc.com that the meeting lasted about two hours and had about 20 people at the table. Biden, Ferguson said, told the group that “he understood the industry itself believes that they’re not necessarily harmful” and seemed “neutral, open-minded, and hadn’t made up his mind yet.” Ferguson said there “wasn’t much talk about changing the content of the games, but putting more controls on parents themselves.” Brad Bushman, a professor at the School of Communications at Ohio State University (who was not at the meeting), said there is really no incentive for video game companies to change. “They’re making a lot of money,” from the violence, he said. Unlike Ferguson, Bushman’s research has shown that violent games do increase aggressive thoughts and angry feelings and can cause aggressive behavior. But in the end, people must vote with their wallets. “If the public continues to buy video games, there’s going to be no impact. But if they say enough is enough, I think the industry will stop producing them,” said Bushman.
भोपाल व रायसेन जिले में करोड़ों का घोटाला भोपाल, महिला एवं बाल विकास विभाग अंतर्गत भोपाल और रायसेन जिले की परियोजनाओं से जुड़े तीन करोड़ के घोटाले को लेकर अधिकारी कुछ भी कहने से बच रहे हैं. फर्जी भुगतान कर यह राशि आंगनवाड़ी कार्यकर्ता, सहायिका के अलावा अन्य व्यक्तियों के बैंक खाते में जमा कर दी गई थी. इस मामले में संबंधित जिलों से तथ्यात्मक जानकारी महालेखा परीक्षक (सीएजी) को उपलब्ध नहीं कराई जा रही है. सीएजी से पत्र मिलने के बाद महिला एवं बाल विकास विभाग ने आपत्ति जताते हुए अधिकारियों को तीन दिन में जानकारी नहीं मिलने पर 9 जिलों के जिला कार्यक्रम अधिकारियों के खिलाफ अनुशासनात्मक कार्रवाई करने की चेतावनी दी है. सीएजी ने अपनी रिपोर्ट में खुलासा किया था कि महिला एवं बाल विकास विभाग में भोपाल और रायसेन जिले में विभिन्न परियोजनाओं के तहत तीन करोड़ 30 लाख रुपए के मानदेय घोटाले को उजागर किया था. इस मानदेय की राशि का फर्जी आहरण कर असंबंद्ध बैंक खातों में यह राशि जमा कर दी गई थी. यह राशि आंगनवाड़ी कार्यकर्ता, सहायिका के अलावा अन्य व्यक्तियों के बैंक खाते में जमा कर दिए गए थे और नियम विरुद्ध आहरण कर लिया गया था. वर्ष 2014 से लेकर वर्ष 2017 में यह गड़बड़ी की गई थी. महालेखा परीक्षक द्वारा भोपाल और रायसेन के अलावा इंदौर, होशंगाबाद, डिंडोरी, खरगौन, मुरैना, राजगढ़, सीहोर,शहड़ोल और उज्जैन में जांच की जा रही है. सीएजी ने इन सभी जिलों के जिला कार्यक्रम अधिकारियों से घोटाले के संदर्भ में तथ्यात्मक जानकारी मांगी थी, लेकिन उन्हें यह जानकारी मुहैया नहीं कराई जा रही है, इससे यह संभावना बढ़ गई है कि गड़बड़ी और बड़े पैमाने पर हो सकती है. संचालक बजट तेजस्वी एस नायक ने महिला एवं बाल विकास विभाग के प्रमुख सचिव जेएन कंसोटिया को पत्र लिखकर जांच किए जा रहे जिलों के अधिकारियों को सीएजी को जानकारी उपलब्ध कराने के निर्देश देने के लिए कहा था. ये जानकारी उपलब्ध कराने के दिए निर्देश असंबद्ध बैंक खातों में भुगतान का विवरण, गड़बड़ी में शामिल लोगों के बैंक खाता क्रमांक, संबंधित बैंक खाते किस व्यक्तियों के नाम है? संबंधित व्यक्ति विभाग की किस परियोजना से जुड़े हैं, क्या वे महिला एवं बाल विकास विभाग के कर्मचारी है, यदि वे विभाग के कर्मचारी नहीं है तो उन्हें किस हैसियत से भुगतान किया गया है?
The terrorist attacks in New York City and Washington D.C. have left many people worrying whether another attack with biological weapons this time could be coming. Mr. John Parachini, a fellow on Terrorism and Non-proliferation Issues at the federally funded RAND Corporation (a think tank in Washington D.C.) talks with VOA's Penelope Poulou about such a possibility. Poulou: Mr. Parachini, can you please tell me what is bio-terrorism? Parachini: Bio-terrorism is the use of disease and toxins to sicken and eventually kill people or incapacitate them. I think such attacks by terrorists are of low probability although, given that they may have high consequences we need to take some measures to detect such attacks early and address the consequences promptly. Poulou: You mention that it is of low probability; why is it of low probability? Parachini: Because it is difficult to acquire these materials, they are difficult to handle, they are difficult to weaponize and they are difficult to deliver to a target. There are other alternatives that they can more readily pursue and as we saw in the attacks of September 11, terrorists essentially used an ordinary means of modern transportation and turned it into a missile that was laden with fuel. Poulou: On the other hand, if we are dealing with the ability to spread a disease like the Plague or like Anthrax, or like Botulism or Smallpox, these type of diseases could kill millions of people instead of few thousands. Parachini: Some could. But, it's always in the conditional. It's possible. But it may not necessarily be likely or indeed the case. Some instances of biological agents have been used and only a few people have been incapacitated or killed. Poulou: Does this have to do with the fact that we have vaccines and antibiotics that can combat such diseases? Parachini: Well, one thing would be improving our public health system to address emerging infectious diseases, which are naturally occurring, can indeed give us capabilities that are valuable in the unlikely and low probability event that a terrorist actually uses a biological agent. Poulou: What other forms of prevention can we employ? Parachini: Well, most important is, we need to make both a national and an international effort to improve the ability to detect emerging infectious diseases. This also can be very valuable in helping us determine whether or not it is a natural outbreak or an intentional one. Poulou: Is it possible to produce more vaccines in a shorter period of time? Parachini: Well, there is currently an extensive research and development effort going on with the guidance of the Centers for Disease Control on the Smallpox vaccine. But, Smallpox as a possible biological agent to be used by terrorists, is I think quite unlikely given that we believe that stocks of Smallpox are only at a research facility in Russia and at the Centers for Disease Control in Atlanta. Now, some people have alleged that other nation states may have retained some Smallpox stocks. But, these are allegations that have not been proven in the public domain, and if they did, they would be very few. So, there are other, naturally occurring diseases that are much more likely and probably much easier to acquire than Smallpox. Poulou: Such as what, for example? Parachini: Well, there are Anthrax outbreaks regularly around the globe because it is a naturally occurring disease. Now, Anthrax is not a contagious agent but it is very deadly and it affects livestock and it occurs around the world. From time to time there are limited outbreaks of plague, which is contagious, which can be a problem. But, today there really has not been a use in the modern period, in the post World War II period of plague for intentional and pernicious purposes. Poulou: Out of all this havoc and mayhem, do you think that we are going to be more prepared in the future? Parachini: There is no doubt that this has raised the profile of a variety of different tools that can be used to counter terrorism. Poulou: Thank you very much, Mr. Parachini. Parachini: I'm very glad to speak with you. John Parachini is an expert on Terrorism and Nonproliferation issues at the federally funded RAND Corporation in Washington D.C.
Alexa had always prided herself on being a friendly and open person, but lately, she felt overwhelmed by the constant barrage of messages she received on Messenger every day. It seemed like everyone from old high school acquaintances to long-lost relatives were reaching out to her, clogging up her inbox with small talk and unsolicited advice. Even worse were the spammers trying to sell her sketchy products or scam her out of her hard-earned money. One evening, while scrolling through yet another string of irrelevant messages, Alexa decided she'd had enough. She was determined to take back control of her digital life and reclaim some semblance of peace and quiet. That's when she stumbled upon an article titled "How to Adjust Your Messenger Activity to Avoid Unwanted Messages and Spam." Alexa eagerly read through the suggestions listed in the article, feeling a sense of relief wash over her as she realized there were steps she could take to protect herself from unwanted intrusions. First, she navigated to her Messenger settings and adjusted her message request preferences so that only people she knew could reach out to her directly. Next, she blocked a few individuals who had been particularly aggressive or bothersome in their messaging habits. Finally, she reported several suspicious accounts as spam, taking satisfaction in knowing that they would no longer be able to harass other innocent users. As she worked through these changes, Alexa couldn't help but feel a pang of guilt. Was she being too harsh? After all, wasn't it better to be kind and welcoming to others, even if they weren't necessarily close friends or family members? And what about those spammers - didn't they deserve a chance to explain themselves before she wrote them off entirely? It was then that she heard a knock on her door. Startled, she looked up to see her neighbor, Mrs. Johnson, standing outside, holding a plate of freshly baked cookies. "I noticed you haven't been yourself lately," said Mrs. Johnson gently. "Is everything okay?" Alexa hesitated, torn between wanting to maintain her newfound boundaries and feeling grateful for the kindness of her elderly neighbor. In that moment, she realized that there was a difference between setting healthy limits and shutting oneself off completely from the world. "Thank you for asking, Mrs. Johnson," Alexa replied, opening the door wider to let her neighbor in. "I've just been dealing with a lot of unwanted messages online, and it's been overwhelming. But I think I'm starting to figure things out." Mrs. Johnson nodded sympathetically. "The internet can be a scary place sometimes," she agreed. "But remember, there's still plenty of good to be found if you look for it. Don't let the bad drive you away from connecting with others." With renewed determination, Alexa thanked her neighbor for the wise words and promised to keep them in mind as she continued to fine-tune her digital presence. As she closed the door behind Mrs. Johnson, she knew that she had made the right decision - not just for herself, but for anyone who might cross her path in search of connection and community.
The minute you start dancing the clock is ticking. There are a limited number of years in which to make as much money as you can. Most dancers retire around 28. If you’re starting when you’re 18 that gives you ten years in which to make as much as you can and then get out. Chances are you will never again be able to make as much per day as you do while dancing. Make the most of it. There are two kinds of dancers, subsistence and capital dancers. A subsistence dancer just works enough to get by. Maybe a few days a week, saves little and is always in a financial crisis. I see these girls panicking to get enough dances to pay rent the next day but by the next week they are back to partying, doing drugs, buying expensive clothes and generally pissing away every dime they earn. Their plans for the future are vague at best and even though they claim to realize they can’t dance forever they seldom save and invest their money or invest in an education. These girls get out of the business no better then they started and spend the rest of their lives getting their ass pinched in menial, low paying jobs. A capital dancer dances as an investment. In my opinion this is the only reason to dance. Dancing is just too hard a way to earn a living to do it for just enough to “get by”. You can get by on a McDonalds salary. If you are going to have guys staring at your naked ass all evening you should at least be securing a decent future for yourself- not just tomorrow’s groceries. There are many excuses for not saving your money but in my experience few of them are valid. Single mother, health problems whatever- you can still afford to save. If you work hard you can make a great deal of money dancing. When you see that money in your hand it just doesn’t seem real, and when you keep seeing it night after night it seems like the supply will be endless. It’s not; you need to put away the largest portion you can. Not just a 10% or so but 30% or 40%. It is possible to do that and still live a very comfortable life. Probably not as comfortable as the other dancers but dancers tend to live beyond their means and end up with nothing but memories of that nice sports car or that fancy apartment. If you can just keep it under control for a few years you can have that stuff for the rest of your life- long after you’re done dancing. Live within your means; base your spending around not what you make dancing but what you would make at a good entry-level job. Get a good, reliable car but you don’t need that giant SUV or zippy sports car. Make sure your lease or car loan doesn’t rely on a dancers level of income to pay it. Same goes for the rent or mortgage. It’s very easy to fall on heels and break an ankle or tear up your knee- happens all the time. You could be out of work for weeks or even months. You don’t want to be buried under a mountain of bills. I suggest buying at least basic health insurance but if you don’t you will need at least enough savings to pay for emergencies. So what to do with the money you save? Well, set enough aside to pay for all of your expenses- food, housing, tuition, utilities, car, whatever for 4 months. This is your emergency fund, put it in your saving account and don’t spend it. The rest you should invest. I have a few well chosen mutual funds that I have been very happy with. As a dancer you’re looking to invest for the long term- at least 5 years and probably 10. Mutual funds are low maintenance and are well suited for this. I strongly advise agianst investing in individual stocks. Despite all tales of buying low and selling high at the end of the year very few people are able to make money off buying and selling individual stocks. Stick with mutual funds, they are safer and more reliable (at least for the novice investor). Waiting for a record company or modeling agency to discover you is NOT investing in your future. If that’s your thing- fine. Just go to school and save your money just in case they don’t discover you. The best possible investment you can make is an education. With a nice big nest egg and a good degree you can do just about anything you want when you retire from dancing. Without an education or any job skills that money will eventually be gone. With an education you can make the most of your savings, use it as capital for your own business or invest it for a steady source of income. Too many dancers talk about how they’re planning on going back to school or they’re just taking a semester off. This is bullshit, if you want an education you need to go to school and work hard. If you’re not going to school then you’re pissing away your future.
चंडीगढ़। सेक्टर-२६ ग्रेन मार्केट में अब चाहे अधिकारी हों या आम आदमी, बिना मास्क के एंट्री नहीं हो सकेगी। एंट्री गेट पर ही लोगों की थर्मल स्कैनिंग होगी और उन्हें सैनिटाइज किया जाएगा। सामान्य तापमान से अधिक होने पर वापस भेज दिया जाएगा। लॉकडाउन और कर्फ्यू के कारण इन दिनों ग्रेन मार्केट में सबसे ज्यादा भीड़ लग रही है। इसी को देखते हुए अब यूटी प्रशासन ने ग्रेन मार्केट में बिना मास्क के एंट्री बैन कर दी है। ग्रेन मार्केट में प्रवेश के लिए यूटी प्रशासन पास को पहले ही जरूरी कर चुका है। इसके साथ ही निजी वाहन का भी परिसर में प्रवेश निषेध किया गया है। दुकानों पर सामान की खरीद फरोख्त के दौरान दुकानों पर भीड़ न हो इसके लिए ऑड ईवन की व्यवस्था की गई है। ग्रेन मार्केट की प्रशासक उपजिलाधिकारी नाजुक कुमार स्वयं यूटी के निर्देशों की देखरेख कर रही हैं। सीटीयू की बसों को २०-२० की संख्या में सब्जियों और फलों के साथ भेजा जाएगा। ग्रेन मार्केट में एक ही एंट्री और एक ही एग्जिट प्वाइंट रखा गया है। लोगों के बीच सोशल डिस्टेंसिंग के लिए चार टीमों का गठन किया गया है। डीएसपी ईस्ट और डीएसपी पीसीआर ग्रेन मार्केट की सुरक्षा का जिम्मा संभाल रहे हैं।
Give Now  » Noon Edition Running Rings Around Us As you already know, not all planets have rings. Only Saturn, Jupiter, Uranus, and Neptune. But did you know that Saturn's rings aren't really even solid disks? They're actually bits of dust and rocks and ice that probably collected around the planet when one or more of the planet's moons were destroyed in a major collision. The debris was too close to the planet to reform as a moon, so it collected into a bunch of orbiting rings instead. The rings are held in place by Saturn's gravitational force and also shaped by the planet's other moons. With a telescope, we can see the rings from earth. The ice in the rings reflects sunlight, which makes them fairly visible from certain angles. But since the rings are only about three-hundred-feet thick, which is pretty thin in planetary terms, they're best seen on an angle. Looking at them straight on is like looking directly at a slightly wrinkled edge of a piece of paper from far away. Support For Indiana Public Media Comes From About A Moment of Science
सहित एलर्जी का शिकार लोगों की परेशानी बढ़ी रही। चिकित्सकों की मानें तो इन धूल कणों के कारण सांस व दिल के रोगियों को काफी परेशानी का सामना करना पड़ सकता है। इसराइली मीडिया कि रिपोर्ट के मुताबिक़ अवैध रूप से गिफ्ट लेने के मामले में भी नेतन्याहू पर आरोप लगाए गए हैं. इसके साथ ही वो एक अख़बार से सकारात्मक कवरेज को लेकर सौदा करने के मामले में भी संदिग्ध हैं. किचन में काउंटर टॉप व अन्य साफसफाई के लिए किचन टॉवल की जरूरत होती है। लेकिन अगर आपके घर में पुरानी बेडशीट है तो आपको किचन टॉवल खरीदने की जरूरत नहीं है। आप बेडशीट को स्क्वेयर या आयाताकार आकार में काटकर उसके कोने पर फोल्ड करके स्टिच करें। आप इसे किचन में क्लीनिंग के लिए इस्तेमाल कर सकते हैं। मई अंतिम सप्ताह तक घोषित होगा बोर्ड का रिजल्ट विधानसभा अध्यक्ष रहे श्रीनिवास तिवारी के कार्यकाल में विधानसभा सचिवालय में हुई नियुक्ति घोटाले पर जिस अफसर ने एफआईआर कराई अब वही अफसर यहां हो रही नियुक्तियों का काम देख रहे हैं। ये हैं यहां के उप सचिव श्यामलाल मैथिल। सोमवार को बीआरडी में बतौर गार्ड तैनात पूर्व सैनिकों को भी मरीजों व तीमारदारों से व्यवहार का पाठ पढ़ाया गया।</s>
DESK: दुनिया को अलविदा कह चुके सुशांत सिंह राजपूत आज भले ही बहुत दूर चले गए हो, लेकिन उनकी यादें आज भी लोगों के दिलों में मौजूद है. जी हां, सुशांत एक बार फिर हम सबसे मिलने आ रहे हैं. दरअसल जी टीवी पर फेमस सीरियल पवित्र रिश्ता का प्रसारण किया जा रहा है. प्रसारण करने वाले चैनल ने उसको श्रद्धांजलि बताया है. आपको बता दें कि जी टीवी ने इसका फैसला किया है कि सुशांत के याद में एक बार फिर सीरियल पवित्र रिश्ता का प्रसारण किया जाये. इस सीरियल से ही सुशांत सिंह राजपूत ने अपने करियर की शुरुआत की थी. इसी शो से शुरू हुई थी सुशांत और अंकिता की लव स्टोरी हालांकि सुशांत सिंह राजपूत का पहला टीवी शो ‘किस देश में है मेरा दिल’ था लेकिन ‘पवित्र रिश्ता’ से ही सुशांत और अंकिता को बतौर एक्टर्स पहचान मिली। इसके साथ ही यही टीवी शो था जिससे सुशांत और अंकिता की लव स्टोरी शुरू हुई थी।
# Range and Mean Deviation The field of statistics has practical applications in almost all fields of life. In finance and investing and manufacturing and various other fields. Whether you want to launch a rocket or calculate a students performance we take the help of statistics. Now let us learn the concepts of range and mean deviation. ## Range and Mean Deviation For a given series of data, statistics aims at analysis and drawing conclusions. The various measures of central tendency – mean, median and mode represent the values in a series. However, we can further implement this analytical claim of statistics, by measuring the scattering and dispersion of data around these measures of central tendency. For example, the range, in a series of men distributed by their ages, gives us an idea of how much the ages can vary from the central value. So without further ado, let us jump right into the concepts of range and mean deviation. ## Range The range can be simply understood as the value that tells us about the scattering of data. This gives us an idea of how much the data can vary. Consequently, it is related to the maximum and minimum values in a distribution. The range is the difference between the maximum and the minimum value in a distribution. Notably, it only gives us the idea of the spread of data. It does not tell us about the dispersion of values from a measure of central tendency. Range = Maximum value – Minimum value ## Mean Deviation To understand the dispersion of data from a measure of central tendency, we can use mean deviation. It comes as an improvement over the range. It basically measures the deviations from a value. This value is generally mean or median. Hence although mean deviation about mode can be calculated, mean deviation about mean and median are frequently used. Note that the deviation of an observation from a value a is d= x-a. To find out mean deviation we need to take the mean of these deviations. However, when this value of a is taken as mean, the deviations are both negative and positive since it is the central value. This further means that when we sum up these deviations to find out their average, the sum essentially vanishes. Thus to resolve this problem we use absolute values or the magnitude of deviation. The basic formula for finding out mean deviation is : Mean deviation= Sum of absolute values of deviations from ‘a’ ÷ The number of observations ## Solved Example for You Q: The sum of squares of deviation of variates from their A.M. is always 1. Zero 2. Minimum 3. Maximum 4. Cannot be said Sol: The correct option is “B”. It is a fundamental concept that the sum of squares of deviation of any variate from their arithmetic mean is always minimum. Share with friends ## Customize your course in 30 seconds ##### Which class are you in? 5th 6th 7th 8th 9th 10th 11th 12th Get ready for all-new Live Classes! Now learn Live with India's best teachers. Join courses with the best schedule and enjoy fun and interactive classes. Ashhar Firdausi IIT Roorkee Biology Dr. Nazma Shaik VTU Chemistry Gaurav Tiwari APJAKTU Physics Get Started
sales and marketing job description Ltd Positions Marketing And Business Development Officer Application Deadline December Category SalesMarketing Source Published Anf Management Co Ltd Job Circular Job Circular Administrative Assistant Resume Template Free Resume Examples Executive Assistant Resume Executive Resume Best Images About Important On Read More Facebook Navana Cng Limited Lpg Unit Head Of Sales Marketing Jobs Circular Navana Cng Limited Lpg Unit Head Of Sales Marketing Jobs This Sample Image Presentation Provider Company Offering Marketing Assistant Cover Letter Sample At Low Price With Discount So Collect Your Sample This Sample Image Presentation Provider Company Offering Marketing Actionable Marketing Tactics To Drive Sales And Apps To Execute Each Of Them Shopify Marketing Tactics Job Description And Business Management Actionable Marketing Tactics To Drive Sales And Apps To Free Download Sales Marketing Resume HttpWww Resumecareer Info Free Download Sales Marketing Resume HttpWww Resumecareer Sales Executive At Browns Group Of Companies Career First Marketing Jobs Sales Jobs Sri Lanka And Group Company Sales Executive At Browns Group Of Companies Career First Related sales and marketing job description DISCLAIMER: All images found here are believed to be in the "public domain". All of the images displayed are of unknown origin. We do not intend to infringe any legitimate intellectual right, artistic rights or copyright. If you are the rightful owner of any of the pictures/wallpapers posted here, and you do not want it to be displayed or if you require a suitable credit, then please contact us and we will immediately do whatever is needed either for the image to be removed or provide credit where it is due. All the content of this site are free of charge and therefore we do not gain any financial benefit from the display or downloads of any images/wallpaper.
--- metaTitle: "Python - Python HTTP Server" description: "Running a simple HTTP server, Serving files, Programmatic API of SimpleHTTPServer, Basic handling of GET, POST, PUT using BaseHTTPRequestHandler" --- # Python HTTP Server ## Running a simple HTTP server ```py python -m SimpleHTTPServer 9000 ``` ```py python -m http.server 9000 ``` Running this command serves the files of the current directory at port `9000`. If no argument is provided as port number then server will run on default port `8000`. The `-m` flag will search `sys.path` for the corresponding `.py` file to run as a module. If you want to only serve on localhost you'll need to write a custom Python program such as: ```py import sys import BaseHTTPServer from SimpleHTTPServer import SimpleHTTPRequestHandler HandlerClass = SimpleHTTPRequestHandler ServerClass = BaseHTTPServer.HTTPServer Protocol = "HTTP/1.0" if sys.argv[1:]: port = int(sys.argv[1]) else: port = 8000 server_address = ('127.0.0.1', port) HandlerClass.protocol_version = Protocol httpd = ServerClass(server_address, HandlerClass) sa = httpd.socket.getsockname() print "Serving HTTP on", sa[0], "port", sa[1], "..." httpd.serve_forever() ``` ## Serving files Assuming you have the following directory of files: [<img src="http://i.stack.imgur.com/61fLG.jpg" alt="enter image description here" />](http://i.stack.imgur.com/61fLG.jpg) You can setup a web server to serve these files as follows: ```py import SimpleHTTPServer import SocketServer PORT = 8000 handler = SimpleHTTPServer.SimpleHTTPRequestHandler httpd = SocketServer.TCPServer(("localhost", PORT), handler) print "Serving files at port {}".format(PORT) httpd.serve_forever() ``` ```py import http.server import socketserver PORT = 8000 handler = http.server.SimpleHTTPRequestHandler httpd = socketserver.TCPServer(("", PORT), handler) print("serving at port", PORT) httpd.serve_forever() ``` The `SocketServer` module provides the classes and functionalities to setup a network server. `SocketServer`'s `TCPServer` class sets up a server using the TCP protocol. The constructor accepts a tuple representing the address of the server (i.e. the IP address and port) and the class that handles the server requests. The `SimpleHTTPRequestHandler` class of the `SimpleHTTPServer` module allows the files at the current directory to be served. Save the script at the same directory and run it. Run the HTTP Server : python -m SimpleHTTPServer 8000 python -m http.server 8000 The '-m' flag will search 'sys.path' for the corresponding '.py' file to run as a module. Open [localhost:8000](http://localhost:8000) in the browser, it will give you the following: [<img src="http://i.stack.imgur.com/FfhnV.jpg" alt="enter image description here" />](http://i.stack.imgur.com/FfhnV.jpg) ## Programmatic API of SimpleHTTPServer What happens when we execute `python -m SimpleHTTPServer 9000`? To answer this question we should understand the construct of SimpleHTTPServer ([https://hg.python.org/cpython/file/2.7/Lib/SimpleHTTPServer.py)](https://hg.python.org/cpython/file/2.7/Lib/SimpleHTTPServer.py)) and BaseHTTPServer([https://hg.python.org/cpython/file/2.7/Lib/BaseHTTPServer.py)](https://hg.python.org/cpython/file/2.7/Lib/BaseHTTPServer.py)). Firstly, Python invokes the `SimpleHTTPServer` module with `9000` as an argument. Now observing the SimpleHTTPServer code, ```py def test(HandlerClass = SimpleHTTPRequestHandler, ServerClass = BaseHTTPServer.HTTPServer): BaseHTTPServer.test(HandlerClass, ServerClass) if __name__ == '__main__': test() ``` The test function is invoked following request handlers and ServerClass. Now BaseHTTPServer.test is invoked ```py def test(HandlerClass = BaseHTTPRequestHandler, ServerClass = HTTPServer, protocol="HTTP/1.0"): """Test the HTTP request handler class. This runs an HTTP server on port 8000 (or the first command line argument). """ if sys.argv[1:]: port = int(sys.argv[1]) else: port = 8000 server_address = ('', port) HandlerClass.protocol_version = protocol httpd = ServerClass(server_address, HandlerClass) sa = httpd.socket.getsockname() print "Serving HTTP on", sa[0], "port", sa[1], "..." httpd.serve_forever() ``` Hence here the port number, which the user passed as argument is parsed and is bound to the host address. Further basic steps of socket programming with given port and protocol is carried out. Finally socket server is initiated. This is a basic overview of inheritance from SocketServer class to other classes: ``` +------------+ | BaseServer | +------------+ | v +-----------+ +------------------+ | TCPServer |---|---|---|---|---|---|---|---|---|---->| UnixStreamServer | +-----------+ +------------------+ | v +-----------+ +--------------------+ | UDPServer |---|---|---|---|---|---|---|---|---|---->| UnixDatagramServer | +-----------+ +--------------------+ ``` The links [https://hg.python.org/cpython/file/2.7/Lib/BaseHTTPServer.py](https://hg.python.org/cpython/file/2.7/Lib/BaseHTTPServer.py) and [https://hg.python.org/cpython/file/2.7/Lib/SocketServer.py](https://hg.python.org/cpython/file/2.7/Lib/SocketServer.py) are useful for finding further information. ## Basic handling of GET, POST, PUT using BaseHTTPRequestHandler ```py # from BaseHTTPServer import BaseHTTPRequestHandler, HTTPServer # python2 from http.server import BaseHTTPRequestHandler, HTTPServer # python3 class HandleRequests(BaseHTTPRequestHandler): def _set_headers(self): self.send_response(200) self.send_header('Content-type', 'text/html') self.end_headers() def do_GET(self): self._set_headers() self.wfile.write("received get request") def do_POST(self): '''Reads post request body''' self._set_headers() content_len = int(self.headers.getheader('content-length', 0)) post_body = self.rfile.read(content_len) self.wfile.write("received post request:<br>{}".format(post_body)) def do_PUT(self): self.do_POST() host = '' port = 80 HTTPServer((host, port), HandleRequests).serve_forever() ``` Example output using `curl`: ```py $ curl http://localhost/ received get request% $ curl -X POST http://localhost/ received post request:<br>% $ curl -X PUT http://localhost/ received post request:<br>% $ echo 'hello world' | curl --data-binary @- http://localhost/ received post request:<br>hello world ```
President Trumps Illegal Wars | WHAT REALLY HAPPENED President Trumps Illegal Wars In a speech candidate Trump delivered in Cincinnati on December 1, 2016 he said, “We will pursue a new foreign policy that finally learns from the mistakes of the past. We will stop looking to topple regimes and overthrow governments. Our goal is stability not chaos. “In our dealings with other countries we will seek shared interests where-ever possible and pursue a new era of peace understanding and goodwill.” What happened Mr. President? Shortly after your election, you bombed Syria and sent an additional 20,000 troops to Afghanistan prolonging the longest war in US history. Not only have you failed us Mr. President, congress has also failed us in shirking their duty under the War Powers Resolution of 1973. It is a federal law intended to restrict the president's power to commit the United States to an armed conflict without the consent of the U.S. Congress. It says that the President can send U.S. Armed Forces into action abroad only by declaration of war by Congress, or in case of an attack upon the United States. The President must notify Congress within 48 hours of committing armed forces to military action and forbids armed forces from remaining for more than 60 days, with a further 30-day withdrawal period, without a Congressional authorization for use of military force or a declaration of war by the United States. The resolution was passed by two-thirds of Congress, overriding the veto of the bill from President Nixon. The War Powers Resolution has been violated many times by past presidents but none of these violations have resulted in any successful legal actions being taken against the president. If Congress had truly represent their constituents by adhering to the War Powers Resolution, it may have resulted in stopping the U.S. from becoming one the most feared nations in the world because of its unconstitutional attempt to spread democracy and regime change even to democratically elected leaders of other countries. Constitutional Issues The constitution includes many checks and balances but the war power is probably the most controversial. Article I is clear in giving Congress the power to declare war and to federalize state militias, but Article II, section 2, names the President “Commander in Chief of the Army and Navy of the United States, and of the Militia of the several States. There has been a debate for years by Constitutional scholars whether the position of Commander in Chief actually gives the President authority to open hostilities or whether it was merely a title the Founders conferred on the President. A close reading of the Convention debates suggests that the framers intended to limit Presidents to defensive actions; not offensive. After World War II, most administrations, both Republican and Democrat, have broadly interpreted the notion of both defensive and offensive wars and have committed U.S. armed forces without congressional authority. The Constitution’s language concerning this issue is “ambiguous” and more than one scholar has described the Executive war power as “vague.” When called into service.... Ethan Allen and... by a Declaration of War. The President is Constitutionally in command of nothing until Congress declares war. Virtually every President from Washington on down has violated that.
बी जे पी ने साबिक़ रुक्न असेंबली के हरी बाबू को आंध्र प्रदेश (सीमा – आंध्र) का सदर नामज़द किया है, जब कि किशन रेड्डी को सदर तेलंगाना स्टेट बी जे पी बरक़रार रखा है। इस सिलसिले में क़ौमी बी जे पी सदर राजनाथ सिंह ने ख़ुद हरी बाबू को नामज़दगी की इत्तिला देते हुए मुबारकबाद पेश की। बी जे पी ज़राए के बामूजिब तक़सीम रियासत के बाद बी जे पी को सीमा – आंध्र में काम करने के लिए काफ़ी मुश्किलात पेश आ रही थीं, क्योंकि तेलंगाना की नुमाइंदगी करने वाले रियास्ती बी जे पी सदर जी किशन रेड्डी को सीमा – आंध्र के दो बड़े प्रोग्रामों से दूर रखा गया था।
अमेरिकी टेलीविजन निर्माता । नथानिएल आर जोन्स , 93, अमेरिकी अटॉर्नी, छठे सर्किट के लिए अपील की अदालत के न्यायाधीश । ग्लोरिया लबकिन , 86, अमेरिकी विज्ञान पत्रकार और संपादक। गॉर्डन मैक्लॉचलन , 89, न्यूजीलैंड लेखक, सामाजिक इतिहासकार, और टेलीविजन और रेडियो प्रस्तुतकर्ता। , 77, नार्वेजियन औद्योगिक डिजाइनर। मिचौ , 88, फ्रेंच कैबरे कलाकार। ह्यूबर्ट मिंगरेली , 64, फ्रेंच लेखक, कैंसर। संतू मोफोकेंग , 64, दक्षिण अफ्रीकी फोटोग्राफर, प्रगतिशील सुपरन्यूक्लियर पाल्सी । लुइस निरेनबर्ग , 94, कनाडाईअमेरिकी गणितज्ञ, गाग्लियार्डो के सहविकासकर्ता निरेनबर्ग प्रक्षेप असमानता , एबेल पुरस्कार विजेता । बॉब शेन , 85, अमेरिकी गायक और गिटारवादक , निमोनिया से जटिलताएं। वांग जियानलियांग , 62, चीनी राजनीतिज्ञ, 19 । ट्यूमर। कैलाबास हेलीकॉप्टर दुर्घटना में मारे गए उल्लेखनीय अमेरिकी : जॉन अल्तोबेली , 56, बेसबॉल कोच । 41 वर्षीय कोबे ब्रायंट , बास्केटबॉल खिलाड़ी , ओलंपिक चैंपियन और ऑस्कर विजेता । 27 शरीफ अल मुजाहिद , 93, पाकिस्तानी प्रोफेसर। , 55, ब्रिटिशअमेरिकी व्यवसाय पत्रकार, अग्नाशय का कैंसर। रामोन एविलेस , 68, प्यूर्टो रिकान बेसबॉल खिलाड़ी । लीना बेन , 36, ट्यूनीशियाई राजनीतिक कार्यकर्ता और ब्लॉगर, गुर्दे की बीमारी। एलन ब्राउन , 76, अमेरिकी फुटबॉल खिलाड़ी । जैक बर्न्स , 86, अमेरिकी कॉमेडियन, अभिनेता और स्क्रीनराइटर , श्वसन विफलता। रथिन दत्ता ,</s>
Arkocaps Arkocapsules Flash 10 capsules£3.50 Properties Arkocaps Arkocapsules: Arkocapsules Flash is a dietary supplement at the root of Rhodiola rosea facilitates relaxation and relaxation in case of passenger stress. Arkocaps Arkocapsules operating tips: 1-2 capsules in the morning and 1 capsule du midi. A take at the time of the meal with a large glass of water. do not exceed the recommended daily dose. A dietary supplement must not replace a varied and balanced diet and a way of life healthy. envelope without gelatin. dry extract of Rhodiola (Rhodiola rosea) 192 mg/capsule, bulking Agent: calcium phosphate, cellulose, anti-caking agent: silicon dioxide, magnesium stearate, envelope: hydroxypropyl methylcellulose, dyes: titanium dioxide, oxide of iron. Our experts recommend This product is either discontinued or no longer available. Our in-house experts have selected similar products so you can find what you need!
Add music to a video using a free software Edited by Ian Gabriel T. Tolledo, Lynn, Eng If you're interested in making your video more dramatic, you should try adding music to it. Videos without music are just plain silly, or at least very bland. Having your pictures move isn't good enough, but adding sound will make it much better! In this "how to", I will show you how to add music to your video, for the low, low price of free! Things you should know - There are tons of video editors out there, and by that I mean TONS, most of which will only offer you so-called "free" software and yet will bombard you with hundreds of other offers. Some of them will even force-feed your computer with installers that come with their application. In order to avoid that, we will use the "most trusted, easiest user interface video editing program on earth", which also happened to come free with the operating system you are using now. Yes... Windows Movie Maker 2013. And one more thing, take my word for it: This will be easy as 1-2-3. - 1Before you can start putting any music in your video, you must first download an installer of WMM (Windows Movie Maker) on your computer. I recommend you download only from the original Windows website, Windows.microsoft.com. Otherwise you can end up with third party installers and worse, malware. If you are already using Windows operating system, you can simply open the movie maker application, On your start menu, type "movie maker" and Windows will automatically show the icon to you. Click on it and wait for the program to start.Download and Install Windows Movie Maker.Advertisement - 2Now that you are in the program itself, you can now start editing your video. But first, insert the file in the time frame. To do this, click the "Add videos and photos" tab under the toolbar, or in a new project, simply click the time-frame area that reads "Add videos and photos" to start adding in files. After choosing an option to input a video file, a separate tab will appear. Simply select your video and Movie Maker will now add it in the time-frame.Insert Your Video.Advertisement - 3After selecting and adding your video file in WMM, you can now select music to overlap the file (WMM does not allow adding music file first before an audio or video file). To add music to your project, simply click the "Select the add music" tab right next on the "Add videos and photos" tab, under the toolbar. After your click, a window will appear in which you can search your computer for a music file. (See below.)Insert Your Music. - 4See, it's that easy, and now your video contains corresponding music, so feel free to choose your song, depending on the project you are working on. Windows Movie Maker also allows you to to save your project on the fly (which means WMM will not render the file, and it will simply save it with the audio as it is). There are also options wherein you can instantaneously upload and share your project on the internet. Currently supported sites are SkyDrive, Facebook, Vimeo, and Flickr. When saving your project, you can likewise select a quality or device, which will greatly provide for resolution fitting.Done. Tips Tricks & Warnings - You can always tweak your project to your liking, so get crazy, be creative and let the ideas flow! - Saving your project from time to time is wise, as you might be interrupted while working. - Adjusting to Windows Movie Maker can take time if you're new to it, so be patient. - Saving your project to a specific format will save you time, and can help avoid resolution problems (e.g. PSP, Zune, and iPhone formats). Categories : Software Recent edits by: Lynn, Ian Gabriel T. Tolledo
Here is a look at the ridiculous amount of paperwork involved in an international adoption: The two columns of papers on the right, (with all of the pretty little signatures and seals that cost a pretty penny) and the stack of papers in the front of the left column, were what I sent off today. The other three stacks are papers I keep keep filed away in folders. I wish I had a picture of all of the grant application paperwork I've done too. A There wouldn't be room enough on our bed for all of it.
है. नीति और योजना के स्तर पर देश का शैक्षिक परिदृश्य जिस तरह अमीरपक्षी और शहरपक्षी बनाया जा रहा है, वह हाशिये के समाजों, ग़रीबों और उत्पीड़ित जातियों के युवाओं की शैक्षिक संभावना को रौंद रहा है! संगठनों ने 27% आरक्षण मंडल कमीशन लागू करने उठाई मांग, देखें वीडियो हिंदी न्यूज़ झारखंड रामगढ़ केदला भूगर्भ परियोजना में पांच दिनों से जलापूर्ति ठप सफाई व्यवस्था में कोताही बरतने का अंजाम ये कि इस शहर में मामूली बारिश से ही भर गए रास्ते, कीचड़ में धंस रहे राहगीर वरिष्ठ पत्रकार नीलोवा रॉय चौधरी कहती हैं उनकी राय में ये हर साल होने वाली झड़पों जैसा ही है और इनमें कुछ नया नहीं है. उनका मानना है कि ये प्रकरण 2013 और 2017 में हुई घटनाओं जैसे बिल्कुल भी नहीं हैं और जब तक दोनों देशों के बीच सीमा विवाद का अंत नहीं हो जाता ये होते रहेंगे. लेकिन कुछ विशेषज्ञों का कहना है कि कि इन झड़पों के पीछे कोई और ट्रिगर हो इसकी संभावना से इंकार नहीं किया जा सकता, जैसे विश्व स्वास्थ्य संगठन के असेंबली में ताइवान की भागीदारी. बैंक की तिजोरी में जेवर रखने का प्रावधान नहीं है। आप कृपया ऐसी कोई उम्मीद न करें। मैंने विनम्र होने की</s>
Comanche County Texas Court Directory The Texas trial court system consists of District Courts, Criminal District Court, Constitutional County Courts, County Courts at Law, Statutory Probate Courts, Justice Courts, and Municipal Courts. For more information on which types of cases each court oversees, compare Texas courts. Below is a directory of court locations in Comanche County. Links for online court records and other free court resources are provided for each court, where available. If you’re not sure which court you’re looking for, learn more about the Texas court system. District Courts in Comanche County Constitutional County Courts in Comanche County Comanche County Constitutional Court Justice Courts in Comanche County Municipal Courts in Comanche County Comanche Municipal Court De Leon Municipal Court
यमन और सऊदी अरब के मध्य युद्ध का सिलसिला जारी हैं, जहां एक ओर यमन का विद्रोही संगठन सऊदी अरब पर मिसाइल हमले कर रहे हैं, वही दूसरी तरफ सऊदी अरब के युद्धक विमान विद्रोही समूह हौथी को भी लगातार निशाना बना रहे हैं. गुरुवार को सऊदी अरब के अपाचे युद्धक विमानों द्वारा सीमावर्ती क्षेत्र सऊदी के जज़ान प्रान्त में हौथी विद्रोहियों और रिपब्लिकन गार्ड पर किये गए हवाई हमलो दर्जनो अधिकारियों को मार गिराया. इससे पहले बुधवार को हौथी विद्रोहियों ने सऊदी अरब के जज़ान पर हमला किया था जिस पर जवाबी करवाई करते हुए सऊदी के अपाचे युद्धक विमानों ने विद्रोहियों को अपना निशाना बनाया. इन दिनों सऊदी अरब की सुरक्षा बलो ने यमन के विद्रोही संगठन के खिलाफ करवाई तेज़ कर दी हैं. और सऊदी के युद्धक विमान लगातार हमले कर रहे हैं. जिससे विद्रोहियों को काफी नुक्सान हुआ हैं. डोनेशन देने से पहले इस link पर क्लिक करके पढ़ें Click Here
Sign up Here's how it works: 1. Anybody can ask a question 2. Anybody can answer I love cooking especially sweets but I'm not a professional. This time I tried to make ready-to-roll icing for the first time to decorate cupcakes but it was horrible (I used crystallized sugar instead of icing sugar which I can't find and another kind of syrup instead of liquid glucose which i can't find either) so the dough was barely holding together. So here is my question: What can I replace liquid glucose and icing sugar with? PS. I live in a country where it is hard to find this kind of ingredients. share|improve this question If you have one of those spinning blade coffee grinders, you can use it to make powdered sugar. A little cornstarch will stabilize it. – Wayfaring Stranger Sep 15 '13 at 19:54 up vote 7 down vote accepted If you cannot find these ingredients, it will be hard to get this type of icing made. The first thing is the liquid glucose. If you used any old thing labelled "syrup", chances are that it contained water, and this is what made your mix a sugar. Liquid glucose is mostly sugar, with almost no wetness to it. Substituting something very wet will not work. Things which will work instead of glucose syrup are agave syrup, treacles, corn syrup, mollasses, golden syrup and honey. You should be aware that most of those will give you a more or less strong coloring and will have a bit of taste on its own. It depends on the type of your cupcakes whether the taste fits them. Corn syrup and golden syrup will be the best alternatives, but they are also less popular around the world. The other thing is the sugar. It absolutely must be in a powdered form. Crystals won't work. If you have a food processor, just put the crystalized sugar in there and process it. Use it immediately, or it will fuse together due to air moisture. But you may still be able to find icing sugar. It is just another word for powdered sugar, and it is used in Middle Eastern cuisine (your profile says Lebanon), for example for dusting lokum, but also in some halva recipes. If you can find a confectioner who does these things, you can ask them for a source of powdered sugar. If you cannot find ingredients which produce an acceptable quality of icing, you can also try other types of icing recipes for decoration. Most do use powdered sugar for easier incorporation, but some are made with sugar dissolved in a liquid. share|improve this answer Thanks, there are chances of finding these ingredients here but they may go with another name as for the icing sugar, i just didn't know it was powdered sugar which we have. – Aldo Abouchedid Sep 26 '13 at 15:32 Liquid glucose can be replaced with plain corn syrup, in most cases. The icing sugar is almost the same as powdered sugar, if you have access to that. If you can't find powdered sugar either, you'll need to put granulated sugar into a food processor with about 2 tablespoons of cornstarch per cup of sugar and blend it until it's a fine powder. The cornstarch in the icing sugar is what holds the icing together, so that's the most critical part. share|improve this answer Interesting. I thought about the role of the cornstarch, but dismissed it as uninteresting, as I do not expect it to hold together anything when not cooked. Do you have firsthand experience with starchless icings? I cannot experiment myself as I don't have a food processor. – rumtscho Sep 15 '13 at 17:56 Well, a starchless icing is generally going to turn out like the example did. That's why the starch is so vital: when wet, cornstarch is a non-Newtonian fluid, which is what allows it to work as icing. Without the starch, you just have a regular fluid. Powdered sugar and icing sugar (at least in the US), both contain starch already, icing has slightly more to let icings set up thicker. – SourDoh Sep 16 '13 at 14:44 Your Answer
पोटैटो वेफर्स कैसे बनायें । Potato Wafers Recipe in Hindi बेहद ही स्वादिष्ट और झटपट तैयार होने वाले ये पोटैटो वेफर्स (Potato Wafers Recipe in Hindi) एक तरह के आलू के चिप्स हैं। इनका चटपटा स्वाद हर बच्चे से लेकर बड़े तक को बहुत पसंद आता है। तो, आप भी जानिए इसे घर पर तैयार करने की रेसिपी और इसे बनाने की कोशिश जरूर करिये। आवश्यक चीजें आलू – 2 से 3 नमक – स्वादानुसार तलने के लिए तेल पोटैटो वेफर्स बनाने की विधि इस लाजवाब पोटैटो वेफर्स को आसानी से अपने घर पर बनाने के लिए सबसे पहले आलू को धोकर छील कर पानी में रख दीजिये। मध्यम मोटाई का एक स्लाइसर लें और आलू के स्लाइस बना लें। इन टुकड़ों को एक कटोरी पानी में डालें। फिर चिप्स को 2 से 3 बार पानी से धो लीजिये ताकि स्टार्च निकल जाये। इसके बाद अतिरिक्त स्टार्च को हटाने के लिए स्लाइस को उंगलियों से हल्के से रगड़ें। अब एक किचन टॉवल लें और उस पर आलू के स्लाइस फैलाएं। स्लाइस को एक-दूसरे के ऊपर न रखें। स्लाइस को दूसरे तौलिये से ढककर 2 मिनट के लिए थपथपा कर सुखा लें। इसी बीच तलने के लिए तेल गरम कर लीजिए। यह भी पढ़ें: बनाना चिप्स रेसिपी हिंदी में तेल के गरम होते ही आलू के टुकड़ों को फ्राई कर लें। तलने के लिए एक-एक करके टुकड़े डालें। इन्हें मध्यम आंच पर तब तक फ्राई करें जब तक ये क्रिस्पी न हो जाएं। इन्हें टिश्यू पेपर से निकाल लें और इनके ऊपर नमक छिड़कें। आपके कुरकुरे आलू वेफर्स अब परोसने के लिए तैयार हैं।
from tkinter import * import requests # db127015acc3512d1d23651766aaf9c9 # api.openweathermap.org/data/2.5/weather?q={city name} def show_weather(weather): try: # tuve que imprmir el json antes, para ver la ubicacion de estos datos print(response.json). Se guardan en weather # asignamos a variables los valores obtenidos desde el weather (desde el json) name_city = weather['name'] desc = weather['weather'][0]['description'] temp = weather['main']['temp'] # se asignan esos valores a las Labels nomabradas anteriormente city['text'] = name_city # se imprimen en pantalla con la Label mas abajo description['text'] = desc temperature['text'] = str(int(temp)) + '°C' # venia como float, lo converti a entero y al str para sumar signo except: weather['name'] = 'Intenta nuevamente' # Le damos la opcion de inpuntear sobre la equitera para reintentar def weather_json(city): try: api_key = 'db127015acc3512d1d23651766aaf9c9' # key de API url = 'https://api.openweathermap.org/data/2.5/weather' # URL de API parameters = {'APPID': api_key, 'q': city, 'units': 'metric', 'lang': 'es'} # parametros es un dic, con APPID que es la key, y la q es pedida por la API response = requests.get(url, params=parameters) # la respuesta que espero, la pido con request, la guardo con get y le paso parametros con params weather = response.json() show_weather(weather) # usamos la funcion y le pasamos el weather encontrado except: print('Error') window = Tk() # Creamos la ventana window.title('Weather App') # Titulo a la ventana window.geometry('350x400') # Asignando tamano a la ventana # Caja de texto text_city = Entry(window, font=('Courier', 20, 'normal'), justify='center') # font, tamano, tipo, justificacion text_city.pack(padx=30, pady=30) # con pad se da el margen text_city.focus() # Boton get_weather = Button(window, text='Obtener clima', font=('Courier', 20, 'normal'), command=lambda: weather_json(text_city.get())) # con el comando get() en text_city tomamos la informacion que se alojo en esa variable al usar Entry get_weather.pack() # Etiquetas city = Label(window, font=('Courier', 20, 'normal')) city.pack(padx=10, pady=10) temperature = Label(window, font=('Courier', 50, 'normal')) temperature.pack(padx=10, pady=20) description = Label(window, font=('Courier', 20, 'normal')) description.pack(padx=10, pady=10) window.mainloop()
More tidbits from Telling Yourself the Truth by William Backus & Marie Chapian Before you read this book, ask yourself this question, “Do I really want to be happy?” If the answer is yes, then I must realize that my joy comes from my relationship to God and His unchanging faithfulness. “…whatsoever things are true, whatsoever things are honest, whatsoever things are just, whatsoever things are pure, whatsoever things are lovely, whatsoever things are of good report; if there be any virtue, and if there be any praise, think on these things.” Philippians 4:8 Pursuing peace means to choose it. You will never have peace if you are putting yourself down. The peaceful person is the one who is at peace with himself. Dag Hammerskjold said, “A man who is at war with himself will be at war with others.” When you like yourself, you will be free to like and appreciate others. When you are hard on yourself, you will be hard on others. “I can’t even if other people can” are crippling words. Changing your misbeliefs will change your feelings and actions. You can do it. One of the first parts of our counseling is to take a history. Examining early years may be important for the following reasons: 1. To discover your misbeliefs learned in childhood. 2. To discover your misbeliefs about events in your childhood. 3. To examine your self-talk: What did you tell yourself then? What do you tell yourself now? Change a person’s beliefs and you will change their feelings and behavior. There are no pat answers to emotional suffering. Your counselor can pray with you for knowledge and discernment and the wisdom to use them effectively. What you believe affects how you behave. A few of the other chapter titles to this book, Telling Yourself the Truth, are: Misbelief in Depression Misbelief in Anger Misbelief in Anxiety Misbelief in Lack of Self-Control The Misbelief in Self-Hate Misbelief in Fear of Change Misbelief in Never Taking a Chance Misbelief in Being Indispensable
Wanna remove mice.. Have a bucket and fill it with about three inches of drinking water. Insert sunflower seed to go over top surface of h2o. Sunflower seeds float. Position bucket at base of ways. Rig a adhere of some type (paint stirrer functions extremely well) on previously mentioned step so it hangs above bucket. So, I have a mouse problem beneath my sink. I have a cat who's got killed 2 but now It appears they moved into the wall and enterprise involving my kitchen area cupboards and toilet cabinet. I bought mouse traps and utilized penut butter Nevertheless they seem to be very intelligent, as they try to eat the peanut butter and dont trip the lure. I have experimented with the peppermint – they came again. I employed the black round traps offered at Lowes,two for $5, not low-priced but they labored for some time, then the mice were on to them. They will not occur near the traps now. I don’t want to eliminate a Dwell mouse from the sticky paper strip, in order that’s out. OMG!!! Out of desperation for some snooze past night, I had been grasping at straws — aiming to find out if I had any of the ingredients stated by others. I had tried out the peppermint flavoring (Completely wrong things) to no avail but in the toilet was a tube of Vick’s vapor rub (The type which is in the tube and rubs in — not the Vaseline form). I went within the condominium by using a long adhere and kept putting dabs of Vick’s over the idea and Placing it up under the fridge, my hutch, about my mattress, by the head of my mattress wherever I listen to a great deal of action within the wall, and so on. Let’s try this yet again. Should your as fed up as I am and don’t intellect killing the little sobs keeping up late night having a flashlight in addition to a 22. Jordin, I'm sure exactly how you're feeling. Swat Pest Handle place poison in my crawlspace and now the mice have moved into my attic and walls. I realize the moment they get in mainly because they give off this kind of horrible musky odor. If you live in an enormous apartment creating, the proprietor need to be responsible for the situation. If he or she doesn’t want to do anything at all about it, contact the Board of Wellbeing and talk with them. Inside the In the meantime — because you seem to have so many mice, they breed much too speedy for just you to receive them underneath Command. It should be a complete developing project. For now tho, your only hope is apparently discovering the holes exactly where they are coming in and seal them shut with steel wool. Love many of the tips. Window cleaner with ammonia is apparently trying to keep the mice off of our mailbox. Don’t know why they had been climbing on it to begin with. It was loaded with “offers” the opposite day, and I cleaned it off with the window cleaner and there haven’t been droppings for a few days. Now I've to uncover anything to complete at my new school, the place the instructors are telling me a couple of mice problem that received’t go away. Once you’re dealing with the pitter-patter of minor feet and it’s not a walking, conversing bundle of joy standing on two legs, you'll have a furry intruder in your home that requirements awareness. Hiding in a very kitchen cupboard or tucked away in the corner of the shed, mice discover tips on how to enter the cleanliest of properties, apartments, along with other human dwellings. I’m about to try out the ammonia and monitor the frequency of them; I’m also heading to begin using pic of the poop and tripped traps; if it gets more of an issue I'll just shift. These small critters are such a ache while in the ass. I've a looking cabin and everytime I go there mice shit in all places, only issue I discovered to work may be the snap traps with peanut butter. To start with these little bastards had been using every one of the peanut butter (every final drop) and I couldnt decide how the hell they have been undertaking it. Would you believe I caught another one particular before this 7 days on a sticky lure AND saw one particular this early morning during the kitchen? This one particular need to be smarter than it’s buddies mainly because it prevented the sticky traps. I saw it on my selection and tossed a sticky entice with some chocolate on it about the array major. This newest episode of mouse-invasion has me so upset which i can’t slumber (they climb on my mattress!)or walk all-around with no anxiety, scared one will soar on me. The key mouse is so Excess fat, I’m afraid she’s Expecting & there will soon be described as a colony of newborn mice! I recently saw a mouse in my kitchen area counter!! Im actually petrified of them as soon as I noticed it operate I screamed and ran absent. I instructed my husband and he asked me that the place did it go and it what way, but I was to scared to view where by it went. It began on a straightforward evening with my husband And that i savoring a Motion picture collectively within the couch. A motion around the bottom of the television stand caught my notice. My coronary heart gave my Mind an uppercut when I observed the minor rodent skitter appropriate underneath the stand. Of course, I screamed. My partner, so engrossed while in the movie, hadn’t found the critter and gave me the most hilarious glimpse – like “I didn’t know you ended up insane After i fulfilled you. This can be a comedy, not a horror movie!”. I described to him diplomatically more info (haha) that I witnessed a mouse go underneath the Television set stand. “Yeah, appropriate” was his response. His eyes centered on perimeter on the stand Regardless of himself and prior to I envisioned the mouse arrived out the other side.
Further tests after diagnosis Your doctor may suggest you have further tests, which can give more information. MRI scan This test uses magnetism to build up a detailed picture of areas of your body. The scanner is a powerful magnet so you may be asked to complete and sign a checklist to make sure it's safe for you. The checklist asks about any metal implants you may have, such as a pacemaker, surgical clips, bone pins, etc. You should also tell your doctor if you've ever worked with metal or in the metal industry as very tiny fragments of metal can sometimes lodge in the body. If you do have any metal in your body it's likely that you won't be able to have an MRI scan. In this situation another type of scan can be used. Before the scan, you'll be asked to remove any metal belongings including jewellery. Some people are given an injection of dye into a vein in the arm, which doesn't usually cause discomfort. This is called a contrast medium and can help the images from the scan to show up more clearly. During the test you'll lie very still on a couch inside a long cylinder (tube) for about 30 minutes. It's painless but can be slightly uncomfortable, and some people feel a bit claustrophobic. It's also noisy, but you'll be given earplugs or headphones. You can hear, and speak to, the person operating the scanner. CT (computerised tomography) scan A CT scan takes a series of x-rays, which build up a three-dimensional picture of the inside of the body. The scan takes 10–30 minutes and is painless. It uses a small amount of radiation, which is very unlikely to harm you and will not harm anyone you come into contact with. You will be asked not to eat or drink for at least four hours before the scan. CT scan CT scan View a large version Read a description of this image You may be given a drink or injection of a dye, which allows particular areas to be seen more clearly. This may make you feel hot all over for a few minutes. It’s important to let your doctor know if you are allergic to iodine or have asthma, because you could have a more serious reaction to the injection. You’ll probably be able to go home as soon as the scan is over. Waiting for test results Waiting for test results can be a difficult time. It may take from a few days to a couple of weeks for the results of your tests to be ready. You may find it helpful to talk with your partner, family or a close friend. Your specialist nurse or one of the organisations listed on our database, can also provide support. You can also talk things over with one of our cancer support specialists on 0808 808 00 00. Back to Tests and scans How myeloma is diagnosed Tests used to diagnose myeloma include blood tests, urine tests, bone marrow biopsies and x-rays of your bones.
Himachal Corona Update :आईजीएमसी शिमला में देर रात हमीरपुर की कोरोना संक्रमित महिला की मौत हो गई। शिमला में आज अंतिम संस्कार किया जाएगा। राज्य में कोरोना वायरस के कारण अब तक चार लोगों की मौत हो चुकी है। महिला की मौत की पुष्टि IGMC शिमला के एमएस डॉ. जनक राज ने की है। Himachal Corona Update : शनिवार को आइसोलेशन वार्ड में भर्ती कराया गया था मीडिया रिपोर्ट के अनुसार, महिला को 22 मई को हमीरपुर मेडिकल कॉलेज से इलाज के लिए रेफर किया गया था। महिला को किडनी की समस्या थी। महिला का कोविड-19 परीक्षण किया गया, जिसमें महिला की रिपोर्ट सकारात्मक आई। उन्हें शनिवार को आइसोलेशन वार्ड में भर्ती कराया गया था। महिला का रविवार को डायलिसिस किया गया था। डॉक्टरों की सख्त निगरानी में अस्पताल के नेफ्रोलॉजी विभाग में यह डायलिसिस प्रक्रिया शाम तक पूरी की गई थी। इसके बाद महिला को आइसोलेशन वार्ड में वापस लाया गया। महिला को करीब 1 बजे डायलिसिस के लिए स्ट्रेचर पर लाया गया। इसके बाद पूरी जगह को सोडियम हाइपोक्लोराइट से साफ कर दिया गया।
परमेश्वर के दैनिक वचन | "अपने कर्तव्यों में परमेश्वर के वचनों का अनुभव कैसे करें" | अंश 576 06 नवम्बर, 2020 कुछ लोगों के लिए, भले ही वे अपने कर्तव्यों का पालन करते समय किसी भी समस्या का सामना क्यों न करें, वे सत्य की तलाश नहीं करते हैं और हमेशा अपने विचारों, अपनी अवधारणाओं, कल्पनाओं और इच्छाओं के अनुसार कार्य करते हैं। वे निरंतर अपनी स्वार्थी इच्छाओं को संतुष्ट करते हैं और उनके भ्रष्ट स्वभाव हमेशा उनके कार्यों पर नियंत्रण करते हैं। भले ही वे उन्हें सौंपे गए कर्तव्य को पूरा कर दें, फिर भी वे किसी सत्य को प्राप्त नहीं करते हैं। तो ऐसे लोग अपने कर्तव्य को करते समय किस पर निर्भर करते हैं? ऐसे व्यक्ति न तो सत्य पर निर्भर करते हैं, न ही परमेश्वर पर। जिस थोड़े से सत्य को वे समझते हैं, उसने उनके हृदयों में संप्रभुत्व हासिल नहीं किया है; वे इन कर्तव्यों को पूरा करने के लिए अपनी स्वयं की योग्यताओं और क्षमताओं पर, उस ज्ञान पर जो उन्होंने प्राप्त किया है और अपनी प्रतिभा पर, और साथ ही अपनी इच्छाशक्ति पर या नेक इरादों पर भरोसा कर रहे हैं। यह अलग प्रकार की प्रकृति है, है ना? यद्यपि कभी-कभी तू अपने कर्तव्य को निभाने के लिए अपनी स्वाभाविकता, कल्पना, अवधारणाओं, ज्ञान और शिक्षा पर भरोसा करे, तेरे द्वारा की जाने वाली कुछ चीज़ों में सिद्धांत का कोई मुद्दा नहीं उभरता है। सतह पर ऐसा लगता है जैसे कि तूने गलत मार्ग नहीं अपनाया है, लेकिन एक ऐसी चीज़ है जिसे नजरअंदाज नहीं किया जा सकता है: अपने कर्तव्य को निभाने की प्रक्रिया के दौरान, यदि तेरी अवधारणाएँ, कल्पनाएँ और व्यक्तिगत इच्छाएँ कभी नहीं बदलती हैं और कभी भी सत्य के साथ प्रतिस्थापित नहीं की जाती हैं, यदि तेरे कार्य और कर्म कभी भी सत्य के सिद्धांतों के अनुसार नहीं किए जाते हैं, तो अंतिम परिणाम क्या होगा? तू एक सेवा करने वाला बन जाएगा। और ठीक यहीमें लिखा है: "उस दिन बहुत से लोग मुझ से कहेंगे, 'हे प्रभु, हे प्रभु, क्या हम ने तेरे नाम से भविष्यद्वाणी नहीं की, और तेरे नाम से दुष्टात्माओं को नहीं निकाला, और तेरे नाम से बहुत से आश्चर्यकर्म नहीं किए?' तब मैं उनसे खुलकर कह दूँगा, मैं ने तुम को कभी नहीं जाना। हे कुकर्म करनेवालो, मेरे पास से चले जाओ" (मत्ती 7:22-23)। परमेश्वर अपने प्रयास लगाने वालों और सेवा प्रदान करने वालों को "अधर्म करने वाले" क्यों कहता है? एक बात पर हम निश्चित हो सकते हैं, और वह यह कि ये लोग चाहे कोई भी कर्तव्य निभाएँ या कोई भी काम करें, इन लोगों की अभिप्रेरणाएँ, बल, इरादे और विचार पूरी तरह से उनकी स्वार्थपूर्ण इच्छाओं से पैदा होते हैं, पूरी तरह से उनके अपने विचारों और व्यक्तिगत हितों पर आधारित होते हैं, और उनके विचार और योजनाएँ पूरी तरह से उनकी शोहरत, रुतबे, अहंकार और भविष्य की संभावनाओं के चारों ओर घूमती हैं। उनके अंतरतम में, कोई सत्य नहीं होता, न ही वे सत्य के सिद्धांतों के अनुसार कार्य करते हैं। इस प्रकार, अब तुम लोगों के लिए क्या खोजना अतिमहत्वपूर्ण है? (हम लोगों को सत्य की खोज करनी चाहिए और परमेश्वर की इच्छा और अपेक्षाओं के अनुसार अपना कर्तव्य निभाना चाहिए।) परमेश्वर की अपेक्षाओं के अनुसार अपना कर्तव्य निभाते समय तुम्हें विशेष रूप से क्या करना चाहिए? कोई काम करते समय तुम्हारे अंदर जो इरादे और विचार होते हैं, उनके संबंध में तुम्हें यह भेद करना ज़रूर सीखना चाहिए कि वे सत्य के अनुरूप हैं या नहीं, साथ ही तुम्हारे इरादे और विचार तुम्हारी अपनी स्वार्थपूर्ण इच्छाओं की पूर्ति के लिए हैं या परमेश्वर के परिवार के हितों के लिए। अगर तुम्हारे इरादे और विचार सत्य के अनुरूप हैं, तो तुम अपनी सोच के अनुसार अपना कर्तव्य निभा सकते हो; लेकिन अगर वे सत्य के अनुरूप नहीं हैं, तो तुम्हें तुरंत पलटकर उस मार्ग का त्याग कर देना चाहिए। वह मार्ग सही नहीं है और तुम उस तरह से अभ्यास नहीं कर सकते; अगर तुम उस रास्ते पर चलते रहे, तो तुम अंत में दुष्टता कर बैठोगे। — '' से उद्धृत अन्य प्रकार की वीडियो
If you are immigrating (i.e. moving/relocating) to the USA for the first time then it does apply to you. A classic example of this would be non-US citizens that have married a military member stationed overseas. If you are a US citizen or resident (with Green/Alien Card) then this won't apply to you. What does "No First Time Entry" (NFE) mean on schedules from Overseas locations to USA?
1911 Encyclopædia Britannica/Atargatis ATARGATIS, a Syrian deity, known to the Greeks by a shortened form of the name, Derketo (Strabo xvi. c. 785; Pliny, Nat. Hist. v. 23. 81), and as Dea Syria, or in one word Deasura (Lucian, de Dea Syria). She is generally described as the “fish-goddess.” The name is a compound of two divine names; the first part is a form of the Himyaritic ’Athtar, the equivalent of the Old Testament Ashtoreth, the Phoenician Astarte (q.v.), with the feminine ending omitted (Assyr. Ishtar); the second is a Palmyrene name ’Athe (i.e. tempus opportunum), which occurs as part of many compounds. As a consequence of the first half of the name, Atargatis has frequently, though wrongly, been identified with Astarte. The two deities were, no doubt, of common origin, but their cults are historically distinct. In 2 Macc. xii. 26 we find reference to an Atargateion or Atergateion (temple of Atargatis) at Carnion in Gilead (cf. 1 Macc. v. 43), but the home of the goddess was unquestionably not Palestine, but Syria proper, especially at Hierapolis (q.v.), where she had a great temple. From Syria her worship extended to Greece, Italy and the furthest west. Lucian and Apuleius give descriptions of the beggar-priests who went round the great cities with an image of the goddess on an ass and collected money. The wide extension of the cult is attributable largely to Syrian merchants; thus we find traces of it in the great seaport towns; at Delos especially numerous inscriptions have been found bearing witness to its importance. Again we find the cult in Sicily, introduced, no doubt, by slaves and mercenary troops, who carried it even to the farthest northern limits of the Roman empire. In many cases, however, Atargatis and Astarte are fused to such an extent as to be indistinguishable. This fusion is exemplified by the Carnion temple, which is probably identical with the famous temple of Astarte at Ashtaroth-Karnaim. Atargatis appears generally as the wife of Hadad (Baal). They are the protecting deities of the community. Atargatis, in the capacity of πολιοῦχος, wears a mural crown, is the ancestor of the royal house, the founder of social and religious life, the goddess of generation and fertility (hence the prevalence of phallic emblems), and the inventor of useful appliances. Not unnaturally she is identified with the Greek Aphrodite. By the conjunction of these many functions, she becomes ultimately a great Nature-Goddess, analogous to Cybele and Rhea (see Great Mother of the Gods); in one aspect she typifies the function of water in producing life; in another, the universal mother-earth (Macrobius, Saturn, i. 23); in a third (influenced, no doubt, by Chaldaean astrology), the power of destiny. The legends are numerous and of an astrological character, intended to account for the Syrian dove-worship and abstinence from fish (see the story in Athenaeus viii. 37, where Atargatis is derived from ἄτερ Γάτιδος “without Gatis,”—a queen who is said to have forbidden the eating of fish). Thus Diodorus Siculus, using Ctesias, tells how she fell in love with a youth who was worshipping at the shrine of Aphrodite, and by him became the mother of Semiramis, the Assyrian queen, and how in shame she flung herself into a pool at Ascalon or Hierapolis and was changed into a fish (W. Robertson Smith in Eng. Hist. Rev. ii., 1887). In another story she was hatched from an egg found by some fish in the Euphrates and by them thrust on the bank where it was hatched by a dove; out of gratitude she persuaded Jupiter to transfer the fish to the Zodiac (cf. Ovid, Fast. ii. 459-474, Metam. v. 331).
कंडेनसर कार एयर कंडीशनर कंडेनसर गैस या वाष्प को तरल में परिवर्तित करता है, और ट्यूब में गर्मी को ट्यूब के पास हवा में बहुत तेजी से स्थानांतरित करता है।कंडेनसर की कार्य प्रक्रिया एक एक्ज़ोथिर्मिक प्रक्रिया है, इसलिए कंडेनसर का तापमान अपेक्षाकृत अधिक होता है।हम ऐसे कोर का उत्पादन कर सकते हैं जो विभिन्न तकनीकों को नियोजित करते हैं, जैसे कि समानांतर प्रवाह प्रकार, सर्पिन प्रकार, पाइप-विस्तार प्रकार और कंडेनसर और बाष्पीकरण के लिए बहुपरत घटक प्रकार, ग्राहकों की मांगों के अनुसार।हमारे अनुसंधान एवं विकास और नवाचार क्षमताओं के कारण, ग्राहक द्वारा प्रदान किए गए ड्राइंग और नमूने के अनुसार नया मॉडल विकसित किया जा सकता है।सहायक सेवाओं और बिक्री के बाद के बाजार के लिए इस्तेमाल किया जाने वाला उत्पाद मर्सिडीज बेंज, बीएमडब्ल्यू, वोक्सवैगन, ओपल, फोर्ड, टोयोटा, होंडा और रेनॉल्ट सहित कई ऑटोमोबाइल मॉडलों के लिए लागू है।अब कंडेनसर और बाष्पीकरण दोनों में से प्रत्येक के मॉडल की 1000 से अधिक किस्में हैं।हीलियम लीकेज डिटेक्टर, नाइट्रोजन लीकेज डिटेक्टर और पूर्ण स्वचालित जल निरीक्षण उपकरण जैसे कई माप उपकरणों के साथ, हम उत्पाद की गुणवत्ता को सख्ती से नियंत्रित कर सकते हैं और डिलीवरी के समय पूर्ण निरीक्षण को लागू कर सकते हैं।आप बस निश्चिंत हो सकते हैं!
def bulk(self): print("%s is yelling..."%self.name) class Dog(object): def __init__(self,name): self.name = name def eat(self): print("%s is eating..."%self.name) d = Dog("NiuHanYang") choice = input('>>:').strip() # print(hasattr(d,choice)) # print(getattr(d,choice)()) if hasattr(d,choice): # func = getattr(d,choice) # func() delattr(d,choice) else: setattr(d,choice,bulk) d.talk(d) d.name
अगर आप भी कोरोना टीकों की दोनों खुराक लेने के बाद खुद को महामारी से पूरी तरह सुरक्षित मानकर चल रहे हैं तो यह धारणा गलत है। जानिये क्या है ब्रेकथ्रू इंफेक्शन और जानिए अहम सवाल-जवाब... 1) क्या है ब्रेकथ्रू संकमण जब टीकाकरण के बाद भी व्यक्ति संक्रमित हो जाता है तो वैज्ञानिक इसे ब्रेकथ्रू इन्फेक्शन कहते हैं। इसमें वायरस वैक्सीन से बने सुरक्षा चक्र को भी तोड़ने में कामयाब रहता है। फाइजर और मॉडर्ना के कोरोना टीके क्लीनिकल ट्रायलों में 94-95 फीसदी प्रभावी मिले हैं। टीके के 95 प्रतिशत प्रभावशाली होने का अर्थ ये नहीं है कि टीका 95 प्रतिशत लोगों का बचाव करता है, जबकि अन्य पांच प्रतिशत लोग संक्रमित हो सकते हैं। टीके के प्रभावी होने का मतलब अपेक्षाकृत जोखिम का पता लगाना है। 2) दोनों खुराक लेने के बाद भी संक्रमण कितना आम अगर दोनों टीके लगवाने वाला व्यक्ति संक्रमित हो जाता है तो उसमें संक्रमण के लक्षण बहुत मामूली या नहीं भी होते हैं। मौजूदा ब्रेकथ्रू इन्फेक्शन शायद डेल्टा स्वरूप के बढ़ते प्रसार के कारण हुआ है। लेकिन टीके ले चुके लोगों में संक्रमण अब भी विरला ही है। मसलन, अमेरिका में एक फरवरी से 30 अप्रैल 2021 के बीच हुए अध्ययन में टीके लगवा चुके 1,26,367 में से 86 लोगों में ही ब्रेकथ्रू इन्फेक्शन मिला। इनमें से अधिकांश ने फाइजर-मॉडर्ना की खुराकें ली थीं। संक्रमितों का यह आंकड़ा 1.2 फीसदी ही रहा। 3) टीकाकरण के बाद भी संक्रमित हो जाना कितना खतरनाक अमेरिका में सीडीसी के पास मौजूद आंकड़ों के हिसाब से ब्रेकथ्रू इन्फेक्शन के मामलों में 27 फीसदी लोग लक्षण रहित थे। सिर्फ 10 फीसदी लोगों के अस्पताल में भर्ती हुए, जिनमें से दो फीसदी की ही मौत हुई। वहीं, 2020 में टीका विकसित नहीं होने से पहले संक्रमण से छह फीसदी मरीजों की मौत हो रही थी। 4) ब्रेकथ्रू इन्फेक्शन की सबसे ज्यादा आशंका कब इस संक्रमण की सबसे ज्यादा आशंका बंद जगहों और संक्रमित व्यक्ति के नजदीकी संपर्क के कारण होती है। मसलन, कम हवादार कार्यालयों, पार्टी, रेस्त्रां या स्टेडियम जैसे स्थानों पर संक्रमितों से संपर्क का खतरा ज्यादा रहता है। उन स्वास्थ्यकर्मियों में ब्रेकथ्रू इन्फेक्शन का खतरा रहता है, जो लगातार संक्रमितों की देखभाल में लगे रहते हैं। इसके अलावा बुजुर्गों में भी ज्यादा खतरा है। वहीं, कमजोर प्रतिरक्षा वाले, अंग प्रत्यारोपण, हृदय, किडनी, लीवर, कैंसर के मरीज भी ब्रेकथ्रू के शिकार हो सकते हैं। 5) डेल्टा जैसे स्वरूप ने कैसे पैदा किया खतरा वैज्ञानिकों ने कोरोना वायरस के पहले के सभी स्वरूपों को मारने के लिए वैक्सीन विकसित की है। लेकिन इसके बाद भी कई नए स्वरूप सामने आ रहे हैं। हालांकि, ये टीके लगवा चुके लोग नए स्वरूपों से संक्रमित होने के बाद भी ज्यादा बीमार नहीं पड़ते। यह सच है कि मौजूदा टीके पुराने स्वरूपों के मुकाबले डेल्टा जैसे स्वरूप पर कम असरदार हैं। ब्रिटेन के जन स्वास्थ्य विभाग के मुताबिक, एमआरएनए टीकों की दो खुराक अल्फा स्वरूप पर 89 फीसदी प्रभावी हैं लेकिन डेल्टा पर 79 फीसदी असरदार हैं। इसके खिलाफ एक खुराक तो सिर्फ 35 फीसदी ही प्रभावी है।
#!/usr/bin/env python3 # -*- coding: utf-8 -*- """ Created on Tue Aug 22 09:48:43 2017 @author: xuchenwang """ # 4.1. Manually Consuming an Iterator ''' You need to process items in an iterable, but for whatever reason, you can’t or don’t want to use a for loop. ''' # 4.2. Delegating Iteration ''' You have built a custom container object that internally holds a list, tuple, or some other iterable. You would like to make iteration work with your new container. ''' # 4.3. Creating New Iteration Patterns with Generators ''' You want to implement a custom iteration pattern that’s different than the usual built- in functions (e.g., range(), reversed(), etc.). ''' def frange(start, stop, increment): while start<stop: yield start start += increment # Use a for loop for n in frange(0,10,2): print(n) # Use other function that consumes an iterable: list(), sum() list(frange(0,10,2)) # Use next() r = frange(0,10,2) next(r) next(r) next(r) next(r) next(r) next(r) # StopIteration # 4.4. Implementing the Iterator Protocol ''' You are building custom objects on which you would like to support iteration, but would like an easy way to implement the iterator protocol. ''' class Node(object): ''' Represent tree structures. ''' def __init__(self,value): self._value = value self._children = [] def __repr__(self): return 'Node({})'.format(self._value) def add_child(self,node): self._children.append(node) def __iter__(self): return iter(self._children) def depth_first(self): yield self for c in self: yield from c.depth_first() if __name__ == '__main__': root = Node(0) child1 = Node(1) child2 = Node(2) root.add_child(child1) root.add_child(child2) child1.add_child(Node(3)) child1.add_child(Node(4)) child2.add_child(Node(5)) for ch in root: print(ch) for ch in root.depth_first(): print(ch) # 4.5. Iterating in Reverse ''' You want to iterate in reverse over a sequence. ''' ''' reversed works: the obj has a size that can be determined the obj implements a __reversed__ method ''' for x in reversed([1,2,3,4]): print(x) f = open('somefile') for line in reversed(list(f)): print(line, end='') class Countdown(object): def __init__(self,start): self.start = start def __iter__(self): n = self.start while n>0: yield n n -= 1 def __reversed__(self): n = 1 while n<= self.start: yield n n += 1 # 4.6. Defining Generator Functions with Extra State ''' You would like to define a generator function, but it involves extra state that you would like to expose to the user somehow. ''' from collections import deque class linehistory(object): def __init__(self,lines,histlen=3): self.lines = lines self.history = deque(maxlen=histlen) def __iter__(self): for lineno,line in enumerate(self.lines,1): self.history.append((lineno,line)) yield line def clear(self): self.history.clear() with open('somefile') as f: lines = linehistory(f) for line in lines: if 'python' in line: for lineno,hline in f.history: print('{}:{}'.format(lineno,hline), end='') # 4.7. Taking a Slice of an Iterator ''' You want to take a slice of data produced by an iterator, but the normal slicing operator doesn’t work. ''' def count(n): while True: yield n n += 1 c = count(0) import itertools for x in itertools.islice(c,10,20): print(x) # 4.8. Skipping the First Part of an Iterable ''' You want to iterate over items in an iterable, but the first few items aren’t of interest and you just want to discard them. ''' # skipping the first items according to a test function. # dropwhile(function): drop the item as long as the function returns True from itertools import dropwhile with open('file') as f: for line in dropwhile(lambda line: line.startswith('#'),f): print(line,end='') # know the exact number of items you want to skip from itertools import islice items = ['a', 'b', 'c', 1, 4, 10, 15] for x in islice(items,3,None): print(x) # 4.9. Iterating Over All Possible Combinations or Permutations ''' You want to iterate over all of the possible combinations or permutations of a collection of items. ''' items = ['a', 'b', 'c'] from itertools import permutations for p in permutations(items): print(p) for p in permutations(items,2): print(p) from itertools import combinations for p in combinations(items,2): print(p) from itertools import combinations_with_replacement for c in combinations_with_replacement(items,2): print(c) # 4.10. Iterating Over the Index-Value Pairs of a Sequence ''' You want to iterate over a sequence, but would like to keep track of which element of the sequence is currently being processed. ''' word_summary = defaultdict(list) with open('file') as f: lines = f.readlines() for index,line in emumerate(lines,1): words = [c.strip().lower() for c in line.split()] for word in words: word_summary[word].append(index) # 4.11. Iterating Over Multiple Sequences Simultaneously ''' You want to iterate over the items contained in more than one sequence at a time. ''' # zip() function: the length of the iteration is the same as the length of the shortest input. from itertools import zip_longest a = [1, 2, 3] b = ['w', 'x', 'y', 'z'] list(zip(a,b)) dict(zip(a,b)) for x,y in zip_longest(a,b,fillvalue=0): print(x,y) # 4.12. Iterating on Items in Separate Containers ''' You need to perform the same operation on many objects, but the objects are contained in different containers, and you’d like to avoid nested loops without losing the readability of your code. ''' from itertools import chain a = [1, 2, 3, 4] b = ['x', 'y', 'z'] for x in chain(a, b): print(x) # 4.13. Creating Data Processing Pipelines ''' You want to process data iteratively in the style of a data processing pipeline (similar to Unix pipes). For instance, you have a huge amount of data that needs to be processed, but it can’t fit entirely into memory. ''' # 4.14. Flattening a Nested Sequence ''' You have a nested sequence that you want to flatten into a single list of values. ''' from collections import Iterable def flatten(items, ignore_types=(str, bytes)): for item in items: if isinstance(item,Iterable) and not isinstance(item,ignore_types): yield from flatten(item) else: yield item items = [1, 2, [3, 4, [5, 6], 7], 8] list(flatten(items)) # 4.15. Iterating in Sorted Order Over Merged Sorted Iterables ''' You have a collection of sorted sequences and you want to iterate over a sorted sequence of them all merged together. ''' import heapq a = [1, 4, 7, 10] b = [2, 5, 6, 11] for c in heapq.merge(a, b): # a,b is sorted sequence print(c) # 4.16. Replacing Infinite while Loops with an Iterator ''' You have code that uses a while loop to iteratively process data because it involves a function or some kind of unusual test condition that doesn’t fall into the usual iteration pattern. '''
B.Tech student threatens to blow up the institute with RDX यूपी न्यूज डेस्कः कानपुर के एक इंजीनियरिंग संस्थान के छात्र ने इंस्टीट्यूट को आरडीएक्स से उड़ाने की धमकी दे डाली। देश के बाहर नौकरी न लगने पर छात्र ने इंस्टीट्यूट प्रबंधन से अपने दस्तावेज और मार्कशीट मांगी है। उसने दो बार इंस्टीट्यूट को उड़ाने की धमकी ईमेल के जरिए दी है। इससे इंस्टीट्यूट प्रबंधन भयभीत है। एसएसपी ने महाराजपुर एसओ को कार्रवाई करने का आदेश दिया है। बिहार सीवान के महमूदपुर बड़हरिया के हबीबपुर गांव निवासी पुनीत कुमार शर्मा कानपुर इंस्टीट्यूट ऑफ टेक्नोलॉजी से बीटेक कर रहा है। वह अंतिम वर्ष का छात्र है। कैम्पस प्लेसमेंट में उसकी कई कंपनियों में नौकरी लग चुकी है पर वह कम वेतन होने की वजह से जॉब करने नहीं गया। वह इंस्टीट्यूट प्रबंधन से बार-बार देश के बाहर अच्छे पैसे पर नौकरी लगाने की बात कर रहा है। कई बार समझाने के बावजूद वह नहीं माना। आखिरकार उसने इंस्टीट्यूट प्रबंधन से मार्कशीट और अन्य दस्तावेज मांगे। जब उसको दस्तावेज नहीं मिले तो उसने निदेशक, प्रबंधतंत्र और कर्मचारियों को धमकाना शुरू कर दिया। 7 अप्रैल और 21 मई को ईमेल के जरिए पुनीत ने इंस्टीट्यूट को आरडीएक्स से उड़ाने की धमकी दी है।
ब्यूरो सहारनपुर। सहारनपुर। स्मार्ट सिटी सीईओ/नगरायुक्त ग़ज़ल भारद्वाज ने स्मार्ट सिटी के तहत चल रही अनेक परियोजनाओं राकेश सिनेमा पुल निर्माण, पांवधोई नदी पर निर्माणाधीन दो पुलों व बेहट रोड़ पर सड़क तथा नाला निर्माण सहित स्मार्ट सिटी के तहत चल रही परियोजनाओं का निरीक्षण किया और सभी परियोजनाओं के पूरा होने के सम्बंध में जानकारी ली। उन्होंने सड़क पर पडे़ अतिरिक्त मलवे को तुरंत हटवाने पर जोर दिया। स्मार्ट सिटी सीईओ/नगरायुक्त ग़ज़ल भारद्वाज स्मार्ट सिटी अधिकारियों के साथ राकेश सिनेमा ढमोला ओवर ब्रिज का निरीक्षण करने पहुंची। स्मार्ट सिटी के डीजीएम सिविल दिनेश सिंघल ने नगरायुक्त को बताया कि एक अबूटमेंट का कार्य पूर्ण कर लिया गया है, दूसरे अबूटमेंट के स्थान पर पाइल कैप का कार्य पूर्ण किया जाना है। ए-वन साइड (सिनेमा वाली रोड) से पहले स्पैन पर शटरिंग का कार्य आरंभ हो गया है जिसके उपरांत स्थल पर गर्डर कास्ट किये जायेंगे। अबूटमेंट कैप तक का सभी कार्य दिसंबर 2023 तक पूर्ण कर लिया जायेगा। पुल का समस्त कार्य अप्रैल 2024 तक पूर्ण किये जाने का लक्ष्य है। इसके बाद नगरायुक्त बेहट रोड पहुँची और पुल खुमरान से बेहट बस अड्डे तक बनायी जा रही सड़क व सड़क किनारे निर्माणाधीन नाले का निरीक्षण किया। अधिशासी अभियंता निर्माण अमरेंद्र गौतम ने नगरायुक्त को बताया कि कैरिज-वे (चलने वाला मार्ग) का कार्य पूर्ण है। नाले का कार्य भी 90 प्रतिशत पूरा हो चुका है। नाले पर डाले गए लोहे के फ्रेम से बने सभी स्लैब एक लेविल में डाले गए थे और गुणवत्ता भी बहुत अच्छी पायी गयी। गौतम ने बताया कि नाले के शेष कवर तथा साइड फुटपाथ का कार्य जनवरी तक पूर्ण कर लिया जायेगा। यहां पुल खुमरान से बेहट अड्डे की ओर पी.क्यू.सी (पेमेंट क्वालिटी कंकरीट) विधि से 330 मीटर लंबी सड़क बनायी गयी है। अधिक वर्षा तथा पांवधोई नदी में आने वाली बाढ़ के समय इस रोड पर बीच में काफी पानी जमा हो जाता था जिससे सड़क क्षतिग्रस्त हो जाती है। अतः स्मार्ट सिटी द्वारा सड़क के इस भाग को विशेष रुप की सीमेंटेड सड़क (पी क्यू सी) से बनाया गयी है। इसके अलावा खुमरान पुल व दाल मंडी पुल तथा सब्जी मंडी पुल व चतरा पुल के मध्य निर्माणाधीन 6 लेन ब्रिज के पाइलिंग एवं सब स्ट्रक्चर निर्माण कार्याे का भी निरीक्षण किया। स्मार्ट सिटी अधिकारियों ने बताया कि पुल खुमरान व दाल मण्डी पुल के बीच निर्माणाधीन 6 लेन पुल पर पाइलिंग का कार्य पूर्ण हो चुका है, शेष कार्य दीपावली के बाद शुरु किया जायेगा। जबकि पुल सब्जी मण्डी और पुल जोगियान के बीच निर्माणाधीन 6 लेन पुल के सम्बंध में बताया कि एक साइड की पाइल कैप का कार्य चल रहा है, कार्य पूर्ण होने के बाद दूसरी साइड का कार्य शुरु किया जायेगा। निरीक्षण के दौरान उन्होंने संबंधित अधिकारियों को सड़क से तत्काल उपयोग में न आने वाली निर्माण सामग्री को हटवाये जाने के निर्देश दिये जिससे त्यौहार के समय सड़कों पर आवागमन सुचारू रूप से हो सके। इस दौरान अधिशासी अभियंता अमरेंद्र गौतम, डीजीएम सिविल दिनेश सिंहल सहित स्मार्ट सिटी के अधिकारी तथा कार्यदायी संस्था के प्रतिनिधि मौजूद रहे।
Notes: A low key kayak launch with a restroom and shower. Launching a kayak here at low tide can be a messy experience, so arriving at high tide is ideal. If you come here during summer weekends you will find many swimmers and paddlers on the beach. Address: 16252 Countess Dr, Huntington Beach CA 92649 Access: All day Parking: Free street parking Subscribe to our newsletter and always be the first to hear about what is happening. © 2018 Southwind Kayak Center. Store Address: 17865 Sky Park Circle Unit F, Irvine CA 92614 Rental Address: 100 N Bayside Dr, Newport Beach CA 92660
Pro Lock Strong Blue is suitable for securing bolts, nuts, sealing pipes (ea. water, steam, gas, compressed air, hydraulic oil). Pro lock extra strong green does not require any hardener, it is solvent free and does not harden in the presence air. Pro lock strong green remains liquid on the air exposed metal surfaces, so there is more time to merge the parts. Airtight hardens pro lock strong pretty quickly in a strong protective film and is fully consistent with protection against corrosion and moisture intrusion. The compounds show a very high locking force, but can be disassembled with standard tools. Clean the two pieces to be joined with the Ultra Degreaser. Bring enough Pro Lock Strong on the surfaces. An immediate connection is not necessary because the material only reacts after connecting the parts. De Pro Lock Strong becomes hard in the absence of air. Anaerobic liquid synthetic materials do not react with metal -Plastic combinations, in which case you need to work with an activator. Hand firmness is reached after 10 to 20 minutes. Final hardening is achieved after 24 hours. The hardening can be accelerated by an activator.
<img src="https://d5nxst8fruw4z.cloudfront.net/atrk.gif?account=iA1Pi1a8Dy00ym" style="display:none" height="1" width="1" alt="" /> # 10.15: Volume of Prisms Using Unit Cubes Difficulty Level: At Grade Created by: CK-12 Estimated3 minsto complete % Progress Practice Volume of Prisms Using Unit Cubes MEMORY METER This indicates how strong in your memory this concept is Progress Estimated3 minsto complete % Estimated3 minsto complete % MEMORY METER This indicates how strong in your memory this concept is Remember Jillian's box from an earlier Concept? Jillian is working on her special box and is wondering how much she can fit inside of it. The box is a rectangular prism and has the following dimensions: 7" x 6" x 4". Can you use unit cubes to figure out the volume of the box? How? This Concept is about identifying volume. You will learn one strategy for accomplishing this task. ### Guidance In this Concept, we will look at the volume of prisms. Volume is the amount of space inside a solid figure. In this Concept, we will look at the volume of prisms. These cubes make up a rectangular prism. The cubes represent the volume of the prism. This prism is five cubes by two cubes by one cube. In other words, it is five cubes long, by two cubes high by one cube wide. We can multiply each of these values together to get the volume of the rectangular prism. 5 ×\begin{align*}\times\end{align*} 2 ×\begin{align*}\times\end{align*} 1 = 10 cubic units If we count the cubes, we get the same result. The volume of the rectangular prism is 10 cubic units or units3\begin{align*}^3\end{align*}. Identify the volume of each prism. #### Example A Solution: 10 cubes #### Example B Solution: 16 cubes #### Example C Solution: 9 Now back to Jillian's box. Here is the original problem once again. Jillian is working on her special box and is wondering how much she can fit inside of it. The box is a rectangular prism and has the following dimensions: 7" x 6" x 4". Can you use unit cubes to figure out the volume of the box? How? If you noticed in the three examples above, each measurement indicated the number of unit cubes that would be needed. We can apply this to Jillian's box. There are seven 1 inch cubes for the length. There are six 1 inch cubes for the width. There are four 1 inch cubes for the height. 7×6×4=168\begin{align*}7 \times 6 \times 4 = 168\end{align*} Jillian's box will hold 168 unit cubes. ### Vocabulary Here are the vocabulary words in this Concept. Surface area the outer covering of a solid figure-calculated by adding up the sum of the areas of all of the faces and bases of a prism. Net diagram that shows a “flattened” version of a solid. Each face and base is shown with all of its dimensions in a net. A net can also serve as a pattern to build a three-dimensional solid. Triangular Prism a solid which has two congruent parallel triangular bases and faces that are rectangles. Rectangular Prism a solid which has rectangles for bases and faces. Volume the amount of space inside a solid figure ### Guided Practice Here is one for you to try on your own. What is the volume of this figure? How many cubes are in this figure? We can see that if we count all the cubes, that we have 48 cubes. The volume of this prism is 48 cubic units or units3\begin{align*}\text{units}^3\end{align*}. ### Video Review Here is a video for review. ### Practice Directions: Find the surface area and volume of each prism. 1. 2. 3. 4. 5. 6. 7. 8. 9. 10 Directions: Identify each type of prism. 11. 12. 13. 14. ### Notes/Highlights Having trouble? Report an issue. Color Highlighted Text Notes Please to create your own Highlights / Notes ### Vocabulary Language: English TermDefinition Net A net is a diagram that shows a “flattened” view of a solid. In a net, each face and base is shown with all of its dimensions. A net can also serve as a pattern to build a three-dimensional solid. Rectangular Prism A rectangular prism is a prism made up of two rectangular bases and four rectangular faces. Surface Area Surface area is the total area of all of the surfaces of a three-dimensional object. Triangular Prism A triangular prism is a prism made up of two triangular bases and three rectangular faces. Volume Volume is the amount of space inside the bounds of a three-dimensional object. Show Hide Details Description Difficulty Level: Authors: Tags: Subjects:
# # 题目背景 LHX教主最近总困扰于前来膜拜他的人太多了,所以他给他的花园加上了一道屏障。&nbsp;<BR><BR><BR> # 题目描述 可以把教主的花园附近区域抽像成一个正方形网格组成的网络,每个网格都对应了一个坐标(均为整数,有可能为负),若两个网格(x1,&nbsp;y1),(x2,&nbsp;y2)有|x1&nbsp;-&nbsp;x2|&nbsp;+&nbsp;|y1&nbsp;-&nbsp;y2|&nbsp;=&nbsp;1,则说这两个网格是相邻的,否则不是相邻的。<BR>教主在y&nbsp;=&nbsp;0处整条直线上的网格设置了一道屏障,即所有坐标为(x,&nbsp;0)的网格。当然,他还要解决他自己与内部人员的进出问题,这样教主设置了N个入口a1,&nbsp;a2,&nbsp;…,&nbsp;aN可供进出,即对于y&nbsp;=&nbsp;0上的所有网格,只有&nbsp;(a1,&nbsp;0),(a2,&nbsp;0),&nbsp;……,&nbsp;(aN,&nbsp;0)&nbsp;可以通过,之外的所有纵坐标为0的网格均不能通过,而对于(x,&nbsp;y)有y不为0的网格可以认为是随意通过的。<BR>现在教主想知道,给定M个点对(x1,&nbsp;y1),(x2,&nbsp;y2),并且这些点均不在屏障上,询问从一个点走到另一个点最短距离是多少,每次只能从一个格子走到相邻的格子。<BR><BR><BR> # 输入格式 输入的第1行为一个正整数N,为屏障上入口的个数。<BR>第2行有N个整数,a1,&nbsp;a2,&nbsp;…,&nbsp;aN,之间用空格隔开,为这N个入口的横坐标。<BR>第3行为一个正整数M,表示了M个询问。<BR>接下来M行,每行4个整数x1,&nbsp;y1,&nbsp;x2,&nbsp;y2,有y1与y2不等于0,表示了一个询问从(x1,&nbsp;y1)到(x2,&nbsp;y2)的最短路。<BR><BR><BR><BR> # 输出格式 输出共包含m行,第i行对于第i个询问输出从(x1,&nbsp;y1)到(x2,&nbsp;y2)的最短路距离是多少。 # 提示 对于20%的数据,有n,m≤10,ai,xi,yi绝对值不超过100;<BR>对于40%的数据,有n,m≤100,ai,xi,yi绝对值不超过1000;<BR>对于60%的数据,有n,m≤1000,ai,xi,yi绝对值不超过100000;<BR>对于100%的数据,有n,m≤100000,ai,xi,yi绝对值不超过100000000。<BR><BR> # 样例数据 <style> table,table tr th, table tr td { border:1px solid #0094ff; } table { width: 200px; min-height: 25px; line-height: 25px; text-align: center; border-collapse: collapse;} </style> <table> <tr> <td>输入样例</td> <td>输出样例</td> </tr> <tr><td>2 2 -1 2 0 1 0 -1 1 1 2 2 </td><td>4 2 </td></tr></table>
The Audience's Responsibility - Suspension of Disbelief In today's internet driven age we see movies come under the microscope more than ever. Once a film is released, and the reviews have come out then the legions of movie fans across the world get together online (and in person) to discuss what they liked and what they didn't. It is inevitable that in any of these conversations you'll hear at some point, from somewhere a criticism in some lapse in logic or other aspect that is cause for the film in question to be irrevocably tarnished. We've all heard one of these complaints are some point in time. Batman v Superman: Dawn of Justice was panned by critics and audiences alike. One of the main talking points (SPOILER ALERT) was the moment that turned Batman from Superman's enemy to ally. The exchanged of "You have to save Martha", "Why did you say that name?!" has been ridiculed far and wide. I, myself, am not a fan of the moment. But have we, as an audience, forgotten the reason we watch movies in the first place? Primarily, we as an audience watch movies to escape our world and to be entertained. A key step in that is a suspension in our disbelief in order to be captured and engrossed into the world we are watching. It is this that I think is increasingly forgotten by the movie discussing public. It is not a new phenomena that films are not completely air-tight in their stories. One could point to the final act of Star Wars. Why did the Death Star not just blow up the planet that was blocking their view of the Rebel base located on the moon on the other side? It is a lapse in the logic of the world that has been created for us and could be considered "story-breaking" and yet the film is one of the most beloved of all time. Indeed, it is only in recent years that people have made that observation. So are people getting pickier? It would seem that with the internet making it easier to discuss films across more people, and even our ability to "citate" with screenshots, etc, that we as an audience are becoming more demanding. No more is it enough to just "go with it", to accept that Superman for some reason would refer to his own mother by her first-name, or that there were untold reasons that the Death Star couldn't just blow-up the planet first. However, even with this logic flaw pointed out, Star Wars isn't suddenly considered to be a much worse film so it can't just be a sign of the times either. I think that as much as we as an audience need to remember to suspend our disbelief, that suspension needs to be earned. We don't complain about the death star, because by the time we hit that part of the film we're so engrossed in the compelling, well-told story that we don't notice "hey, they could have just blown up the planet". Conversely, many would say they were not engrossed in the story of Batman v Superman: Dawn of Justice, so when those fateful lines hit the reaction is "Seriously?". What do you think? Are we less forgiving as an audience than we used to be or is the criticism warranted, and just more readily available in this internet age? #BatmanvSuperman #StarWars #SuspensionofDisbelief #Plotholes #criticism Make sure to subscribe to get more articles, commentary, and news! Featured Posts Recent Posts Search By Tags No tags yet. © 2017 by Mark Seymour
Thursday, March 31 2016 15:39 MSK Tech and Science Amateur astronomer made a video of UFO’s collision with Jupiter ufo, space, science, Jupiter, strange, mystery, device, Juno, America, USA, TNT, energy, rise, cp;;ision, object They revealed an object that had fallen on Jupiter. The collision gave rise to the release of energy equal to 12.5 million tons of TNT. Experts suggest that amateur astronomers have watched the collision of the gas giant with a comet. Kernbauer’s information was confirmed by an amateur astronomer John McKay from Dublin (Ireland). The astronomers have made videos out of the images taken by their telescopes. In general, Jupiter collides with large comets and asteroids once a year. The biggest collision happened in 1994 when the gas giant met Shoemaker-Levy 9 (D/1993 F2). An American automatic station Juno (Jupiter Polar Orbiter) is to start exploration of Jupiter and its natural satellite in the nearest future. The device is planned to arrive at Jupiter on July 5, 2016. This automatic interplanetary station will move around the gas giant in an elliptical orbit at a distance of five thousand kilometers from its atmosphere. Juno is expected to do 33 turns around Jupiter in 365 days and every turn will take 14 days. latest news
Excel financial model and business planning What is an excel model? If you run a business then you need a financial model. These are tools to help you forecast the future of your business. Whether you're looking to raise finance, plan an acquisition or simply understand the future cash requirements of your business then a financial model is what you need. Excel financial model are spreadsheet based tools used for forecasting. They use a series of user defined assumptions in order to assess future performance. Well build financial models allow the user or business owner to ask questions of their business such as: 1) What if I take a loan out? Can I afford to pay it back? 2) If I offer better credit terms to my customer, what will happen to my cash? 3) What's the impact of increasing prices over the next five years? How to build a financial model? Microsoft's spreadsheet software Excel is one of the most prolific tools for building financial models. It's a tool that most people are relatively familiar with. Whilst most people use it to simply add a couple of numbers or keep a list, at the hands of a professional financial modeller, Excel can be used to produce a complex array of financial relationships used in order to predict future cash flows. To become an excel financial modeller you most likely need a very good understanding of accountancy and finance. However, that's not enough. Lots of people working in finance believe that they can build financial models. However, it takes specific training to build models from scratch. But you don't have the time to start learning how to build professional, flexible and easy to use excel financial models! You've got a business to run! But don't worry. You can download excel financial models. This website: provide downloadable financial models. Why not check out this free excel financial model. Simply, use the coupon code SAMPLE at checkout to get your first free financial model. No comments
Re: pure function • To: mathgroup at smc.vnet.net • Subject: [mg113711] Re: pure function • From: Leonid Shifrin <lshifr at gmail.com> • Date: Mon, 8 Nov 2010 05:39:42 -0500 (EST) ```Stephan, Yes, sure, use With instead of Module: In[2]:= getFunc:=With[{a=2},Function[{x},a*x]] In[3]:= f=getFunc Out[3]= Function[{x\$},2 x\$] So, by using Module, you can create a closure whose state (variable <a> in this case) comes from surrounding context but can be modified by it at a later time. Using With gets you a textual substitution of a value that a given expression had, at the moment when With was invoked. You can also accomplish your goal somewhat differently, by redefining your getFunc: In[4]:= Clear[getFunc]; getFunc[y_] := Function[{x}, y*x] In[6]:= getFunc[2] Out[6]= Function[{x\$}, 2 x\$] The semantics of parameter-passing in Mathematica is somewhat similar to With: parameters are textually substituted to the body before the body starts to evaluate. There are a few subtle differences (related to name collision resolution in nested scoping constructs), but they do not show up in this particular case. Regards, Leonid On Mon, Nov 8, 2010 at 11:37 AM, Stephan <stschiff80 at googlemail.com> wrote: > Hi, > > I have a function that returns a pure function: > > In[1]:= getFunc := Module[{a=2}, Function[{x}, a * x]] > > In[2]:= f = getFunc > > Out[2]= Function[{x\$}, a\$57 x\$] > > > Is there any way, to have the body of the returned function contain the > actual _value_ of the local variable a, instead of the _symbol_ ? > > So I would like the returned function to be written as > > Function[{x\$}, 2 x\$] > > The reason is, that I would like to have a quick way to actually see the > value instead of digging out the local variable a\$57... > > Thanks, > > Stephan > > ``` • Prev by Date: Re: help: how to fit a list of data in two dimensions • Next by Date: Re: pure function • Previous by thread: Re: pure function • Next by thread: Re: pure function
Terms in italics are used by younger Kindred, and tend to be viewed as more vulgar slang by their elders. Of course, the older Kindred have terminology several centuries old that is incomprehensible sometimes to the younger vampires. Alleycat: A vampire with no permanent haven, or a vampire that feeds on the homeless, vagrants, and other elements of low society. Anarch: A vampire that has rejected the Camarilla to exist as an independent. The vast majority of anarchs are under a century old. Angstburger: Over-the-top moping about one’s vampiric condition. Antediluvians: The near mythological founders of the original vampire clans. They are attributed to be vampires of incalculable power, each of whom survived the Great Flood. They are believed to either be dead, in torpor, or manipulating the Jyhad. Ash: A vampire who’s been destroyed. Ball: A gathering of Toreador and invited guests. Banking: The practice of “withdrawing” blood from blood banks and hospital reserves. This blood has little taste, although it will sustain a vampire. A Kindred that engages in this practice is known as a Banker. Baron: An anarch “Prince”; a Kindred who claims a domain but is part of the Anarch Movement. Barony: The domain of an anarch “Prince.” Also, an autonomous community of anarchs. Becoming, The: The moment one passes from being a fledgeling into “full” vampire status, usually at a point deemed by one’s Sire. Blister:A vampire who contracts a mortal disease and then spreads it to each vessel fed upon. Bloat: Taking more blood than one needs, resulting in reddened eyes, a ruddy complexion and the continual shedding of tears of blood. Blood Bond: The supernatural love created by the act of ingesting a Kindred’s vitae three times. Bonds can rarely be broken, especially if they are periodically reinforced with more vitae. Blood Doll: A mortal who freely gives their blood to a vampire. Blue Blood: A Ventrue. Boojum: Any other supernatural creature, usually non-vampiric. Cainite: The Sabbat describe themselves as Cainites rather than Kindred, a term they find unpleasant. Cannibal: A vampire who indulges in diablerie. Cape: An obvious vampire. Also an elder. Chantry: A communal haven-cum-workshop for a city’s Tremere. Court: The formal audience granted by the prince to his subjects, often given at Elysium. When a prince holds court, in theory any of the city’s Kindred may approach him to present themselves, request boons or otherwise make requests for favor or action. Cub Scouts: Archons. Damned, The: Kindred. Degenerate: An unfriendly term for Toreador Kindred. Dessert: Feeding for pleasure, not need. Diablerie: When one vampire drains another vampire of blood, in the process devouring their soul. The practice holds a great deal of allure, for it is said to bestow the greatest pleasure imaginable, and can also grant greater power. Most consider it a heinous act. Do Over: The process of erasing memories from a mortal’s mind. Often used to cover up evidence of feeding. Domain: A territory assigned to a single vampire, who then has primary rights to feeding, industry and whatnot within her domain. Destruction: The power of life and death over other Kindred. Possessed by a city’s prince and occasionally bestowed on others within his dominion. Embrace: The act of turning a mortal into a vampire. Elysium: A haven of art and culture within a Camarilla city. Elysiums are, by long tradition, zones wherein combat or the use of Disciplines is strictly forbidden. Much of the harpies’ work is done in Elysium. Final Death: The ultimate destruction of a vampire. Final Nights: The last years before Gehenna and the death of all vampires. Fledgling: A newly created vampire, still under their sire’s protection. Fossil: Derisive term for a vampire who is stuck, stylistically, in an anachronistic mode of behavior. Often used to refer to elders. Futon: A coffin. Fuzzy: A Lupine. Gehenna: The vampire apocalypse. The Camarilla officially denies Gehenna, blood gods, Caine, et cetera, but the Sabbat is virtually a Genenna cult. Generation: A measure of a vampire’s innate power and descent from Caine, the vampire progenitor. Low generation vampires are considerably stronger than higher generation vampires. Ghoul: A mortal (usually, but not always a human) who has been fed vitae and acquired a hint of vampiric power as a result. Also the act of making someone a ghoul. Grandpa: A member of a vampire’s lineage more distant than their sire. Half-Breed: A ghoul. Sometimes phrased as “Half-Blood.” Harpy: A de facto title given to the Kindred who sit in judgment on the rest of a city’s social status. The harpies mandate the social pecking order through inneundo, rumors, favoritism, and other such tools. Haven: A vampire’s “home.” Hunger, The: The urge to feed, a powerful drive amongst vampires. Inky: A hunter, specifically a member of the Inquisition. John Law: The sheriff; less frequently, the scourge. Juice: Vitae. Jyhad: The war of ideals amongst the different sects of Kindred. Vampire elders command from the shadows, manipulating mortals and other vampires alike — and the elders are often manipulated in turn. Indeed, most combatants may not even realize for whom they fight, or why. Keeper of Elysium: The vampire charged with upholding the sanctity and quality of a city’s Elysium. Laid: Fed. Leftovers: Blood taken from a corpse. Lick: A vampire. Masquerade: The Camarilla’s strict policy of concealing the existence of vampires from the mortal world. Munchies: Hunger for vitae after heavy use of Disciplines. Oops: A breach of the Masquerade. Ordeal: A form of trial among Kindred, wherein the accused undergoes some sort of test (combat, sunlight, etc) to prove their innocence. Pioneer: The first Kindred into a city or area. Pioneers often set themselves up as princes, and call for reinforcements to help them maintain their holdings. Few pioneer princes last long; once they’ve stabilized their domains, most are rudely shoved aside by usurpers less inclined to take risks. PF: Short for “pity fuck.” A Kindred who receives the Embrace because of guilt or pity on the part of his sire. Prefrosh: A mortal who is a candidate for the Embrace. Primogen: A member of the council of elders who putatively advise the prince of a city. The primogen council’s actual power varies from city to city. Princeling: A derisive term for the leader of a coterie. Pyramid: Slang term for the formal structure of Clan Tremere. Rabbit: A vampire who only feeds on animals. Animal blood is sometimes known as rabbit food. Rack: The prime feeding grounds in a given city. Often composed of clubs, bars and shopping districts. Rag: The weakest vampire in a coterie. Red List: The listing of those Kindred whom the Camarilla most ardently desires to see purged from the face of the earth. Vampires on the Red List are considered under continual blood hunt. Retainer: A mortal or ghoul who serves a vampire directly. Rug: A dead Lupine. Alternately, a dead Gangrel. Salon: A place where Kindred meet to discuss philosophy and look fashionable. Sand Castle: An unsafe haven or vulnerable domain. Scoutmaster: A justicar. Sewer Rat: An unfriendly term for Nosferatu Kindred. Shovelhead: Sabbat vampire, usually one of their shock troops. The term comes from the Sabbat recruiting practice of hitting a mortal over the head with a shovel, Embracing them, and then sending them out to the front lines. Seneschal: A prince’s right-hand vampire. The seneschal handles many of the night-to-night operations of a city. Soy: Vitae taken from an animal; a less-filling and tasteless substitute for the real thing. Tentacle: Ahideously deformedvampire, usually a Tzimisce. Thin Blood: A vampire of weak generation, usually 14th generation or higher. These vampires are weaker than most, and cannot even Embrace. However, many of them can eat, drink, and even have children. Time of Thin Bloods: Considered to be the coming of Gehenna, it is marked by a large number of weak generation vampires and Caitiff. Torpor: A state of deep slumber that lasts for an extended period of time. Trashman: A vampire who feeds on the homeless and other human detritus. The term derives from such Kindred’s tendency to pick up supper from alleyways or curbsides. Uncle: An elder who takes an interest in or who patronizes a younger Kindred. Sort of a vampiric sugar daddy. Valentine: A Kindred who uses his powers to achieve mortal celebrity, often in violation of the Masquerade. Vector: Vampire who spreads mortal diseases; so called because the CDC has taken an interest in the way in which blood-based diseases have been spreading. Vlad: A Kindred who acts in stereotypically “vampiric” fashion. Vlads usually wear capes, flaunt their powers and speak in strained Eastern European accents. Few last very long. War of Ages: Anarch term for the clash of Kindred over issues such as age, sect policy (which favors elders in anarch opinion) and generation. Also, the Jyhad. Whack Job: Malkavian, or a victim of Dementation. Yawp: The claims of a prince or other Kindred who can’t hold his territory. Resurgens VirgilVansant VirgilVansant
Everyone is chiming in with their two cents, so here are mine. I did it, passed the TSHOOT exam, which means I’m now CCNP Certified. Woop!!! So the TSHOOT exam itself, - 3 mutliple answer questions - 1 Drag and Drop - 15 support tickets to answer within a simulator Last exam of the year The past few months I’ve forced my head into revision for the three CCNP exams, with two down, I have TSHOOT left to do, and I’m aiming to pass before Christmas Day. Which is a nice goal to have, but when I have to recertify next year, It’ll be around 24th December. But currently, Cisco only requires you to pass one of the three exams to keep the CCNP. The TSHOOT is an interesting exam, compared with others. It contains a small number of multiple answer based questions, however the bulk of the exam is sat around a pre-defined and publicly available topology, where within a simulator you troubleshoot various support tickets. There’s even an online mock exam provided by Cisco, so you can get use to the way the simulator works before you sit the exam. To me, it’s very close to an open book exam, however having a busy work schedule, and a small amount of time to complete the exams, I personally will not have that much time to sit down and understand the topology inside out. So fingers crossed. Using the TSHOOT study guide for something else The first two chapters of the TSHOOT official study guide are actually a really good blueprint for infrastructure maintenance and troubleshooting which can be applied beyond that of just networking. So that’s what I’m going to touch upon in this blog post. Let’s start off with infrastructure maintenance, so this not only includes your network devices, but server and client hardware, the following are a few instances; Continue reading Applying the TSHOOT methodology to everything So the #vDM30in30 challenge is over, which was started off by the guys from Virtual Design Master, and the challenge was to write 30 blog posts in 30 days. That’s all. Why I took the challenge I took up the challenge, because it was that, a challenge, I started the blog in April 2014, but only really started to post stuff on a regular basis in July 2014. With around 30 blog posts on the site, taking the 30 posts in 30 days doubles my content, and also my exposure. I encountered this issue on a brand new Veeam installation the other day. When running a test backup job. "Error: NFC storage connection is unavailable, Storage: [stg-datastore-(Number),nfchost-host-(Number),conn:(ServerName)"
In this investigation, pupils use pond nets to take samples of invertebrates living in three micro-habitats, or three unique habitats (e.g. pond, river, canal). After identifying the animals they have found, pupils calculate a pollution score using the animals as bioindicators. Pollution is the addition to the environment of something which causes harm. We can measure the amount of pollution in water by calculating a Biotic Index, which works by giving each type of animal a score. Animals which are sensitive to pollution have a high score, while animals that are tolerant of pollution have a low score. Through this activity pupils will: - use sampling to compare and contrast invertebrates living in three contrasting habitats - calculate a pollution score for each habitat Resources to download Background information for teachers Animals that live in water have different ways of obtaining oxygen - Across the body: oxygen in the water goes through the skin and into the body e.g. flatworms, leeches, snails, water mite, midge larvae - Gills, e.g. water flea, mayfly nymphs, caddis fly larvae, damselfly nymphs, dragonfly larvae, freshwater shrimps - Snorkels : some animals have a tube which gets oxygen from the surface e.g. water stick insects and water scorpions - Scuba divers : some animals have hairy bodies which hold bubbles of air collected from the surface. They take the air down with them and breathe through spiracles, e.g. water beetles and water boatmen Characteristics of different freshwater animals Leeches (Phylum Annelida, Class Hirundinea) - Relatively few leech species are parasitic and blood-sucking. - Many are scavengers or predators. - They use their suckers to attach themselves to the substrate, and move by looping their body with a series of muscular contractions. Water fleas (Class Crustacea) - Water fleas feed on algae. - They float in the water of ponds and streams; their bristles slow them down. Freshwater shrimps (Class Crustacea) - Shrimps can be found in vast numbers. They are detritivores. - Shrimps are flattened in shape and swim on their sides. This slows them down in moving water and allows them to hide underneath stones. - Shrimps have a moderate tolerance to water pollution. Freshwater Hoglouse (Class Crustacea) - Hoglice are detritivores that eat dead or decaying animal and plant material. - They do not have particularly streamlined bodies, so are less common in moving water than in ponds. - They are more tolerant of pollution than freshwater shrimps. Mayflies (Class Insecta, Order Ephemeroptera) - Mayflies are the only insect where the final nymph stage can fly (called ‘duns’ by anglers). The duns fly out of the water and turn into adults. Adults are short-lived (sometimes only one day) and do not eat. - Mayfly nymphs are flattened in shape for hiding under stones, and are flat enough to remain in the boundary layer around the stone where the current is slower. - The nymphs have one hook at the end of each leg appendage and use these for clinging to the substrate - Nymphs feed mainly on dead vegetation. - Mayflies are normally found in clean, well-oxygenated streams, and are sensitive to pollution, although one type of swimming mayfly is commonly found in ponds. Dragonflies and Damselflies (Class Insecta, Order Odonata) - Dragonflies are generally the larger. Adult dragonflies rest with their wings outstretched; damselfly wings are folded. - Nymphs have an ovipositor that they pierce aquatic plants, logs and wet mud etc. with and lay the eggs. Eggs are laid singly. The nymphs clamber among stems and are quite inconspicuous. - The nymphs are voracious carnivores. To catch prey they have an elongated labium hinged in the middle and folded back under the thorax. It has grappling hooks and spines at the tip. The muscles are capable of extending it with lightning speed. It is thrown forward and opened by a single movement; it closes on the victim and is withdrawn. The gills are upon the tip of the abdomen. Caddis flies (Class Insecta, Order Trichoptera) - Caddis flies have larvae instead of nymphs. There are two types. Cased caddis fly larvae live in cases made of twigs, leaves and small stones. The cased caddis fly larva case provides a weight to keep it in the stream bed. The case also provides protection from damage by current. Caseless caddis fly larvae do not make cases. Instead they spin a net of silk which is attached to stones. Invertebrates are washed downstream into it and are consumed. This relies on moderate current flow. - Larvae have filamentous gills, usually along the abdomen. - Cased caddis fly larvae are herbivores; they graze algae. Some caseless caddis fly larvae are carnivores. Beetles (Class Insecta, Order Coleoptera) - Beetles are a large group found in all habitats except polluted water. - Diving beetles are carnivores. They traps air beneath their wings and renew it by visiting the surface. They have paddle-like legs that are often fringed by hairs to allow them to move swiftly through the water. Flies (Class Insecta, Order Diptera) - Fly larvae can survive in most conditions, even in heavily polluted water. - Phantom midge larvae, rat-tailed maggots and cranefly larvae are all carnivores. - Non-biting midge larvae are detritivores. They live at the bottom, where there is little oxygen, so they contain haemoglobin and are bright red in colour (often known as bloodworms).They can live in heavily polluted water. - Rat-tailed maggots live in mud in ponds and ditches. They have a telescopic breathing tube which allows them to take in air from the water surface even if the water level changes.
# as predicate def find_numbers(nums, test): lst = list() for i in nums: if test(i): lst.append(i) return lst # # def is_even(n): # return n % 2 == 0 result = find_numbers([1, 2, 3, 8, 3, 2, 87, 54, 55, 88, -2, -10], lambda n: n % 2 == 0) print(result) # sorting example result.sort() print(result) result.sort(key=lambda v: abs(v)) print(result)
Vincent Callebaut Architectures has released a design proposal for a new eco-tourism resort in The Philippines inspired by natural coastline forms. Making extensive use of cradle-to-cradle and other sustainable design principles, the resort features a series of spiraling apartment buildings and shell-shaped hotel buildings, themselves positioned on two Fibonacci spirals of land in a coastal lagoon. At the center of the ensemble, a mountain-like complex combines a school, recreational swimming pools, sports halls, the resort's kitchens, and a suite of laboratories for environmental scientists. Latest projects in Philippines Latest news in Philippines Henning Larsen Architects, in collaboration with landscape architects SLA and BuroHappold Engineering, has been selected as the winners of an international design competition to design a new iconic skyscraper for the city of Manila, Philippines. Located within the Bonifacio Global City business district, “ICONE” tower rises from a large public plaza as a dramatic spire, piercing the sky and becoming a new icon for the Manila Skyline. In its annual report, the 2016 Tall Building Year in Review, the Council on Tall Buildings and Urban Habitat (CTBUH) has announced that 2016 saw the completion of a record 128 buildings 200 meters or higher. This number surpasses the previous record of 114 completions set in 2015. Eighteen of these buildings became the tallest in their city, country, or region, and ten earned the designation of supertall, at 300 meters and above. Brooklyn-based design studio, workshop and think tank CAZA (Carlos Arnaiz Architects) has announced its plans for Ospital Pacifica de Juan and Juana Angara, a hybrid hospital and trauma center prototype located in rural Baler, Philippines. As the first combined General Hospital and Trauma Care Center in the country, the project will drastically improve medical support in this remote area. Last week, Daniel Libeskind joined Century Properties Group to celebrate the ground breaking of the “Century Spire.” Designed as a key building for Century City - a 3.4 hectare, mixed-use development in Makati - the all-glass, 60-story office and residential tower sets itself apart with a “dramatic crown” that divides and expands the building’s top half as it rises. When commissioned to design a church in Cebu, the oldest urban center of the Philippines, Carlos Arnaiz of CAZA hoped to create a “scared place that embodied the contemporary search for meaning.” Inspired by the world’s diversity, Arnaiz, together with his colleagues, envisioned the Chapel of San Pedro Calungsod, the “Church of 100 Walls.” Symbolic of “commonality and difference,” the church represents the many paths one may take through life and invites visitors to explore its many, distinct spaces made up of 100, uniquely-sized walls. On Friday, one of the strongest storms ever to hit land left 660,000 Filipinos homeless, with countless more desperately needing basic supplies to survive. Vanity Fair reports that Developer Robbie Antonio’s OMA-designed “Stealth,” a $15 million private residence/art gallery in Manila will be completed by the end of the month. The home is a series of stacked, irregular boxes with rooftop pool and waterfall. Loading... It could take a few seconds
नई दिल्ली। बिहार में आए सियासी तूफान के बाद भी जदयू में जंग थमती नहीं दिख रही है। बागी हो चुके नेता शरद यादव के पर कतरने के लिए पार्टी ने एडी-चोटी का जोर लगा दिया है। शरद यादव की राज्यसभा सदस्यता को रद्द करने के लिए अब पार्टी नेताओं ने उपराष्ट्रपति वेंकैया नायडू से मुलाकात की। जदयू के राज्यसभा में संसदीय दल के नेता आरसीपी सिंह और महासचिव संजय झा ने शरद यादव की सदस्यता खत्म करने की मांग करते हुए उपराष्ट्रपति को पत्र सौंपा। उपराष्ट्रपति को शरद यादव की पार्टी विरोधी गतिविधियों का सबूत सौंपा गया और उनकी सदस्यता खत्म करने की मांग की गई। राज्यसभा के नियमों के शेड्यूल १० के तहत उनकी सदस्यता रद्द करने की मांग की गई। इसमें किसी भी सदस्य के स्वेच्छा से सदस्यता छोडऩे पर सदस्यता रद्द होने का प्रावधान है। जदयू महासचिव संजय झा ने बताया कि शरद को पार्टी की ओर से आधिकारिक तौर पर यह पत्र लिखा गया था कि वे राजद की रैली में शामिल न हों। पार्टी के निर्देश का उल्लंघन कर उन्होंने राजद की रैली में मंच साझा किया। यह संविधान के दसवें अनुच्छेद के तहत स्वत: दल त्याग का मामला बनता है। पूर्व में ऐसे मामलों में सदस्यता खत्म होने के दृष्टांत हैं। बता दें कि २०१५ में बिहार में जदयू और राजद ने साथ में चुनाव लड़ा था और भारी जीत हासिल की थी। इसके बाद जदयू के नीतीश कुमार सीएम और राजद कोटे से तेजस्वी यादव को डिप्टी सीएम बनाया गया। जुलाई में नीतीश ने राजद से अलग होकर भाजपा के सहयोग से सरकार बना ली। इसके बाद जदयू के शीर्ष नेता शरद यादव ने नीतीश के खिलाफ मोर्चा खोल रखा है। इसके बाद जदयू ने शरद यादव को राज्यसभा में पार्टी के नेता पद से हटा दिया था। बाद में शरद यादव ने पिछले दिनों राजद प्रमुख लालू प्रसाद यादव की महारैली में भी हिस्सा लिया था। इसके बाद जदयू ने कहा था कि रैली में भाग लेकर शरद यादव ने खुद से पार्टी की सदस्यता का त्याग कर दिया है।
पूर्व प्रधानमंत्री मनमोहन सिंह पर बनी फिल्म 'द एक्सीडेंटल प्राइम मिनिस्टर' रिलीज हो गई है. हर ओर मनमोहन सिंह और उनके काम की चर्चा है. इसी बीच हम आपको बताने जा रहे हैं एक दिन में ये एक्सीडेंटल प्राइम मिनिस्टर कितना काम करता था. प्रधानमंत्री रहते हुए विनम्र मनमोहन सिंह दिल की दो सर्जरी के बाद भी जितना काम करते थे, उनकी ऊर्जा की बराबरी शायद कोई 20 साल का युवा भी नहीं कर पाता. मनमोहन सिंह अपने जीवन में इतने बैलेंस के साथ चलते थे कि वे एक ओर अफगानिस्तान के मामले पर विचार कर लेते थे, दूसरी ओर प्रशांत महासागर में सुरक्षा की स्थिति पर अपने किसी समकक्ष से बात कर लेते थे और वहीं लोकल मुद्दों पर सांसदों से भी बात कर लेते थे. मनमोहन सिंह अक्सर अपने 7 रेसकोर्स रोड (लोककल्याण मार्ग) के अपने ऑफिस के अलावा घर पर भी काम किया करते थे. पीएम रहते मनमोहन सिंह के दिन की शुरुआत सवेरे-सवेरे घर के बाहर पार्क में टहलने से होती थी. ये उनके दिन की एक ऐसी गतिविधि थी, जिसे वे कभी मिस नहीं करते थे. इसके बाद 7 बजे से वे ऑफिस के कामों के लिए तैयार रहते थे. कभी-कभी वे ब्रेकफास्ट भी तभी कर लेते थे, जब उन्हें किन्ही खास लोगों से मिलना होता था, जैसे उनके करीबी अर्थशास्त्री जगदीश भगवती. इसी वक्त वे उनके साथ किसी खास विचार पर बातें भी कर लेते थे. वे ऐसा अख़बार पढ़ते हुए भी कर लेते थे. 9 बजे से मनमोहन सिंह ऐसे लोगों से मिलना शुरू कर देते थे, जिनके साथ उनकी अपॉइंटमेंट होती थी. ऐसे में वे उन सीनियर अफसरों से भी मिलते थे, जो प्राथमिकता के हिसाब से उन्हें रक्षा और राजनीतिक महत्व की बातों के बारे में जानकारी देते थे. अपने पूर्ववर्ती प्रधानमंत्रियों की अपेक्षा मनमोहन सिंह बहुत ध्यान से इन सारी ही बातों को सुनते थे और बजाए उन मुद्दों को पूरी तरह से प्रधानमंत्री कार्यालय के अधिकारियों पर छोड़ने के लगातार हर मुद्दे पर अपने विचार बताते जाते थे. 2009 में हुई अपनी कई बाईपास सर्जरी के बाद मनमोहन सिंह वक्त से अपने खान-पान को लेकर और ज्यादा संजीदा हो गए थे. वे 1 बजे दोपहर में अपने घर खाने के लिए आ जाते थे और ढाई से तीन बजे के बीच फिर से ऑफिस लौट जाते थे. मनमोहन सिंह रातभर तो नहीं जागते थे पर बहुत जल्दी सोते भी नहीं थे. उनकी शामें अक्सर कार्यक्रमों से भरी रहती थीं. साथ ही कई लोग उनसे थोड़ी से वक्त के लिए फोन पर बात करने के लिए भी अर्जी लगाए रहते थे. इनमें किसी कैबिनेट मीटिंग के तुरंत बाद किसी मुद्दे पर बात करने को फोन कर देने वाले मंत्री भी होते थे. ज्यादातर मौकों पर मनमोहन सिंह बातचीत के लिए मना नहीं करते थे और बातें लंबी खिंचती जाती थीं. वे अपने ऊपर मीडिया की रिपोर्टों पर ध्यान दिए बगैर वे वीकेंड्स पर भी काम किया करते थे.हालांकि फाइलें जांचने और उसमें गलतियां देख लेने की उनकी प्रतिभा अद्वितीय थी लेकिन उनके सहयोगी नहीं चाहते थे कि वो छोटी से छोटी बातें चेक करें. मनमोहन वीकेंड्स पर भी बेहद शांती से काम कर लिया करते थे. वीकेंड पर काम के दौरान उनके चारों ओर कोई पॉलिटिकल जमावड़ा नहीं लगा करता था. प्रधानमंत्री पर पद पर रहते हुए एक ओर राजनीति में उनके भविष्य की चर्चा जोरों पर थी दूसरी ओर उन्होंने ग्रीन एनर्जी ऑप्शन पर मीटिंग को चुपचाप निपटा दिया था. फाइलों को एक ही नज़र में देखकर परखने की मनमोहन में ग़ज़ब की कला थी. वे फाइलें जांचने के लिए मेनेजमेंट के पचड़ों में कम ही फसा करते थे. किसी भी डिपार्टमेंट में काम करते हुए मनमोहन कभी भी मंत्रालयों का गला नहीं पकड़ते थे, क्योंकि उन्हें विश्वास था कि मिनिस्टर्स अपना रोज़ाना का काम रोज़ करते हैं. बुधवार को एडिटर्स के साथ होने वाली मीटिंग में एक बार उन्होंने कहा भी था कि वे अपने सहयोगियों के साथ काम करते हुए क्लास मोनिटर जैसे नहीं होते. इन्फ्रास्ट्रक्चर सेक्टर के काम का जायज़ा लेते हुए मनमोहन को जब भी रोडब्लॉक्स मिलते तो वे हमेशा उसका हल ढूंढने की ओर कदम बढ़ाते थे. उनकी इस आदत से मिनिस्टर और ब्यूरोक्रेट्स अच्छी तरह वाकिफ रहते. उन्हें मालूम होता कि ये वो व्यक्ति है जो डीटेल्स और आंकड़ों के चक्कर में नहीं फंसेगा.
• The Seville Reporters In Focus: What is Buffett Telling The Markets? Warren Buffett, the Oracle of Omaha has been critical of gold for a long time. He has expressed that the "magic metal" has no utility, and in Buffett's opinion an investment in good American companies was a better investment than gold. This has been true for Warren Buffett who is considered one of the best stock pickers / investors of all time. The reality of the situation though is that from January 2000 to present day Gold has increased by 593%. During the same time the S&P 500 has increased 129%. For the average buy-it, set-it-and-forget-it investor, gold was the better play. But investors who would've invested in gold futures in 2000 would've missed out on dividend payments, which could've been used to invest in companies that were out performing the stock market and the gold market. In any case, Buffett caught the investment world off guard with two major moves. Buffett purchased a gold company and he sold off a large portion of his bank holdings. What is Buffett Signaling to the Markets? Buffett's recent moves could mean a lot or they could mean very little. Buffett's moves could mean a lot because Buffett has been a big investor in banks throughout the years. In my Buffett Sells a Bank piece, I discussed how during the Great Financial Crisis, partly created by banks, Buffett made one of his greatest investments in Goldman Sachs. Through the Wells Fargo account scandal that cost Well's customers lots of headache and Wells Fargo shareholders billions of dollars, Buffett stuck with bank, In 2008 when Buffett made his Goldman Sachs investment he stated he made the investment because he believed the government would bail out the big failing banks at the time, and the U.S. government did to the taxpayers dismay. So now, as the markets are flying, and Wall Street is looking forward to the markets making new highs, Buffett scales down his bank positions.  The other reason why Buffett's move could mean something significant, is that gold, in my lifetime, has been a place where investment dollars flow to when investors are weary of the stock markets. Gold has been a safety play for investors who needed to put capital preservation over capital appreciation. Is Buffett telling us that he is weary of the stock markets with his investment in Barrick Gold (GOLD)? There has been no bigger cheerleader for the stock market and buying American companies for the long-term than Warren Buffett. If he's selling banks and buying a gold company does that mean he sees tough times ahead for the stock market, and is he positioning himself for those tough times? However, on the flip side Buffett's moves could be nothing, just a reorganizing of the portfolio. Buffett made headlines earlier in the year when he sold his airline holdings, as Buffett, like many other investors, saw the airlines not returning to normal business for quite a while. He could be doing the same here with banks. As we stated earlier, Buffett along with partner Charlie Munger are some of the greatest investors to ever live. The draw down on their banking positions could be because they have their eyes on other value plays in the market. The headlines about the Barrick Gold investment did what headlines are supposed to do, get us interested so that we click and read a story that tells us very little. Under the hood of it, Barrick Gold is a typical value investor's company. The company has more tangible assets (cash and cash equivalents, inventory, and property, plant, and equipment), $29.7 billion, than they do total liabilities, $14 billion, according to Yahoo Finance. The company has a profit margin of 39%, a return on equity of 22.3%, and solid free cash flow generation. Buffett buys gold is the headline, but the real story is Buffett buys another solid undervalued company that so happens to mine gold. My Thoughts I, like Buffett, have always been a critic of investing in gold. I'm the person that says, every piece of gold ever mined is still on earth, how valuable can it be? But that aside, while I think the markets are headed for a decent sized pull back, I don't think Buffett's recent moves are a signal of something major to come. Again, I feel markets are due for a correction. I believe if this correction happens it will be the knockout punch for a lot of companies, and bring many others well below their intrinsic value, which gives investors with lots of cash lots of options to buy cheap companies. Buffett's bank positions have done well for him, but the financial industry has underperformed the markets since the market's rally off of the March pandemic lows. What the charts tell me is there are better places to deploy cash than banks at this time, and Buffett may feel the same way. Buffett selling banks has been an interesting theme for 2020, but I don't think investors should read too much into it. The banking system isn't failing or dying, at least not in 2020. I don't think the sale of Buffett's bank positions can be put in the same boat as the sale of the airline positions earlier in the year. The coronavirus had a direct impact on the airlines, but the major investment banks were able to have a blowout Q2 in 2020. The investment in Barrick Gold doesn't mean the stock market is going to crash. The investment appears to be a nibble at a company with a strong balance sheet that could possibly become a Berkshire Hathaway company in the future. If there is a signal being sent by Warren Buffett, it's that bank stocks are stalling, and there's bigger money to be made elsewhere, and that he still loves undervalued companies with strong balance sheets.  6 views0 comments Recent Posts See All
प्रधानमंत्री नरेंद्र मोदी देश में ‘औपरेशन ग्रीन योजना’ की शुरुआत करना चाहते हैं. इस योजना को प्रधानमंत्री ने ‘टौप’ कहा है. खेती से जुड़ी इस योजना में टी यानी टमाटर, ओ मतलब ओनियन और पी मतलब पोटैटो को शामिल कर इसे टौप कहा गया है. देश में इस से पहले श्वेतक्रांति और हरितक्रांति किसानों के लिए बनी थीं. श्वेतक्रांति में दूध और डेयरी को प्राथमिकता दी गई थी तो हरितक्रांति में अनाज उत्पादन पर जोर था. दोनों ही योजनाओं का प्रभाव यह पड़ा कि देश के किसानों ने अपनी मेहनत व लगन से इन को सफल बनाया. देश को अनाज और दूध के उत्पादन में आत्मनिर्भर बनाया. देश के किसान की सब से बड़ी त्रासदी यह है कि जैसे ही वह पैदावार को बढ़ाता है, फसल के दाम घट कर माटी के मोल हो जाते हैं, जिस से उसे लागत मूल्य भी नहीं मिल पाता है. सरकार हर बार समर्थन मूल्य दे कर यह दिखाती है कि वह किसानों पर बहुत बड़ा उपकार कर रही है. समर्थन मूल्य की घोषणा सरकार एक राजा के अंदाज में करती है जिस से लगता है कि वह किसानों पर उपकार कर रही है. सरकार के पास समर्थन मूल्य को घोषित करने का कोई फार्मूला नहीं है. समर्थन मूल्य लागू करने को ले कर कोई भी सरकार स्वामीनाथन आयोग की सिफारिशों को लागू नहीं करना चाहती. भाजपा ने अपने चुनावी वादे में कहा था कि वह स्वामीनाथन आयोग की सिफारिशों को लागू करेगी. किसानों को एक झुनझुना देने के लिए सरकार ने कहा कि साल 2022 तक किसानों की आय दोगुनी हो जाएगी. यह एक ऐसी बात है जिस को न समझा जा सकता है, न समझाया जा सकता है. केंद्र की भाजपा सरकार नारे देने में माहिर है. उसे पता है कि 2019 के लोकसभा चुनावों में किसानों की समस्याएं बड़ा मुद्दा होंगी. आलू, प्याज और टमाटर के किसान सब से अधिक परेशान हैं. किसानों के लिए ये ‘कैश क्रौप’ हैं. इन में भी अब किसानों को मुनाफा नहीं मिल रहा. ऐसे किसानों के लिए नरेंद्र मोदी का नया नारा टौप है. औपरेशन ग्रीन योजना के तहत इस को बढ़ाया जाना है. प्रधानमंत्री ने कहा कि इस के तहत फसल का डेढ़गुना समर्थन मूल्य देना ऐतिहासिक फैसला है. हाल के कुछ सालों में पूरे देश में प्याज, आलू और टमाटर उगाने वाले किसानों की संख्या तेजी से बढ़ी है. इन किसानों की परेशानियां कम करने के लिए यह नारा दिया गया है ताकि वे स्वामीनाथन आयोग की बातों को भूल जाएं. लागत से कम समर्थन मूल्य सरकार लागत मूल्य को ले कर अपनी खूब वाहवाही करती है. जितना पैसा किसानों को राहत देने में नहीं लगता उस से अधिक योजना की वाहवाही बखान करने वाले विज्ञापनों व कार्यक्रमों में बरबाद हो जाता है. समर्थन मूल्य के खेल को समझने के लिए आलू की खेती की लागत को देखना जरूरी है. एक बीघा खेत में आलू की बोआई करने में किसान का करीब 23 हजार रुपया खर्च होता है. बहुत अच्छी फसल हो, तो 20 से 25 क्विंटल के बीच आलू की पैदावार होती है. सरकार का आलू पर समर्थन मूल्य 487 रुपए प्रति क्विंटल है. अगर एक खेत में 25 क्ंिवटल आलू की पैदावार मानें, तो 12 हजार रुपए आलू की पूरी फसल का सरकार से समर्थन मूल्य मिलेगा. ऐसे में किसान को 11 हजार रुपए प्रति बीघा का नुकसान साफ दिखता है (देखें बौक्स). इस के अलावा सरकारी खरीद में तमाम तरह की परेशानियां हैं, सो अलग. सरकारी क्रय केंद्रों पर केवल 30 से 55 एमएम का आलू ही खरीदा जाता है. कई बार अच्छी फसल होने से आलू का आकार बढ़ भी जाता है. खराब फसल होने पर आलू का आकार घट जाता है. ऐसे में आधी से अधिक फसल क्रय योग्य ही नहीं मानी जाती . यह भी किसानों की परेशानी की बड़ी वजह है. सरकार किसानों पर उपकार जताते हुए आलू को 300 किलोमीटर दूर से मंडी तक लाने के लिए 50 रुपए क्ंिवटल की छूट, मंडी शुल्क में 2 प्रतिशत और सेस में आधा प्रतिशत छूट देने की बात भी करती है. यह प्रक्रिया बेहद जटिल है, जिस की वजह से छोटे किसान को इस का लाभ नहीं मिलता है. आलू की लागत और सरकार द्वारा दिए जा रहे समर्थन मूल्य की तुलना से साफ होता है कि 1 बीघा की आलू खेती में किसान को तकरीबन 11 हजार रुपए का नुकसान होता है. पैदावार ज्यादा, नुकसान ज्यादा आलू की लागत और बिक्री को देखने से साफ है कि टौप योजना का किसानों को क्या लाभ होने वाला है. इस योजना के तहत आने वाली तीनों फसलों टमाटर, प्याज, आलू की एकसी कहानी है. जब किसानों के खेत से इन की खरीदारी होती है तो वह बहुत सस्ती होती है. जब ये चीजें बाजार से उपभोक्ता तक पहुंचती हैं तो इन की कीमतें दोगुना से अधिक हो जाती हैं. जिस आलू को सरकार 5 रुपए प्रतिकिलो के भाव से कम में खरीदती है वह उसी समय बाजार में 10 रुपए प्रतिकिलो से अधिक का बिक रहा होता है. कुछ समय के बाद यही आलू 20 से 30 रुपए प्रतिकिलो तक बिकता है. एक तरफ किसान कोल्डस्टोर में रखे अपने आलू को सड़क पर फेंकने को मजबूर होता है तो दूसरी तरफ किसान के पैदा किए आलू से ही बिचौलिया मालामाल होता है. टमाटर और प्याज को ले कर भी यही कहानी है. ये फसलें इस तरह की हैं कि जिन को कुछ दिनों तक बाजार में जाने से रोका जा सकता है. जिस की वजह से बिचौलियों को इन के दाम बढ़ानेघटाने का मौका मिल जाता है. उत्तर प्रदेश में आलू सब से अधिक पैदा होता है. गन्ना के बाद आलू किसानों के लिए सब से बड़ी ‘कैश क्रौप’ है. आलू के किसानों की बदहाली को सरकार सामने नहीं आने देना चाहती. किसानों ने जब विरोधस्वरूप लखनऊ में विधानसभा रोड पर एक रात आलू फेंक कर सरकार का ध्यान अपनी परेशानी की ओर दिलाया तो सरकार ने आलू फेंकने वालों को जेल भेज दिया. उन के इस कदम को विरोधी पार्टी की साजिश करार दिया. आलू, टमाटर और प्याज की खेती करने वाले किसानों की परेशानी यह है कि उन की पैदावार जितनी बढ़ती है, फसल की कीमत उतनी ही घटती जाती है. किसान फसल को रोके रखने की हालत में नहीं होता. वह किसी भी कीमत पर पैदावार को बेचने को मजबूर रहता है. इस का लाभ बिचौलिए उठाते हैं. वे किसानों से कम कीमत पर खरीद कर महंगी कीमत पर बाजार में बेचते हैं. प्रधानमंत्री की ‘औपरेशन ग्रीन योजना’ यानी टौप में इस को हल करने का कोई फार्मूला नहीं सुझाया गया है. केवल नारों से भला नहीं होगा सरकार को किसानों की परेशानियों को जमीनी स्तर पर देखना चाहिए. केवल नारे देने से किसानों का भला नहीं होने वाला. सरकार को लागत के अनुपात में फसल का मूल्य किसानों को देना चाहिए. आज किसान महंगाई बढ़ने, छुट्टा जानवरों द्वारा फसल को बरबाद करने और बाजार में फसल की कम कीमत मिलने से परेशान हैं. घर बनाने से ले कर खेती के दूसरे प्रबंध करने तक में उसे महंगाई का सामना करना पड़ रहा है. बढ़ती महंगाई का असर किसानों पर भी पड़ता है. सरकार किसानों को महंगाई से बचाने के लिए कुछ नहीं कर रही है. एक के बाद एक नएनए नारे दे कर सरकार किसानों को केवल बरगलाने का काम कर रही है. VIDEO : कार्टून लिटिल टेडी बियर नेल आर्ट ऐसे ही वीडियो देखने के लिए यहां क्लिक कर SUBSCRIBE करें गृहशोभा का YouTube चैनल.
tv [untitled] CSPAN August 20, 2009 7:00pm-7:30pm EDT . >> announcer: the following is a masn presentation. >> presentation. >> bob: the rockies took advantage of colin balester last night knocking him out. come back hits from ryan zimmerman kept it close in d.c. the bullpen got 23 outs in eight innings but fell just short of stopping the rockies. tonight, garrett mock seeks to earn his third curly w in a row. . >> bob: in a town s history another step into the future and some history as well for the acknowledges today. a new general manager. but the more things change the more they stay the same. fans coming in for game 3 of this series, bob carpenter, rob dibble, rob it was four months ago when ryan zimmerman signed his contract, mike rizzo signed his today. >> rob: and folks who don't know mike rizzo, he has been around the game for an awful long long time, he has done it as a player, as a development guy, this is some of his stuff done with the washington nats, been a part of the last three drafts, so obviously signing the extension for the base of the franchise, the trades, and then revietnamping a lot of this team, a lot of guys that were left over from jim bowden's rein he has been able to trade or get rid of or send back somewhere else, hence they came. but i think you know you look at the bullpen, he has revamped the bullpen. manny acta was changed with jim wriggleman, so all the things he has done is positive. but i like listening to him. he wants to win. not just about developing for the future, stephen strasburg, etcetera, he wants to win right now and be competitive right now but his long-term goals are to win championships and i think kasten, the lerner family, they are all going in the right direction. >> everybody in the organization wanted to him to get the job. we're going to cover the bases, with sean burnett, one of mike rizzo's acquisitions, 26 years of age from dunedin florida, a # 1/2 e.r.a., a win, and so far anchoring the left side of that bullpen. high cholesterol. you've taken steps to try and lower both your numbers. but how close are you to your goals? there may be more you can do. only caduet combines two proven medicines... in a single pill to significantly lower... high blood pressure and high cholesterol. in a clinical study of patients... with slightly elevated blood pressure and cholesterol, caduet helped 48% reach both goals in just 4 weeks. caduet is one of many treatment options, in addition to diet and exercise... that you can discuss with your doctor. caduet is not for everyone. it's not for people with liver problems... and women who are nursing, pregnant or may become pregnant. to check for liver problems, you need simple blood tests. tell your doctor about any heart problems... and all other medications you are taking... or if you experience muscle pain or weakness, as they may be a sign of a rare but serious side effect. how close are you to where you want to be? ask your doctor if caduet can help you go... for both your goals. . nats baseball on masn, brought to you by southwest airlines. book your next trip at southwest.com. and by pnc bank. pnc, leading the way. . it is sizzling in our nation's capital tonight, it's gonna be in the low 90s when we get this ball game under way. the nats and the rockies in game 3, the rock rockies have dominated since 05 winning 25 of 35 will send this lineup out there. carlos gonzalez has homered in four straight games and brad haunt has had a good series, a couple r.b.i.s and a couple walks. the rockies are tough to hold down. their selective hitters, they are second to the phillies in runs and home runs. and for garrett mock, it will be his 20th appearance and start number 7. rob ball has won his last two times out. if. >> rob: he has won his last two times out, throwing strikes, getting ahead in the count. that's been the key to his success. let's give you the scouting report on mr. mock. there is cause foray applause because he has gone out there, won his last two starts after four so-so starts, pushed the nfl. this season he has been very effective, third trip not so good, got to be better in later innings and help out that bullpen after last night's disaster by balester and stick to your game plan and if you get a lot of runs don't deviate. . >> bob: carlos gonzalez, we under way at 7:06, 91 degrees, and mostly a little bit beyond partly cloudy skies right now. but it is nice to have some cloud cover, i bet those people in the upper deck in right field are glad it's cloudy. gonzalez hitting .289, on-base percentage of .350. and he has homered in four consecutive games and six of his last eight. so a week and a half ago this guy had two home runs all year, now he has eight. and they like him a lot, rob, he is only 23 years of age, they got him in the deal with oakland. with left-hander rob street and closer matt halladay. mock goin' right after him, ryan spilborghs had to get out of the way in the on-deck circle for a line drive that went right by his ear. >> when i talked to don baylor about him up in colorado he just talked about this kid is hitting the ball real well. they just wanted him to make more contact during the game and once he is making more contact during the game, balls are flying out of the ball park all over the place, average has shot right up there where it should be, and they are very comfortable with him. >> bob: nine strikeouts, 15 walks under this don baylor's instruction, an outstanding hitter and a former manager and hitting coach and a pretty good off-speed pitch by mock to get a strikeout. . >> well and garrett mock do great job. >> rob: on the pitch track, throws a great drop out the bottom change-up on the young man, a lot of young players, especially when they get to this level, have trouble with change-ups, breaking balls, and things that are off speed. one thing they can consistently hit at any level is a fastball. so i think we learned last few nights with gonzalez, stay away from stuff that he can get extension on. >> bob: 29-year-old outfielder ryan spilborghs. haven't seen him yet in this series. 6'1", 190 out of santa barb seventh round draft choice back in '02. mock has good stuff tonight. quickly 0-2. 11 year veteran hunter wendelstedt has the plate, doug get its at second, brian night at third. i wonder why he hasn't been playing the last couple nights the way he has been hitting? mainly because they've had gonzalez and young dexter fowler together in the outfield. >> zimmerman has to back up. he doesn't like to do that, he throws it so short, it was a long bounce for adam dunn. that's better than a short hop. and here is the nationals defense, still at the bottom of the league, but much much better over the last month and a half. nyjer morgan and elijah dukes have combined for 24 outfield assists, guzman, gonzalez up the middle, josh bard behind the plate. and as debbie taylor told us last night, jesus flores start to go resume baseball activities, threw for the first time yesterday after severely bruising that shoulder a couple months ago. that one right in there for todd hilton. >> rob: frac touring the bone inside the shoulder, and that fracture caused him to miss a lot of time and they had to make sure that bone was completely healthy before they aloud him to do baseball stuff. >> bob: todd hilton, two hits and five walks in this series. for the most part, the nationals haven't had much to do with him, if anything. it has kept him from driving any runs in and maybe that's why. hitting nearly .400 career against the nats, almost an r.b.i. per game and a home run every three times out. and that goes back the montreal days as well. . >> rob: maybe there is something to the fact that todd helton loves fried baloney sandwiches. >> bob: he does? >> rob: yes he does. >> bob: breakfast of champions? >> rob: i think he eats them at the ball park every day. i don't know if he still does that, i know we have had conversations over the last decade. we kid him about that, that used to be something i liked, he liked. >> bob: fried baloney. you throw it in a pan, you fry it up, maybe melt some cheese on a roll. maybe become a future hall of fame hitter by eating fried baloney sandwiches, kids. . >> bob: yeah, either that o appointment down at the knute risk system center. >> rob: eh now. >> bob: tulowitzki is up next with nobody out and two aboard here. gets a little pop-up for ryan zimmerman, and a very good one- two-three top of the first for garrett mock. for our 737s fly to over 65 cities across the country every day. pa announcer: final boarding call... all passengers... each with an average speed of 590 mph... almost as fast as you. nothing's gonna hold you down. ou hawpe restgrab your bag . it's on™ ( ding ) book now at southwest.com. runs. and an offense that nyjer morgan has brought alive lately. adam dunn is the clean-up man. a walk and four strikeouts but like the man in front of him, ryan zimmerman who is hitting .431 this month, having a very good dog days of august. this is jason hamell. his 4.7 e.r.a. is a bit deceptive because on the road this year in 10 of his 11 starts he has given up three earned runs or fewer. he is a big 26-year-old right- hander, 6'6". 220. they got him from tampa bay a trade back in april. and here is nyjer morgan, 5 out of '8, a couple runs, a stolen base. and an r.b.i. in this series, in fact two stolen bases. that's a slow roller to tulowitzki, he knows he has to hurry and got him by a step. >> rob: pnc scouting report on jason hamell coming up. prefers d level, that means t road. 5-4 with a 3 e.r.a. on the road, .267 batting average against, .379 at home, us that the 370, the straight arrow, gets in trouble when his stuff is flattened out. he was a great pick up, especially the back end of the rotation, 21 starts, 7 wins. . >> bob: guzman, first pitch swinging and two outs. rockies defensively are fifth in the national league. the kid, gonzalez, hasn't made an error in the outfield yet this year. troy tulowitzki is probably the frontrunner for the gold glove at shortstop. he only has six r.b.i.s on the year. up the middle deep as they talk about it all the time whether gonzalez is in left or center he is pretty solid. then you have tulowitzki and bar mass. ryan zimmerman has been on base, he got his r.b.i. total up to 80. the only batter hotter in august than ryan zimmerman is minnesota's joe mauer. mauer at .465, zimmerman at .431. this month he is 25 for 58. . >> rob: in those 21 starts rockies have won 12 of those games that hamel has started. . >> bob: there's some high gas, a swing anna foul tip. each pitcher gets a top of the first, the pitcher is looking good so far. ♪ ♪ i always feel like (announcer) it's right here, it's easy... ♪ somebody's watching me. ...it's the money you could be saving with geico. ♪ who's watching? ♪ tell me who's watching. (muffled music) (announcer) it's right here, it's easy... ♪ i always feel like somebody's watching me. ♪ it's the money you could be saving with geico. . >> bob: nats park on august t 20th and the top of the second rolls around. tulowitzki, hawpe and stewart for the hard-hitting colorado rockies who have a one game, actually it's a 1 1/2 game lead over the giants today. they lost at cincinnati on a walk off homer in the bottom of the 10th. and the rockies lead the marlins by three, the braves by four, in the national league wildcard. jim tracy, 49-25. since taking over. but jim tracy would tell you "no, bob, my players are 49- 25". he is the ultimate behind-the- scenes not out front type of manager. that suits them well. >> rob: goodman though, fundamentally sound, like jim wriggleman, quiet. >> bob: troy tulowitzki. if adam dunn takes cares of this 1 or 8 or for the series. 4 of 8 to start the series. >> rob: both managers only get loud when they have to. and that means if you're not playing well like the nationals did that one night they made four errors and they had a closed-door meeting to figure things out. . >> bob: brad hawpe steps in hitting .304. this is sort of interesting. i was told by some colorado personnel last night that the general manager candidate the nationals did not hire once said brad hawpe will never see a pitch in the major leagues. . >> rob: well then. >> bob: also said that clint var mass will never be more than a utility player. >> rob: ho nellie. >> bob: one ball and one strike to hawpe who is a very good major league hitter and a superior outfield player. >> rob: weekend will stat takes a hit right in the mafnlg. a hello, how do you do. yeah, but i had a pitching coach become my major league pitching coach at the major league level and he told me when i was 19 "you'll never pitch in the major leagues with those mechanics." >> bob: what did you say to him when you were reunited? >> that's classified but it did cost me a thousand dollars when he came out to the mind. but i was blessed, george bam burger and joe alta belly were positive with me down there, i went to extended spring training in the early '80s, after i had already pitched a half season in the minor leagues and both of those men, george bam burger at the time working with the brewers organization and alta belly with the organization, said "you throw strikes with that velocity -- see the strikeout there to hawpe -- you'll pitch in the big leagues. just repeat your delivery." that was their message. >> bob: garrett mock with a fantastic change-up against a hitter who looked like he was geared up for #-2 gas. >> rob: a lot of hitters think fastball is coming, looking for a fastball. way out in front of that. no shot. >> bob: two strikeouts for garrett mock and he faces ian stewart. and there is the heater. gets it up there at 91. . >> rob: but i also think sometimes when someone does make that kind of comment it's motivational so all, you know, it was to me anyway. >> bob: uh-huh. >> rob: you're 19 years old, you've already been demoted and then somebody on top of it says "well your mechanics stink," that's not why i was there. i was there to actually work on my breaking stuff to go along with the velocity. >> bob: mock has a hitter 3-2. 0-5 in this series, 0 for the last seven. this is a young player that has got lots of pop but he is batting .229. former number 1 draft choic and off speed gets him. garrett mock great command to go with his good stuff in the early going and six in a row. adam dunn will be next. what is it to lead? at pnc, it's doing what most benefits our customers. whether that's building more certified green buildings than anyone on earth. creating online banking tools for the next generation. or making a 10 year, $100 million investment in kids. it's how we've always done business. and will for a very long time to come. pnc. leading the way. . >> deb: welcome back to nationals park everybody. we're covering the bases as we move through the bottom of the second inning. this is a scoreless game. we're covering the bases with reliever sean burnett, one of the acquisitions. he describes himself as shy, reserved, once he gets out on the mound a different character, very competitive and tense. . >> bob: and we'll hear from sean in just a second. who was offered a scholarship at the university of miami out of florida and sided to sign his first professional contract. adam dunn leads off in the bottom of the second. 2 for 7 in this series with a walk and the rockies have struck him out four times. off speed, well done. >> rob: by the way, i wanted to bring this up because we barely got a chance to talk about it after thga last nit, the nationals bullpen did a tremendous job, got 23 outs, only allowed two solo home ns, gave the nationals a chance to win last night. and so, hopefully, garrett mock can give them a little t of a rest tonight. >> bob: adam dunn gone again on a fastball, outside corner. well let's just turn things around, rob, if you had a standardter who gow 3 outs gave up two so home runs we would be talking about him for the next two days. >> rob: ablutely. absolutely. because that would be a great start and give your team an opportunity to win. there you see hamel, on the top of his game tonight, hitting that outside of the plate on adam dunn. so it's evaluation time. you want to win some ball games but some of these young starters are being evaluated for the winter meetings that will come up after the season ends and e where their professional life will lead. and you want tomae.a $ ó fivm fhuhse/óotommúmtoav right now. >> bob: josh willingham and elijah dukes combined 2 for 16 this series. willingham goes to right field. that will be easy for brad hawpe. and a moment ago debbie taylor started telling you about our cover the bases guy sean burnett and sean talks about himself and how he likes to compete. >> my dad, i guess, is very competitive, i grew up competing against him but it's just something i've had my whole life and i always tried to be the best i could be and that's where i'm competitive. playing ball in the street i always wanted to win or be the best. that's just the way i am and hopefully i can pass it down to my son because it's one of the good traits i have and you can be successful at life. >> bob: you have to be competitive to do what zaun sean did a couple years ago. he was a starter until last season. he had made as many as 27 starts in the minor leagues in one year before that. former number 1 draft pick. we'll have more on sean, debbie will check in with us later as well and tell you more about our cover the bases guy. sean burnett. bases empty, two outs, elijah dukes hitting .240. and he gets under that one as the fastball overpowered him. right field for brad hawpe. and both pitches setting down their first six batters in a hurry tonight. at some restaurants when you get boneless wings... what are you really paying for? whoa! ha ha! i say "happy," you say "birthday!" happy... birthday! who's hungry? why pay for flair when you can get all the flavor for just $3.99 with wendy's new boneless wings. tender, juicy chicken, hand tossed in our signature buffalo or bbq sauce. it's waaaay better than fast food. it's wendy's. . >> bob: it's a hot night in nation's capital, both pitchers flawless as we go
बॉलीवुड में थप्पड़ एक ऐसी चीज है जो ऑफस्क्रीन भी उतना ही असरदार है जितना ऑनस्क्रीन। ऐसे कई सेलिब्रिटीज रहे है जो थप्पड़ की गूंज के साथ सुर्ख़ियों में आए ,कभी किसी स्टार ने किसी दर्शक को थप्पड़ जड़ा तो कभी कोई स्टार खुद ऐसे थप्पड़ों का शिकार हुआ तो कभी स्टार्स खुद थप्पड़ मार काण्ड में शामिल हो गए। सलमान खान थप्पड़ मारने से लेके थप्पड़ खाने तक के काण्ड में शामिल हैं,सलमान के शिकारों में शोमैन शुभास घई और रणबीर कपूर जैसे सितारे शामिल हैं। कई बार तो दर्शक भी सलमान की इस सनक का शिकार हो चुके हैं,अनिल कपूर की बर्थडे पार्टी में जाते वक़्त जब एक फैन उनसे गले मिला और उन्हें किश कर लिया तो सलमान अपना आपा खो बैठे और उसे थप्पड़ जड़ दिया। मीडिया वाले भी अक्सर सलमान के थप्पड़ों का शिकार होते रहे हैं। बॉलीवुड के ये एंग्री यंग मैन अक्सर अपना आपा खो बैठते हैं ,उनके हाँथ उनका इशारा समझने में बिलकुल देर नहीं लगाते। लेकिन एक बार एक वाक्या ऐसा भी आया जब सलमान को खुद थप्पड़ों का स्वाद चखना पड़ा,जब दिल्ली में एक निजी पार्टी के दौरान एक लड़की ने सलमान पर थप्पड़ों की बौछार कर दी हैरत की बात तो ये रही की इतने थप्पड़ खाने के बाद भी सलमान ने आपा नहीं खोया और चुपचाप वहां से चले गए,सलमान ने लड़की होने का बेनिफिट थप्पड़ मारने वाली लड़की को दे दिया। जॉन ने लड़की पर हाँथ उठा कर अपनी मर्दानगी दिखाने में देर नहीं की साल २००९ में जब एक इवेंट के लिए जॉन अब्राहम मंगलोर पहुचे तो इस दौरान एक्ससिटेड होकर एक फीमेल फैन ने न सिर्फ जॉन को किश करने और गले मिलने की कोशिश की बल्कि अपनी आँखों पर यकीन करने के लिए उन्हें नोच भी लिया इससे जॉन को इतना गुस्सा आ गया की उन्होंने उस लड़की को थप्पड़ जड़ दिया वैसे जॉन ये कारनामा मुंबई में एक फोटोग्राफर की धुनाई करके भी दिखा चुके हैं। वैसे तो ऑनस्क्रीन गोविंदा बहुत मजाकिया किस्म के एक्टर हैं पर २००८ में फिल्म मनी है तो हनी है के सेट पर कुछ उल्टा ही द्रश्य देखने को मिला गोविंदा ने वहां एक विजिटर को चांटा जड़ दिया लेकिन ये सेलिब्रिटी चांटा खा कर वो दर्शक चुप नहीं बैठा और उसने गोविंदा पर मुकदमा दायर कर दिया। शाहरुख़ खान भी आईपीएल के टाइम वानखेड़े स्टेडियम में अपना ये जोहर दिखा चुके हैं , शाहरुख द्वारा हनी सिंह को मारे गए थप्पड़ की गूंज हालांकि दूर तक सुनाई नहीं दीं। एक पार्टी के दौरान शाहरुख़ खान ने फराह खान के पति सिरीश कुंदेर को थप्पड़ मार दिया। कटरीना कैफ की पार्टी में शाहरुख़ ने सलमान को थप्पड़ मार के खूब सुर्खियां बटोरी। राखी सावंत तो खैर अपने बॉयफ्रेंड तक को थप्पड़ का स्वाद चखा चुकी हैं ,ये वाक्या तब का है जब उनके एक्स बॉयफ्रेंड अभिषेक उनके घर उनसे माफ़ी मांगने गए तब राखी को इतना गुस्सा आ गया की उन्होंने ने अभिषेक को एक के बाद एक थप्पड़ रशीद कर दिए। आपको भले हे यकीन न आए लेकिन गुस्सा लिओनी को भी आता है साल २०१६ में एक इवेंट में एक एक पत्रकार ने उनसे कुछ ऐसा पूछ लिया की सनी ने सीधा उसे थापड़ ही जड़ दिया।
# coding:utf-8 def add_function(a,b): c= a+b print(c) if __name__ == "__main__": add_function(2,0) # 分别写出三个变量为int类型,float类型,str类型,例如int类型:a = 1 # 查看定义三个变量的类型(type)并计算数值类型总值 a = 1 b = '25' c = 3.14 print(type(a),type(b),type(c)) print(a+int(b)+int(c)) a = "如果给这份爱加上⼀个期限我希望是" b = "9999.00" c = "1" d = "年" # 请根据我们提供的a,b,c,d变量 进⾏运算拼接处出: 如果给这份爱加上⼀个期限我希望是 # 10000年 # # 首先我们把b转换成float浮点类型, # 然后转换成int类型去掉小数,再把c转换成int类型, # 将b+c进行数字计算,整体为: e = int(float(b))+int(c), # 然后我们把字符串进行拼接,需要把我们计算的e再转换为str类型进行字符串拼接 print(type(a),type(b),type(c),type(d)) print(a+str(int(c)+int(float(b)))+d) time = 9 # 条件1,如果加班时间>=10,小k打车回家 if time >= 10: print('小k打车回家') elif time <= 10: print('小k做地铁回家') elif time <= 8: print('小k骑单车回家') else: print(小k不回家)
Tuesday, September 18, 2007 Michael Palin’s New Europe Watching the first instalment of Michael Palin’s New Europe on BBC1 brought back memories of last summer for me. The palm-lined seafront of Split and the Roman colonnades of Diocletian’s palace, the minarets of the Sarajevo skyline and the reconstructed bridge at Mostar all conjured up images of my own Balkan adventure. The series started off promisingly with Palin perched on top of a mountain in Slovenia’s Julian Alps looking towards the horizon, symbolising the beginning of his journey into a transformed continent. It was the usual Palin fare, the unique cocktail of travel documentary and quirky humour of the mild-mannered Englishman abroad adopting the “when in Rome” attitude by attempting to blend in with the natives and meeting all kinds of colourful characters along the way. One of the more appealing aspects of Palin’s travels is that he’s never been afraid to try out new experiences, delve into local politics or venture off the beaten track. In his Sahara series Palin stayed at a refugee camp inhabited by the stateless Saharawi people of the former Spanish colonies of the Western Sahara whose self-proclaimed people’s democratic republic in defiance of the Moroccan and Mauritanian authorities has never been recognised by the UN. In Bosnia images of a bitter and bloody war are still fresh in people’s memories. Shots of Palin walking the lively streets of present day Sarajevo interspersed with film footage of civilians running for cover in those same streets amid constant gunfire and explosions during the three-year long siege of the city, “the longest siege in modern European history” just over a decade ago was highly effective. Similarly, a film of the Old Bridge in Mostar being blown up in 1993 juxtaposed with scenes of local divers jumping into the river from the rebuilt bridge, now a UNESCO World Heritage site and tourists milling around in the sunshine. The glaring contrast between then and now was quite poignant. We in the West to our shame have effectively become immune to news pictures of conflict and civil unrest in distant African or Asian countries, a regular feature of our news bulletins for decades, whether in the Democratic Republic of Congo, Darfur, Rwanda, Sierra Leone, Iraq, Vietnam or Sri Lanka. What was particularly disturbing about the conflict in the former Yugoslavia was that such events could occur on our doorstep, in the so-called “civilised world” at the end of the 20th century. Scenes of half-starved prisoners of war behind barbed wire, and excavations of mass graves among other horrific sights were an almost daily feature of TV news headlines throughout the early 1990s, evoking memories of another European war fought 50 years earlier. The resilience of the people of Sarajevo cannot be understated. Palin spoke to survivors of the Bosnia, including one man leading a landmine clearance operation in the countryside surrounding Sarajevo, who had planted many of the mines himself, mines which will take an estimated 70 years to clear. The trouble with such travel documentaries is that they barely scratch the surface. Cramming Slovenia, Bosnia, Croatia, Serbia and Albania into an hour-long programme doesn’t do justice to the experience - although the book does go imto considerably more detail. Hours of film footage must have been pared down in post production and this was surely a frustrating task for the editors. So what purpose does all this serve? What does travel actually achieve? Palin provides his personal view in his own inimitable style: “I try not to go out with too many prejudices or come back with too many opinions. I'm frequently approached by people who want to know how travel has changed me and what great insights I might have had on dusty roads and in blazing sunsets. Now I no longer even try to make up an answer. Any journey away from the room you're sitting in will increase the potential for coming upon the unexpected and occasionally wonderful, but that's not to equate travel with ultimate enlightenment or universal solutions, any more than breathing will ensure you become president of the US. It helps, but that's about all. I've learned that what I like about travel is that it doesn't sort everything out. Actually, it doesn't sort anything out. Where there was certainty, it sows uncertainty, where there is conviction, it sows doubt, where there is comfort, it sows heat rash. It's just that being in unfamiliar surroundings watching unfamiliar activity is something I find, on the whole, deeply refreshing.” How very true. No comments:
“Contentment alone is enough, Indeed the bliss of eternity can be found in your contentment.” ~ Lao Tzu, 46th verse, Tao Te Ching When someone is lost in worry, all their energy goes into planning for the future. They attempt to anticipate every conceivable threat and build up layers to protect themselves. When aligned with inner harmony and balance, your energy is fully focused within the present moment. Satisfaction begins to replace the desire to accumulate. Your sense of tranquility will shine, allowing you to simply live in a state of gratitude and contentment. Begin your day with a gratitude walk. Step outside into the expansive energy of this new day and it’s unlimited potential. Speak out loud. Laugh, open your arms and feel your heart chakra expand. Listen to the sounds of life all around you. Be one with the present moment. Finally, send peaceful energy to someone you may consider an enemy. This could be someone with whom you disagree on political ideology, a challenging family member, even world governments businesses or people who anger you. Choose to see beyond appearances to the infinite, living spark of the Divine. Peace and beauty and safety reside within you. Once you release the need to worry, complain or judge, you’ll discover that only love remains. Today my intention is to be kind and gentle with myself as a grow and change. I am a lifetime student of love.
''' Name: What's Your Name? Task: You are given the first name and last name of a person on two different lines. Your task is to read them and print the following: Hello <firstname> <lastname>! You just delved into python. Sample Input: Guido Rossum Sample Output: Hello Guido Rossum! You just delved into python. ''' def print_full_name(a, b): print("Hello " + a + " " + b + "! You just delved into python.") if __name__ == '__main__': first_name = raw_input() last_name = raw_input() print_full_name(first_name, last_name)
Re: ASA News Releases Murphy ( Sun, 07 Sep 1997 13:41:56 -0400 wrote: > I am confused. I can agree that evolution might be a God-guided process. If > that's the case, how then can it "look just like purposeless, unguided > evolution to the scientific observer"? Is not this a contradiction? Will > not the scientific observer eliminate your God-guided view by use of Ockham's > razor, which cuts away useless or gratuitous ideas in explanation, and > accepts the simplest hypothesis which can explain the data? Is not > "God-guided evolution" a useless and gratuitous explanation in the eyes of > the scientific observer, best to be cut away? > I am open for suggestions on resolving my confusion. Glenn's response was good. Briefly further - 1) Scientific and theological explanation aren't the same. We understand scientifically how grain grows, but still (I hope) pray for daily bread. 2) Is.45:15. George L. Murphy
Join them; it only takes a minute: Sign up Join the Stack Overflow community to: 1. Ask programming questions 2. Answer and help your peers 3. Get recognized for your expertise Hi i've been trying to install the library on Thinking in Java book 4th edition and i hit a very thick brick wall. I've done everything that the guide from the website told me to do and i still can't get the library to work. From what i've read it seems that the problem is from the build.xml files. having no xml knowledge I am clueless about how I have to modify it in order for it to work. In both cmd and eclipse I am getting these error Build Failed c:\TIJ4\code\build.xml:59:J2SE5 required Can anyone tell me what I should do ? I am using eclipse if there is a simpler solution by using eclipse rather than ant please help me out. It's been a week now and I still can't make it work. share|improve this question Well, you should post the chunk of the Ant script that's actually causing the error. Right now it sounds like there's either (a) a dependency on SE5, which you don't have, or (b) an artificial dependency on SE5 and you have a version > 5, and haven't compensated. – Dave Newton Oct 8 '11 at 16:23 up vote 1 down vote accepted The important thing to do is to realize that your ant file has a specific java requirement. Something to try that might fix this very easily : I believe you can remove any references to a specific JDK, and if you have a reasonably up to date JDK, the build will succeed. The definete fix : Look into the exact (line 59) of your build file, and try to satisfy the java version that line requires. Java is generally backwords compatible -- something designed to run in J2SE5 should run in the latest JDK. Its not terribly difficult to update your JDK (just google for instructions on your OS). • The most common mistake I see is that people who have the java run time installed believe they also have the Java SDK as well. share|improve this answer Does this "install the library" means you want to look at the code and run them in your eclipse? If so I can share my experience with you. 1. First run the script; this will add package info to the source code 2. Create a new Java project in Eclipse, and then just copy all the source code folders to the src source folder in eclipse, these folders will then be recognized as Java packages. 3. You should be able to run the classes with a main function. You can also configure which java version to use for this project in Eclipse build path. 1.5 or higher will work. share|improve this answer Your Answer
War on Drugs “Not Successful” The “War on Drugs” a term first used by Richard Nixon was an agenda intended to both define and reduce the illegal drug trade. The initiative includes a set of laws and policies intended to discourage the production, discount distribution, and consumption of illegal substances. According to the AP after 40 years, over $1 Trillion dollars spent, and hundreds of thousands of lives lost, NONE of the goals defined by the War on Drugs have been accomplished. The US drug czar Gil Kerlikowske went on record saying “In the grand scheme, it has not been successful, Forty years later, the concern about drugs and drug problems is, if anything, magnified, intensified.” When looking at statistics records indicate that marijuana and prescription drug abuse are climbing, while cocaine use is way down. I think aside from taking a look at the drug program as a whole, which clearly needs to be done, something needs to be done for drug sentencing laws. Thousands of under represented youth are incarserated due to minor drug offenses costing the tax payers millions of dollars as a well. About The Author
class Board: all = {1,2,3,4,5,6,7,8,9} def __init__(self): self.cells = list(range(81)) self.row_cons = [{1,2,3,4,5,6,7,8,9} for i in range(9)] self.col_cons = [{1,2,3,4,5,6,7,8,9} for i in range(9)] self.block_cons = [{1,2,3,4,5,6,7,8,9} for i in range(9)] self.cnt = 0 def step(self): print("step", str(self.cnt), "---------------------------------------------") self.cnt += 1 print(self) self.place_singles() print(self) print("step done", "=========================================") def place_singles(self): xs = [(i, j, b.get_poss(i, j)) for j in range(9) for i in range(9) if len(b.get_poss(i, j)) > 0] ys = sorted(xs, key=lambda tup: len(tup[2])) print("constraints, sorted:", ys) if len(ys) == 0: print("board is full") return singles = list(filter(lambda tup: len(tup[2]) == 1, ys)) print("singles: ", singles) if len(singles) == 0: print("cannot find any singles") return for i, j, sgt in singles: self.set(sgt.pop(), i, j) print("set ", self.get(i, j), "at", i, j) def reduce_double_constraints(self): """if a digit in a block must occur on a col or row, all other cols/rows cannot have that digit""" for n, block in self.get_blocks(): block_cons = self.block_cons[n] block_rows = [self.row_cons[x] for x in self.get_row_indices_for_block(n)] block_cols = [self.col_cons[x] for x in self.get_col_indices_for_block(n)] # if possible digit is only possible in one row, all other rows can be ruled out. for digit in block_cons: if digit in ...: pass def get_row_indices_for_block(self, n): x, y = int(n/3), n%3 return [x, x+1, x+2] def get_col_indices_for_block(self, n): x, y = int(n/3), n%3 return [y, y+1, y+2] def setup_linear(self, xs): assert(len(xs) == 81) for i in range(9): for j in range(9): self.set(xs[i*9+j], i, j) def setup_from_tups(self, xs): for n, i, j in xs: self.set(n, i, j) def set(self, n, i, j): self.cells[i*9+j] = n self.row_cons[i].discard(n) self.col_cons[j].discard(n) self.block_cons[self.coords_to_block_index(i,j)].discard(n) def get(self, i, j): return self.cells[i*9+j] def get_poss(self, i, j): if self.get(i,j) > 0: return set() # print("poss at", i, j) # print(self.row_cons[i]) # print(self.col_cons[j]) # print(self.block_cons[self.coords_to_block_index(i,j)]) res = Board.all & self.row_cons[i] & self.col_cons[j] & self.block_cons[self.coords_to_block_index(i,j)] # print(res) # print("=====") return res def get_row(self, i): return self.cells[9*i:9*i+9] def get_col(self, i): return [self.cells[j*9+i] for j in range(9)] def get_rows(self): return [self.get_row(i) for i in range(9)] def get_cols(self): return [self.get_col(i) for i in range(9)] def get_block_by_coords(self, i, j): return self.get_block(int(i/3)*3 + int(j/3)) def get_block(self, i): return [self.cells[x*9 + y] for (x,y) in self._nhood(*self._midpoints()[i])] def get_blocks(self): return [self.get_block(i) for i in range(9)] def _midpoints(self): return [(1,1), (1,4), (1,7), (4,1), (4,4), (4,7), (7,1), (7,4), (7,7)] def _nhood(self, i, j): return [(i-1, j-1), (i-1, j), (i-1, j+1), (i, j-1), (i, j), (i, j+1), (i+1, j-1), (i+1, j), (i+1, j+1)] def coords_to_block_index(self, i, j): return int(i/3)*3 + int(j/3) def __repr__(self): s = "" for x in self.get_rows(): s += str(x) + "\n" return s s1 = [5,3,0,0,7,0,0,0,0,6,0,0,1,9,5,0,0,0,0,9,8,0,0,0,0,6,0,8,0,0,0,6,0,0,0,3,4,0,0,8,0,3,0,0,1,7,0,0,0,2,0,0,0,6,0,6,0,0,0,0,2,8,0,0,0,0,4,1,9,0,0,5,0,0,0,0,8,0,0,7,9] s2 = [0,0,0,0,0,0,0,0,0,0,0,0,0,0,3,0,8,5,0,0,1,0,2,0,0,0,0,0,0,0,5,0,7,0,0,0,0,0,4,0,0,0,1,0,0,0,9,0,0,0,0,0,0,0,5,0,0,0,0,0,0,7,3,0,0,2,0,1,0,0,0,0,0,0,0,0,4,0,0,0,9] s3 = [0,7,0,1,0,6,0,0,0,0,0,4,0,0,0,7,0,0,8,0,0,0,0,0,5,3,0,2,0,1,0,9,4,0,0,0,0,8,0,0,0,0,0,9,0,0,0,0,6,8,0,2,0,5,0,1,5,0,0,0,0,0,3,0,0,7,0,0,0,6,0,0,0,0,0,9,0,3,0,7,0] b = Board() b.setup_linear(s3) b.step()