text
stringlengths 2
2.82M
⌀ |
---|
St Andrew's Church, Redbourne
St Andrew's Church is a redundant Anglican church in the village of Redbourne, Lincolnshire, England. It is recorded in the National Heritage List for England as a designated Grade I listed building, and is under the care of the Churches Conservation Trust. The church stands in the centre of the village, which is to the east of the A15 road, and some south of Brigg.
History
The church dates from the 14th–15th century. Rebuilding took place in the later part of the 18th century; this included new north and south chapels in the 1770s by William and Thomas Lumby of Lincoln. The plaster ceilings date from 1775–77, and the top two stages were added to the tower in 1785. A new west door, partial rebuilding of the aisles, the chancel, and the clerestory, probably also date from this period. The south chapel was rebuilt in early 19th century as a mausoleum for the Dukes of St Albans. The church was restored in 1888 by the local architect W. W. Goodhand. The restorations included removing the gallery, reordering the seating, and the addition of a new south porch. The church was declared redundant in May 1978. A vestry door was inserted and east side windows were removed in about 1985.
Architecture
Exterior
St Andrew's is constructed in limestone with some rendering. The nave, aisles and clerestory have lead roofs; the mausoleum, vestry and porch are slated. Its plan consists of a three-bay nave with a clerestory, north and south aisles, a south porch, a single-bay chancel with a vestry and organ chamber to the north, and the mausoleum to the south, and a west tower. The tower has a rectangular staircase projection to the southeast. It is in four stages, divided by string courses, on a moulded plinth. In the bottom stage on the west side is a blocked doorway, an arched three-light window, and a square-headed two-light window. On the north and south sides are lighting slits. In the staircase turret are three slits, and a sundial. The second stage contains two-light windows, and in the third stage is a clock face on the west side. In the top stage are two-light bell openings, and the parapet is embattled. The aisles have pointed two-light windows and along the clerestory are square-headed two-light windows. In the south aisle there is a blocked doorway to the west, a blocked lancet window to the east, blocked circular windows to the east and west, and a blocked pointed south window. A carved stone dating from the 10th–11th century has been re-set in the west wall. The chancel has an east window. In the vestry are two two-light windows, and the mausoleum has a south door. All the parapets are embattled, some with crocketted pinnacles.
Interior
The arcades are carried on octagonal piers. The ceilings are plastered, the nave ceiling being decorated with foliate bosses. The floors are flagged. The baluster-shaped font was made in 1775 by Richard Hayward. The east window contains painted glass by William Collins dating from about 1840. This is a copy of The Opening of the Sixth Seal (part of the Last Judgment) by Francis Danby. Also by Collins are twelve stained glass windows depicting the Apostles. The organ is no longer present. There is a ring of six bells. Five of these were cast in 1774 by Henry Harrison II, and the undated sixth bell is by James Harrison III.
Memorials
In the north wall of the chancel is a niche containing a black marble graveslab depicting a knight and angels, and is dated 1410. On the south side of the chancel are marble wall tablets to members of the Carter family with dates in the 18th century, and to the 8th Duke of St Albans, who died in 1825, and his wife. On the north side of the chancel is a memorial to the 9th Duke of St Albans who died in 1851 by J. G. Lough, and to his wife, Harriet, who died in 1837, by Chantrey, and a memorial to Charlotte, Lady Beauclerk, dating from about 1825. In the mausoleum are two tiers of tombs of the St Albans family.
External features
In the churchyard is a gravestone dated 1737 to Rev Josias Morgan, vicar of the parish, It is listed at Grade II. There are also the war graves of a soldier of World War I, and another of World War II.
See also
List of churches preserved by the Churches Conservation Trust in the East of England
References
Category:Grade I listed churches in Lincolnshire
Category:Church of England church buildings in Lincolnshire
Category:English Gothic architecture in Lincolnshire
Category:Churches preserved by the Churches Conservation Trust |
I don't have personal experience to contribute but after talking to a friend who's been through the cloth diaper routine a few times, I changed my planned "all pre-fold all the time" stance to a combo of prefold and pocket diapers.
Apparently the pockets are great for overnight, since you can stuff them with extra inserts or more absorbent inserts or whatever. She also directed me towards http://jilliansdrawers.com/ , which has a trial set where you can try out a bunch of brands before committing. As far as I can tell, brand loyalty is basically a religious issue and babies vary in how they fit a given brand, so I'm a little scared to buy a lot before trying them.
for us, pockets at night were great when i changed him during the night, but now, its all about how much stuffin i can get on his bottom at night, and layers of prefolds are more effective, and i throw a sheet of microfleece over it to act like the stay dry of a pocket. Of course i couldn't shell out for the hitech pocket stuffin, and just stuff my pockets with prefolds. that said, they are my diaper bag, out and about diapers, all three of them.
For out and about I really like my Bummis wet bag - I have a size small, which is 10" x 12" and just right for about three medium sized prefolds, but you can get bigger ones if you use pockets or want it to hold more. I like it because it has a zipper, and the handle unsnaps so I can hang it on something if I need to.
I got wet bags from SnuggyBaby on Etsy, but they have their own website you can order from, too. Here are the wet bags. I haven't used them yet (stillllllllll pregnant), but they seem really well made and come in some super cute patterns (which is kind of pointless, but I'm a sucker for cute fabric).
I have a diaper sprayer, but again: haven't used it yet. I don't know why I keep posting in this thread when I don't actually have anyone to diaper yet.
i have that exact diaper sprayer. i didn't worry too much about breastfeeding poops since they were pure liquid, but once he started eating solids it came in handy. the only thing is the pressure is REALLY touchy, and if you aren't careful you're going to get backsprayed with poo water...
_________________Gwyneth Paltrow: "I'm superstitious. Whenever I start a new movie I kill a hobo with a hammer."
I saw (but didn't actually read) an article about the dangers of diaper sprayers. I think because of strangulation risks. If you have one or plan to get one I would read it. I think I saw it on the diaper junction blog. I am not saying not to use one but I see the potential hazard, so make sure you have the bathroom door baby proofed.
I got wet bags from SnuggyBaby on Etsy, but they have their own website you can order from, too. Here are the wet bags. I haven't used them yet (stillllllllll pregnant), but they seem really well made and come in some super cute patterns (which is kind of pointless, but I'm a sucker for cute fabric).
Oh my! I love it! I'm of huge fan of fabric and paper for that matter with design. I actually have the fabric for the "Tranquil Leaves Wet Bag" as a camera bag that I bought on Etsy.
i don't have a sprayer- i dunk diapers in the toilet or shake of more solid poops into the toilet. I used to use a scraper, but in the last move, it disappeared (it was a golden cake scraper i picked up at a thrift store, i could replace it, but i'm to cheap and lazy). as they said, until they start solids, you don't need to worry about it. I also figure it keeps me washing my hands, which i should do anyway.
oh, and on the cheap and lazy note, for diapering out and about i keep a couple plastic shopping bags in the zippered compartment of my backpack for wet bags.
What is your night time set-up? I've been using Nature's Best disposables at night, because they're easier when I'm half asleep and because, now that he's sleeping for more than 2 hours at a time, I don't want a wet diaper against his skin. But lately it seems we have a poop leak every night--poop goes up his back, through his pajamas, and onto my sheets. I never have leaks when he's in cloth, so disposables are actually turning out to be more work. Plus they smell bad. I want to make the switch to cloth at night, so I ordered some fleece-lined hemp doublers. Most nights he's not pooping until 4 or 5am (I think) so if he's in the same diaper 10pm-4am, he's not sitting in poop. Green Mountain Diapers recommends wool for overnight, but obviously I'd like to avoid that. Do you have special covers for nighttime, or do you just use your regular covers with extra absorbency inside?
I only had two covers that were Nikky brand. I always saved them for night time because they were bullet proof and fully breathable poly. They run about $14.00 new and worth ever single penny. Nikkys have been around since the early 80's and rival any of todays brands. I would highly receommend trying one for nightime.
my two sons never pooped during the night, but they pee'd twice as much as my daughter and nursed every 1-2 hours untile the bitter end. I swear I birthed little piggies. The nikkys were great.
I noticed turd through the window of the front-load washer while I was running a load of diapers last night. My husband kindly disposed of it. I guess I need to start making sure all the disposable liners have been flushed. I don't know how that one got past us. ;p
I noticed turd through the window of the front-load washer while I was running a load of diapers last night. My husband kindly disposed of it. I guess I need to start making sure all the disposable liners have been flushed. I don't know how that one got past us. ;p
Hahaha! I couldn't help but get a mental picture of Mr. Hanky the Christmas Poo from South Park when I read this. Not helpful at all, but it gave me a hearty laugh...On a more helpful note, I really love my Maxwell Designs Diaper Bag, Wet Bag and Changing Pad. My wet bag sounds exactly like what Poopie B described. Also, if you are interested, the Maxwell Designs chic will match your changing pad, diaper bag and wet bag, if you are into that sort of thing. Linky http://tootsntots.com/main/shop/categor ... l-designs/I got the XL and to be honest, I could have gotten by with the L or M.
_________________Go gentle unto the night, children. For the flouncin' hat is sure to unflatter even the finest face ~ PandacookieGet with the times, nameless fourth banana ~Tofulish
Like Mel I have the Maxwell gear - bag, change pad and wetbag. Mine match because I am into that sorta thing ;) I do love that it zips from a mess containing perspective, but I actually like one of the other bags I have from http://www.applecheeks.com better (it's drawstring style) because I find it easier to load diapers into without getting my hands messy. And maybe it's just me, but I've found having more than 1 wetbag to be pretty beneficial, as sometimes we have crazy weekends and I don't have time to wash one or wait for it to dry before we have to head out again.
For overnight, we actually put one of our applecheeks inserts into one of our BumGenius AIO diapers and have never had a leak. We were getting all kinds of leaks with every other combination we tried (we have pockets, the Bumgenius, and a bunch of fitteds with covers - were never into prefolds) but I think we have hit the jackpot.
I thought this was a useful page: http://www.esbaby.net/whatdoineed.htm I am still pregnant myself but just spent a good part of the weekend navigating this and interrogating my cloth diapering friends!
Things I have learned:- one-size diapers are great, and eventually if I like them I plan to use a mix of one size Fuzzibunz and Flip system. (with flip cloth inserts most of the time and maybe disposable inserts when we travel).. HOWEVER, even my friend with giant babies finds that her kids don't fit well into "one size" diapers until they're a little over 10 lbs, so it's good to have some newborn or small diapers to span that 7-12 lb range. (Assuming you plan to have big babies - my mom and MIL churned 'em out in the 7.5-10+ range so I'm not too worried about fitting a 5lber myself!) From reading around it does sound like the Flip diapers can possibly be used with larger newborns, but I've decided to get plenty of NB options just in case.
- count on using about 12 inserts or all-in-one/pocket diapers per day for a newborn, larger babies go less frequently. So then you multiply by how often you want to do laundry, and you probably don't want to go over 3 days because things will get rank. If you plan to air dry, leave time for that! So personally my plan is to have 3 days' worth of diapers, so that means 36 changes.
- For all-in-one/pocket diapers, that means one per change for the most part
- For prefolds (those are pieces of cloth sewn on the side that you have to put inside a cover) or fitted diapers (these look a little like all-in-ones and have snaps or velcro to hold them together, BUT they're made of non-waterproof material so if you go out or baby moves a lot you need a cover on that), you'll need one prefold or fitted per change PLUS a certain number of covers (that site recommends 5-9 total for a 3 day supply). The covers are just a waterproof shell that go over the diaper.
- Personally I've been mulling the tradeoff between nice matchy-match commercial system vs. collecting a little of everything and seeing what I like. After talking it over with the husband and doing some research I've decided that with newborn diapers I'm going to get a few each of different things. All babies are shaped differently and even the same TYPE of diaper can fit very differently between brands! I guess this is why some people RAVE about one brand while others hate it, and vice versa with another brand. So I'm preparing to be flexible! But after doing gobs of research, here's what my newborn shopping list is:
[ ] Small Fuzzibunz in various colors: 6-8 (these are pocket diapers, so very convenient for nighttime!) Zulily has these on sale for >1/2 off every once in a while so I'm planning on waiting for the next sale. Already have a couple, they seem very soft and well-made.[ ] Fitted newborn diapers: 6 (lots of options on etsy with cute fabrics! my friend says that if you're just at home with baby still immobile, you don't necessarily need a cover. If you go out, you do. I figure these will be almost as easy as the fuzzibunz at night[ ] Small size indian prefolds - 24 (they're cheap)[ ] Snappis - 2 - these hold the prefolds in place if you don't want to use diaper pins. You need to replace them every 6 mos and need 1-2 of them.[ ] NB/small covers - need 5, ordered 8 of a couple types - Bummis with snaps and the suspiciously cheap Real Nappies with velcro[ ] One Flip system one-size day pack - 2 covers + 6 inserts. I don't know if these will fit a young baby but I'm going to try.[ ] Pondering getting a few newborn all in ones, since there are cute inexpensive ones on etsy.
I also am planning on the husband not wanting to do elaborate prefold securing in the middle of the night (nor will I probably!), so I'm hoping to find what works for us among pocket diapers, all-in-ones, and fitted diapers.
It sounds like some brands of velcro are easier to remove by older babies than others. I'm not worried about this for NBs, and planning on going with snaps personally because I don't like velcro, but it does sound like it's slightly easier to put on (and, thus, take off).
Oh I forgot to mention: one important thing with newborns is that the umbilical cord shouldn't be covered/bothered by a diaper. So for example these newborn fitted diapers (again, these aren't waterproof so they need a cover with them), have a little notch where it's lower to accommodate that: http://www.etsy.com/listing/66693480/tiny-flowers-newborn-tt-fitted-cloth?ref=v1_other_2 Now I don't quite understand exactly what is and isn't compatible, but apparently you can adjust prefolds a little so they're folded under, and some diapers seem to have a setting where the front can be put lower.. The frustrating thing is that talking to people it seems like the cord can come off anywhere between a couple days after birth to weeks and weeks! so it's tough to say how much you need to accommodate this. Maybe the expert diaperers can chime in about this. I'm pretty sure, though, that for example the small fuzzi bunz I bought might not be usable the first few days because of this issue. I've heard of friends just sticking with disposables until the cord is gone and healed, to avoid the issue entirely.
And so my backup plan is to just have a pack or two of disposables, honestly. I also considered just going with those until the baby is big enough to fit into one size because the amount you'll spend on newborn cloth diapers can pay for itself if you have a preemie, but if your baby is larger they might be in newborn sizes just a few weeks! For a cost comparison, It looked on diapers.com that Pampers Swaddlers for newborns worked out to about $3/day.
Also, EVERY brand seems to have different sizing, so be careful about that, but it sounds like weighs are also just guidelines and you'll need to adjust the fit and even how much absorbent material you stuff in the diaper to suit your particular baby! ACK! I hope all this gets a lot more obvious once I have a baby in diapers.. I agree that it is incredibly confusing! I feel like I spent most of the weekend on this and it's still a mystery.
I bought newborn prefolds and covers from Green Mountain Diapers. Prefolds are just squares of quilty cotton fabric that you either pin around the baby or fold in thirds and hold in place with a waterproof cover. Prefolds and covers are the cheapest option, and I've found them very, very easy. My husband only changes one or two diapers each day and always says he can't believe how easy they are. I have pins but I like the snappis fasteners.
Green Mountain Diapers has a newborn starter package that lets you try a sampling of different brands of covers. That's a good idea, because you just don't know what you'll like until you try it. I thought I would like velcro, but then it curled under and scratched my son, so now I only use covers with snaps. The covers I thought were adorable had leg holes that were way too small for my kid, so I'm glad I waited before ordering lots of covers in larger sizes. I like thirsties duo covers--size small fits birth through about 15 lbs., size large lasts 15 lbs. until potty training (or so they say). You should just try several brands, see what is easy for you and what fits your kid best.
How many diapers and covers you need for a newborn depends on how big your baby is and how fast he/she grows, which is impossible to know now. Walter was out of newborn covers in 3 weeks, so those were kind of a waste of money. But if he had been tiny for a long time, the next size up would have been too big and leaky. So yes, you may end up wasting money on diapers that are too small. An alternative is to just use disposable until the baby grows into size smalls. We used disposables about half the time the first 2-3 weeks. It just felt easier; I was overwhelmed and didn't feel like figuring out a washing routine. Now I think cloth is easier than disposable, but just tossing the diapers in the trash made the first weeks (esp. nighttime) go more smoothly.
You're not the only one who finds this all confusing; I spent DAYS reading cloth diapering websites trying to figure it out. The good news is, once you're actually doing it every day, it'll seem easy.
You're not the only one who finds this all confusing; I spent DAYS reading cloth diapering websites trying to figure it out. The good news is, once you're actually doing it every day, it'll seem easy.
Ha ha. No kidding. I remember being really confused and concerned about it.
We went with prefolds and covers (the Thirsties Duos, which are two sizes... which for us were basically newborn and post-newborn) with the plan of moving on to AIOs as the Emperor got older/we could afford them. But I actually found that AIOs aren't a good match for us. They take forever to dry, for one thing, and we don't have a dryer. We ended up sticking with just prefolds etc and I expect that's what he'll be in for the duration.
I think there's no real way to know what's going to work for you and your baby til you've got the kid. Alas...
By the way, mitten, our nighttime diaper is pretty simple. We use super huge prefolds (toddler sized maybe?), tri fold them, then fold the front over so it's doubled up. So he's got basically six layers of prefold in his pee area overnight. It works really well now that he's older-- we barely every have nighttime leaks.
It's really hard to diaper babies so they don't leak some substance when they're younger. We didn't have poop leaks, but we did often have pee leaks when he was younger.
I'm another hardcore prefold fan (I love the thirstie duo covers and my husband likes the bummi super brights). We've tried AIOs and pockets, but they've always leaked on us or seem way too baggy. Turns out the cheapest route was the best fix for us! (love when that actually happens!) |
You are Bigger than Your Anxiety
Today’s article is brought to you by AG contributor Bryan3000. Bryan and I have been exchanging ideas for weeks and I’ve enjoyed those conversations. I think that you’ll enjoy his perspective as well.
— Paul Dooley
So, it’s another Sunday afternoon and I’m lucky enough to be spending some time at home, playing with my little four year old girl and watching football. Life doesn’t get much better. That said, as I sat there… I had some of the usual slow-boiling anxiety that seems to just hang around some days for no particular reason. Attempting to use the things I’ve learned, I did my best to simply accept the symptoms and go about my day.
My little girl also was dealing with her own health issues that day. She had another cold, which seem to come on an almost weekly basis at this age. Her forehead felt a little hot, her nose was runny and she occasionally looked up from her toys to cough a few hacking coughs. As I sat dealing with my own discomfort, it dawned on me that she must have been dealing with a good deal of her own. Her outward symptoms surely weren’t the only ones.
These colds almost always come with a host of uncomfortable effects on our heads, bodies, moods, etc. Sure, she seemed a little crabby at times, but she kept right on focusing on the little play-set and animal figures she had set up… mouthing words for them to talk to each other, and creating her own little fictional world. She was completely immersed in what she was doing.
All of those symptoms, and yet no complaining from her. It appeared to be the furthest thing from her mind. Now, a cynical mind might look at this situation and assume that she’s just a child. She doesn’t know the real dangers of health issues. She’s too young to have developed an actual sense of self-awareness with regards to her health.
But, there’s another way to look at this. This child of four years has certainly dealt with sickness before. She’s been to the doctor. She’s gotten shots. (She just loves those!) She’s aware of medication and sometimes even claims to need it. (Likely because it’s cherry-flavored and sugary.) She’s not oblivious to the concept of illness. Instead, she’s just simply not that impressed with it. Of course, at some point… she’ll have a rough flu or illness that does slow her down. It’s part of growing up. But right now, she’s got a view of her illness that just might be one we can all learn from.
Now, I’m certainly not the first to suggest that we’re larger than our afflictions. This is a well-covered topic. However, it may be a concept that we need to remind ourselves of, and on a regular basis. The reality of my daughter and I sitting in that living room that day was that her illness was likely a much bigger threat to her than my simmering anxiety was
to me.
In fact, by this point if you’ve read or listened to enough material from this very website, you know anxiety symptoms aren’t dangerous at all. Yet, there I was doing my best to accept and flow with my symptoms,struggling at times as she sat care-free playing with her toys and urging me to do the same.
The problem with panic and anxiety is that by its very nature, it feels so much larger in scope than it really is. The symptoms come on in such a way that it affects that very brain mechanisms that estimate a perceived threat. It’s function is to convince us that we are in trouble. As we all know, that is its biological purpose and is part of all of our make-up. Yet, if you’re reading this, you also probably know that anxiety itself is not a real threat. As Dr. Claire Weeks put it, “don’t be bluffed by a thought.”
You are bigger than anxiety. The reality on a short-term basis is that anxiety is probably far-less dangerous than the common cold and certainly less dangerous than the flu. (No, you shouldn’t be afraid of the flu, either!) We all need to remind ourselves every day just how big we are and just how small anxiety really is.
Think of your body, mind, spirit, and all of the things that comprise your being. Think of what you’ve accomplished and want to accomplish. Think of the mind you’ve been blessed with and the positive attributes you’ve been given, physically. We all have them, regardless of our conditions. Think of the complex tasks your body completes every day without any effort on your part. Think of all the illnesses your body has defeated over your lifetime. We’re all giants in so many regards. Anxiety pales in comparison.
No one else sees your anxiety. It doesn’t even make your nose run! People see you, the giant entity that you are. We all need to give ourselves this daily reminder so the picture becomes (and remains) crystal clear. If we can all view ourselves as bigger than the problem, perhaps we can eventually deal with anxiety as easily as a child deals with a cold.
As for me, I did manage to work through the symptoms and enjoy much of the day. I’ll now remember that Sunday as a special time spent with my child, not for the bothersome physical symptoms. I have my struggles like we all do, but life only offers so many of those moments. I don’t intend to let anxiety take them away from me. I hope you won’t, either.
Comments
Bryan, I agree 100%. I have a four yr old of my own and that guy could care less about feeling bad for too long. He really does have better things to do. And although it is partly ignorance on his part, the bottom-line is that if you don’t focus on the negative, that negative issue shrinks in size. It’s when you sit and worry that the trouble starts. Great article.
Hey Emily, thanks for thinking of me. Bryan is right, if you go to the home page and click on the Anxiety Superhero article you’ll find highlighted links to the book title that will take you straight to amazon. |
Synovial Fluid Leukocyte Esterase in the Diagnosis of Peri-Prosthetic Joint Infection: A Systematic Review and Meta-Analysis.
Peri-prosthetic joint infection (PJI) is a serious and frequent complication of total joint arthroplasty (TJA). Recently, synovial fluid leukocyte esterase (LE), measurement of which is convenient and fast, has been examined as a marker of PJI. We summarized the articles describing synovial fluid LE as a biomarker for the diagnosis of PJI and assessed its diagnostic value in patients suspected of having PJI. We searched with appropriate key words in PubMed, Embase, Web of Science, the Cochrane database, and Science Direct. Eligible studies providing sufficient data to construct 2 × 2 contingency tables were chosen on the basis of several criteria, and the quality of the chosen studies was assessed. The pooled sensitivity, specificity, and diagnostic odds ratio (DOR) were calculated for those studies. The summary receiver operating characteristic (SROC) curve and the area under the SROC (AUSROC) were used to evaluate the overall diagnostic performance of LE. Eleven studies were found suitable for this systematic review. Among them, eight articles with a total of 1,011 participants qualified for meta-analysis. The pooled sensitivity, specificity, and DOR were 0.90 (95% confidence interval [CI] 0.76-0.96), 0.97 (95% CI 0.95-0.98), and 310.76 (95% CI 103.86-929.88), respectively. The SROC was 0.98 (95% CI 0.96-0.99). Sub-group analysis indicated that the sample inclusion criteria might be the main source of heterogeneity. Publication bias was suggested by an asymmetrical funnel plot (p = 0.144). Although the result of synovial fluid LE assay can be influenced by sample-related factors, it is more specific as a means to exclude PJI. |
<?php
/**
* Copyright © Magento, Inc. All rights reserved.
* See COPYING.txt for license details.
*/
namespace Magento\Customer\Controller\Adminhtml\Index;
class Wishlist extends \Magento\Customer\Controller\Adminhtml\Index
{
/**
* Wishlist Action
*
* @return \Magento\Framework\View\Result\Layout
*/
public function execute()
{
$customerId = $this->initCurrentCustomer();
$itemId = (int)$this->getRequest()->getParam('delete');
if ($customerId && $itemId) {
try {
$this->_objectManager->create(\Magento\Wishlist\Model\Item::class)->load($itemId)->delete();
} catch (\Exception $exception) {
$this->_objectManager->get(\Psr\Log\LoggerInterface::class)->critical($exception);
}
}
$resultLayout = $this->resultLayoutFactory->create();
return $resultLayout;
}
}
|
? PARTICULAR DESIGN – The excellent design of our karaoke microphone is very suitable for your hand, which can make you feel more comfortable. And the built-in high-quality Bluetooth module can be used as speaker, player and Recorder, compatible with various singing applications
? TWO WAYS CONNECTION – Bluetooth Connection & Cable Connection. You just need to connect your phone with cable or Bluetooth, and then open the singing APP on your phone. The built-in clearly audio and vividly sound effect can make you enjoy listening and singing anytime and anywhere. Great for KTV singing, gathering singing, family singing, travel singing, car stereo, instrument recording, interviews and live ect
? HIGH COMPATIBILITY – Supporting micro SD card max 64GB(NOT INCLUDED) and song switch. The Bluetooth has a great distance of connection(10m), and supports Android, iPhone, iPad, IOS and all Smartphone
? EASY TO USE – Multi-function buttons can adjust the Music, Echo, Volume and PA/R. Free to switch the previous and next song mode. Adjustable echo length effect can bring super surround with immersive enjoy. And the USB port allow you to plug USB and turn this magic piece to MP3 and play directly
Introducing Indigi’s MQ09 Portable Handheld Wireless Bluetooth 4.0 Karaoke Microphone & MP3 Speaker System, plus built-in Disco LED Dance Light. The MQ09 delivers powerful and full sound with a built-in mixer attached to the device! Connect to a device through Bluetooth 4.0 or use the micro SD Memory card and play music directly through the speaker and sing through the microphone for the ultimate karaoke experience! With the HiFi upgraded microchip, the MQ09 delivers clear and crisp vocals that you’d expect while singing or speaking. And because it’s wireless and ultra-compact, it’s easy to take anywhere. Use it at a friends house to sing karaoke, a family reunion, party, or if you’re a street performer, this will replace your loud speaker! With the built-in dual speakers, you get a 360º projection of sound. The Indigi MQ09 Wireless Bluetooth Microphone and Speaker Combo can play unplugged up to 5 hours and can be charged from most USB power sources.
The microphone is layered with three types of filters to remove any distortion/background noise from your voice to provide true to life vocals. Play Music and Sing over the chrous while controlling the volume of the music to harmonize The Dual 3W speakers with the full-range provide amazing clarity and sound from both Music through Bluetooth/AUX and your Voice. Fitted with a mixer onboard the MQ09, you can control Treble, Bass, Independant Volume controls for Voice & Music, and also add Echo to your voice. Bluetooth 4.0 wireless transmission solves the need to carry around an AUX cord, but we’ve included one for you incase your device doesn’t have Bluetooth. It also has a micro sd card or TF card slot to play music from the memory card. No special charger needed, fitted with the most popular charger (microUSB) The appearance of new, metallic finish + iron mesh + professional mixer |
Q:
Generate XML from a class with JAVA
I asked this question before:
Generate XML from a class
I want to do this with Java.
Is it possible to do the same with Java via attributes?
or is there a framework i can use for this purpose as well.
A:
XStream will allow you to represent any class as an XML. You can check here for an example.
A:
JAXB could be what you want. It's fairly common. You just add some annotations to your properties and any instance of that class can be serialized/deserialized to XML.
|
How do I stop my dog lunging at traffic?
(Q) I have awful trouble walking my dog because she lunges and barks at traffic, and she almost has me off my feet. She especially does this with lorries and buses.
(A) Jackie Drakeford says: First you need to restore control for your own safety, and I recommend getting a harness that has the lead attachment on the chest. Walk your dog from a lead on her collar, but have a second lead on the harness. It's a lot easier than it sounds to work with two leads, and the beauty of this arrangement is that when your dog lunges, the chest fastening means that as the harness lead comes into play, it turns her towards you.
Next you need to look at your dog's motivation. Most dogs who do this are trying to scare the traffic away, because there is a big element of fear involved. Not only is there the size to consider, but the noise, vibration, and the diesel fumes at dog height make these vehicles a very unpleasant experience for the dog as they go by. And of course the traffic does go away, so your dog thinks her actions have succeeded, which is rewarding her.
Her imagined success brings with it a big rush of excitement hormones, which are highly addictive, and so prompt her to repeat this behaviour for the thrill of it. Thrill and fear are very closely linked in the mind. If your dog is a herding breed, then she is also genetically programmed to dive at moving things and get them moving faster, so there is yet another another huge reward in this.
Every dog has a reaction distance. Right now, you are too close to the traffic, so find places where you can both observe it while being far enough away that your dog doesn't feel the need to react. Sit together watching the traffic going by, while rewarding calm behaviour with a few treats, a toy or a game. If your dog reacts, you are still too close. Go to places where large vehicles are parked, and walk by at a sufficient distance that your dog doesn't react, and reward as before. Don't rush this, but be happy with small victories, and keep lessons very short — five minutes is ample to begin with. These are training sessions, and she will still need to be walked, but away from traffic so she can enjoy a calm time out exercising.
At home, concentrate on giving your dog an occupation that makes her think, such as puzzle toys, stuffed Kongs, and scattering some of her food about the garden for her to search out. This will satisfy the reward centres in her brain to replace the high she gets from attacking traffic.
Using these methods together, you will gradually desensitise her to traffic, but it will take time and you must go at her pace. Your aim is to stop the lesson before she reacts rather than pushing her to the point when she does. |
An in vitro and in vivo assessment of the potential of Vibrio spp. as probiotics for the Pacific white shrimp, Litopenaeus vannamei.
The objective of the work was to determine whether known strains of nonpathogenic vibrios can act as probiotics for the control of Vibrio infections in the Pacific white shrimp, Litopenaeus vannamei. Of the ten species tested, only Vibrio alginolyticus (NCIMB 1339) and Vibrio gazogenes (NCIMB 2250) showed antagonistic activity towards a panel of shrimp pathogenic vibrios. In the case of V. alginolyticus, this activity depended on the presence of live bacteria while in V. gazogenes both live and dead bacteria showed anti-Vibrio activity. Injection of shrimp with either V. alginolyticus or V. gazogenes at 3 × 10(7) or 3 × 10(5) total bacteria per shrimp resulted in mortality with higher levels in the case of V. alginolyticus (100% mortality 18 h postinjection of 3 × 10(7) bacteria). Juvenile shrimp were fed commercial diets top-coated with either chitin (an immune stimulant) or chitin + V. gazogenes. Both chitin and V. gazogenes caused a significant decline in the number of Vibrio-like bacteria in the fore and hind gut, and changes were also seen in the hepatosomatic index (a measure of digestive health) and the total number of blood cells in circulation. Analysis of mid/hindgut and faecal samples obtained using terminal restriction fragment length polymorphism showed that the gut microbiota of shrimp has limited bacterial diversity and that after 8 weeks exposure to the experimental diets there were significant changes in the microbial flora of the GI tract of shrimp as a result of the presence of V. gazogenes. Of the vibrios tested, V. gazogenes has potential as a probiotic for the control of bacterial diseases in shrimp. Overall, this study shows the promise of V. gazogenes together with chitin to improve the health and welfare of shrimp under aquaculture conditions. |
Field
This disclosure is generally related to computer networks. More specifically, this disclosure is related to deploying an overlay content centric network across an Internet Protocol network.
Related Art
Recent research efforts are producing content centric networking (CCN) to re-architect the entire network stack around content. In CCN, packets typically do not contain network addresses for a source and a destination of the packet. Rather, clients issue requests for Content Objects, and routers across the network route these requests directly through the network to a closest network node that stores a copy of the content, which returns a packet that includes the requested Content Object to respond to the request.
CCN can use controlled flooding as a mechanism to route the requests to the appropriate content providers, which eliminates the burden of having to configure explicit routes to all possible content providers. However, the benefits produced by this mechanism comes at the cost of an increased overhead of the object-requesting traffic in the network. To make matters worse, the way CCN nodes are connected to each other has a major impact in the amount of Interests present in the network, which makes it difficult to deploy a CCN network without a debilitating overhead. For example, a sub-optimal CCN topology may cause Interests to flow via an undesirably large number of links, and can produce network congestion at certain CCN nodes. This sub-optimal topology can result in unnecessary processing overhead at the CCN nodes, and can increase the delivery time for content accessed by these Interests. |
Youtube casino slots free
Casino free online verdienen How To Play Blackjack And Win Youtube Online Free Slots Wolf Run casino spiele iphone Online casino play million trick to. Diamond Island NEW GAME Free Spins Slot Machine Bonus Round . NEW SLOT MACHINES FROM LAS. The 50 Dragons slots game in this video from Aristocrat is fun to play won good credits. Play free Aristocrat.
Youtube casino slots free Video
💰 JACKPOT HANDPAY 💰 LOCK IT LINK $25 MAX BET SLOT BONUS ★ 1,500 SUBSCRIBERS ★ I must admit, I got a little teary-eyed. Ingredients agave almond flour avocado bacon beans beef carrot celery cheese chicken chocolate Coconut Oil corn easy healthy gluten free egg featured Food Rock Star Friday Foodie Fix garlic GF Food Critic gluten free flour jalapeno lemon lime Mexican Spices milks mushroom nuts onions pasta peppers pork potato quinoa real food weekly Restaurant Review seafood seeds Shrimp spinach tomatoes Turkey vinegar wine zucchini. Powder room table vanity. You can also learn more about John and his story HERE. I loved how beautifully he fused Star Wars with the traditional Dia de los Muertos artistic style. Create and publish a feed to display it. Your house will begin to fill with the most amazing aroma. The detail in my Death Star costume is astounding. I always save those liquids for soup bases or for a sauce. We have always had dogs and never had on that minded. Add in the rest of the onion, bay leaves and chili piquin peppers. J Calixto, Virginia beach, VA. I also love burgers and I really enjoy taking […]. It also happens to be the birthday month of the Maker himself, George Lucas. Strain it into your container, label and store. Rub down the chicken breasts with the seasonings and place on top of the ribs. No Results Found The page you requested could not be. When I opened the box and started looking through the artwork, I was amazed at the vibrancy of the colors, not to mention the kostenlos zug spielen detail in each print. Dark stain on maple.
Youtube casino slots free - base
I hope you enjoy this dish and you manage to get your red beans and rice made to eat with the Jerk Chicken and Pork, and sit at your table too. Still happy and full of it but minds well now. Thank you John for making my birthday so memorable!!! Put the lid on and cook on low for hours. So instead of my seafood stir-fry yesterday I decided to drive myself insane. Just in time for Star Wars Day! Layer half of the onion on the bottom of the crockpot. Thank you John for making my birthday so memorable!!! I was so touched by this special birthday card John created for me! Strain it into your container, label and store. It also happens to be the birthday month of the Maker himself, George Lucas. Your house will begin to fill with the most amazing aroma. These are not to be served. However being frugal which for me sometimes means lazy I decided I would cook them in the same crockpot together at the same time. There was also another little surprise in the box from John Karpinsky himself! I use cleaned out glass pasta sauce jars. Now I also like to make Tostones which are slices fried once, smashed and […]. Ron Davidson is a fantastic Dog Trainer! |
Q:
How to create DNS records for my VPS
first of all I should mention that I'm fairly new to the world of DNS. I've purchased a VPS plan and I'm trying to run a web server and also a custom mail server (postfix and dovecot combination), which turns out to be a real pain. I'm aware of the fact that I can make my life easier by using Google App services but nonetheless I want to be able to do it myself.
I'm stuck with so called DNS records and as far as my understanding goes I should first of all create an A record for my mail.mydomain.com and afterwards a MX record, am I right? I checked every option my hosting provider provides, but unfortunately I couldn't find anything.
If I run:
nslookup -q=mx mydomain.com
it gives me:
Non-authoritative answer:
mydomain.com mail exchanger = 10 mail.mydomain.com
and for "Authoritative answers" I get nothing.
So first question: "'Authoritative answers' are answers from mydomain.com itself and to be able to give such answers I should run my own DNS Name Server and have so called 'zones file' in which I have these records setup, am I right?".
And following question would be: "to be able to do it I should have 'bind' software package installed, right?".
Another question: "if haven't done any of it how come I get 'Non-authoritative answer' for my MX query? Does it mean I already have one MX record from my service provider?".
And the last question would be, since it is for a custom mail server and if you are familiar with it: "could you tell me why do I have to have a reversed domain record (I think it is called PTR) in order to avoid my mail get landed in spam folder?"
A:
You got Non-authoritative answer because you did not query records from name servers of the domain, and the results may contain IPs.
This result is similar as yours.
$ nslookup -q=mx google.com
Server: 8.8.8.8
Address: 8.8.8.8#53
Non-authoritative answer:
google.com mail exchanger = 30 alt2.aspmx.l.google.com.
google.com mail exchanger = 20 alt1.aspmx.l.google.com.
google.com mail exchanger = 40 alt3.aspmx.l.google.com.
google.com mail exchanger = 50 alt4.aspmx.l.google.com.
google.com mail exchanger = 10 aspmx.l.google.com.
Authoritative answers can be found from:
alt3.aspmx.l.google.com internet address = 173.194.204.26
alt4.aspmx.l.google.com internet address = 74.125.141.26
alt2.aspmx.l.google.com internet address = 173.194.219.27
aspmx.l.google.com internet address = 74.125.25.26
alt1.aspmx.l.google.com internet address = 74.125.193.27
So we can find name servers of the targeted domain.
$ nslookup -q=ns google.com
Server: 8.8.8.8
Address: 8.8.8.8#53
Non-authoritative answer:
google.com nameserver = ns3.google.com.
google.com nameserver = ns1.google.com.
google.com nameserver = ns2.google.com.
google.com nameserver = ns4.google.com.
Authoritative answers can be found from:
ns3.google.com internet address = 216.239.36.10
ns2.google.com internet address = 216.239.34.10
ns1.google.com internet address = 216.239.32.10
ns4.google.com internet address = 216.239.38.10
Then we can get authoritative answer.
$ nslookup -q=mx google.com ns1.google.com
Server: ns1.google.com
Address: 216.239.32.10#53
google.com mail exchanger = 40 alt3.aspmx.l.google.com.
google.com mail exchanger = 10 aspmx.l.google.com.
google.com mail exchanger = 30 alt2.aspmx.l.google.com.
google.com mail exchanger = 50 alt4.aspmx.l.google.com.
google.com mail exchanger = 20 alt1.aspmx.l.google.com.
As the sample you posted, you can confirm if mail.mydomain.com has pointed to a IP ( so called A record ), and mail related services maight be OK if there are correct MX & A records.
You should find out name servers of your domain before you maintain the DNS records.
I guess your service provider ( or someone else ) have set up MX record of your domain, you may get more answers from your service provider.
|
The molecular basis of hemophilia A.
Due to new, sensitive methodologies, the rate at which factor VIII gene mutations are found is increasing rapidly. The next five years should lead to the discovery of a wide range of defects as well as potential new hot-spots for mutations. Advances in understanding the protein will also provide new insights into the effects of particular mutations. Tremendous strides have been made in carrier detection and prenatal diagnosis. Already diagnosis is possible in 70% of cases with the factor VIII intragenic polymorphisms. Although there is still room for improvement in availability, speed, and cost of the test, many families in the United States and Europe are benefiting from this sensitive detection method. |
CLARK — A park in Clark that will host this weeks’s Union County MusicFest, expected to draw tens of thousands of spectators this weekend, has been sprayed for mosquitoes after health officials discovered an insect carrying the West Nile Virus there last week.
A mosquito pool, used by health officials to trap insects for testing, tested positive on Aug. 31, the county said. The pool was located in Oak Ridge Park, the site of the county’s annual free concert festival.
“It is not uncommon to find West Nile Virus in mosquito pools throughout the county, and the state of New Jersey as a whole,” Sebastian D’Elia, a county spokesman, said in an e-mail Thursday afternoon. “When it is found, the site is immediately treated.”
The state Department of Health and Senior Services, as well as local health offices throughout New Jersey, regularly test mosquitoes for the virus. Hundreds of insects regularly test positive, state reports show.
But cases of humans contracting the disease are rare, both the state and county said. In the past several years, there has been only one confirmed human case of the virus in Union County, D’Elia said.
MusicFest started earlier this week but will host its featured acts this weekend. Bands include headliners Train and Spoon, as well as OK GO, Soul Asylum, Suzanne Vega, The Bravery and The Zombies.
D'Elia urged those planning to attend the concerts to take common precautions such as wearing long pants and applying mosquito repellent. |
Q:
Looping within a regular expression
can regex able to find a patter to this?
{{foo.bar1.bar2.bar3}}
where in the groups would be
$1 = foo $2 = bar1 $3 = bar2 $4 = bar3 and so on..
it would be like re-doing the expression over and over again until it fails to get a match.
the current expression i am working on is
(?:\{{2})([\w]+).([\w]+)(?:\}{2})
Here's a link from regexr.
http://regexr.com?3203h
--
ok I guess i didn't explain well what I'm trying to achieve here.
let's say I am trying to replace all
.barX inside a {{foo . . . }}
my expected results should be
$foo->bar1->bar2->bar3
A:
This should work, assuming no braces are allowed within the match:
preg_match_all(
'%(?<= # Assert that the previous character(s) are either
\{\{ # {{
| # or
\. # .
) # End of lookbehind
[^{}.]* # Match any number of characters besides braces/dots.
(?= # Assert that the following regex can be matched here:
(?: # Try to match
\. # a dot, followed by
[^{}]* # any number of characters except braces
)? # optionally
\}\} # Match }}
) # End of lookahead%x',
$subject, $result, PREG_PATTERN_ORDER);
$result = $result[0];
|
King Kong to Open on Broadway
The long-anticipated musical of King Kong, itself based on the 1932 novel of the same name by Merian C. Cooper, will finally be coming to Broadway, complete with the titular mammoth ape. Set to open on November 8, 2018 at the Broadway Theatre, the musical will utilize an innovative mix of robotics, puppetry, and stagecraft to bring this character to life. The production will be directed and choreographed by Oliver Award-winner Drew McOnie (In the Heights).
“Based on the 1932 novel, the stage production of King Kong is a contemporary take on the classic tale of beauty and the beast. The story follows a young actress and a maverick filmmaker as they voyage from the bustling streets of 1930s New York to an uncharted island to capture the greatest wonder the world has ever seen. At the center of this 21st-century reimagining: a 20-foot high, 2,000-pound gorilla brought to life by a team of seamlessly integrated artists and technicians. King Kong is a larger-than-life encounter with a legend that’s always been too big to contain.”
King Kong’s book writer Jack Thorne won the 2017 Olivier Award and the Evening Standard Award for Best Play for Harry Potter and the Cursed Child, which is poised to make its Broadway premiere this spring. The musical features a score by composer and music producer Marius de Vries (the films La La Land, Moulin Rouge, and Romeo + Juliet) who is a four-time Grammy nominee. Eddie Perfect (songs) is a Helpmann Award winner and composer and lyricist of the Broadway-bound Beetlejuice, Strictly Ballroom The Musical and Shane Warne The Musical.
The design team for the Broadway production of King Kong will include Peter England (Set and Projection Design), Sonny Tilders (Creature Design), Roger Kirk (Costume Design), Peter Mumford (Lighting Design), Peter Hylenski (Sound Design), Gavin Robins (Aerial and King Kong Movement Director). Casting will be announced at a later date.
Mark Robinson is the author of the two-volume encyclopedia The World of Musicals and maintains a theater and entertainment blog at markrobinsonwrites.com. |
import { ChildProcessReporter } from '@integration/testing-tools';
import { serenity, StreamReporter } from '@serenity-js/core';
export = function () {
this.setDefaultTimeout(5000);
serenity.configure({
crew: [
new ChildProcessReporter(),
new StreamReporter(),
],
});
};
|
337 F.Supp. 150 (1972)
CITY OF NEW YORK, Plaintiff, and Bush Terminal Railroad Users Association, Inc., et al., Intervening Plaintiffs,
v.
The UNITED STATES of America et al., Defendants.
Civ. No. 71-C-1639.
United States District Court, E. D. New York.
January 20, 1972.
*151 *152 Louis Walters, Asst. Corp. Counsel (J. Lee Rankin, Corp. Counsel for City of New York, Peter C. Demetri and Eleanor Oppenheimer, Asst. Corp. Counsels, of counsel), for plaintiff.
Stacey L. Wallach, New York City (Tenzer, Greenblatt, Fallon & Kaplan, New York City, of counsel), for intervening plaintiff, Bush Terminal Users Ass'n.
William C. Mahoney, Washington, D. C., for intervening plaintiffs, United Transportation Union and Brotherhood of Railway, Airline & Steamship Clerks, Freight Handlers, Express & Station Employes.
John C. McTiernan, Asst. Counsel, N. Y. State Dept. of Transportation, Albany, N. Y., for intervening plaintiff, State of New York.
Lloyd H. Baker, Asst. U. S. Atty. (Robert A. Morse, U. S. Atty. Eastern District of New York, of counsel), for defendant, the United States.
Theodore C. Knappen, Washington, D. C., Asst. Gen. Counsel, for defendant, Interstate Commerce Commission.
G. Clark Cummings, New York City, for defendant, Bush Terminal R.R.
Before FRIENDLY, Chief Circuit Judge, MISHLER, Chief District Judge, and WEINSTEIN, District Judge.
FRIENDLY, Chief Circuit Judge:
In this action against the United States, the Interstate Commerce Commission, Bush Terminal Railroad and certain of the latter's officers and directors, the City of New York, joined by several intervenors, asks us to annul an order of the Interstate Commerce Commission dated December 13, 1971, in F.D. No. 25896, which authorized abandonment of the entire line of Bush Terminal Railroad Company (the Railroad) in Kings County, New York, and Hudson County, New Jersey. The order, which was effective immediately, was entered after the Railroad on December 1, 1971, had unilaterally imposed an embargo on all outgoing freight and announced that on December 15, 1971, it would impose a similar embargo on all incoming freight, because of the allegedly unseaworthy condition of its marine equipment, and after users of the Railroad had begun an action to enjoin the embargo which they considered to be an unauthorized abandonment. The Railroad terminated operation on December 13 immediately on learning of the Commission's order.[1]
On December 17, the City began this action and sought a temporary restraining order, see 28 U.S.C. § 2284(3). Judge Weinstein denied this but set the City's motion for a temporary injunction for argument on December 22 before a three-judge court which he asked to have convened, 28 U.S.C. §§ 2321, 2325. At the argument, the Bush Terminal Users Association, Inc., United Transportation Union, the Brotherhood of Railway, Airline and Steamship Clerks, Freight Handlers, Express and Station Employes, and the Department of Transportation of the State of New York were allowed to intervene as plaintiffs. Issuance of *153 a temporary restraining order was again refused, but we reserved decision on the motion for a temporary injunction pending the filing of the record and briefs.
The Railroad, organized in 1903, is a wholly-owned subsidiary of Bush Universal, Inc., which had been known as Bush Terminal Company until July, 1968. The purpose of establishing the Railroad was to acquire franchise rights in city streets and extend to new buildings railroad services then being provided in Brooklyn, New York, by Bush Terminal. The line owned by the Railroad is only 1.8 miles long. This connects with some 13.56 miles of track in Brooklyn and car-float and towage facilities that are operated by the Railroad but are owned and had previously been operated by Bush Terminal, allegedly as agent for the Railroad and for trunk line carriers serving New York Harbor. In Bush Terminal R.R. Co. Operation, 257 I.C.C. 375 (1944), the Commission authorized the Railroad, pursuant to § 1(18) of the Interstate Commerce Act, to extend its railroad by acquiring through lease the trackage and other facilities owned by Bush Terminal. The lease took effect on January 1, 1945. Since then the Railroad, as a common carrier, has moved cars between industries in and near the Bush Terminal in Brooklyn across New York Harbor to and from various trunk line terminals in New Jersey. In December, 1968, Bush Terminal, having changed its name and become a conglomerate, controlled by Universal Consolidated Industries, Inc., a still more conglomerated conglomerate, conveyed all its real estate, including some of the land over which the Railroad operates, to a newly organized, wholly owned subsidiary, Bush Terminal Company, Inc. This new subsidiary assumed its parent's obligations under the lease to the Railroad. We will generally refer to Bush Universal, Inc. and Bush Terminal Company, Inc., simply as "the Terminal Company."
The Railroad, on October 23, 1969, filed an application under § 1(18) of the Interstate Commerce Act for permission to abandon the operation both of its owned and of its leased properties. Hearings were held in late June, 1970. The application was opposed by users of the service, governmental and quasi-governmental bodies and labor organizations representing the Railroad's employees. In their post-hearing briefs the City, the State, and the Users Association for the first time raised the issue that authorization of abandonment by the lessee, the Railroad, would not relieve the lessor, the Terminal Company, of its independent obligation to operate the leased properties, an obligation that would revive upon discontinuance of operations by the lessee. See Lehigh Valley R.R. Co. Proposed Abandonment of Operation, 202 I.C.C. 659, 663 (1935); Norfolk S.R.R. Co. Receivers Abandonment, 221 I.C.C. 258, 260 (1937); Livestock Terminal Service Co. Abandonment of Operation, 257 I.C.C. 1, 7 (1944); Hoboken R.R., Whse. & S.S. Connecting Co. Operation, 257 I.C.C. 739, 743-44 (1944). The Railroad responded, correctly enough as a matter of law, see Meyers v. Famous Realty, Inc., 271 F.2d 811, 814-815 (2 Cir. 1959), cert. denied, 362 U.S. 910, 80 S.Ct. 681, 4 L.Ed.2d 619 (1960), that this doctrine applies only when the lessor was a "carrier by railroad," see 49 U.S.C. § 1(18), when the lease was made; it claimed that the Terminal Company was not.
On June 3, 1971, the examiner rendered a report recommending authorization of the abandonment. He found that, despite various promotional efforts, the Railroad's traffic had seriously declined, due to motor vehicle competition, and the moving of industries away from the Brooklyn area served by it; that the Railroad "has sustained substantial losses for many years, and prospects for reversing the decline in traffic and for profitable operations are very slim;" and that the property owned and leased by the Railroad was in such poor condition that an expenditure by it of approximately $930,000 would be required for *154 rehabilitation of roadway and marine equipment.[2] With the Railroad's long record of losses and negative net worth, these funds could not be obtained except from the parent. The examiner concluded that, despite undoubted hardship to users, which might require many to move, with consequent loss of employment opportunities and revenues to the City and the State, there was no alternative to authorizing abandonment by the Railroad. Turning to the legal argument concerning the obligations of Terminal Company as lessor, the examiner concluded that this raised a factual issue of the lessor's earlier common carrier status, which had never previously been resolved and which could be tested in an action by the objecting parties under § 1(18) and (20). Thus, he declined to condition abandonment by the Railroad upon resumption of operation of the leased properties by the Terminal Company. Following the Commission's general practice in cases of complete abandonment where neither the carrier nor a parent carrier realizes economic advantages other than the termination of losses,[3] see Chicago, A. & S.R.R. Co. Receiver Abandonment, 261 I.C.C. 646, 652 (1946); Okmulgee Northern Ry. Co. Abandonment, 320 I.C.C. 637, 645-646 (1964); Manifestee & Repton R.R. Co. Abandonment, 324 I.C.C. 489, 492 (1964); Tennessee Central Ry. Co. Abandonment of Operations, 333 I.C.C. 443, 453-454 (1968), he declined to impose employee protective conditions.
Exceptions and a reply thereto by the Railroad were filed with the Commission in early August. The City's, the Unions' and the Users Association's exceptions requested oral argument. On November 3, the Users Association filed a petition for leave to file a petition to reopen the hearing to include further testimony concerning the willingness of users to pay a surcharge of $25 per car. *155 The Railroad replied by letter. On December 13, the Commission, acting by Division 3, entered the order to which we have referred. This noted that the exceptions had raised "a substantial question of possible damage to the environment" as a result of the substitution of trucks for railroad cars but concluded that "any damage that may occur to environmental amenities by our approval of this application is to be outweighed by the proven economic harm that would result from its denial." It upheld the findings and conclusions of the examiner and decided that, save for the point just stated, the exceptions and reply thereto raised no new or material issue and were not of such a nature as to require the issuance of a report. After denying the petition of the Users Association for leave to file a petition to reopen the record, it adopted the hearing examiner's order of abandonment "as the order of the Commission, Division 3, effective on the date of service hereof," which was specified to be December 13.
I.
If we were to view the matter apart from certain special considerations urged by the plaintiff and intervenors, it would be clear that the order of abandonment was supported by substantial evidence at the time it was issued. Between 1959 and 1969, the Railroad's traffic declined from 618,053 to 459,685 tons. During the same period, traffic for four types of customers tenants of the Terminal Company; tenants of an unrelated organization, Bush Terminal Associates; customers located on private sidings; and the Brooklyn Army base fell from 13,490 to 4,165 cars, those from the Army base having later dwindled to zero. Losses have been incurred every year since 1959. These attained highs of $368,431 and $376,644 in 1966 and 1967; while the losses for 1968 and 1969 were less, $311,910 and $220,582, respectively, the Railroad persuasively claimed the reduction was due principally to the deferral of maintenance expenditures which would have to be made if it were required to continue operations. The balance sheet as of December 31, 1969, shows current assets of $451,242 and current liabilities of $1,990,754.[4] The story seems to be the familiar one of decreased usage and higher costs leading to deterioration of plant, and deterioration of plant then leading to further decrease in usage and still further deterioration, until a time finally comes when the operation grinds to a halt, with attendant hardship on the remaining users and the employees. Courts are not free to annul the Commission's decision to allow abandonment under such circumstances simply because greater wisdom at an earlier date on the part of all concerned might have preserved a valuable transportation enterprise. See Washington & Old Dominion Users Ass'n v. United States, 287 F.Supp. 528 (E.D.Va. 1968) (three-judge court); Asbury v. United States, 298 F.Supp. 589 (W.D.Va. 1969) (three-judge court). As the examiner said, "an unprofitable operation cannot be expected to continue indefinitely for the benefit of shippers who may be adversely affected but who do not furnish sufficient traffic to support a line, or to furnish transportation during periods when trucks experience difficulty operating, or for such commodities as may not be handled economically by trucks."
Before the hearing examiner, the plaintiffs argued that the loss figures constituted only bookkeeping losses which must be disregarded because they reflect intercompany charges arising out of a leasing arrangement between a parent and a wholly owned subsidiary, and that the Railroad and its parent must be viewed as a single entity to obtain an accurate financial picture. The examiner had abundant basis for rejecting these arguments. The Commission had earlier found the leasing arrangement between the Terminal Company and the Railroad to be fair, 257 I.C.C. at 379-381, and the *156 examiner received and adopted new testimony reinforcing this conclusion. Apart from an annual fee of $25,000 for services such as telephones, casual engineering, and payroll accounting, which has remained unchanged since 1945 and which the Examiner permissibly found to be fair, indeed, low, payments were made for services actually rendered such as maintenance work and managerial services of officers of the Railroad who are also officers of the Terminal Company and for rent calculated on the basis of a basic rental component and a percentage rental component as provided in the lease. The percentage rental is 75% of the Railroad's net earnings from both its leased and owned properties; the basic rental is essentially an amount equivalent to property taxes, depreciation, and 5½% of the assessed value of the leased real estate and the agreed value of the other leased property. An owner would have incurred the various service and managerial expenses. No payment of percentage rental has been made since 1959, there having been no net earnings since that date. Finally, the basic rental provides less than a fair rate of return, at least under current conditions where prime corporate bonds command rates in the neighborhood of 7%. In fact, in 1966, 1967, and 1968, the Railroad's actual payments to the Terminal Company were less than the current charges other than rent;[5] if it had been independently operated and had bonds outstanding, it would long since have had to take advantage of § 77 of the Bankruptcy Act. In short, it does not appear that the intercompany charges were either improper or unreasonable.
Much is sought to be made of the benefit which the parent received from the Railroad's losses in its consolidated income tax return, but did not pass on to the Railroad. Whatever bearing this might or might not have on a claim by the Terminal Company in the case of insolvency on the part of the Railroad, cf. Western Pacific R.R. Corp. v. Western Pacific R.R. Co., 206 F.2d 495 (9 Cir.), cert. denied, 346 U.S. 910, 74 S.Ct. 241, 98 L.Ed. 407 (1953), the mere fact that, due to other income of the parent, the ultimate impact of the Railroad's losses may be less than if it stood alone, would not justify requiring railroad operations to be continued at a loss. Only the railroad business is to be considered in deciding whether an operation is unprofitable and should be abandoned. See Brooks-Scanlon Co. v. Railroad Comm'n, 251 U.S. 396, 399, 40 S.Ct. 183, 64 L.Ed. 323 (1919). This same principle also disposes of the contention that the parent, with its other profitable businesses, and the Railroad should be viewed as a single entity for financial accounting purposes, thus purportedly eliminating any showing of loss. Problems of constitutional dimensions would be raised by requiring a company to subsidize a losing railroad operation with non-railroad businesses, see id. particularly in a case such as this where the railroad business has failed to show a profit for some ten years. For purposes of this abandonment proceeding, then, the Railroad's historical losses are real, substantial, and not exaggerated by intercompany transactions.[6]
Relying on a lease provision obligating the lessor to make capital expenditures *157 with respect to the leased property, the plaintiffs advance a further argument that the serious condition of the equipment used by the Railroad is the result of the Terminal Company's failure to make necessary capital expenditures and the size of the estimated maintenance expenditures now necessary should therefore be appropriately discounted. More specifically, the lease provides that although the lessee is required to maintain the properties at its own expense, the lessor is obligated to make capital expenditures if not occasioned by the lessee's failure to maintain with the provisos that the lessor could terminate the lease if more than $100,000 of such capital expenditures were required in any year and that the lessee could either terminate the lease or make capital expenditures at the expense of the lessor if the latter failed to make necessary capital expenditures. There is evidence in the record which indicates that from 1960 through 1969 the Terminal Company made capital expenditures amounting to $786,751 with respect to the leased properties. This would suggest that only a little more than $200,000 additional capital could have been called upon in that ten year period to replace the large amount of rundown equipment being used by the Railroad. Even assuming that the lessee could have called upon the lessor to make additional major capital expenditures and that the result would have been a substantial reduction in the maintenance expenditures now necessary on the part of the lessee, it should be recognized that in fact any such capital expenditures must ultimately be paid for by the lessee since, among other things, the basic rental consists of a depreciation charge and an interest component. Thus, in the 1960 through 1969 period, depreciation charges payable to the Terminal Company by the Railroad amounted to $592,670. Also the record clearly shows that throughout much of that period the Railroad was in default in the payment of rent. By December 31, 1964, the Railroad owed the Terminal Company over four hundred thousand dollars and that sum increased to more than a million and a half by December 31, 1969. Indeed, since 1965, the annual increase in the Railroad's debit balance to the Terminal Company has exceeded $100,000. In light of these figures, it is very doubtful that the lessor has been obligated to make any capital expenditures for some time[7] at the least, not since the Railroad has been in default on its rent. Consequently, we see no basis for discounting the substantiality of the maintenance expense facing the Railroad should it be required to continue operations.
We have reviewed the evidence before the Commission concerning the Railroad's physical and financial condition at this length in order to delimit the extent to which reconsideration of the specific matters here discussed[8] will be necessary on the remand to be prescribed in what follows. Compare Massachusetts Bay Telecasters, Inc. v. FCC, 104 U.S.App.D.C. 226, 261 F.2d 55, 65 (1958), modified, 111 U.S.App.D.C. 144, 295 F.2d 131 (Cir.), cert. denied, 366 U.S. 918, 81 S.Ct. 1094, 6 L.Ed.2d 241 (1961).
*158 II.
Despite the bleak financial picture of the Railroad's past history and future prospects established before the hearing examiner, we are confronted with a serious argument by the plaintiff and intervenors that the Commission has acted here in violation of the National Environmental Policy Act of 1969 (NEPA), 42 U.S.C. §§ 4321-47. Although this abandonment proceeding was initiated before NEPA became effective on January 1, 1970, all agency hearings and decision-making occurred long after the effective date. Consequently, we have no doubt that NEPA was applicable. Cf. Environmental Defense Fund, Inc. v. Corps of Engineers, 324 F.Supp. 878, 880 (D.D.C.1971); Environmental Defense Fund, Inc. v. Corps of Engineers, 325 F.Supp. 728, 743-744 (E.D. Ark.1971). While the Commission may initially have thought that, as a general matter, abandonment proceedings were not within the provisions of NEPA, subdivisions (A), (B), and (D), among others, of § 102(2), 42 U.S.C. § 4332(2), impose a number of duties on all federal agencies with respect to the consideration and exploration of the environmental effects of their decisions and plans, and the obligation of a federal agency to adhere to these subdivisions in all instances is essentially unqualified.[9] In addition, in cases of "major Federal actions significantly affecting the quality of the human environment," § 102(2) (C) requires the federal agency to include in its report a "detailed statement" which comprehensively considers the effect of the proposed action upon the environment and alternatives thereto. At the time of the hearings in this proceeding, it may not have been entirely clear from the statute or from the Interim Guidelines published by the Council on Environmental Quality (CEQ), 35 Fed. Reg. 7390-93 (May 12, 1970), revision proposed, 36 Fed.Reg.1398-1402 (Jan. 28, 1971), guidelines published, 36 Fed. Reg. 7724-29 (April 23, 1971), that a railroad abandonment proceeding, despite its potential for increase in the use of alternative modes of transportation with greater polluting effects, such as trucks, constituted the type of federal action which requires a detailed environmental statement as prescribed in § 102 (2) (C). However, the Commission has gone a long way to resolving whatever doubt there was on the question by its proposed rules which include railroad abandonment proceedings among those actions which may have a significant effect on the quality of the environment. See ICC Notice of Proposed Rule Making: Implementation of National Environmental Policy, App. A(d) (2), 36 Fed.Reg. 10807, 10809 (June 3, 1971). And although it is evident that the Commission has been slow in reacting to the directive of the CEQ, 35 Fed.Reg. 7390-93 (May 12, 1970), and of NEPA itself, that each federal agency establish formal procedures to guide the preparation of § *159 102(2) (C) environmental impact statements, this cannot, excuse the Commission's failure to consider adequately the provisions of NEPA once the Act had become effective.
The examiner's report gave no consideration to the environmental implications of the abandonment of the Railroad's operations. None of the protestants had sought at the hearing to develop the record in this respect. The environmental issue was first raised by the City in its Exceptions to the examiner's report. It argued there that if 13,500 carloads which it assumed to be the Railroad's annual traffic were moved by truck, substantial additional tonnage of pollutants would be discharged.[10] The Railroad replied that these figures were highly exaggerated, particularly since much of the protestants' argument at the hearing and in their exceptions was not that users would turn to trucks but rather that they would move away as soon as their leases expire, or perhaps even before. Whatever the merits of these opposing views, it is apparent that there is likely to be some adverse environmental effect as a result of the abandonment. Yet the only agency consideration given the environmental issues is the cursory statement of Division 3 which we set out in the margin.[11] In our opinion, this is insufficient to establish compliance with, in particular, § 102(2) (B) & (D), much less with the detailed requirements of § 102(2) (C).
We recognize that the Commission was here faced with a relatively new statute so broad, yet opaque, that it will take even longer than usual fully to comprehend its import. The protestants compounded an already difficult situation by waiting until the eleventh hour to raise an important question which would best have been considered from the outset. Further, we are not eager to remand for what may well be a largely ritualistic act. We have serious question whether, in view of the consistent record of losses and the large sums needed to remedy deferred maintenance and for capital expenditures and the unavailability of any likely source for these, there is any alternative to allowing abandonment here, despite adverse environmental effects. A recent offer by the Users Association, discussed infra, perhaps offers at least a glimmer of hope. But at this juncture the Railroad appears unable to continue, and has operated as long as it has only because the *160 Terminal Company has not pressed for collection of increasing amounts now more than a million and a half dollars owed to it. We find no indication in NEPA that Congress meant to authorize an agency to compel a parent or sister company to finance a losing subsidiary or affiliate simply because the latter's demise will have an unfortunate effect on the environment; and there would be the gravest doubt whether it constitutionally could under the circumstances here before us. See Brooks-Scanlon Co. v. Railroad Comm'n, supra, 251 U.S. 396, 399, 40 S.Ct. 183, 64 L.Ed. 323; Railroad Comm'n of State of Texas v. Eastern Texas R.R., 264 U.S. 79, 85, 44 S.Ct. 247, 68 L.Ed. 569 (1924); Pacific Tel. & Tel. Co. v. Tax Comm'n, 297 U.S. 403, 413, 56 S.Ct. 522, 80 L.Ed. 760 (1936) (Brandeis, J.); In re New York, N. H. & H. R. R., 304 F.Supp. 793, 801-803 (D.Conn.1969), aff'd in part and rev'd in part sub nom. New Haven Inclusion Cases, 399 U.S. 392, 90 S.Ct. 2054, 26 L.Ed.2d 691 (1970).
On the other hand, such considerations do not justify the Commission's disregard of the law. The tardiness of the parties in raising the issue cannot excuse compliance with NEPA; primary responsibility under the Act rests with the agency. See Calvert Cliffs' Coordinating Committee, Inc. v. United States Atomic Energy Commission, 449 F.2d 1109, 1118-1119 (D.C.Cir. 1971); cf. Scenic Hudson Preservation Conference v. FPC, 354 F.2d 608, 620 (2 Cir., 1965), cert. denied, 384 U.S. 941, 86 S.Ct. 1462, 16 L.Ed.2d 540 (1966); Isbrandtsen Co. v. United States, 96 F.Supp. 883, 892 (S.D.N.Y. 1951) (three-judge court), aff'd sub nom. A/S Ludwig Mowinckels Rederi v. Isbrandtsen Co., 342 U.S. 950, 72 S.Ct. 623, 96 L.Ed. 706 (1952). Furthermore, the legislative history indicates that one of the strong motivating forces behind NEPA, and § 102 in particular, was to make exploration and consideration of environmental factors an integral part of the administrative decision-making process. See S.Rep.No.91-296, 91st Cong., 1st Sess., U.S.Code Cong. & Admin.News, p. 2751; 115 Cong.Rec. 40416 (Dec. 20, 1969) (remarks of Senator Jackson). See also Calvert Cliffs', supra, 449 F.2d at 1112-1114. To permit an agency to ignore its duties under NEPA with impunity because we have serious doubts that its ultimate decision will be affected by compliance would subvert the very purpose of the Act and encourage further administrative laxity in this area. The systematic investigation of the abandonment of the Railroad's operations which NEPA requires may well reveal substantial environmental consequences and, given that the most recent offer of the Users Association may possibly provide an economic alternative to abandonment, compel further consideration of its propriety and necessity. In any event, preservation of the integrity of NEPA necessitates that the Commission be required to follow the steps set forth in § 102, even if it now seems likely that those steps will lead it to adhere to the present result. Thus, this proceeding must be remanded to the Commission for it to bring itself into compliance with the law.
III.
The plaintiff and intervenors in this action have relied heavily on the willingness of the Railroad's users to submit to a surcharge. At the close of the hearing before the examiner, the Users Association suggested that if the Commission were disposed to authorize abandonment, the users would be willing to pay a surcharge sufficient to enable the Railroad to operate without serious loss. In its brief the Association suggested a surcharge of $10 per car, which it claimed would produce added annual revenue of $130,000.[12] The examiner dealt with *161 this in a passage of his report, set forth in the margin.[13] Under the stimulus of a decision of Division 3 in Wellsville, Addison & Galeton R.R. Corp. Abandonment, 338 I.C.C. 604, served August 26, 1971, the Users Association, on November 3, filed a petition for leave to file a petition to reopen. This time the offer was upped to $25 per car, and was supported by affidavits of 21 shippers accounting for 2,000 carloads annually. As previously indicated, Division 3 denied leave to file. Finally, together with its brief in this action, the Users Association filed an affidavit which, in essence, puts forth its most recent and most substantial offer to pay a $25 surcharge. The affidavit purports to establish the willingness of 94 users, who ship and/or receive some 7,000 carloads annually, to pay such a surcharge.
Were we not convinced that we must remand for further consideration of NEPA, we would dispose of the Users Association's three surcharge offers seriatim. First, we see no basis for quarreling with the examiner's rejection of the initial $10 offer on what little he had before him. The propriety of the refusal to consider the second offer turns on whether the Commission abused its discretion in denying the petition to reopen. While the Court of Appeals for this circuit has held that an order refusing to reopen is not "wholly immune from judicial examination," Cappadora v. Celebrezze, 356 F.2d 1, 5-7 (2 Cir. 1966); see also Blue Bird Coach Lines, Inc. v. United States, 328 F.Supp. 1331, 1337-1338 (W.D.N.Y.1971) (three-judge court), nevertheless, as recognized in the cases cited, the scope of review of such orders is exceedingly narrow. Courts must always bear in mind the warning of Mr. Justice Jackson:
If upon the coming down of the order litigants might demand rehearings as a matter of law because of some new circumstance has arisen, some new trend has been observed, or some new fact discovered, there would be little hope that the administrative process could ever be consummated in an order that would not be subject to reopening.
Interstate Commerce Commission v. Jersey City, 322 U.S. 503, 514, 64 S.Ct. 1129, 1134, 88 L.Ed. 1420 (1944). Here there were no "new circumstances" at all. There was only the fact that the examiner's report had made the likelihood of abandonment more vivid for more users than it had been at the hearing stage. Furthermore, the companies joining in the second offer represented only 2,000 carloads which means a maximum of $50,000 in added revenue, making the doubtful assumption that they would continue their present usage at the higher rates. The plaintiff's argument that the Commission's action here cannot be reconciled with that in the Wellsville case, supra, 338 I.C.C. 604, is without force.[14] There was, in short, *162 no abuse of discretion in the Commission's denial of the petition to reopen. Finally, the newly offered affidavit would, in the normal course, be properly excluded from consideration in this action. "The rule is well settled that proceedings [under 28 U.S.C. § 2321] are not de novo, and ordinarily it is improper to allow the Commission's findings to be attacked or supported by evidence which the Commission had no opportunity of considering." Wycoff Co. v. United States, 240 F.Supp. 304, 308 (D.Utah 1965) (three-judge court), citing Louisville & N. R. R. v. United States, 282 U.S. 740, 51 S.Ct. 297, 75 L.Ed. 672 (1931); Mississippi Valley Barge Line Co. v. United States, 292 U.S. 282, 54 S.Ct. 692, 78 L.Ed. 1260 (1934); American Trucking Ass'ns, Inc. v. United States, 344 U.S. 298, 73 S.Ct. 307, 97 L.Ed. 337 (1953). See also Town of Inlet v. New York Cent. R. R., 7 F.Supp. 781, 784 (N.D.N.Y.1934) (three-judge court); Convoy Co. v. United States, 200 F.Supp. 10, 15-16 (D.Ore.1961) (three-judge court); Oklahoma Corporation Comm'n v. United States, 235 F.Supp. 803, 806-807 (W.D.Okl.1964) (three-judge court). The only exceptions to this rule are cases in which the jurisdictional facts doctrine of Crowell v. Benson, 285 U.S. 22, 52 S.Ct. 285, 76 L.Ed. 598 (1932), is raised or, at least in former days, in which a rate order is attacked as confiscatory. Interstate Investors, Inc. v. United States, 287 F. Supp. 374, 386 (S.D.N.Y.1968) (three-judge court), aff'd, 393 U.S. 479, 89 S.Ct. 707, 21 L.Ed.2d 687 (1969). Otherwise, the court's function in a proceeding such as this is only to review the decision of the Commission in light of the record before it. See Sakis v. United States, 103 F.Supp. 292, 313 (D.D.C.) (three-judge court), appeal dismissed by stipulation, 344 U.S. 801, 73 S.Ct. 4, 97 L.Ed. 625 (1952). It is consistent with Mr. Justice Jackson's views concerning petitions to reopen that parties be obligated to develop the record fully before the Commission and not seek continually to introduce additional evidence. This assures that the Commission will be able to perform meaningfully the decision-making functions residing initially with it and that there is some semblance of finality and orderliness in the administrative process. Indeed, this most recent surcharge offer is a classic instance of evidence which could and should have been introduced before the trial examiner.
But there is, in our opinion, more at stake here than the interests of the named parties. To be sure, the precise consequences for the City, its economy, and its people are not readily ascertainable; but the Railroad's demise will undoubtedly be followed by the relocation of at least some users with the attendant loss of jobs for employees, loss of business for the users' suppliers and customers, and ultimately both economic and physical deterioration in the local community. Against this background, we note the Users Association's contention that the additional $175,000 in revenue ensured by its most recent surcharge offer, when combined with a union offer to eliminate one train crew producing an estimated annual cost saving of $60,000, see note 6, would make the Railroad's continued operation economically feasible. Considered in the light of 1969 financial figures, the Users Association points out that approximately $175,000 in additional revenues plus a $60,000 cost saving would turn a $220,582 loss into a $14,418 profit. On the record before us we could only speculate on the correctness of the Users Association's position although we do have certain fundamental doubts about its proffered calculations which the parties should seriously consider.[15] The necessity *163 of remand to the Commission for further consideration of the environmental issue allows us to avoid such unwarranted speculation and to give sway to the substantial element of public interest contained in this case by directing the Commission on remand to reopen the administrative record and reevaluate the propriety of abandonment in light of the additional evidence tendered to this court concerning the willingness of users to pay a $25 surcharge.[16] On remand, both sides should present the most recent financial and traffic figures available, thus permitting an accurate reappraisal of the Railroad's future economic prospects assuming a $25 surcharge were put into effect.[17] We consider our action here to be consonant with the general principle that there must be finality in the administrative process; we direct further consideration of the Railroad's financial prospects with the most recent surcharge offer only because we must remand for failure to comply with NEPA in any event.
IV.
In remanding this action to the Commission for further action we do not vacate its abandonment order of December 13, and thus we allow the Railroad to remain shut down pending further administrative action.[18] Although the Commission's failure to act in accordance with applicable law, specifically NEPA, would provide sufficient basis for vacating the Commission's order, see 5 U.S.C. § 706(2) (A), such action is not compelled. In reviewing the Commission's action, we sit as a court with equity powers, and as such
may adjust relief to the exigencies of the case in accordance with the equitable principles governing judicial action. The purpose of judicial review is consonant with that of the administrative proceeding itself, to secure a just result with a minimum of technical requirements.
Ford Motor Co. v. NLRB, 305 U.S. 364, 373, 59 S.Ct. 301, 307, 83 L.Ed. 221 (1939). See also Addison v. Holly Hill *164 Fruit Products, Inc., 322 U.S. 607, 619-622, 64 S.Ct. 1215, 88 L.Ed. 1488 (1944). The special circumstances here justify our remanding for further consideration without the vacating of the Commission's order that would normally attend upon this. NEPA is a new and unusual statute imposing substantive duties which overlie those imposed on an agency by the statute or statutes for which it has jurisdictional responsibility. Initially harmonizing and integrating the special duties imposed by NEPA with an agency's traditional regulatory functions is not an easy task. What is more, the plaintiffs who now seek to benefit from the Commission's failure completely to perform the tasks imposed on it by NEPA exacerbated the problem by waiting until after the hearings were completed to raise the environmental question. While none of this can ultimately insulate unlawful administrative conduct from judicial correction, in the exercise of our equity powers we deem this sufficient, considering the seriously deteriorated condition of the Railroad, both physically and economically, as established by the evidence before the Commission, to warrant allowing the December 13 order to remain standing at this juncture for a short period while the Commission supplements the record on the environmental issue and then assesses whether its order should be in any way revised. Cf. Coffey v. Jordan, 107 U.S.App.D.C. 113, 275 F.2d 1 (1959).
Even more clearly this is a wholly logical posture in which to have this action proceed insofar as the additional evidence with respect to the surcharge offer is concerned. We have already explored the evidence at length and found that there was substantial basis in the present record for the Commission's conclusions with respect to the Railroad's current financial condition and future economic prospects. Even assuming the most recent surcharge offer so substantially alters the Railroad's financial prospects as to make abandonment inappropriate, it is nonetheless merely additional evidence which could and should have been presented to the hearing examiner. Thus, we do not think that this evidence can impeach the present validity of the December 13 order on the record now before us. At most, under the special circumstances of this case, this additional evidence can and does warrant supplementary action by the Commission albeit this action may ultimately impugn the continuing propriety of the December 13 order and warrant its revision. Cf. Fleming v. FCC, 96 U.S. App.D.C. 223, 225 F.2d 523 (1955); Massachusetts Bay Telecasters, Inc. v. FCC, supra, 261 F.2d at 65-67.
We will, then, give the Commission ninety days to conduct whatever further proceedings it may wish concerning the environmental and surcharge issues, to make additional determinations, and to serve, and file with us, a supplemental report consistent with this opinion and the record of any further proceedings. The parties shall serve and file any further briefs within fifteen days after service of the supplemental report; we will hear additional argument if requested. We emphasize the need for expeditious action and holding the Commission to a strict time schedule because we are permitting the December 13 order to stand and the Railroad to remain shut down.[19] In the meantime, we will retain *165 jurisdiction, cf. Addison v. Holly Hill Fruit Products, Inc., supra, 322 U.S. at 619, 64 S.Ct. 1215, and will withhold decision of the motion for a preliminary injunction. Upon the filing of the supplemental report and record we shall deal with this matter as on final hearing. F.R.Civ.P. 65(a) (2).
NOTES
[1] We understand that arrangements were made whereby New York Dock Railway, apparently using some of the Railroad's equipment, handled distressed freight in the immediate vicinity of the City of New York.
[2] The equipment used in the Railroad's operation is owned by the Terminal Company. Under the leasing arrangement, the Railroad is responsible only for maintenance expenses; capital expenditures with respect to the leased properties are the obligation of the Terminal Company. The cost of rehabilitating all the trackage used by the Railroad was estimated at $553,000. A marine consultant had testified that the operating machinery of the tug used by the Railroad was rattling, and that renewal of this plus other necessary tug repairs would cost $115,000. The short term cost of repairing the seven car floats used by the Railroad would be $280,000. These are all maintenance expenses which would have to be paid by the Railroad, leading to the $930,000 estimate.
Substantial capital expenditures on the part of the Terminal Company are also needed. The condition and age of the six locomotives four are more than 39 years old; two are more than 25 years old used by the Railroad are such that it would be more advisable to replace them than to repair them. The cost of the three replacements which would be needed was estimated at $379,700. Similarly, the car floats were 25 to 47 years old and all but one leaked. The marine consultant testified that it would be more practicable to buy six new car floats than to repair the seven old ones. New car floats would cost $300,000 each.
In arriving at the $930,000 estimate, the examiner included the $280,000 estimate with respect to short term repairs by the Railroad on the car floats while apparently assuming that the Terminal Company would also have to purchase six new car floats at $300,000 each. Review of the marine consultant's testimony suggests that he considered purchase of new car floats as a preferable alternative to repairing the old ones, obviating the need for the expenditure of $280,000 by the Railroad. But even after adjusting for this, the Railroad would still have to make a substantial expenditure of approximately $650,000 to rehabilitate its roadbed and marine equipment. Moreover, in the long run, capital expenditures by the Terminal Company are not a meaningful panacea for the Railroad's interrelated financial and maintenance woes, since under the rental terms the Terminal Company ultimately recoups capital expenditures from the Railroad, see infra.
[3] The only property owned by the Railroad, the rails over 1.8 miles of City streets, is likely to have a negative salvage value in light of the City's demand that the Railroad not merely pave over the tracks but remove them and repave the streets. The salvage value of the leased equipment to the owner is nominal.
[4] The latter figure includes accrued accounts payable of $1,718,426, of which $1,560,055 was due to the Terminal Company.
[5] Furthermore, the Terminal Company has never charged the Railroad interest on its ever mounting debt.
[6] Nor, taken alone, would the offer of the unions to eliminate one train crew have meaningfully alleviated the economic plight of the Railroad as established by the evidence before the hearing examiner. Even assuming the full annual cost of approximately $60,000 would be realized as savings, this would not be by any means sufficient to provide the Railroad with a reasonable possibility of bringing expenses into line with revenues, much less to ensure adequate funds for much needed maintenance. Whether, when combined with steps proposed to generate additional revenues, the cost saving produced by the elimination of one train crew would be enough to make the Railroad profitable once again is a separate question, see Part III infra.
[7] Thus, while a problem of considerable interest would be raised if a parent used its power to prevent an operating subsidiary from exercising contractual rights against the parent, performance of which might have averted the conditions now requiring abandonment, cf. W. R. Grace & Co. v. CAB, 154 F.2d 271 (2 Cir.), cert. granted sub nom. Pan American Airways Corp. v. W. R. Grace & Co., 328 U.S. 832, 66 S.Ct. 1378, 90 L.Ed. 1608 (1946), dismissed as moot, 332 U.S. 827, 68 S.Ct. 203, 92 L.Ed. 401 (1947), that question is not presented here.
[8] We do not at this time decide whether the Commission was correct in concluding that the order of abandonment should not have been conditioned upon resumption of operations by the Terminal Company, or in refusing to impose labor protective conditions, since the further action by the Commission which we direct infra could make review of these questions unnecessary.
[9] While § 102 contains the qualification "to the fullest extent possible," this does not appear to have been intended to relax the obligation of administrative authorities to perform the duties set forth in the section. To the contrary, the conference committee which added this language stated that its purpose
is to make it clear that each agency of the Federal Government shall comply with the directives set out in [ § 102(2) ] unless the existing law applicable to such agency's operations expressly prohibits or makes full compliance with one of the directives impossible .... Thus, it is the intent of the conferees that the provision "to the fullest extent possible" shall not be used by any Federal agency as a means of avoiding compliance with the directives set out in section 102. Rather, the language in section 102 is intended to assure that all agencies of the Federal Government shall comply with the directives set out in said section "to the fullest extent possible" under their statutory authorizations and that no agency shall utilize an excessively narrow construction of its existing statutory authorizations to avoid compliance.
Conference Report No. 91-765, 91st Cong., 1st Sess. (1969), U.S.Code Cong. & Admin.News, p. 2770. See also Port of New York Authority v. United States, 451 F.2d 783, 789 n. 26 (2 Cir. 1971).
[10] The figures in the City's Exceptions, which were not otherwise of record, were:
Emission Tons Per Year
(low) (high)
Assuming Assuming
26,314 trucks 59,200 trucks
Carbon monoxide 14,000 31,000
Hydrocarbons 1,950 4,900
Oxides of Nitrogen 3,900 7,950
Particulate 310 600
[11] This, in full text, is
It appearing, That, although a substantial question of possible damage to the environment has been raised, denial of the application herein will almost certainly result in the financial collapse of the applicant, which would, in effect, substitute economic waste for brief postponement of the envisoned environmental damage; and that under the balancing test prescribed by the court in Calvert Cliffs' Coordinating Committee, Inc., et al. v. Atomic Energy Commission, No. 24,839 (U.S.Ct. App., D.C.1971) [449 F.2d 1109], as in accordance with Section 102 of the National Environmental Protection Act, any damage that may occur to environmental amenities by our approval of this application is to be outweighed by the proven economic harm that would result from its denial . . . .
[12] The Association used for its calculation an estimated traffic figure of 13,000 cars per year which was apparently derived from data available at that time for the years 1967, 1968, and 1969. More recent experience indicates that annual usage has since decreased by more than one-third, see note 15, infra.
[13] No evidence was submitted in the record with respect to this proposal. The 12 protesting shippers, who are members of the Users Association, were not interrogated, and consequently were not cross-examined, concerning their willingness to pay an additional charge. The $130,000 figure was obviously based on all of applicant's traffic, and the Users Association, which has 32 members, was not authorized to speak for the over 300 other users of applicant's line, whether they are agreeable to the additional charge. Even if all shippers were willing to pay the additional $10 per car, the additional $130,000 in revenue would not convert the deficit operation to a profitable one, and would not provide funds for necessary rehabilitation. Also, there is no assurance that shippers would continue to tender the present amount of traffic at the increased rate. In fact, the contrary may be expected, in view of the history of declining traffic.
[14] First, Division 3's reversal of a review board in the Wellsville case rested on a number of factors, of which Erie-Lackawanna's offer of increased divisions of revenue with the applicant, 338 I.C.C. at 608, was only one. Also, an offer of increased divisions between two carriers, which can be made immediately effective and will not adversely affect interline traffic, differs substantially from the offer of some shippers to submit to a surcharge on shipments they choose to make by rail, which might or might not be acceptable to others. Finally, the offer of increased divisions in Wellsville was fully developed in the original record, not a belated proffer four months after an examiner's adverse report and when decision was near.
[15] In 1969 the Railroad handled approximately 13,000 carloads, whereas the very affidavit submitted by the Users Association to this court indicates that in 1971 the Railroad handled only some 8,000 carloads. If the amount of traffic handled by the Railroad has in fact declined so sharply, gross railway operating revenues today must be substantially less than in 1969 unless rate increases have occurred. Exactly what has happened to costs in the meantime is unclear. And even if the union's offer and the surcharge would cause the Railroad's operations to approach the break-even point, there must be some consideration of its immediate need to make large expenditures in order to repair its seriously deteriorated equipment.
[16] Such a direction to reopen the administrative record to take in additional evidence where remand to the Commission is unavoidable on other grounds is not unprecedented, cf. Jarman v. United States, 219 F.Supp. 108, 119 (D.Md. 1963) (three-judge court).
[17] Defendants have raised the question of the need for Commission action to make the surcharge binding on all users of the Railroad. Under 49 U.S.C. § 15(1), the Commission may act on its own motion to hold hearings and determine the reasonableness of a proposed rate. In its brief, the Commission argues essentially that the necessary rate-making hearing would be lengthy and complex; the Users Association seems to think not. In any case, we see no inherent obstacle to the Commission making a rate determination in the context of this proceeding. And certainly if the Railroad's traffic is now in fact only 8,000 carloads annually, see note 15, supra, the Users Association's affidavit purporting to establish the willingness of users representing some 7,000 carloads annually provides the Commission with substantial and crucial evidence that the rate increase would not make motor carrier service preferable to rail service. In short, it is possible that the surcharge will be shown to provide economic hope for the Railroad and that the rate increase produced by the surcharge will be shown to be reasonable, and thus we think justified, whatever administrative effort is necessary to investigate these matters.
[18] In its brief in this action, the Railroad has argued that even if we were to vacate the Commission's order, our actions would neither remove nor be determinative of the legality of its self-imposed embargo. We find it unnecessary to pass upon this.
[19] That this action to review the Commission's abandonment order has had to proceed with the Railroad already shut down and that we have now found it necessary to seek further agency consideration highlights the preferability of the Commission's usual practice of not making its orders of abandonment effective until 30 or 35 days after service. Indeed, the plaintiffs contend that on this ground alone the order was arbitrary, capricious, and an abuse of discretion. 5 U.S.C. § 706(2) (A). On the basis of the evidence before the Commission concerning the serious economic and physical condition of the Railroad we are not inclined so to conclude. Without doubt, immediate abandonment had a drastic effect on the users and employees of the Railroad. But all concerned had been on notice of the likelihood of abandonment for two and a half years. The Railroad had even offered the users the services of a transportation consultant to help them devise other means of transportation. Delay in the effectiveness of the order would have been of little significance here were it not now necessary to remand to the Commission for further action, and the matters which have delayed a speedy, final determination of the Railroad's future are ones which the plaintiffs could and should have presented to the hearing examiner long ago.
|
BANGALORE, Feb 7 (Reuters) - Canada's Ram Power Corp
RPG.TO said its San Jacinto-Tizate project in Nicaragua
encountered construction delays, and was also facing higher
material and labor costs, sending shares of the company down to
a nearly 21-month low.
The project has about $15-$20 million of additional
construction costs, the renewable energy company said in a
statement.
Steven Scott, director of investor relations, said the
company is moving to a new contractor as labour and procurement
issues had delayed the project.
"We just have not had the luck that we thought we would
have with our current contractor," Scott told Reuters.
Continued... |
**2 - sqrt(242)))*6 + 0.
99*sqrt(2) + 4616
Simplify (-4 + (3 + 2*sqrt(1584) + 3 + (2*sqrt(1584) - sqrt(1584)))*1*-1)**2.
720*sqrt(11) + 14356
Simplify 4 + (((5*sqrt(190)*-1 + sqrt(190) + -4*(-1*sqrt(190) + sqrt(190)))*4)/(((sqrt(30)*-4)/sqrt(3) - sqrt(10)) + sqrt(30)/(sqrt(3)*4)))**2.
4172/19
Simplify 6*(sqrt(2156) + 4 + 3 + sqrt(2156) + (sqrt(440) - (sqrt(440) - ((sqrt(440)*-3 - sqrt(440) - sqrt(440))*2 - sqrt(440))))/sqrt(10)).
42 + 36*sqrt(11)
Simplify (sqrt(119)/(-5*sqrt(567)) + -5)**2 + sqrt(17) + 4 + 1 + 3*(sqrt(17) + -5)**2.
-259*sqrt(17)/9 + 315917/2025
Simplify ((sqrt(270)*-1)/(sqrt(60)/(sqrt(18)/sqrt(3))))**2 + sqrt(48)*2 + (sqrt(30)/sqrt(10))**2*2.
8*sqrt(3) + 33
Simplify (sqrt(1728) - sqrt(1728)*-1 - (2*sqrt(60)/sqrt(5) + sqrt(12) + sqrt(12)))/(sqrt(216)*-1*-4 - (sqrt(216) + (sqrt(216) - 1*sqrt(216)) - sqrt(216))*5).
5*sqrt(2)/6
Simplify ((sqrt(2432) + -1*sqrt(2432))/(-2*(sqrt(2) + sqrt(6)/sqrt(3))))**2 - -5*(-6*(5 + (sqrt(19) + 0 - sqrt(19))))**2.
4500
Simplify (((sqrt(273) - (sqrt(273) - -5*sqrt(273)*1))/(sqrt(63)*3 + sqrt(7)))/((sqrt(180)/sqrt(6))/sqrt(10) + sqrt(432)))**2.
1/52
Simplify -2*(-2 + (sqrt(1331) - (-2 + sqrt(1331))) + (-1*sqrt(66) + sqrt(66))/sqrt(6) + -4) + -5.
3
Simplify (-1*sqrt(187)*-4 - (sqrt(187) - (1*sqrt(187)*-2 + sqrt(187))))/(sqrt(396)*-3 + sqrt(396) - sqrt(396) - (sqrt(88)*3)/sqrt(8))*-4.
8*sqrt(17)/21
Simplify (-5 + -2*sqrt(22)/sqrt(2) + sqrt(121)/(sqrt(11) + sqrt(33)/sqrt(3)))**2 + 3 + (sqrt(88)/(sqrt(288) - -2*sqrt(288)))**2 + -1.
15*sqrt(11) + 8389/162
Simplify (-4 + -3 + 2 + -4*sqrt(448) + sqrt(448) + 3 + 1)**2 + 5.
48*sqrt(7) + 4038
Simplify (1*sqrt(304)*3)**2 + ((sqrt(114)/(1*sqrt(6)))**2 - ((1*sqrt(76))/sqrt(4))**2) + sqrt(475)*-2 + -5 + sqrt(475) + sqrt(475) + 3 + -3.
2731
Simplify (sqrt(486) - (sqrt(486)*1 + sqrt(486)) - (sqrt(384) + sqrt(384)*-3 + sqrt(384) + sqrt(384) + sqrt(384)))/(2*sqrt(320)/(-2*sqrt(10))).
17*sqrt(3)/4
Simplify (sqrt(4400) - (sqrt(4400) - (1*sqrt(4400)*-3 - sqrt(4400))) - -5*1*sqrt(4400))/(-2*sqrt(256)*1*4).
-5*sqrt(11)/32
Simplify 5*(-4*sqrt(325)*-3)**2 + -4*2*sqrt(117)*1.
-24*sqrt(13) + 234000
Simplify (-4*6*-3*(sqrt(275) + (sqrt(275) - -4*sqrt(275)*-6) + -1)*-1)**2 + 1.
1140480*sqrt(11) + 689995585
Simplify ((4*3*sqrt(112)*4 - (sqrt(28) + -4 - 5*sqrt(42)/sqrt(6))) + -3)**2.
390*sqrt(7) + 266176
Simplify ((((-1 + sqrt(1700))*5 - sqrt(1700))*-2 + -5)**2*-6 + 2)*-1.
-4800*sqrt(17) + 652948
Simplify ((((sqrt(102)/sqrt(2))/sqrt(3) - (sqrt(2448)*1 + sqrt(17))) + 1*sqrt(68) + 1 + 4)*-5*-1)**2.
-2500*sqrt(17) + 43125
Simplify (4*(sqrt(171) - (0 + sqrt(171))*3))**2 + -4 - -6*(sqrt(171) + 2*(sqrt(171)*1 + sqrt(171))**2 + sqrt(171) + 4).
36*sqrt(19) + 19172
Simplify -1*((sqrt(68)/(3*sqrt(256) - sqrt(4)) - ((1 + sqrt(153))**2 + sqrt(153) + -1)) + -1).
206*sqrt(17)/23 + 154
Simplify (-3*sqrt(187)*-5 + sqrt(187)*1*-4)/(((sqrt(121)*-2 + sqrt(121))/sqrt(11) - sqrt(275)*3)*5).
-11*sqrt(17)/80
Simplify -1 + (sqrt(32)/sqrt(64) - (sqrt(128) - (sqrt(128) - (sqrt(128)*-1 + sqrt(128)))))/(2*(sqrt(4) + sqrt(144)*-3)).
-1 - sqrt(2)/136
Simplify (0 + 3*sqrt(2057) + -5)*-4 + 0 + (-5 + (0 + sqrt(2057))*4)**2.
-572*sqrt(17) + 32957
Simplify ((sqrt(76)*1*5 + sqrt(76) + (sqrt(76) - 1*sqrt(76)*2 - sqrt(76)) + sqrt(76))*1)/(sqrt(8)/(sqrt(2) - sqrt(2)*2) - sqrt(48)/(sqrt(12) + sqrt(300))).
-30*sqrt(19)/7
Simplify -1*(sqrt(190)/(sqrt(10) + (2*sqrt(90))/sqrt(9)) + sqrt(171)*2 + 5)*3*5.
-95*sqrt(19) - 75
Simplify (2*sqrt(200))**2 + 4 - -1*sqrt(200)*-2 - (sqrt(16)/sqrt(2) + 1 - (sqrt(800) + sqrt(800) + sqrt(800) + -3 + sqrt(800)))**2.
-11380 + 604*sqrt(2)
Simplify ((1*sqrt(168) - sqrt(168))/sqrt(12))/(sqrt(600)/sqrt(12)) + (sqrt(1008) + ((sqrt(1008) - (-3 + sqrt(1008)))**2 - sqrt(1008)) - sqrt(63)*5).
-15*sqrt(7) + 9
Simplify (3*(((6*2*sqrt(85) - sqrt(85)) + sqrt(85))/(sqrt(55)/(sqrt(11)*-1)))**2*3 + -3)*4 + -1.
88115
Simplify ((4*((sqrt(425) - (-1 + 1 + sqrt(425)) - 6*(sqrt(425) + 1)) + -5))**2 + -3)*4.
42240*sqrt(17) + 986932
Simplify (-5*(3 + 0 + (1 + 2*sqrt(1573) - sqrt(1573)) + 2*sqrt(1573) + 0 + -1))**2.
4950*sqrt(13) + 354150
Simplify (4*(-6*(sqrt(95) - -1*sqrt(95)) + sqrt(95))*-3)/(6*(2*sqrt(405) - sqrt(405)) + sqrt(405) + 5*(sqrt(405) + sqrt(405)*-1)).
44*sqrt(19)/21
Simplify ((-5 + (sqrt(768) + -2 - sqrt(768)))*-6)**2 - 1*(sqrt(18)/(sqrt(6)*-3) + sqrt(3) - 3*sqrt(300)).
88*sqrt(3)/3 + 1764
Simplify (2*(sqrt(187) + (5*sqrt(187)*-1 - sqrt(187)) + sqrt(187))*-1)/((sqrt(66)/sqrt(12))/(sqrt(32)*1)).
64*sqrt(17)
Simplify 2 + ((-1*(sqrt(119) + (sqrt(119) + (sqrt(119) - sqrt(119)*1) - sqrt(119)))*2*-6)/((sqrt(504) + (-4*sqrt(504)*2 - sqrt(504)))/sqrt(8)))**2.
25/4
Simplify 3 + (3 + (5 + (sqrt(448) - 5*sqrt(448)*-1) + 0)**2)*5.
2400*sqrt(7) + 80783
Simplify 4*(0 + sqrt(2299)) + sqrt(2299) + 1 + 2 - ((sqrt(19) - (sqrt(684) + (sqrt(684) + sqrt(684) + 0 - sqrt(684))**2)) + (-1*sqrt(1900))**2).
-1213 + 60*sqrt(19)
Simplify (-2*(sqrt(3645) + (sqrt(3645) - (-3 + sqrt(3645) + sqrt(3645) + -1)) + 3*sqrt(3645)*-2)*6*-4)**2.
-2985984*sqrt(5) + 302367744
Simplify (-4*4*(sqrt(228) + -1*sqrt(228) + sqrt(228)))/(-5*(sqrt(108) - sqrt(12))*4).
2*sqrt(19)/5
Simplify (-6*(-2 + sqrt(13)*-1 + sqrt(1872) + -1))**2 + sqrt(6292) + sqrt(52) + -4*sqrt(117).
-2364*sqrt(13) + 56952
Simplify (6*-2*-2*sqrt(133)*4)/(sqrt(448) - (sqrt(448) + sqrt(448)*1)*-6 - -6*2*sqrt(448)).
12*sqrt(19)/25
Simplify 1*((sqrt(192)*-2*1 - (sqrt(192) + 3 + sqrt(192) + 2))**2 + 3)*3.
960*sqrt(3) + 9300
Simplify 2*(5 + sqrt(304)*-2) + 2*(5*(sqrt(171) - -3*sqrt(171)))**2.
-16*sqrt(19) + 136810
Simplify (2 + (2*sqrt(320) + 3)*-4)**2 + (sqrt(245) + -3*sqrt(245)*-3 - (sqrt(245) - (sqrt(245) + -2))**2*-2).
1350*sqrt(5) + 20588
Simplify (0 + (3 + (sqrt(2) - (-1 + sqrt(2))) - sqrt(10)/(sqrt(25)/sqrt(5))) + 1 + sqrt(8)/sqrt(4)*4 + 4)**2.
54*sqrt(2) + 99
Simplify (3*(sqrt(84) - sqrt(84)*2))/(sqrt(12) - (sqrt(1452)*2 + sqrt(1452))) + 2 + (sqrt(49) + 1*sqrt(49)*-5)/(sqrt(7) - (sqrt(49) + sqrt(784))/sqrt(7)).
2 + 35*sqrt(7)/32
Simplify (-1 + -6*(5 + (0 + sqrt(1539) + 2 - -1*-1*sqrt(1539)) + -5))**2.
169
Simplify (-5*4*sqrt(448) + -2 + sqrt(448)*-3 - (-5 + -2 + sqrt(448) - (sqrt(448) + sqrt(448)*3)*6))**2 + -3.
22
Simplify (-1 + ((sqrt(1728) - (3 + sqrt(1728)))**2 - sqrt(1728)) + 4 - ((-4 + 4*sqrt(1728))*-1)**2)*6.
-165912 + 4464*sqrt(3)
Simplify (((2 + sqrt(13))*-4)**2 + sqrt(416)/sqrt(2) - 5*3*sqrt(208))*-1.
-272 - 8*sqrt(13)
Simplify 6*(-6*(3 + -4*(-1 + sqrt(252))*1*-4*3))**2.
-5598720*sqrt(7) + 125848728
Simplify (-4 + sqrt(275)*-1 - -2*sqrt(275)*1)**2 - (-1 + sqrt(275) + -2 + (-2*sqrt(275) + 4)**2).
-822 + 35*sqrt(11)
Simplify 0 + 3*(-4 + (-5 + 5*2*sqrt(11) - (sqrt(99) - (1 + (sqrt(99) - (sqrt(99) + 0)))))).
-24 + 21*sqrt(11)
Simplify 4 + ((-4*sqrt(1701))/sqrt(3))**2 + ((sqrt(3087) + sqrt(3087)*3)/sqrt(9))**2.
14564
Simplify 1 + ((-2*sqrt(76)/sqrt(2) + (sqrt(1862) + -2*sqrt(1862) - sqrt(1862)))/(sqrt(14)/sqrt(252) - (sqrt(864)/sqrt(12) + sqrt(2))))**2.
176785/1681
Simplify -1*((5*(1 + sqrt(147)))**2 + sqrt(147) - (2*(sqrt(147) + -3))**2)*4.
-12304 - 2100*sqrt(3)
Simplify ((6*-2*sqrt(147)*2 + (sqrt(147) - (-2*sqrt(147) + -4) - -3*sqrt(147)*1))**2 + -5)*6.
-6048*sqrt(3) + 285834
Simplify (3*(sqrt(320) + -3) + 5)**2 - 1*(sqrt(80)/sqrt(4) + 2)**2.
-200*sqrt(5) + 2872
Simplify sqrt(65)/(sqrt(45)*-1)*-1 - (sqrt(13) + ((sqrt(13) - sqrt(13)*-1)**2 - sqrt(13)) + 4 + sqrt(156)/(sqrt(96)/sqrt(8))).
-56 - 2*sqrt(13)/3
Simplify (sqrt(336)/(sqrt(35)/sqrt(5))*-2)/(-5*(sqrt(96) - 2*sqrt(96)*2)).
-sqrt(2)/15
Simplify (-4*-3*1*(1 + sqrt(320))*-1*4*5)**2.
921600*sqrt(5) + 18489600
Simplify ((2*sqrt(252))/sqrt(12) + sqrt(21))/(sqrt(363)*2) + ((2*sqrt(175) + 1)*-3 + -5)**2.
10563*sqrt(7)/22 + 6364
Simplify (5*((sqrt(1872) - (sqrt(1872) + (-1 + sqrt(1872) + sqrt(1872))*2)) + 2 + -6*(4*sqrt(1872) + -5)))**2.
-571200*sqrt(13) + 36720100
Simplify (0 + ((sqrt(8)/sqrt(2) - sqrt(4))*-3)/(sqrt(8)*-3) + (sqrt(12)/sqrt(3)*-5 + sqrt(4))/(sqrt(242)*3))**2.
32/1089
Simplify ((5*sqrt(171)*2 + sqrt(171) + -2*sqrt(171)*6)/(sqrt(81)/(-2*sqrt(9))*6))**2 + 1.
28/9
Simplify -2 + -4 + sqrt(468) + (sqrt(1053) - -2*sqrt(1053))**2 - ((sqrt(13) + (sqrt(1300) + 0)**2 - sqrt(13))*6 + (-5*2*sqrt(78))/sqrt(6)).
16*sqrt(13) + 1671
Simplify 4*(sqrt(2448) + 1 + sqrt(68)/(sqrt(20)/sqrt(5))) - (sqrt(272) + (sqrt(27 |
Q:
Does a list_iterator garbage collect its consumed values?
Suppose I have li = iter([1,2,3,4]).
Will the garbage collector drop the references to inaccessible element when I do next(li).
And what about deque, will elements in di = iter(deque([1,2,3,4])) be collectable once consumed.
If not, does a native data structure in Python implement such behaviour.
A:
https://github.com/python/cpython/blob/bb86bf4c4eaa30b1f5192dab9f389ce0bb61114d/Objects/iterobject.c
A reference to the list is held until you iterate to the end of the sequence. You can see this in the iternext function.
The deque is here and has no special iterator.
https://github.com/python/cpython/blob/master/Modules/_collectionsmodule.c
You can create your own class and define __iter__ and __next__ to do what you want. Something like this
class CList(list):
def __init__(self, lst):
self.lst = lst
def __iter__(self):
return self
def __next__(self):
if len(self.lst) == 0:
raise StopIteration
item = self.lst[0]
del self.lst[0]
return item
def __len__(self):
return len(self.lst)
l = CList([1,2,3,4])
for item in l:
print( len(l) )
|
The lush green hills, limestone headlands, towering trees and giant boulders have attracted a host of artists who are inspired by the stunning nature.
Walk among giant karri trees at nearby Tree Top Walk, indulge in top drops from rustic wineries or treat yourself to a tasting tour of the bramble, blueberry and herb farms or the cheese and toffee factories.
In town visit the historic fire station, old butter factory, Denmark’s first school, and the popular drinking hole the Denmark Hotel.
Explore the town’s maze, alpaca stud, animal farm and sandalwood factory or take a whale-watching tour.
Water-lovers can hire canoes, motorboats, paddleboats or aqua bikes and mess around on the river.
Throw in a line for herring, salmon and bream at Lights Beach or just kick back and watch the waves crashing over the rocks at Wilson Head and Lions Lookout.
Wherever you stay, end your day with a glass of local red under a clear night sky scattered with thousands of sparkling stars.
Denmark and the Great Southern Region
The great Southern and Albany region is fast becoming one of Australia's leading wine and food regions.
How to get to Denmark
Travelling by bus/train
Daily Transwa bus services are available between Denmark and Perth and there are alternative routes which you may
choose from, some of which include transfers to the Australind rail service between Bunbury and Perth.
We understand what you are going through, when you are looking for the best deals and the best tours. Should I go on this one or that one should I stay at this one or that one?. Questions,questions you want to know, how many people on the tour?. How old are the people?. What type of accommodation?. Do they do nice food?. Is there a lot of driving?. What type of vehicle do they use? And many more |
---
abstract: 'We numerically investigate the self-diffusion coefficient and correlation length of the rigid clusters (i.e., the typical size of the collective motions) in sheared soft athermal particles. Here we find that the rheological flow curves on the self-diffusion coefficient are collapsed by the proximity to the jamming transition density. This feature is in common with the well-established critical scaling of flow curves on shear stress or viscosity. We furthermore reveal that the divergence of the correlation length governs the critical behavior of the diffusion coefficient, where the diffusion coefficient is proportional to the correlation length and the strain rate for a wide range of the strain rate and packing fraction across the jamming transition density.'
author:
- Kuniyasu Saitoh
- Takeshi Kawasaki
bibliography:
- 'diffusion\_overdamp.bib'
title: Critical scaling of diffusion coefficients and size of rigid clusters of soft athermal particles under shear
---
Introduction
============
*Transport properties* of soft athermal particles, e.g. emulsions, foams, colloidal suspensions, and granular materials, are important in science and engineering technology [@bird]. In many manufacturing processes, these particles are forced to flow (through pipes, containers, etc.) and the transportation of “flowing particles" is of central importance for industrial applications [@larson]. Therefore, there is a need to understand how the transport properties are affected by rheological flow properties of soft athermal particles.
Recently, the rheological flow properties of soft athermal particles have been extensively studied and it has been revealed that the rheology of such particulate systems depends not only on strain rate but also on packing fraction of the particles [@rheol0; @pdf1; @rheol1; @rheol2; @rheol3; @rheol4; @rheol5; @rheol6; @rheol7; @rheol8; @rheol9; @rheol10; @rheol11; @rheol12; @rheol13]. If the packing fraction $\phi$ is lower than the so-called jamming transition density $\phi_J$, steady state stress is described by either Newtonian [@rheol0; @pdf1] or Bagnoldian rheology [@rheol1; @rheol2; @rheol3; @rheol4; @rheol5] (depending on whether particle inertia is significant or not). If the packing fraction exceeds the jamming point ($\phi>\phi_J$), one observes yield stress at vanishing strain rate [@review-rheol0]. These two trends are solely determined by the proximity to the jamming transition $|\Delta\phi|\equiv|\phi-\phi_J|$ [@rheol0] and rheological flow curves of many types of soft athermal particles have been explained by the critical scaling near jamming [@pdf1; @rheol1; @rheol2; @rheol3; @rheol4; @rheol5; @rheol6; @rheol7; @rheol8; @rheol9; @rheol10; @rheol11].
On the other hand, the mass transport or *self-diffusion* of soft athermal particles seems to be controversial. As is the rheological flow behavior on shear stress or viscosity, the diffusivity of the particles under shear is also dependent on both the strain rate and packing fraction. Its dependence on the shear rate $\dot{\gamma}$ is weakened with the increase of $\dot{\gamma}$,i.e. the diffusivity $D$ exhibits a crossover from a linear scaling $D\sim\dot{\gamma}$ to the sub-linear scaling $D\sim\dot{\gamma}^q$ at a characteristic shear rate $\dot{\gamma}_c$, where the exponent is smaller than unity, $q<1$ [@diff_shear_md7; @diff_shear_md6; @dh_md2; @diff_shear_exp2; @diff_shear_exp1; @diff_shear_md2; @diff_shear_md3; @diff_shear_md4]. For example, in molecular dynamics (MD) simulations of Durian’s bubble model in two dimensions [@diff_shear_md7; @diff_shear_md6] and frictionless granular particles in three dimensions [@dh_md2], the diffusivity varies from $D\sim\dot{\gamma}$ ($\dot{\gamma}<\dot{\gamma}_c$) to $D\sim\dot{\gamma}^{0.8}$ ($\dot{\gamma}>\dot{\gamma}_c$). These results agree with laboratory experiments of colloidal glasses under shear [@diff_shear_exp2; @diff_shear_exp1] and also suggest that the diffusivity does not depend on spatial dimensions. However, another crossover, i.e. from $D\sim\dot{\gamma}$ to $D\sim\dot{\gamma}^{1/2}$, was suggested by the studies of amorphous solids (though the scaling $D\sim\dot{\gamma}^{1/2}$ is the asymptotic behavior in rapid flows $\dot{\gamma}\gg\dot{\gamma}_c$) [@diff_shear_md2; @diff_shear_md3; @diff_shear_md4]. In addition, it was found in MD simulations of soft athermal disks that in a sufficiently small flow rate range, the diffusivity changes from $D\sim\dot{\gamma}$ ($\phi<\phi_J$) to $\dot{\gamma}^{0.78}$ ($\phi\simeq\phi_J$) [@diff_shear_md0], implying that the crossover shear rate $\dot{\gamma}_c$ vanishes as the system approaches jamming from below $\phi\rightarrow\phi_J$.
Note that the self-diffusion of soft athermal particles shows a clear difference from the diffusion in glass; *no plateau* is observed in (transverse) mean square displacements (MSDs) [@diff_shear_md0; @diff_shear_md2; @diff_shear_md3; @diff_shear_md4; @diff_shear_md7; @dh_md2]. The absence of sub-diffusion can be also seen in quasi-static simulations ($\dot{\gamma}\rightarrow 0$) of soft athermal disks [@dh_qs1] and MD simulations of granular materials sheared under constant pressure [@diff_shear_md1].
Because the self-diffusion can be associated with collective motions of soft athermal particles, researchers have analyzed spatial correlations of velocity fluctuations [@rheol0] or non-affine displacements [@nafsc2] of the particles under shear. Characteristic sizes of collectively moving regions, i.e. *rigid clusters*, are then extracted as functions of $\dot{\gamma}$ and $\phi$, however, there is a lack of consensus on the scaling of the sizes. For example, the size of rigid clusters $\xi$ diverges as the shear rate goes to zero $\dot{\gamma}\rightarrow 0$ so that the power-law scaling $\xi\sim\dot{\gamma}^{-s}$ was suggested, where the exponent varies from $s=0.23$ to $0.5$ depending on numerical models and flow conditions [@dh_md2; @diff_shear_md1]. The dependence of the rigid cluster size on packing fraction is also controversial. If the system is below jamming, critical scaling of the size is given by $\xi\sim|\Delta\phi|^{-w}$, where different exponents (in the range between $0.5\le w\le 1.0$) have been reported by various simulations [@rheol0; @nafsc2; @rheol16]. In contrast, if the system is above jamming, the size becomes insensitive to the packing fraction (or exceeds the system size $L$) as only $L$ is the relevant length scale, i.e. $\xi\sim L$, in a quasi-static regime [@diff_shear_md2; @diff_shear_md3; @diff_shear_md4; @pdf1]. From a scaling argument, a relation between the diffusivity and size of rigid clusters was proposed as $$D\sim d_0\xi\dot{\gamma}~,
\label{eq:rigid_cluster}$$ where $d_0$ is the particle diameter [@diff_shear_md1]. It seems that previous results above jamming,i.e. as $\dot{\gamma}$ is increased, $D/\dot{\gamma}$ changes from constant to $\dot{\gamma}^{-1/2}$ and corresponding $\xi$ undergoes from $L$ to $\dot{\gamma}^{-1/2}$, support this argument [@diff_shear_md2; @diff_shear_md3; @diff_shear_md4]. However, the link between the diffusivity and rigid clusters *below jamming* is still not clear.
In this paper, we study the self-diffusion of soft athermal particles and the size of rigid clusters. The particles are driven by simple shear flows and their fluctuating motions around a mean velocity field are numerically calculated. From numerical results, we extract the diffusivity of the particles and explain its dependence on the control parameters (i.e. $\dot{\gamma}$ and $\phi$). We investigate wide ranges of the control parameters in order to unify our understanding of the diffusivity in both fast and slow flows, and both below and above jamming. Our main result is critical scaling of the diffusivity $D$, which parallels the critical scaling of the size of rigid clusters $\xi$. We find that the linear relation between the diffusivity and size \[Eq. (\[eq:rigid\_cluster\])\] holds over the whole ranges of $\dot{\gamma}$ and $\phi$ if finite-size effects are not important. In the following, we show our numerical method in Sec. \[sec:method\] and numerical results in Sec. \[sec:result\]. In Sec. \[sec:disc\], we discuss and conclude our results and outlook for future.
Methods {#sec:method}
=======
We perform MD simulations of two-dimensional disks. In order to avoid crystallization of the system, we randomly distribute an equal number of small and large disks (with diameters $d_S$ and $d_L=1.4d_S$) in a $L\times L$ square periodic box [@gn1]. The total number of disks is $N=8192$ and the packing fraction of the disks $\phi$ is controlled around the jamming transition density $\phi_J\simeq0.8433$ [@rheol0]. We introduce an elastic force between the disks, $i$ and $j$, in contact as $\bm{f}_{ij}^\mathrm{e}=k\delta_{ij}\bm{n}_{ij}$, where $k$ is the stiffness and $\bm{n}_{ij}\equiv\bm{r}_{ij}/|\bm{r}_{ij}|$ with the relative position $\bm{r}_{ij}\equiv\bm{r}_i-\bm{r}_j$ is the normal unit vector. The elastic force is linear in the overlap $\delta_{ij}\equiv R_i+R_j-|\bm{r}_{ij}|>0$, where $R_i$ ($R_j$) is the radius of the disk $i$ ($j$). We also add a damping force to every disk as $\bm{f}_i^\mathrm{d}=-\eta\left\{\bm{v}_i-\bm{u}(\bm{r}_i)\right\}$, where $\eta$, $\bm{v}_i$, and $\bm{u}(\bm{r})$ are the damping coefficient, velocity of the disk $i$, and external flow field, respectively. Note that the stiffness and damping coefficient determine a time scale as $t_0\equiv\eta/k$.
To simulate simple shear flows of the system, we impose the external flow field $\bm{u}(\bm{r})=(\dot{\gamma}y,0)$ under the Lees-Edwards boundary condition [@lees], where $\dot{\gamma}$ is the shear rate. Then, we describe motions of the disks by overdamped dynamics [@rheol0; @rheol7; @pdf1], i.e. $\sum_{j\neq i}\bm{f}_{ij}^\mathrm{e}+\bm{f}_i^\mathrm{d}=\bm{0}$, where we numerically integrate the disk velocity $\bm{v}_i=\bm{u}(\bm{r}_i)+\eta^{-1}\sum_{j\neq i}\bm{f}_{ij}^\mathrm{el}$ with a time increment $\Delta t = 0.1t_0$. In the following, we analyze the data in a steady state, where shear strain applied to the system is larger than unity. In addition, we scale every time and length by $t_0$ and the mean disk diameter $d_0\equiv(d_S+d_L)/2$, respectively.
Results {#sec:result}
=======
In this section, we show our numerical results of the self-diffusion of soft athermal particles (Sec. \[sub:diff\]). We also extract rigid clusters from numerical data in order to relate their sizes to the diffusivity (Sec. \[sub:rigid\]). We explain additional data of the rheology and non-affine displacements in Appendixes.
Diffusion {#sub:diff}
---------
We analyze the self-diffusion of soft athermal particles by the transverse component of *mean squared displacement* (MSD) [@diff_shear_md0; @diff_shear_md1; @diff_shear_md3; @diff_shear_md4], $$\Delta(\tau)^2 = \left\langle\frac{1}{N}\sum_{i=1}^N\Delta y_i(\tau)^2\right\rangle~.
\label{eq:MSD}$$ Here, $\Delta y_i(\tau)$ is the $y$-component of particle displacement and the ensemble average $\langle\dots\rangle$ is taken over different choices of the initial time (see Appendix \[sec:nona\] for the detail) [^1]. Figure \[fig:msdy\] displays the MSDs \[Eq. (\[eq:MSD\])\] with different values of (a) $\phi$ and (b) $\dot{\gamma}$. The horizontal axes are the time interval scaled by the shear rate, $\gamma\equiv\dot{\gamma}\tau$, i.e. the shear strain applied to the system for the duration $\tau$. As can be seen, every MSD exhibits a crossover to the normal diffusive behavior, $\Delta(\tau)^2\sim\dot{\gamma}\tau$ (dashed lines), around a crossover strain $\gamma=\gamma_c\simeq 1$ regardless of $\phi$ and $\dot{\gamma}$. The MSDs below jamming ($\phi<\phi_J$) monotonously increase with the increase of packing fraction, while they (almost) stop increasing once the packing fraction exceeds the jamming point ($\phi>\phi_J$) \[Fig. \[fig:msdy\](a)\]. The dependence of MSDs on the shear rate is monotonous; their heights decrease with the increase of $\dot{\gamma}$ \[Fig. \[fig:msdy\](b)\]. These trends well correspond with the fact that the non-affine displacements are amplified in slow flows of dense systems, i.e. $\dot{\gamma}t_0\ll 1$ and $\phi>\phi_J$ [@saitoh11]. In addition, different from thermal systems under shear [@rheol10; @nafsc5; @th-dh_md1], any plateaus are not observed in the MSDs. Therefore, neither “caging" nor “sub-diffusion" of the particles exists in our sheared athermal systems [@dh_md2; @dh_qs1; @dh_md1].
![ The transverse MSDs $\Delta^2$ \[Eq. (\[eq:MSD\])\] as functions of the shear strain $\gamma\equiv\dot{\gamma}\tau$. (a) The packing fraction $\phi$ increases as indicated by the arrow and listed in the legend, where the shear rate is $\dot{\gamma}=10^{-6}t_0^{-1}$. (b) The shear rate $\dot{\gamma}$ increases as indicated by the arrow and listed in the legend, where the packing fraction is $\phi=0.84$. \[fig:msdy\]](msdy.png){width="\columnwidth"}
To quantify the normal diffusion of the disks, we introduce the diffusivity (or diffusion coefficient) as [^2] $$D=\lim_{\tau\rightarrow\infty}\frac{\Delta(\tau)^2}{2\tau}~.
\label{eq:D}$$ Figure \[fig:diff\](a) shows double logarithmic plots of the diffusivity \[Eq. (\[eq:D\])\] over the shear rate $D/\dot{\gamma}$, where symbols represent the packing fraction $\phi$ (as listed in the legend). The diffusivity over the shear rate increases with $\phi$. If the system is above jamming $\phi>\phi_J$, it is a monotonously decreasing function of $\dot{\gamma}$. On the other hand, if the system is below jamming $\phi<\phi_J$, it exhibits a crossover from plateau to a monotonous decrease around a characteristic shear rate, e.g. $\dot{\gamma}_0t_0\simeq 10^{-3}$ for $\phi=0.80$ [@diff_shear_md3; @diff_shear_md4].
In Appendix \[sec:rheo\], we have demonstrated *scaling collapses* of rheological flow curves [@rheol0]. Here, we also demonstrate scaling collapses of the diffusivity. As shown in Fig. \[fig:diff\](b), all the data are nicely collapsed [^3] by the scaling exponents, $\lambda=1.0$ and $\nu=4.0$. If the shear rate is smaller than a characteristic value as $\dot{\gamma}/|\Delta\phi|^\nu \lesssim 10^4$,i.e. $\dot{\gamma}<\dot{\gamma}_c\simeq 10^4|\Delta\phi|^\nu$, the data below jamming ($\phi<\phi_J$) are constant. However, the data above jamming ($\phi>\phi_J$) show the power-law decay, where the slope is approximately given by $-0.3$ (solid line). Therefore, we describe the diffusivity in a *quasi-static regime* ($\dot{\gamma}<\dot{\gamma}_c$) as $|\Delta\phi|^\lambda D/\dot{\gamma}\sim\mathcal{G}_\pm(\dot{\gamma}/|\Delta\phi|^\nu)$, where the scaling functions are given by $\mathcal{G}_-(x)\sim\mathrm{const.}$ for $\phi<\phi_J$ and $\mathcal{G}_+(x)\sim x^{-0.3}$ otherwise. On the other hand, if $\dot{\gamma}>\dot{\gamma}_c$, all the data follow a single power law (dotted line). This means that the scaling functions are given by $\mathcal{G}_\pm(x) \sim x^{-z}$ in a *plastic flow regime* ($\dot{\gamma}>\dot{\gamma}_c$), where the diffusivity scales as $D\sim\dot{\gamma}|\Delta\phi|^{-\lambda}\mathcal{G}_\pm(\dot{\gamma}/|\Delta\phi|^\nu)\sim\dot{\gamma}^{1-z}|\Delta\phi|^{\nu z-\lambda}$. Because this scaling should be independent of whether the system is below or above jamming,i.e. independent of $|\Delta\phi|$, the power-law exponent is given by $z=\lambda/\nu=1/4$ as confirmed in Fig. \[fig:diff\](b).
![ (a) The diffusivity over the shear rate, $D/\dot{\gamma}$, as a function of $\dot{\gamma}$, where $\phi$ increases as indicated by the arrow and listed in the legend. (b) *Scaling collapses* of the diffusivity, where $\Delta\phi\equiv\phi-\phi_J$. The critical exponents are given by $\lambda=1.0$ and $\nu=4.0$, where slopes of the dotted and solid lines are $-\lambda/\nu$ and $-0.3$, respectively. \[fig:diff\]](diff_coeff.png){width="\columnwidth"}
In summary, the diffusivity of the disks scales as $$D \sim
\begin{cases}
|\Delta\phi|^{-\lambda}\dot{\gamma} & (\phi<\phi_J) \\
|\Delta\phi|^{0.3\nu-\lambda}\dot{\gamma}^{0.7} & (\phi>\phi_J)
\end{cases} \label{eq:D1}$$ in the quasi-static regime ($\dot{\gamma}<\dot{\gamma}_c$) and $$D \sim \dot{\gamma}^{1-\lambda/\nu}
\label{eq:D2}$$ in the plastic flow regime ($\dot{\gamma}>\dot{\gamma}_c$), where the critical exponents are estimated as $\lambda=1.0$ and $\nu=4.0$. From Eqs. (\[eq:D1\]) and (\[eq:D2\]), we find that the diffusivity below jamming ($\phi<\phi_J$) is linear in the shear rate $D\sim\dot{\gamma}$ in slow flows, whereas its dependence on the shear rate is algebraic $D\sim\dot{\gamma}^{3/4}$ in fast flows. A similar trend has been found in molecular dynamics studies of simple shear flows below jamming [@diff_shear_md0; @dh_md2; @dh_md1] and experiments of colloidal glasses under shear [@diff_shear_exp1]. In addition, the proportionality for the diffusivity below jamming diverges at the transition as $|\Delta\phi|^{-1}$ \[Eq. (\[eq:D1\])\], which we will relate to a length scale diverging as the system approaches jamming from below (Sec. \[sub:rigid\]). The diffusivity above jamming ($\phi>\phi_J$) implies the crossover from $D\sim|\Delta\phi|^{0.2}\dot{\gamma}^{0.7}$ to $\dot{\gamma}^{3/4}=\dot{\gamma}^{0.75}$, which reasonably agrees with the prior work on soft athermal disks under shear [@diff_shear_md0]. Interestingly, the crossover shear rate vanishes at the transition as $\dot{\gamma}_c\sim|\Delta\phi|^{4.0}$, which is reminiscent of the fact that the crossover from the Newtonian or yield stress to the plastic flow vanishes at the onset of jamming (see Appendix \[sec:rheo\]).
Rigid clusters {#sub:rigid}
--------------
We now relate the diffusivity to rigid clusters of soft athermal particles under shear. The rigid clusters represent collective motions of the particles which tend to move in the same direction [@saitoh11]. According to the literature of jamming [@rheol0; @pdf1; @corl3], we quantify the collective motions by a spatial correlation function $C(x)=\langle v_y(x_i,y_i)v_y(x_i+x,y_i)\rangle$, where $v_y(x,y)$ is the transverse velocity field and the ensemble average $\langle\dots\rangle$ is taken over disk positions and time (in a steady state). Figure \[fig:corl\] shows the normalized correlation function $C(x)/C(0)$, where the horizontal axis ($x$-axis) is scaled by the mean disk diameter $d_0$. As can be seen, the correlation function exhibits a well-defined minimum at a characteristic length scale $x=\xi$ (as indicated by the vertical arrow for the case of $\phi=0.84$ in Fig. \[fig:corl\](a)). Because the minimum is negative $C(\xi)<0$, the transverse velocities are most “anti-correlated" at $x=\xi$. Therefore, if we assume that the rigid clusters are circular, their mean diameter is comparable in size with $\xi$ [@diff_shear_md1]. The length scale $\xi$ increases with the increase of $\phi$ \[Fig. \[fig:corl\](a)\] but decreases with the increase of $\dot{\gamma}$ \[Fig. \[fig:corl\](b)\]. These results are consistent with the fact that the collective behavior is most enhanced in slow flows of dense systems [@saitoh11].
![ Normalized spatial correlation functions of the transverse velocities $C(x)/C(0)$, where symbols are as in Fig. \[fig:msdy\]. (a) The packing fraction $\phi$ increases as indicated by the arrow and listed in the legend, where $\dot{\gamma}=10^{-6}t_0^{-1}$. The minimum of the data for $\phi=0.84$ is indicated by the vertical (gray) arrow. (b) The shear rate $\dot{\gamma}$ increases as indicated by the arrow and listed in the legend, where $\phi=0.84$. \[fig:corl\]](corl.png){width="\columnwidth"}
As reported in Ref. [@rheol0], we examine critical scaling of the length scale. Figure \[fig:xi\](a) displays scaling collapses of the data of $\xi$, where the critical exponents, $\lambda=1.0$ and $\nu=4.0$, are the same with those in Fig. \[fig:diff\](b). If the shear rate is smaller than the characteristic value, i.e. $\dot{\gamma}<\dot{\gamma}_c\simeq 10^4|\Delta\phi|^\nu$, the data below jamming ($\phi<\phi_J$) exhibit plateau, whereas those above jamming ($\phi>\phi_J$) diverge with the *decrease* of shear rate. Therefore, if we assume that the data above jamming follow the power-law with the slope $-0.4$ (solid line), the length scale in the quasi-static regime ($\dot{\gamma}<\dot{\gamma}_c$) can be described as $|\Delta\phi|^\lambda\xi\sim\mathcal{J}_\pm(\dot{\gamma}/|\Delta\phi|^\nu)$ with the scaling functions, $\mathcal{J}_-(x)\sim\mathrm{const.}$ for $\phi<\phi_J$ and $\mathcal{J}_+(x)\sim x^{-0.4}$ otherwise. Note that, however, the length scale is limited to the system size $L$ \[shaded region in Fig. \[fig:xi\](a)\] and should be scaled as $\xi\sim L$ above jamming in the quasi-static limit $\dot{\gamma}\rightarrow 0$ [@pdf1; @diff_shear_md3; @nafsc2]. This means that the system size is the only relevant length scale [@nafsc0] and thus we conclude $\xi\sim L$ in slow flows of jammed systems. On the other hand, if $\dot{\gamma}>\dot{\gamma}_c$, all the data are collapsed onto a single power law \[dotted line in Fig. \[fig:xi\](a)\]. Therefore, the scaling functions are given by $\mathcal{J}_\pm(x)\sim x^{-z}$ such that the length scale scales as $\xi\sim\dot{\gamma}^{-z}|\Delta\phi|^{\nu z-\lambda}$. Because this relation is independent of $|\Delta\phi|$, the exponent should be $z=\lambda/\nu$ as confirmed in Fig. \[fig:xi\](a).
![ (a) Scaling collapses of the length scale $\xi$, where $\Delta\phi\equiv\phi-\phi_J$ and $\phi$ increases as listed in the legend. The critical exponents are $\lambda=1.0$ and $\nu=4.0$ as in Fig. \[fig:diff\](b), where slopes of the dotted and solid lines are given by $-\lambda/\nu$ and $-0.4$, respectively. The shaded region exceeds the system size $|\Delta\phi|^\lambda L/2$ for the case of $\phi=0.90$. (b) Scatter plots of the diffusivity over the shear rate $D/\dot{\gamma}$ and the length scale $\xi$, where $\phi$ increases as listed in the legend. The dotted line represents a linear relation $D/\dot{\gamma}\sim\xi$ and the shaded region exceeds the system size $L/2\simeq 44d_0$. \[fig:xi\]](xi.png){width="\columnwidth"}
In summary, the length scale, or the mean size of rigid clusters, scales as $$\xi \sim
\begin{cases}
|\Delta\phi|^{-\lambda} & (\phi<\phi_J) \\
L & (\phi>\phi_J)
\end{cases} \label{eq:xi1}$$ in the quasi-static regime ($\dot{\gamma}<\dot{\gamma}_c$) and $$\xi \sim \dot{\gamma}^{-\lambda/\nu}
\label{eq:xi2}$$ in the plastic flow regime ($\dot{\gamma}>\dot{\gamma}_c$), where the critical exponents, $\lambda$ and $\nu$, are the same with those for the diffusivity \[Eqs. (\[eq:D1\]) and (\[eq:D2\])\]. The critical divergence below jamming in the quasi-static regime, i.e. $\xi\sim|\Delta\phi|^{-1}$ \[Eq. (\[eq:xi1\])\], is consistent with the result of quasi-static simulations ($\dot{\gamma}\rightarrow 0$) of sheared athermal disks [@nafsc2]. In addition, the scaling $\xi\sim\dot{\gamma}^{-1/4}$ in the plastic flow regime \[Eq. (\[eq:xi2\])\] is very close to the prior work on athermal particles under shear [@dh_md2].
From the results of the diffusivity \[Eqs. (\[eq:D1\]) and (\[eq:D2\])\] and length scale \[Eqs. (\[eq:xi1\]) and (\[eq:xi2\])\], we discuss how the rigid clusters contribute to the diffusion of the particles. The linear relation $D\sim d_0\xi\dot{\gamma}$ \[Eq. (\[eq:rigid\_cluster\])\] holds below jamming (regardless of $\dot{\gamma}$) and in the plastic flow regime (regardless of $\phi$). We stress that the divergence of the diffusivity over the shear rate in the quasi-static regime, i.e. $D/\dot{\gamma}\sim|\Delta\phi|^{-1}$ \[Eq. (\[eq:D1\])\], is caused by the diverging length scale below jamming, i.e. $\xi\sim|\Delta\phi|^{-1}$ \[Eq. (\[eq:xi1\])\]. As shown in Fig. \[fig:xi\](b), the linear relation (dotted line) well explains our results if the length scale $\xi$ is smaller than $10d_0$. If the system is above jamming, the length scale increases (more than $10d_0$) with the increase of $\phi$. However, the diffusivity over the shear rate $D/\dot{\gamma}$ starts to deviate from the linear relation (dotted line) and the length scale reaches the system size $L/2\simeq 44d_0$ (shaded region). We conclude that this deviation is caused by finite-size effects and further studies of different system sizes are necessary (as in Refs. [@diff_shear_md3; @diff_shear_md4]) to figure out the relation between $D/\dot{\gamma}$ and $\xi$ in this regime, which we postpone as a future work.
Discussions {#sec:disc}
===========
In this study, we have numerically investigated rheological and transport properties of soft athermal particles under shear. Employing MD simulations of two-dimensional disks, we have clarified how the rheology, self-diffusion, and size of rigid clusters vary with the control parameters,i.e. the externally imposed shear rate $\dot{\gamma}$ and packing fraction of the disks $\phi$. Our main result is the critical scaling of the diffusivity (Sec. \[sub:diff\]) and size of rigid clusters (Sec. \[sub:rigid\]), where their dependence on both $\dot{\gamma}$ and $\phi$ is reported \[Eqs. (\[eq:D1\]), (\[eq:D2\]), (\[eq:xi1\]), and (\[eq:xi2\])\]. The diffusivity has been calculated on both sides of jamming (by a single numerical protocol) to unify the understanding of self-diffusion of soft particulate systems: We found that (i) the diffusivity below jamming exhibits a crossover from the linear scaling $D\sim\dot{\gamma}$ to the power-law $D\sim\dot{\gamma}^{3/4}$. Such a crossover can be also seen in previous simulations [@diff_shear_md7; @diff_shear_md6; @dh_md2] and experiments [@diff_shear_exp2; @diff_shear_exp1]. In addition, (ii) the diffusivity below jamming diverges as $D\sim|\Delta\phi|^{-1}$ if the system is in the quasi-static regime ($\dot{\gamma}<\dot{\gamma}_c$), whereas (iii) the diffusivity (both below and above jamming) is insensitive to $\phi$ if the system is in the plastic flow regime ($\dot{\gamma}>\dot{\gamma}_c$). Note that (iv) the crossover shear rate vanishes at the onset of jamming as $\dot{\gamma}_c\sim|\Delta\phi|^{4.0}$. These results (ii)-(iv) are the new findings of this study. On the other hand, we found that (v) the diffusivity above jamming is weakly dependent on $\phi$ (as $D\sim|\Delta\phi|^{0.2}$) in the quasi-static regime and (vi) shows a crossover from $D\sim\dot{\gamma}^{0.7}$ to $\dot{\gamma}^{3/4}$. Though the result (v) is the new finding, the result (vi) contrasts with the prior studies of sheared amorphous solids and granular materials under constant pressure, where the diffusivity exhibits a crossover from $D\sim\dot{\gamma}$ to $\dot{\gamma}^{1/2}$ [@diff_shear_md1; @diff_shear_md3; @diff_shear_md4]. Because our scaling $D\sim\dot{\gamma}^{0.7}$ in the quasi-static regime is consistent with Ref. [@diff_shear_md0], where the same overdamped dynamics are used, we suppose that the discrepancy is caused by numerical models or flow conditions.
We have also examined the relation between the diffusivity and typical size of rigid clusters $\xi$ (Sec. \[sub:rigid\]). Below jamming, we found the critical divergence $\xi\sim|\Delta\phi|^{-1}$ in the quasi-static regime as previously observed in quasi-static simulations ($\dot{\gamma}\rightarrow 0$) of sheared athermal disks [@nafsc2]. In the plastic flow regime, the size becomes independent of $\phi$ and scales as $\xi\sim\dot{\gamma}^{-1/4}$. This is consistent with the previous result of sheared athermal particles [@dh_md2] (and is also close to the result of thermal glasses under shear [@th-dh_md1]). Above jamming, however, the size exhibits a crossover from $\xi\sim L$ to $\dot{\gamma}^{-1/4}$ which contrasts with the crossover from $\xi\sim\mathrm{const.}$ to $\dot{\gamma}^{-1/2}$ previously reported in simulations of amorphous solids [@diff_shear_md1; @diff_shear_md3; @diff_shear_md4]. From our scaling analyses, we found that the linear relation $D\sim d_0\xi\dot{\gamma}$ \[Eq. (\[eq:rigid\_cluster\])\] holds below jamming (for $\forall\dot{\gamma}$) and in the plastic flow regime (for $\forall\phi$), indicating that the self-diffusion is enhanced by the rotation of rigid clusters [@rheol0; @diff_shear_md1].
In our MD simulations, we fixed the system size to $L\simeq 88d_0$. However, systematic studies of different system sizes are needed to clarify the relation between $D$ and $\xi\sim L$ above jamming, especially in the quasi-static limit $\dot{\gamma}\rightarrow 0$ [@diff_shear_md3; @diff_shear_md4]. In addition, our analyses are limited to two dimensions. Though previous studies suggest that the diffusivity is independent of the dimensionality [@diff_shear_md7; @diff_shear_md6; @dh_md2], a recent study of soft athermal particles reported that the critical scaling of shear viscosity depends on dimensions [@rheol15]. Therefore, it is important to check whether the critical scaling \[Eqs. (\[eq:D1\]) and (\[eq:D2\])\] is different (or not) in three-dimensional systems. Because we observed qualitative difference from the results of sheared amorphous solids and granular materials under constant pressure [@diff_shear_md1; @diff_shear_md3; @diff_shear_md4], further studies of different numerical models and flow conditions are necessary to complete our understanding of self-diffusion of soft athermal particles. Moreover, the relation between the diffusivity and shear viscosity may be interesting because it gives a Stokes-Einstein like relation for the non-equilibrium systems studied here.
We thank H. Hayakawa, M. Otsuki, and S. Takada for fruitful discussions. K.S. thanks F. Radjai and W. Kob for fruitful discussions and warm hospitality in Montpellier. This work was supported by KAKENHI Grant No. 16H04025, No. 18K13464 and No. 19K03767 from JSPS. Some computations were performed at the Yukawa Institute Computer Facility, Kyoto, Japan.
Rheology {#sec:rheo}
========
The rheology of soft athermal particles is dependent on both the shear rate $\dot{\gamma}$ and area fraction $\phi$ [@rheol0; @pdf1; @rheol7]. Figure \[fig:rheo\] displays our numerical results of *flow curves*, i.e. (a) the pressure $p$ and (b) shear stress $\sigma$ as functions of the shear rate $\dot{\gamma}$. Here, different symbols represent different values of $\phi$ (as listed in the legend of (a)). The pressure and shear stress are defined as $p=(\tau_{xx}+\tau_{yy})/2$ and $\sigma=-\tau_{xy}$, respectively, where the stress tensor is given by the virial expression $$\tau_{\alpha\beta}=\frac{1}{L^2}\sum_i\sum_{j~(>i)}f_{ij\alpha}^\mathrm{e}r_{ij\beta}
\label{eq:stress}$$ ($\alpha,\beta=x,y$) with the $\alpha$-component of elastic force $f_{ij\alpha}^\mathrm{e}$ and the $\beta$-component of relative position $r_{ij\beta}$. As shown in Fig. \[fig:rheo\], both the pressure and shear stress exhibit the Newtonian behavior,i.e. they are proportional to the shear rate, $p\sim\dot{\gamma}$ and $\sigma\sim\dot{\gamma}$ (dotted lines), only if the area fraction is lower than the jamming transition density ($\phi<\phi_J$) and the shear rate is small enough ($\dot{\gamma}t_0\lesssim 10^{-4}$). However, a finite yield stress, $p_Y>0$ and $\sigma_Y>0$, emerges in the zero shear limit $\dot{\gamma}\rightarrow 0$ if the system is above jamming ($\phi>\phi_J$).
![ *Flow curves*, i.e. (a) the pressure $p$ and (b) shear stress $\sigma$ as functions of the shear rate $\dot{\gamma}$. The area fraction $\phi$ increases as indicated by the arrow (listed in the legend) in (a). The dotted lines represent the Newtonian behavior, i.e. (a) $p\sim\dot{\gamma}$ and (b) $\sigma\sim\dot{\gamma}$, for low area fractions, $\phi<\phi_J$, where $\phi_J\simeq 0.8433$ is the jamming transition density. \[fig:rheo\]](flow_curves.png){width="\columnwidth"}
In the literature of jamming [@rheol0; @pdf1; @rheol7], rheological flow curves are collapsed by critical scaling. This means that the crossover from the Newtonian behavior ($p\sim\dot{\gamma}$ and $\sigma\sim\dot{\gamma}$) or the yield stress ($p\sim p_Y$ and $\sigma\sim\sigma_Y$) to plastic flow regime vanishes as the system approaches jamming $\phi\rightarrow\phi_J$. To confirm this trend, we collapse the data in Fig. \[fig:rheo\] by the proximity to jamming $|\Delta\phi|\equiv|\phi-\phi_J|$ as in Fig. \[fig:rheo-clp\]. Though the critical exponents are slightly different, i.e. $\kappa_p=1.1$ and $\mu_p=3.5$ for the pressure \[Fig. \[fig:rheo-clp\](a)\] and $\kappa_\sigma=1.2$ and $\mu_\sigma=3.3$ for the shear stress \[Fig. \[fig:rheo-clp\](b)\], all the data are nicely collapsed on top of each other. If the shear rate is small enough, the data below jamming ($\phi<\phi_J$) follow the lower branch, whereas the data above jamming ($\phi>\phi_J$) are almost constant. Therefore, the pressure and shear stress can be described as $p/|\Delta\phi|^{\kappa_p}\sim\mathcal{F}_\pm(\dot{\gamma}/|\Delta\phi|^{\mu_p})$ and $\sigma/|\Delta\phi|^{\kappa_\sigma}\sim\mathcal{F}_\pm(\dot{\gamma}/|\Delta\phi|^{\mu_\sigma})$ with the scaling functions, $\mathcal{F}_-(x)\sim x$ for $\phi<\phi_J$ and $\mathcal{F}_+(x)\sim\mathrm{const.}$ for $\phi>\phi_J$.
On the other hand, if the shear rate is large enough, the system is in plastic flow regime, where all the data (both below and above jamming) follow a single power law (dotted lines in Fig. \[fig:rheo-clp\]). This implies that the scaling functions are given by $\mathcal{F}_\pm(x)\sim x^z$ (for both $\phi<\phi_J$ and $\phi>\phi_J$) with a power-law exponent $z$. Then, the pressure and shear stress scale as $p\sim|\Delta\phi|^{\kappa_p}\mathcal{F}_\pm(\dot{\gamma}/|\Delta\phi|^{\mu_p})\sim\dot{\gamma}^z|\Delta\phi|^{\kappa_p-\mu_p z}$ and $\sigma\sim|\Delta\phi|^{\kappa_\sigma}\mathcal{F}_\pm(\dot{\gamma}/|\Delta\phi|^{\mu_\sigma})\sim\dot{\gamma}^z|\Delta\phi|^{\kappa_\sigma-\mu_\sigma z}$, respectively. These scaling relations should be independent of whether the system is below or above jamming, i.e. independent of $|\Delta\phi|$. Thus, the power-law exponent is $z=\kappa_p/\mu_p\simeq 0.31$ for the pressure and $z=\kappa_\sigma/\mu_\sigma\simeq 0.36$ for the shear stress as confirmed in Fig. \[fig:rheo-clp\] (dotted lines). Note that the scaling collapses in Fig. \[fig:rheo-clp\] also confirm that the jamming transition density $\phi_J\simeq 0.8433$ is correct in our sheared systems [@rheol0].
![ Scaling collapses of (a) the pressure and (b) shear stress, where $\Delta\phi\equiv\phi-\phi_J$ is the proximity to jamming. See the text for critical exponents, $\kappa_p$, $\mu_p$, $\kappa_\sigma$, and $\mu_\sigma$, where the dotted lines have the slopes (a) $\kappa_p/\mu_p$ and (b) $\kappa_\sigma/\mu_\sigma$. \[fig:rheo-clp\]](flow_curves_clp.png){width="\columnwidth"}
In summary, the rheological flow properties of the disks are described as $$\begin{aligned}
p &\sim&
\begin{cases}
|\Delta\phi|^{\kappa_p-\mu_p}\dot{\gamma} & (\phi<\phi_J) \\
|\Delta\phi|^{\kappa_p} & (\phi>\phi_J)
\end{cases}~, \label{eq:pressure1} \\
\sigma &\sim&
\begin{cases}
|\Delta\phi|^{\kappa_\sigma-\mu_\sigma}\dot{\gamma} & (\phi<\phi_J) \\
|\Delta\phi|^{\kappa_\sigma} & (\phi>\phi_J)
\end{cases}~, \label{eq:shear_stress1}\end{aligned}$$ in the quasi-static regime and $$\begin{aligned}
p &\sim& \dot{\gamma}^{\kappa_p/\mu_p}~, \label{eq:pressure2} \\
\sigma &\sim& \dot{\gamma}^{\kappa_\sigma/\mu_\sigma}~, \label{eq:shear_stress2}\end{aligned}$$ in the plastic flow regime. The critical exponents are estimated as $\kappa_p=1.1$, $\mu_p=3.5$, $\kappa_\sigma=1.2$, and $\mu_\sigma=3.3$. In Eqs. (\[eq:pressure1\]) and (\[eq:shear\_stress1\]), the Newtonian behavior is given by $p\sim|\Delta\phi|^{-2.4}\dot{\gamma}$ and $\sigma\sim|\Delta\phi|^{-2.1}\dot{\gamma}$, where the exponents are comparable to those for viscosity divergence below jamming [@rheol7]. The yield stress vanishes as $p_Y\sim|\Delta\phi|^{1.1}$ and $\sigma_Y\sim|\Delta\phi|^{1.2}$ when the system approaches jamming from above \[Eqs. (\[eq:pressure1\]) and (\[eq:shear\_stress1\])\], which is consistent with the previous study of two-dimensional bubbles under shear [@pdf1]. The scaling in the plastic flow regime, $p\sim\dot{\gamma}^{0.31}$ and $\sigma\sim\dot{\gamma}^{0.36}$ \[Eqs. (\[eq:pressure2\]) and (\[eq:shear\_stress2\])\], is close to the prior work on sheared athermal disks [@rheol14], indicating *shear thinning* as typical for particulate systems under shear [@larson].
Non-affine displacements {#sec:nona}
========================
The self-diffusion of soft athermal particles is also sensitive to both $\dot{\gamma}$ and $\phi$. Because our system is homogeneously sheared (along the $x$-direction), the self-diffusion is represented by fluctuating motions of the disks around a mean flow. In our MD simulations, the mean velocity field is determined by the affine deformation as $\dot{\gamma}y\bm{e}_x$, where $\bm{e}_x$ is a unit vector parallel to the $x$-axis. Therefore, subtracting the mean velocity field from each disk velocity $\bm{u}_i(t)$, we introduce non-affine velocities as $\Delta\bm{u}_i(t)=\bm{u}_i(t)-\dot{\gamma}y_i\bm{e}_x$ ($i=1,\dots,N$). *Non-affine displacements* are then defined as the time integrals $$\Delta\bm{r}_i(\tau) = \int_{t_a}^{t_a+\tau}\Delta\bm{u}_i(t)dt~,
\label{eq:non-affine}$$ where $\tau$ is the time interval. Note that the initial time $t_a$ can be arbitrary chosen during a steady state.
It is known that the non-affine displacements \[Eq. (\[eq:non-affine\])\] are sensitive to the rheological flow properties (Sec. \[sec:rheo\]) [@saitoh11]. Their magnitude significantly increases if the packing fraction exceeds the jamming point. In addition, their spatial distributions become more “collective" (they tend to align in the same directions with neighbors) with the decrease of the shear rate. This means that the self-diffusion is also strongly dependent on both the shear rate and density. Especially, the collective behavior of the non-affine displacements implies the growth of rigid clusters in slow flows $\dot{\gamma}t_0\ll 1$ of jammed systems $\phi>\phi_J$, where the yield stress $\sigma\sim\sigma_Y$ is observed in the flow curves (Fig. \[fig:rheo\]).
[^1]: The MSDs defined by the *total* non-affine displacements show quantitatively the same results (data are not shown).
[^2]: We define the diffusivity \[Eq. (\[eq:D\])\] as the slope of the MSD \[Eq. (\[eq:MSD\])\] in the normal diffusive regime $\gamma=\dot{\gamma}\tau>1$, where we take sample averages of $\Delta(\tau)^2/2\tau$ as $D/\dot{\gamma}\equiv <\Delta(\gamma)^2/2\gamma>$ in the range between $1<\gamma<10^2$.
[^3]: The data for the highest shear rate, $\dot{\gamma}=10^{-1}t_0^{-1}$, is removed from the scaling collapses in Figs. \[fig:diff\](b) and \[fig:xi\](a).
|
Q:
Is a Python closure a good replacement for `__all__`?
Is it a good idea to use a closure instead of __all__ to limit the names exposed by a Python module? This would prevent programmers from accidentally using the wrong name for a module (import urllib; urllib.os.getlogin()) as well as avoiding "from x import *" namespace pollution as __all__.
def _init_module():
global foo
import bar
def foo():
return bar.baz.operation()
class Quux(bar.baz.Splort): pass
_init_module(); del _init_module
vs. the same module using __all__:
__all__ = ['foo']
import bar
def foo():
return bar.baz.operation()
class Quux(bar.baz.Splort): pass
Functions could just adopt this style to avoid polluting the module namespace:
def foo():
import bar
bar.baz.operation()
This might be helpful for a large package that wants to help users distinguish its API from the package's use of its and other modules' API during interactive introspection. On the other hand, maybe IPython should simply distinguish names in __all__ during tab completion, and more users should use an IDE that allows them to jump between files to see the definition of each name.
A:
I am a fan of writing code that is absolutely as brain-dead simple as it can be.
__all__ is a feature of Python, added explicitly to solve the problem of limiting what names are made visible by a module. When you use it, people immediately understand what you are doing with it.
Your closure trick is very nonstandard, and if I encountered it, I would not immediately understand it. You would need to put in a long comment to explain it, and then you would need to put in another long comment to explain why you did it that way instead of using __all__.
EDIT: Now that I understand the problem a little better, here is an alternate answer.
In Python it is considered good practice to prefix private names with an underscore in a module. If you do from the_module_name import * you will get all the names that do not start with an underscore. So, rather than the closure trick, I would prefer to see correct use of the initial-underscore idiom.
Note that if you use the initial underscore names, you don't even need to use __all__.
A:
The problem with from x import * is that it can hide NameErrors which makes trivial bugs hard to track down. "namespace pollution" means adding stuff to the namespace that you have no idea where it came from.
Which is kind of what your closure does too. Plus it might confuse IDEs, outlines, pylint and the like.
Using the "wrong" name for a module is not a real problem either. Module objects are the same from wherever you import them. If the "wrong" name disappears (after a update) it should be clear why and motivate the programmer to do it properly next time. But it doesn't cause bugs.
|
Q:
Control RaspberryPI 3 via Serial/GPIO
So I'm working on a bit of a little project with a PI for work.
I'm making the PI into a little portable NAS where i can connect it to a network and on boot, it will email me its IP Address (if it gets one). In the case where the network is static, i want to have a way to connect to my PI's terminal and configure a static IP without the need of connecting the PI to a display and mouse and keyboard etc. I want to connect to my PI via Putty and get to the console.
I followed this tutorial on enabling the /dev/ttyS0 port which is the GPIO on pins 14 and 15. And from my understanding, this should allow me to do what i want but not sure what the next step is to connect the PI to my PC so i can Putty into it.
I was looking at GPIO to USB or something, but unsure what to use.
Anyone done this before or similar and knows what i should get to achieve what i want?
Many thanks!
A:
You need an USB to TTL cable. TTL indicates 3.3 V compatibility. "Normal" USB to RS-232 cables work with higher voltages and can damage the Pi.
Example USB to TTL cable : https://www.adafruit.com/product/954
|
Q:
What frameworks are available in ASP.NET Core (ASP.NET 5) applications?
I have seen various frameworks targeted in project.json files, using names such as netcore50, dotnet, dnx451, net45, and others. The documentation for the "framework" section project.json does not (yet) specify how to use this section for different frameworks.
What frameworks are available and what name should be used in project.json to target each?
A:
UPDATE 3
Full list see Target Frameworks.
The most common TFMs ASP.NET app developers need to know are:
netcoreappx.y = An application that targets .NET Core x.y (e.g. netcoreapp1.0 = .NET Core 1.0)
netstandardx.y = A library that targets .NET Standard x.y. (e.g. netstandard2.0 = .NET Standard 2.0). .NET Standard libraries can work on desktop .NET, Windows Phone, Mono, and others.
net4xy = A library or console app that targets desktop .NET Framework 4.x.y (e.g. net452 or net46)
UPDATE 2 (Dec 9, 2015)
Somewhat official docs are now available from dotnet. See .NET Platform Standard → Nuget
For libraries targeting multiple platforms that adhere to the .NET Standard, these TFMs (target framework monikers) are available.~
UPDATE (Aug 12, 2015)
This Nuget blog post shows additional TFMs available for nuget. It also explains the dotnet TFM.
Original response
Although this is not official documentation, this blog post by Oren Novotny has an excellent table showing the different target framework monikers.
|
Occupational injury and illness recording and reporting requirements. Occupational Safety and Health Administration (OSHA), U.S. Department of Labor. Final rule.
The Occupational Safety and Health Administration (OSHA) is revising its rule addressing the recording and reporting of occupational injuries and illnesses (29 CFR parts 1904 and 1952), including the forms employers use to record those injuries and illnesses. The revisions to the final rule will produce more useful injury and illness records, collect better information about the incidence of occupational injuries and illnesses on a national basis, promote improved employee awareness and involvement in the recording and reporting of job-related injuries and illnesses, simplify the injury and illness recordkeeping system for employers, and permit increased use of computers and telecommunications technology for OSHA recordkeeping purposes. This rulemaking completes a larger overall effort to revise Part 1904 of Title 29 of the Code of Federal Regulations. Two sections of Part 1904 have already been revised in earlier rulemakings. A rule titled Reporting fatalities and multiple hospitalization incidents to OSHA, became effective May 2, 1994 and has been incorporated into this final rule as Section 1904.39. A second rule entitled Annual OSHA injury and illness survey of ten or more employers became effective on March 13, 1997 and has been incorporated into this final rule as Section 1904.41. The final rule being published today also revises 29 CFR 1952.4, Injury and Illness Recording and Reporting Requirements, which prescribes the recordkeeping and reporting requirements for States that have an occupational safety and health program approved by OSHA under Section 18 of the Occupational Safety and Health Act (the "Act" or "OSH Act"). |
Q:
String Formatting: what is the width for the e format?
My IronPython console gives the following:
>>> "%9.2e" % 1.236
'1.24e+00'
>>> "%10.2e" % 1.236
' 1.24e+00'
>>>
The total characters in the output do not seem to correspond to 9 or 10 respectively.
A:
This is a know bug with IronPython; the width is not handled correctly when using the %<width>e format.
CPython handles the width as expected; e.g. '%9.2e' % 1.236 produces a string of length 9. You could try using the format() function instead, if you are lucky it doesn't reuse the same code:
format(1.236, '9.2e')
|
/*
* linux/fs/super.c
*
* (C) 1991 Linus Torvalds
*/
/*
* super.c contains code to handle the super-block tables.
*/
#include <linux/config.h>
#include <linux/sched.h>
#include <linux/kernel.h>
#include <asm/system.h>
#include <errno.h>
#include <sys/stat.h>
int sync_dev(int dev);
void wait_for_keypress(void);
/* set_bit uses setb, as gas doesn't recognize setc */
#define set_bit(bitnr,addr) ({ \
register int __res __asm__("ax"); \
__asm__("bt %2,%3;setb %%al":"=a" (__res):"a" (0),"r" (bitnr),"m" (*(addr))); \
__res; })
struct super_block super_block[NR_SUPER];
/* this is initialized in init/main.c */
int ROOT_DEV = 0;
static void lock_super(struct super_block * sb)
{
cli();
while (sb->s_lock)
sleep_on(&(sb->s_wait));
sb->s_lock = 1;
sti();
}
static void free_super(struct super_block * sb)
{
cli();
sb->s_lock = 0;
wake_up(&(sb->s_wait));
sti();
}
static void wait_on_super(struct super_block * sb)
{
cli();
while (sb->s_lock)
sleep_on(&(sb->s_wait));
sti();
}
struct super_block * get_super(int dev)
{
struct super_block * s;
if (!dev)
return NULL;
s = 0+super_block;
while (s < NR_SUPER+super_block)
if (s->s_dev == dev) {
wait_on_super(s);
if (s->s_dev == dev)
return s;
s = 0+super_block;
} else
s++;
return NULL;
}
void put_super(int dev)
{
struct super_block * sb;
struct m_inode * inode;
int i;
if (dev == ROOT_DEV) {
printk("root diskette changed: prepare for armageddon\n\r");
return;
}
if (!(sb = get_super(dev)))
return;
if (sb->s_imount) {
printk("Mounted disk changed - tssk, tssk\n\r");
return;
}
lock_super(sb);
sb->s_dev = 0;
for(i=0;i<I_MAP_SLOTS;i++)
brelse(sb->s_imap[i]);
for(i=0;i<Z_MAP_SLOTS;i++)
brelse(sb->s_zmap[i]);
free_super(sb);
return;
}
static struct super_block * read_super(int dev)
{
struct super_block * s;
struct buffer_head * bh;
int i,block;
if (!dev)
return NULL;
check_disk_change(dev);
if (s = get_super(dev))
return s;
for (s = 0+super_block ;; s++) {
if (s >= NR_SUPER+super_block)
return NULL;
if (!s->s_dev)
break;
}
s->s_dev = dev;
s->s_isup = NULL;
s->s_imount = NULL;
s->s_time = 0;
s->s_rd_only = 0;
s->s_dirt = 0;
lock_super(s);
if (!(bh = bread(dev,1))) {
s->s_dev=0;
free_super(s);
return NULL;
}
*((struct d_super_block *) s) =
*((struct d_super_block *) bh->b_data);
brelse(bh);
if (s->s_magic != SUPER_MAGIC) {
s->s_dev = 0;
free_super(s);
return NULL;
}
for (i=0;i<I_MAP_SLOTS;i++)
s->s_imap[i] = NULL;
for (i=0;i<Z_MAP_SLOTS;i++)
s->s_zmap[i] = NULL;
block=2;
for (i=0 ; i < s->s_imap_blocks ; i++)
if (s->s_imap[i]=bread(dev,block))
block++;
else
break;
for (i=0 ; i < s->s_zmap_blocks ; i++)
if (s->s_zmap[i]=bread(dev,block))
block++;
else
break;
if (block != 2+s->s_imap_blocks+s->s_zmap_blocks) {
for(i=0;i<I_MAP_SLOTS;i++)
brelse(s->s_imap[i]);
for(i=0;i<Z_MAP_SLOTS;i++)
brelse(s->s_zmap[i]);
s->s_dev=0;
free_super(s);
return NULL;
}
s->s_imap[0]->b_data[0] |= 1;
s->s_zmap[0]->b_data[0] |= 1;
free_super(s);
return s;
}
int sys_umount(char * dev_name)
{
struct m_inode * inode;
struct super_block * sb;
int dev;
if (!(inode=namei(dev_name)))
return -ENOENT;
dev = inode->i_zone[0];
if (!S_ISBLK(inode->i_mode)) {
iput(inode);
return -ENOTBLK;
}
iput(inode);
if (dev==ROOT_DEV)
return -EBUSY;
if (!(sb=get_super(dev)) || !(sb->s_imount))
return -ENOENT;
if (!sb->s_imount->i_mount)
printk("Mounted inode has i_mount=0\n");
for (inode=inode_table+0 ; inode<inode_table+NR_INODE ; inode++)
if (inode->i_dev==dev && inode->i_count)
return -EBUSY;
sb->s_imount->i_mount=0;
iput(sb->s_imount);
sb->s_imount = NULL;
iput(sb->s_isup);
sb->s_isup = NULL;
put_super(dev);
sync_dev(dev);
return 0;
}
int sys_mount(char * dev_name, char * dir_name, int rw_flag)
{
struct m_inode * dev_i, * dir_i;
struct super_block * sb;
int dev;
if (!(dev_i=namei(dev_name)))
return -ENOENT;
dev = dev_i->i_zone[0];
if (!S_ISBLK(dev_i->i_mode)) {
iput(dev_i);
return -EPERM;
}
iput(dev_i);
if (!(dir_i=namei(dir_name)))
return -ENOENT;
if (dir_i->i_count != 1 || dir_i->i_num == ROOT_INO) {
iput(dir_i);
return -EBUSY;
}
if (!S_ISDIR(dir_i->i_mode)) {
iput(dir_i);
return -EPERM;
}
if (!(sb=read_super(dev))) {
iput(dir_i);
return -EBUSY;
}
if (sb->s_imount) {
iput(dir_i);
return -EBUSY;
}
if (dir_i->i_mount) {
iput(dir_i);
return -EPERM;
}
sb->s_imount=dir_i;
dir_i->i_mount=1;
dir_i->i_dirt=1; /* NOTE! we don't iput(dir_i) */
return 0; /* we do that in umount */
}
void mount_root(void)
{
int i,free;
struct super_block * p;
struct m_inode * mi;
if (32 != sizeof (struct d_inode))
panic("bad i-node size");
for(i=0;i<NR_FILE;i++)
file_table[i].f_count=0;
if (MAJOR(ROOT_DEV) == 2) {
printk("Insert root floppy and press ENTER");
wait_for_keypress();
}
for(p = &super_block[0] ; p < &super_block[NR_SUPER] ; p++) {
p->s_dev = 0;
p->s_lock = 0;
p->s_wait = NULL;
}
if (!(p=read_super(ROOT_DEV)))
panic("Unable to mount root");
if (!(mi=iget(ROOT_DEV,ROOT_INO)))
panic("Unable to read root i-node");
mi->i_count += 3 ; /* NOTE! it is logically used 4 times, not 1 */
p->s_isup = p->s_imount = mi;
current->pwd = mi;
current->root = mi;
free=0;
i=p->s_nzones;
while (-- i >= 0)
if (!set_bit(i&8191,p->s_zmap[i>>13]->b_data))
free++;
printk("%d/%d free blocks\n\r",free,p->s_nzones);
free=0;
i=p->s_ninodes+1;
while (-- i >= 0)
if (!set_bit(i&8191,p->s_imap[i>>13]->b_data))
free++;
printk("%d/%d free inodes\n\r",free,p->s_ninodes);
}
|
Q:
OpenCV cvtColor CV_BGR2HSV CV_32FC3 Saturation Range
I'm trying to build histograms for materials in OpenCV 3.2 but am confused by the HSV ranges--they don't seem to match the documentation, or I am approaching it wrong.
// cv::Mat bgrPhoto contains a test image
cv::Mat3f hsvPhoto;
bgrPhoto.convertTo(hsvPhoto, CV_32FC3);
cv::cvtColor(hsvPhoto, hsvPhoto, CV_BGR2HSV, CV_32FC3);
std::vector<cv::Mat1f> hsvChannels;
cv::split(hsvPhoto, hsvChannels);
// Documentation [0.0, 1.0]: measured here Hue to 360.0, Sat to 1.0, Val to 255.0
double minHue, maxHue, minSat, maxSat, minVal, maxVal;
cv::minMaxIdx(hsvChannels[0], &minHue, &maxHue, 0, 0);
cv::minMaxIdx(hsvChannels[1], &minSat, &maxSat, 0, 0);
cv::minMaxIdx(hsvChannels[2], &minVal, &maxVal, 0, 0);
A:
When you converted your image from 8-bit to 32-bit, you haven't scaled your values from [0, 255] to [0, 1]. convertTo() simply converts the types; it doesn't rescale the values by default. This is affecting your output since, from the docs for color conversion from BGR to HSV, V simply gets set to max(B, G, R) (which will be a max of numbers going up to 255). You'll notice that in the docs for cvtColor() it says for 8-bit and 16-bit images, they are scaled to fit the [0, 1] range; but not for float images. However, the H channels and S channels still get scaled to the correct ranges because they use V to scale the image.
When you do bgrPhoto.convertTo(hsvPhoto, CV_32FC3) you need to divide by 255 to set the values into [0, 1]. If you check out the docs for convertTo() you'll notice a third positional argument can be set which is a scale factor. Simply using bgrPhoto.convertTo(hsvPhoto, CV_32FC3, 1.0/255.0) will, as the documentation states, scale every pixel value by that factor.
Also, Miki's point in the comment on the OP totally slipped by me but it was a great catch; check the docs for cvtColor(); the fourth argument is an argument for number of destination channels, not dtype, so cv::cvtColor(hsvPhoto, hsvPhoto, CV_BGR2HSV) is what you want.
|
Waßmannsdorf
Waßmannsdorf is a village and a civil parish (Ortsteil) of the German town of Schönefeld, located in the district of Dahme-Spreewald in Brandenburg. As of 2007 its population was of around 1,000.
History
First mentioned in 1350 as Wasmanstorp, the village was an autonomous municipality until 2003, when it merged into Schönefeld. From 1961 to 1989 its municipal borders with West Berlin were crossed by the Berlin Wall.
Geography
Waßmannsdorf is located in the southeastern suburb of Berlin, near the districts of Tempelhof-Schöneberg, Neukölln and Treptow-Köpenick; and bordering with the quarter of Rudow. The nearest places are Großziethen, Selchow, Schönefeld and Blankenfelde-Mahlow. The village is 20 km far from Königs Wusterhausen, 28 from Ludwigsfelde and 34 from Potsdam.
Transport
Waßmannsdorf is situated close to the runway of Berlin Schönefeld Airport, that will be merged into the new Berlin Brandenburg Airport in 2017. Crossed by the Berlin outer ring, it will be served by a new railway station on the S-Bahn extension to the new airport (lines S45 and S9). The village is also interested by the Expressway Potsdam-Schönefeld projects.
Gallery
References
External links
Waßmannsdorf page on Schönefeld municipal website
Waßmannsdorf Fire Service
SV Waßmannsdorf football club
Category:Villages in Brandenburg
Category:Localities in Dahme-Spreewald
Category:Bezirk Potsdam
Category:Former municipalities in Brandenburg
Category:Populated places established in the 1350s |
Ventilatory response to CO2 in patients with snoring, obstructive hypopnoea and obstructive apnoea.
Obstructive sleep apnoea (OSA) is caused by an obstruction of the upper airway. Sufficient sensitivity to CO2 in the respiratory centre is known to be a critical factor for adequate tone in the upper airway muscles. The hypothesis of this study is, therefore, that the ventilatory response to CO2 is reduced in patients with OSA. Twenty-six patients who suffered from snoring, 19 snoring patients with obstructive hypopnoea (OH) and 33 snoring patients with obstructive apnoea (OA), were studied. The control group consisted of 25 subjects from a random sample with no history of snoring or daytime sleepiness. Tests of the hyperoxic and hypoxic ventilatory response to CO2 were performed, as well as static and dynamic spirometry. Subjects in the OA group displayed a higher hyperoxic (VE/FetCO2hy = 12.6 l min-1/%) and hypoxic (VE/FetCO2ho = 15.7 l min-1/%) ventilatory response to CO2 than patients with obstructive hypopnoea (VE/FetCO2hy = 8.6 l min-1/%; VE/FetCO2ho = 15.2 l min-1/%), snorers (VE/FetCO2hy = 8.4 l min-1/%; VE/FetCO2ho = 12.7 l min-1/%) and non-snorers (VE/FetCO2hy = 7.6 l min-1/%; VE/FetCOho = 9.6 l min-1/%). Multiple regression analysis reveals that neck circumference, apnoea index, oxygen desaturation index, PCO2 and sex (male gender) are correlated with VE/FetCO2hy (R2 = 0.43). Multiple regression analysis also reveals that ERV (expiratory reserve volume) and sex (male gender) are correlated with VE/FetCO2ho (R2 = 0.21). Arguing against the hypothesis, patients with OSA displayed an increased hyperoxic and hypoxic ventilatory response to CO2. Nocturnal apnoea frequency and the obesity factor in OSA may have contributed to these results. |
Game Details
Assume the role of Timmy, mini action adventure hero, and fight the forces of evil in "Army Men :Soldiers of Misfortune." Timmy's Tan Army Men action figures have run amok, capturing his Green Army Men, and attempting to take control of his little slice of suburbia! It's up to you to defeat the enemy, save your toys and family, and restore order to your home! The house is your playground as you control a 3 inch tall Timmy and a slew of toy weaponry to keep his tan Army Men from achieving "Global Home Domination." You'll never look at your toys the same again...
# Battle army men by utilizing toys around the house like squirt guns, tennis balls, foam dart guns, and bowling balls. |
Lymphocyte expansion after unrelated cord blood allogeneic stem cell transplantation in adults.
Limited information is available regarding the incidence and features of lymphocyte expansions after allogeneic hematopoietic stem cell transplantation (allo-HSCT). Large granular lymphocytes (LGL) expansions have been reported after bone marrow or peripheral blood, but not after unrelated cord blood (UCB) allo-HSCT, associated with indolent clinical courses and favorable outcomes. Here, we considered 85 recipients of UCB allo-HSCT to more broadly define the impact of lymphocytosis, not limited to LGL. Sustained lymphocytosis was observed in 21 (25%) patients at a median onset of 12.6 months and with a median duration of 12 months. Immunophenotypic analysis showed predominantly CD8+ T and/or polyclonal B-cell expansions. Three patients only had monoclonal T-cell expansion. CMV reactivation was significantly more frequent in the group of patients with lymphocytosis (76% vs 28%, P=0.0001), but was not associated with survival. Conversely, 2-year disease-free survival and overall survival were significantly higher for lymphocytosis patients (85% vs 55%, P=0.01 and 85% vs 63%, P=0.03, respectively). In conclusion, expansion of T or B lymphocytes after UCB allo-HSCT in adults is not a rare event. Although occurring relatively late after transplant, this feature is predictive of a better outcome for the patients. |
In the semiconductor industry, metal silicides have typically been used to provide low resistive contacts to source/drain regions and gate electrodes in metal oxide semiconductor (MOS) and CMOS transistors. Titanium silicide (TiSi2) has traditionally been used because of its low resistivity. However, by using the conventional Ti-salicide process the sheet resistance increases for lines having a thickness of less than about 0.35 microns (μm). A high temperature anneal is needed to completely transform the silicide from the high-resistivity C49 phase to the low-resistivity C54 phase. In some lines, the transformation is not complete and the film agglomerates before complete transformation into the low-resistivity state.
TiSi2 has been replaced with CoSi2 to circumvent the problem mentioned above. However, CoSi2 consumes significant amounts of silicon during formation, which increases the difficulty of forming shallow junctions for silicon-on-insulator (SOI) substrates. Further, as the semiconductor industry approaches dimensions less than 65 nm, CoSi2 also exhibits rapid sheet resistance degradation. Specifically, the polysilicon gate sheet resistance Rs increases sharply at narrow line widths due to voids formed by vacancy coalescence at the polySi grain boundary.
Ni suicide with low resistivity, low salicidation temperature, small mechanical stress, low silicon consumption and relative insensitivity of sheet resistance to linewidth is currently being investigated to replace CoSi2. Manufacturing a functioning device requires several processing steps after contact formation where the silicide temperature typically exceeds 600° C. Under such conditions, NiSi has been reported to agglomerate and form NiSi2 which has a higher resistivity than NiSi. See, for example, J. Y. Yew, et al. “Epitaxial growth of NiSi on (111) Si inside 0.1-0.6 mm oxide openings prepared by electron beam lithography”, Appl. Phys. Lett. 69(7), (1996); B. A. Julies, “A Study of the NiSi to NiSi2 Transition in the Ni—Si Binary System”, Thin Solid Films, 347, 201, 1999; and M. C. Poon, “Thermal Stability of Cobalt and Nickel Silicides”, Microelectronics Reliability 38, 1495, 1998.
Further, when shallow junctions (on the order of about 15 nm or less) are to be formed, nickel disilicide formation is seen under the spacer resulting in shorting of the device between the gate and the source/drain regions. The thermal stability of NiSi has to be improved before it can be used as a contact in submicron microelectronic devices.
Co-pending and co-assigned U.S. patent application Ser. No. 10/334,464, filed Dec. 31, 2002, now U.S. Pat. No. 6,905,560 entitled “Retarding Agglomeration of Ni Monosilicide Using Ni Alloys” describes various metals that can be co-deposited with Ni to prevent disilicide formation. Some of these metals, such as Ti, V, Cr, Zr, Nb, Mo, Hf, Ta, W and Re, prevent nucleation of NiSi2. Ge, Rh, Pd, Pt or mixtures thereof can be used as stabilizing agents.
The successful formation of a silicide contact through the salicide process requires deposition of a thin (less than 10 nm) Ni alloy uniformly over the substrate, heating the substrate to form the silicide over regions where silicon is present and finally selectively etching the unreacted metal without attacking the silicide. Any attack of the silicide would reduce the thickness of the line and increase the contact resistance. Further, the etchant should be capable of not only removing Ni, but all the other metals added along with it. Present etchants for removing Ni and Ni alloys in the salicide contact process are based on a mixture of hydrogen peroxide and sulfuric acid at temperatures greater than 60° C. This is disclosed for example, in U.S. Pat. No. 6,468,901 and P. S. Lee, et al. “New Salicidation Technology with Ni(Pt) Alloy for MOSFETs”, IEEE Electronic Device Letters, 22 (12) 2001. Such etchants are incapable of removing all additional elements especially noble metals such as Pt, Pd, Rh and Re used along with Ni. Presence of the unreacted metal on the spacers and trench isolation regions leads to shorting of the devices thereby preventing the manufacturing of a functioning semiconductor chip. The remaining unreacted metal is referred in the art as stringers.
In view of the above, there is a need for providing a new and improved method for forming NiSi contacts which avoids leaving unreacted metals, i.e., stringers, on the spacers and trench isolation regions. |
It is known to recover nickel and/or copper from sulfidic ores by comminuting the ore to a finely divided state, subjecting the comminuted ore to froth flotation to upgrade the metal content thereof, and roasting the concentrate in an oxidizing atmosphere to remove the sulfur therefrom as SO.sub.2, followed by the reduction of the oxidized concentrate at an elevated temperature with a carbonaceous material to form molten nickel which is cast to provide pig nickel for use in the manufacture of stainless steel.
The foregoing method has certain disadvantages particularly with respect to the formation of SO.sub.2 which is undesirable. Unless the SO.sub.2 is converted to sulfuric acid on site, the SO.sub.2 effluent released into the atmosphere presents environmental problems.
Nickel-containing sulfidic minerals and laterites are the two major raw material sources for nickel. The laterites are abundantly distributed throughout the world.
However, laterites unlike nickel sulfide ores, cannot be concentrated by froth flotation or magnetically. Compared to other ores, the nickel content is low, for example, may range from 0.5 to 1.5% nickel by weight, with the exception of deposits in New Caledonia and Indonesia in which the amount of nickel is of the order of up to about 3% by weight which is quite high.
It has been predicted that by the end of this century, laterites will become the major source for the production of nickel.
The conventional process for recovering nickel from lateritic ores is somewhat energy intensive in that the nickel is extracted from the ore by high pressure leaching at elevated temperature in an autoclave.
For example, one process for recovering nickel and cobalt from lateritic ores is the well known Moa Bay process involving acid leaching at elevated temperatures and pressures at which iron oxide and aluminum oxysulfate are substantially insoluble.
In the Moa Bay process, lateritic ore at minus 20 mesh (95% passing 325 mesh U.S. Standard) is pulped to approximately 45% solids and the nickel and cobalt selectively leached with sufficient sulfuric acid at elevated temperature and pressure (e.g. 230.degree. C. to 250.degree. C. and 405 to 580 psia) to solubilize about 95% each of nickel and cobalt in about 60 to 90 minutes. After pressure let down, the leached pulp is washed by countercurrent decantation with the washed pulp going to tailings. The leach solution pH, which is quite low (e.g., between 0 and 0.5), is then neutralized with coral mud to a pH of about 2.4 in a series of four tanks at a total retention time of about 20 minutes and the thus-treated product liquor (containing about 5.65 gpl Ni, 0.8 gpl Fe and 2.3 gpl Al), after solid-liquid separation, is then subjected to sulfide precipitation. The leach liquor is preheated and the sulfide precipitation carried out using H.sub.2 S as the precipitating reagent in an autoclave at about 120.degree. C. (250.degree. F.) and a pressure of about 150 psig.
In the original scheme for treating the mixed sulfides, the sulfide precipitate was washed and thickened to a solids content of 65%. It was then oxidized in an autoclave at about 177.degree. C. (350.degree. F.) and a pressure of about 700 psig.
The solution containing nickel and cobalt was then neutralized with ammonia to a pH (5.35) sufficient to precipitate any residual iron, aluminum, and chromium present using air as an oxidizing agent.
The precipitate was thereafter separated from the solution and the nickel and cobalt solution then adjusted to a pH of about 1.5. H.sub.2 S was added to precipitate selectively any copper, lead and zinc present. The precipitate was separated from the solution by filtration and the nickel recovered by various methods. One method comprised treating the nickel-containing solution with hydrogen at elevated temperature and pressure to produce nickel powder.
The aforementioned method, as stated hereinbefore, had certain economic disadvantages. The conversion of mixed nickel-cobalt sulfide into salable separate nickel and cobalt products was very expensive and there was no market for mixed sulfide precipitates.
It is known to subject gold-bearing sulfide ore to oxidative bioleaching. Such methods are disclosed in U.S. Pat. No. 4,729,788, No. 5,127,942 and No. 5,244,493. The sulfidic material is ground, placed in heaps or piles or pulped or slurried and bioleached to oxidize the sulfide mineral using bacteria at temperatures of about 15.degree. C. to about 40.degree. C. The sulfide particle containing gold occluded within it is biooxidized to physically free up the gold for removal by cyanide leaching or other types of leaching.
Attempts to use bioleaching to recover base metals, such as nickel, have not been attractive enough to warrant the building of a commercial plant, particularly since technology was not in place economically at the time for recovering nickel from the solution which were quite dilute at best, except for the use of solvent extraction by means of which more concentrated solutions could be produced for the subsequent recovery of nickel. The recovery of nickel from low grade bioleach solutions by solvent extraction has its problems in that (i) there are organic solvents that preferentially extract nickel from mixed ferric iron-nickel containing solutions such as shown hereinafter in Example 2 and (ii) the micro-organisms present in the bioleach solutions tend to adversely affect the separation of the organic phase from the aqueous phase.
The problem with ferric iron is that either the ferric ion will preferentially load on organic solvents, such as DEPHA(di-2-ethyl hexyl phosphoric acid) or it will oxidize the active ingredient in organic solvents such as Cyanex 272; 301 and 302. These reagents are sold by the American Cyanamid Company with the following active ingredients: phosphoric, phosphonic and phosphinic acids.
"Third phase" formation during solvent extractions sometimes limits the application of solvent extraction in leaching operations, particularly in a bioleaching circuit because bacteria and organic solvents are not compatible. For example, Thiobacillus ferroxidans is in essence a sulfur-loving bacteria which presents problems in solvent extraction, particularly when the organic solvent contains sulfur, such as in di-nonyl-naphthyl sulfonic acid. Since many nickel sulfide ore bodies have a metal cut-off grade of around 0.2% to 0.5% Ni, it at once becomes apparent that a method is needed to enable the production of nickel solutions of sufficiently high concentration from which the nickel can be recovered economically. Thus, low grade nickel ores, in essence, could then be treated the same as a high grade ore with the same economical advantages.
Recent work conducted in the bioleaching of ores has indicated that low grade ores can be economically leached using bacteria as a means for effecting the dissolution of metal, e.g., nickel and/or cobalt, into an aqueous acid solution.
An advantage of bioleaching, while time dependent, is the fact that it is not energy and cost intensive. The pregnant solution obtained, however, is quite dilute.
One bioleaching method proposed for the recovery of nickel from sulfide ores is disclosed in Canadian Patent No. 2,065,491 which issued on Oct. 9, 1992.
According to the Canadian patent, a method disclosed comprises crushing the sulfide ore which is thereafter formed into a heap and the ore heap percolated with an iron sulfate solution which, optionally, carries bacteria, such as Thiobacillus ferroxidans, Thiobacillus thiooxidans or Leptospirillum ferroxidans. By virtue of the oxidation of the sulfide ore, the generation of sulfuric acid occurs, thus forming a sulfate solution.
Sulfuric acid or an alkali, such as lime, is added to the solution, if necessary, to control the pH to a range of about 1.2 to 3, preferably from 2.3 to 2.5.
An anaerobic bacterium is added to the sulfate solution to cause the precipitation of the dissolved metal as an insoluble sulfide, thus upgrading the metal into a highly concentrated form which then must be treated to recover the metal, e.g., nickel.
To bring about sulfide generation of the dissolved metal (e.g., nickel), a bacterium, referred to as Desulforvivrio Desulfuricans, may be added to the solution. After the nickel sulfide precipitates, it is separated from the solution to provide a concentrate high in nickel which must be further treated, such as by high pressure leaching at an elevated temperature in the presence of sulfuric acid to produce a nickel sulfate solution from which the nickel is extracted by known conventional methods.
In a paper entitled "The Solubilization of Nickel, Cobalt and Iron From Laterites by Means of Organic Chelating agents" (Denis I. McKenzie et al, International Journal of Mineral Processing' 21 (1987) P.275-292), a group of carboxylic acids were mentioned as chelating agents, including Oxalic Acid, Citric Acid, Tartaric Acid, among others. The efficacy of the organic acids at natural pH were compared to H.sub.2 SO.sub.4 (15 mM final concentration). Over a 456 hour period, using 15 mM concentrations of acids with 2 grams of ore (West Australian ore) in 150 ml of H.sub.2 O, Oxalic, Citric and Tartaric acids compared somewhat favorably with H.sub.2 SO.sub.4. Amount of nickel dissolved in ppm was 30.3 for H.sub.2 SO.sub.4, 18.5 for Oxalic acid, 20.2 for Citric acid and 16.3 for Tartaric.
The same acids employed on Indonesian ore showed that the nickel dissolved amounted to the following: Citric Acid 863 ppm, Tartaric Acid--708 ppm, Oxalic Acid--318 ppm, etc.
In a paper entitled "Microbial Leaching of Nickel from Low Grade Greek Laterites," Mineral Bioprocessing, TMS, 1991 page 191-205, the authors indicate a variety of heterotrophic micro-organisms that can produce such organic acids. They include: asperigillus and penicillia concentrations of around 40 grams of organic acid which were readily produced by these microorganisms.
Close to 70% of the Ni and less than 5% of the Fe were solubilized after a 51-day leaching period from a laterite ore containing about 1% Ni and 30% Fe. This work also showed an improved extraction when the organisms plus the culture medium were mixed with the laterite ore. An explanation was given: "Once the organisms attach themselves to the surface of the mineral grains, a high metal concentration gradient is experienced which could be toxic to the organisms spurring them to produce more citric acid (possibly as a defense response) which subsequently leaches out more ions from the mineral grains." If the toxic metal were to be removed from the solution, as proposed in accordance with the present invention, either during the leaching process or interrupted by it, the leaching kinetics will be enhanced significantly so long as a low level of the toxic metal is maintained.
One method of heap leaching with nutrient solutions containing at least one micro-organisms include those selected from the group consisting of the fungi Aspergillus Niger, Penicillium Sp., Aspergillus Sp., Penicillium Simplicissimus and the bacteria Enterobacter Spp., Bacillus Spp., and Achromobacter Spp.
It would be desirable to provide a process for bioleaching relatively low grade as well as relative high grade nickel-containing lateritic ores and sulfidic ores or concentrates thereof in combination with a novel method for concentrating the nickel ions in solution from which nickel is economically recovered. |
Q:
Using the AngularJS require option to call into another directive
I was just reading here about accessing one directive's controller from within another directive via the require option:
http://jasonmore.net/angular-js-directives-difference-controller-link/
The directive droppable and dashboard declarations in on my view - on two different divs:
<div class="wrapper wrapper-content animated fadeInRight">
<div class="row">
<div class="col-lg-12" data-droppable drop="handleDrop">
<div id="dash" dashboard="dashboardOptions" class="dashboard-container"></div>
</div>
</div>
However I can't seem to get it to work. My dashboardCtrl param below is NULL.
Here in my droppable directive, I use the REQUIRE option:
.directive('droppable', function () {
return {
scope: {
drop: '&',
},
//****************** dashboard directive is optionally requested ************
require: '?dashboard',
link: function (scope, element, attributes, dashboardCtrl) {
el.addEventListener('drop', function (e) {
if (e.preventDefault) { e.preventDefault(); }
this.classList.remove('over');
var item = document.getElementById(e.dataTransfer.getData('Text'));
this.appendChild(item.cloneNode(true));
// *** CALL INTO THE dashboardCtrl controller ***
dashboardCtrl.addWidgetInternal();
return false;
}, false);
}
}
});
and the dashboard directive :
angular.module('ui.dashboard')
.directive('dashboard', ['WidgetModel', 'WidgetDefCollection', '$modal', 'DashboardState', '$log', function (WidgetModel, WidgetDefCollection, $modal, DashboardState, $log) {
return {
restrict: 'A',
templateUrl: function (element, attr) {
return attr.templateUrl ? attr.templateUrl : 'app/shared/template/dashboard.html';
},
scope: true,
controller: ['$scope', '$attrs', function (scope, attrs) {
// ommitted for brevity
}],
link: function (scope) {
scope.addWidgetInternal = function (event, widgetDef) {
event.preventDefault();
scope.addWidget(widgetDef);
};
};
}
}]);
However, my dashboardCtrl parameter is NULL. Please help me to figure out how to use require.
I actually need to call the addWidget() function, which is within the link option; but I suppose I can copy or move that into the controller option.
thank you !
Bob
A:
Here is an example of "parent" directive dashboard requiring droppable, and communication between the two making use of require and passing dashboardCtrl
Here is a good article to see directive to directive communication
Fiddle example also built from your previous question
JSFiddle
app.directive('droppable', [function () {
return {
restrict: 'A',
require: 'dashboard',
link: function (scope, elem, attrs, dashboardCtrl) {
dashboardCtrl.controllerSpecificFunction('hello from child directive!');
scope.addWidgetInternal = function(message) {
console.log(message);
}
}
}
}]);
app.directive('dashboard', [function () {
return {
restrict: 'A',
controller: function ($scope) {
$scope.handleDrop = function(message) {
$scope.addWidgetInternal(message)
}
this.controllerSpecificFunction = function(message) {
console.log(message);
}
}
}
}]);
Edit
Based on discussion, here is a solution for what I currently understand the problem to be
Parent directive dashboard optionally requires child directive droppable and there needs to be communication between the two
<div dashboard>
<button id="dash" droppable ng-click="handleDrop($event)">Handle Drop</button>
</div>
app.directive('droppable', [function () {
return {
restrict: 'A',
require: '^?dashboard',
link: function (scope, elem, attrs, dashboardCtrl) {
scope.handleDrop = function($event) {
dashboardCtrl.addWidgetInternal($event);
}
}
}
}]);
app.directive('dashboard', [function () {
return {
restrict: 'A',
controller: function ($scope) {
this.addWidgetInternal = function($event) {
console.log($event);
}
}
}
}]);
Updated JSFiddle
|
On the summary page of the Archos store it says the 28 has bluetooth, when I click on the full specs there is no mention of BT. Checking the product page there is no mention of BT, so I assume there is a mistake on the store summary. Can anyone confirm that it does or does not have BT communications? |
Gaze patterns and audiovisual speech enhancement.
In this study, the authors sought to quantify the relationships between speech intelligibility (perception) and gaze patterns under different auditory-visual conditions. Eleven subjects listened to low-context sentences spoken by a single talker while viewing the face of one or more talkers on a computer display. Subjects either maintained their gaze at a specific distance (0°, 2.5°, 5°, 10°, and 15°) from the center of the talker's mouth (CTM) or moved their eyes freely on the computer display. Eye movements were monitored with an eye-tracking system, and speech intelligibility was evaluated by the mean percentage of correctly perceived words. With a single talker and a fixed point of gaze, speech intelligibility was similar for all fixations within 10° of the CTM. With visual cues from two talker faces and a speech signal from one of the talkers, speech intelligibility was similar to that of a single talker for fixations within 2.5° of the CTM. With natural viewing of a single talker, gaze strategy changed with speech-signal-to-noise ratio (SNR). For low speech-SNR, a strategy that brought the point of gaze directly to within 2.5° of the CTM was used in approximately 80% of trials, whereas in high speech-SNR it was used in only approximately 50% of trials. With natural viewing of a single talker and high speech-SNR, subjects can shift their gaze between points on the talker's face without compromising speech intelligibility. With low-speech SNR, subjects change their gaze patterns to fixate primarily on points that are in close proximity to the talker's mouth. The latter strategy is essential to optimize speech intelligibility in situations where there are simultaneous visual cues from multiple talkers (i.e., when some of the visual cues are distracters). |
As you know, Valentine's Day is coming soon, so get prepare on the time :-) I show you some gift ideas for your love partner and hope you'll find inspiration what to buy and suprise your boyfriend/girlfriend on this fabulous love day. I've made my wishlist. Do you make your list and do you have some ideas how to spend Valentine's Day? Are you planning romantic dinner or maybe romantic journey with your partner? |
Gracilibacillus alcaliphilus sp. nov., a facultative alkaliphile isolated from indigo fermentation liquor for dyeing.
A facultatively alkaliphilic, lactic-acid-producing and halophilic strain, designated SG103(T), was isolated from a fermented Polygonum indigo (Polygonum tinctorium Lour.) liquor sample for dyeing prepared in a laboratory. 16S rRNA gene sequence phylogeny suggested that SG103(T) is a member of the genus Gracilibacillus with the closest relatives being 'Gracilibacillus xinjiangensis' J2 (similarity: 97.06 %), Gracilibacillus thailandensis TP2-8(T) (97.06 %) and Gracilibacillus halotolerans NN(T) (96.87 %). Cells of the isolate stained Gram-positive and were facultatively anaerobic straight rods that were motile by peritrichous flagella. The strain grew at temperatures between 13 and 48 °C with the optimum at 39 °C. It grew in the range pH 7-10 with the optimum at pH 9. The isoprenoid quinone detected was menaquinone-7 (MK-7) and the DNA G+C content was 41.3 mol%. The whole-cell fatty acid profile mainly (>10 %) consisted of iso-C15 : 0, anteiso-C15 : 0 and anteiso-C17 : 0. Unlike other reported species of the genus Gracilibacillus, the strain lacked diphosphatidylglycerol as a major polar lipid. DNA-DNA hybridization experiments with strains exhibiting greater than 96.87 % 16S rRNA gene sequence similarity, 'G. xinjiangensis' J2, G. thailandensis TP2-8(T) and G. halotolerans NN(T), revealed 2±4 %, 4±9 % and 3±2 % relatedness, respectively. On the basis of the differences in phenotypic and chemotaxonomic characteristics, and the results of phylogenetic analyses based on 16S rRNA gene sequences and DNA-DNA relatedness data from reported species of the genus Gracilibacillus, strain SG103(T) merits classification as a members of a novel species, for which the name Gracilibacillus alcaliphilus sp. nov. is proposed. The type strain is SG103(T) ( = JCM 17253(T) = NCIMB 14683(T)). |
Asenjonamides A-C, antibacterial metabolites isolated from Streptomyces asenjonii strain KNN 42.f from an extreme-hyper arid Atacama Desert soil.
Bio-guided fractionation of the culture broth extract of Streptomyces asenjonii strain KNN 42.f recovered from an extreme hyper-arid Atacama Desert soil in northern Chile led to the isolation of three new bioactive β-diketones; asenjonamides A-C (1-3) in addition to the known N-(2-(1H-indol-3-yl)-2-oxoethyl)acetamide (4), a series of bioactive acylated 4-aminoheptosyl-β-N-glycosides; spicamycins A-E (5-9), and seven known diketopiperazines (10-16). All isolated compounds were characterized by HRESIMS and NMR analyses and tested for their antibacterial effect against a panel of bacteria. |
###### Strengths and limitations of this study
- The study data were obtained through a questionnaire carried out by face-to-face interviews. The youth were trained to obtain dietary diet from their parent and grandparent. They were accompanied by the research assistant during data collection.
- This study provides important insights of differences in food types consumed between the younger and older Pacific generation.
- Exploratory factor analyses was used to examine dietary data between groups, providing robust findings.
```{=html}
<!-- -->
```
- A major limitation is the small sample size of the study; however, this is a feasibility study, and the results are limited to the study participants.
- The use of the dietary diversity questionnaire is based on a limited sampling frame of food group diversity over a 7-day period; therefore, it may not be completely representative of all food items and food groups that may have been consumed by the different age generations.
Introduction {#s1}
============
Pacific peoples in New Zealand (NZ) are at greater risk of developing long-term conditions such as prediabetes, diabetes[@R1] and cardiovascular disease[@R4] due to obesity, defined as having a body mass index (BMI) \>30 kg/m^2^. The prevalence of obesity (67% in adults aged 15+ years) in Pacific peoples is twice that in the general population (33%).[@R5] Obesity has been viewed as a result of the changing westernised environmental pressures,[@R6] leading to an energy expenditure/energy storage mismatch that operates through dietary behaviours.[@R6] Often modernised dietary patterns, characterised by high energy dense and palatable food,[@R8] and eating habits, such as having more access to less healthy snacks and food,[@R9] explain the weight gain.[@R11] The findings from the NZ national nutritional survey on Pacific peoples reported similar patterns of energy, micronutrient intake, dietary supplement use and dietary habits (eg, consumption of breakfast and other food types, fruit and vegetable intake and salt intake), compared with the general population.[@R12]
Obesity rates continue to rise for all young people aged 15--24 years, with the highest increase among young Pacific peoples (up by 50% between 2007 and 2012).[@R13] Previous NZ research has documented the impact of family meals on the dietary quality of young people[@R14] and found that eating family meals together had an overall positive effect on the home food environment[@R15] and that it encouraged the availability of more healthy food.[@R10] Results from the Youth'12 Survey highlighted similar findings that shared family meals were associated with positive outcomes for young people, which were accentuated for those living in the lower deprivation neighbourhoods (66%), compared with those in the higher deprivation areas (58%).[@R16] However, the survey results do not provide any clues as to the obesity-related mechanisms to further understanding about why young people continue to eat unhealthily. It has also been shown that young people experiencing poverty, irrespective of living in either low deprivation or more affluent neighbourhoods, does not explain overweight and obesity issues for young people.[@R17] Little research has focused on understanding the Pacific concept of socialisation and food as inter-related activities, and there is increasing recognition of the importance of this if obesity prevention strategies are to effective.[@R18]
In 2014, we investigated obesity-related health issues among 30 Pacific youth from the Wellington and Auckland regions of NZ in the pilot study, '*Chewing the facts on fat! What does that say about me?*'. The methodology and scope of the study has been published elsewhere.[@R19] As part of that study, we also examined Pacific youths' diet and eating habits as it relates to obesity development. In particular, we explored dietary diversity as a form of investigating diet quality, which could be useful in identifying dietary component needs and provide insights to guide development of intervention strategies to improve diet quality and health outcomes for young Pacific peoples. The aim of the current paper is to examine the intergenerational dietary patterns among 30 young Pacific adults aged 15--24 years, and 34 parents and grandparents, from Wellington and Auckland regions.
Method {#s2}
======
From a pilot study of 30 young Pacific adults aged 15--24 years in Wellington and Auckland, NZ, we investigated the social cultural determinants of the obesogenic environment. The study was conducted in two phases, and the original study methodology has been previously published,[@R19] which described the recruitment, questionnaire data and the social demography of the participants, from phase 1. This paper presents data mainly from phase 2, obtained from young Pacific peoples who were trained to interview and obtain information from one Pacific parent and one Pacific grandparent to examine and compare older generation's dietary habits with those of the Pacific youth group (phase 1) using the Pasifika dietary diversity questionnaire (described below). As Pacific peoples are not a homogenous group, we will refer to them as Pasifika, defined as a collective group of people representing the different Pacific Island nations and their respective languages, social cultural realities and protocols.
Patient involvement {#s2a}
-------------------
Patients were not involved in the planning or design of the study.
Demography {#s2b}
----------
Basic descriptive data were obtained from the parent and grandparent as per the protocol (face to face) described in phase 1 of the study,[@R19] including measured weight and height, from which BMI was determined. We used the international standard cut-offs in defining obesity.[@R20] BMI was analysed as a continuous variable, with a BMI of ≥30 kg/m^2^ and 25--29.9 kg/m^2^ defined as being obese and overweight, respectively.[@R21] Waist-to-hip circumference was also measured, from which the waist--hip ratio (WHR) was determined to provide a measure of central adiposity to indicate associated risk of incident cardiovascular events.[@R22] The waist-to-height ratio (WtHR) was also calculated, as an adjunct measure of central obesity, which is less prone to measurement error than WHR.[@R23] Deprivation was assessed using the NZDep2013 measure,[@R25] a small area-based measure of deprivation derived from the 2013 Census, which uses nine variables (benefit income, employment, household income, communication, transport, support, qualifications, living space and home ownership) from the Census to place small area blocks on a deprivation scale from 1 to 10 with 10 representing the most deprived 10% of NZ areas, while 1 represents the 10% least deprived areas. For analyses, deprivation was categorised into quintiles combining deciles 1--2, 3--4, 5--6, 7--8 and 9--10. Ethnicity was defined according to standard NZ Census data[@R26] and self-identified by each participant; however, for participation in the project, parents and grandparents needed to be self-identifiable as being of Pacific ethnicity. Where possible, the participants were also invited to record any physician-diagnosed conditions to highlight the presence of morbidity.
Dietary diversity {#s2c}
-----------------
The Pacific dietary diversity questionnaire was compiled by the research team to assess the scope of individual foods and food groups in Pacific peoples' diets. The dietary diversity questionnaire aims to capture the 'range of food' that people consume over a 7-day period and not to measure quantity of food items like the 'food frequency questionnaire'. This type of assessment has been used among other indigenous groups successfully, and it has been proven to be effective than a quantitative assessment of describing the quality of the diet.[@R27] This questionnaire was pretested among an independent community group of Pasifika youth (n=30) from Wellington, and it was adapted to include common food that would be consumed by Pasifika people in NZ (eg, povi masima \[salted meat\]).
Data on different individual foods and food groups that were consumed over a 7-day period (reference period) were collected and recorded (dichotomised: yes/no) by the Pacific youth who were participants in phase 1 and were trained by the research team at a single day workshop. The training involved familiarising and understanding the questionnaire and prompts. Following the training day, each youth arranged and organised a face-to face interview (accompanied by a research assistant), with a parent and grandparent. The questionnaire included both nutritious and discretionary food and food groups to encapsulate the diversity of food groups and of food items. The questionnaire data produced a total of 26 food groups (15 nutritious and 11 discretionary) specifically consumed by the study participants. However, using exploratory factor analyses (EFA) (see below) in order to create meaningful summary patterns that describe types of diet, we had refined the food groups down to 13, as determined by the total percentage of items consumed within a food grouping, per person. The groupings are: group 1: meats, poultry and fish diversity; group 2: dairy products diversity; group 3: bread, cereals and starchy vegetable diversity; group 4: legumes and nut diversity; group 5: fruit diversity; group 6: vegetable diversity; group 7: oil and fat diversity; group 8: drinks diversity; group 9: alcohol diversity; group 10: sauces, spreads and flavouring diversity; group 11: sweets and sweet snacks diversity; group 12: savoury snacks diversity; and group 13: take way food diversity.
Eating habits and meal patterns, food choices and related cultural and social influences were also investigated, but the results are not presented here.
We also included a measure of acculturation using a tool developed by coauthor JK and his colleagues[@R33] to examine affiliation to traditional or mainstream culture. The tool was used in this project to examine metabolic health outcomes in relation to the participants' affiliation with their Pacific heritage and or mainstream culture. This has been described in detail previously,[@R19] and the responses were grouped based on a summation of the following categories: *integrated* (high affiliation with Pacific heritage and mainstream culture); *tradition* (high affiliation with Pacific heritage only); *assimilated* (high affiliation with mainstream culture only); and *marginalised* (low affiliation with both Pacific heritage and mainstream culture).
Data analysis {#s2d}
-------------
Descriptive data of the parent/grandparent characteristics (ie, sex, ethnicity, education, diagnosed comorbidities, deprivation, body weight anthropometrics and acculturation mode affiliation) were analysed by distribution proportions.
EFA was used for analysis of the 13 food data groups (described above). With this approach, we originally intended to identify dietary patterns between three generational groups. Due to small numbers in the older generational group, the parents and grandparents were combined to form a single group ('old'), which was compared with the youth responses ('young') obtained from phase 1. Each dietary pattern was allocated weights for each food group, which were used to calculate a standardised mean score for each dietary pattern. EFA analysis was conducted in SAS for Windows V.9.1 (SAS Institute, Cary, NC, USA), and each factor was rotated and compared (promax and varimax) to identify and improve interpretability of each factor loading. Parallel analyses and scree plots were also used to check for data interpretability. Each of the dietary pattern scores was standardised to have a mean of zero and a variance of one. Each participant was assigned a score for each dietary pattern, since a typical person's diet may include characteristics of more than one pattern. Thus, the dietary pattern scores are a constant measure of how closely the participant's diet matches each type of diet. Based on the EFA of all the participants' dietary intake, standardised scores above 0.3 (ie, threshold) for any given food grouping indicated a strong propensity matched to a particular dietary pattern. Thus, we have identified three distinctive dietary pattern groups (from 65 potential dietary groups). Our selection of the three-factor loadings was confirmed by parallel analyses. Negative scores are indicative of participants 'less likely' to consume dietary patterns.
From our univariate logistic regression analyses (data not presented here), we identified potential independent factors that may explain differences in dietary scores between the young and old participants. Therefore, multivariate logistic regression was applied to further examine the association between participant's dietary patterns and those variables. (acculturation status, sex, treatment for comorbidities such as asthma, high blood pressure, heart troubles, diabetes, stroke, thyroid problems, psychological problems and sleep problems).
Results {#s3}
=======
Demographics of the old and young participant groups {#s3a}
----------------------------------------------------
[Table 1](#T1){ref-type="table"} highlights the main characteristics of the young and old generation groups that participated in the study. In addition to the 30 young people, a total of 34 parents and grandparents (ie, old group) took part in phase 2 of the study. There were no significant differences between the young and old gender groups. The average age of the parent's group was 50.2 years old and for the grandparent's group 72.2 years old (for both sexes). Education background showed that the more than half (52.9%) of the old group had postschool qualifications; the majority (80%) of the young group had any school qualification. Thus, education status was non-remarkable with no significant differences between the two groups. The participants self-identified across a range of ethnic groupings including different Pacific Island nations, such as Samoa, Tonga and Tokelau representing the dominant Pacific ethnic affiliations. Other ethnic groups included: Māori, Chinese and NZ European. This is an indicator of the growing 'diversity' of intermixing between Pacific and other ethnic groups. However, the important thing to note, is that the participants continue to self-identify and affiliate strongly with their Pacific culture and values. The majority of the young (80%) and old (73%) groups assessed their acculturation mode as being 'integrated', illustrating that both groups have an *equally* high affiliation with both Pacific and mainstream cultures, although this was not statistically significant. The old group rated their affiliation with living a more 'traditional' (17.7%) lifestyle, compared with the young group (6.7%), suggesting young people have less involvement within the Pacific community and other wider activities, at the time of the study. When examining socioeconomic position using the NZ Deprivation (2013) scale, comparing the old and young groups, those living in the 'least deprived' (NZDep 1--2) areas, with those living the 'most deprived (NZDep 9--10) areas, there were no differences between each group. For this study, the majority of both young (46.7%) and old (51.5%) participants lived the highest deprived areas of the region.
######
Distribution of participant characteristics
Proportion (%) or mean (SD) by young and old
-------------------------------- ---------------------------------------------- -------------- ---- -------------- ---- -------------- --------------
Gender
Male 19 29.7 11 36.7 8 23.5
Female 45 70.3 19 63.3 26 76.5 0.251
Ethnicity
NZ European 6 9.4 5 16.7 1 2.9 0.091
Maori 2 3.1 1 3.3 1 2.9 1.000
Samoan 30 46.9 14 46.7 16 47.1 1.000
Cook Island Maori 3 4.7 3 10.0 0 0.0 0.097
Tongan 15 23.4 7 23.3 8 23.5 0.985
Niuean 6 9.4 4 13.3 2 5.9 0.407
Tokelauan 10 15.6 5 16.7 5 14.7 1.000
Tahitian 1 1.6 1 3.3 0 0.0 0.469
Kiribatian 1 1.6 0 0.0 1 2.9 1.000
Fijian 5 7.8 3 10.0 2 5.9 0.659
Chinese 6 9.4 5 16.7 1 2.9 0.091
Education
Any school qualification 45 70.3 24 80.0 21 61.8 0.111
Postschool qualification 30 46.9 12 40.0 18 52.9 0.301
NZDep2013
1--2 4 6.4 2 6.7 2 6.1
3--4 7 11.1 4 13.3 3 9.1
5--6 5 7.9 1 3.3 4 12.1
7--8 16 25.4 9 30.0 7 21.2
9--10 31 49.2 14 46.7 17 51.5 0.673
Missing 1
Comorbidities
Asthma 16 25.0 6 20.0 10 29.4 0.386
High blood pressure 19 29.7 0 0.0 19 55.9 \<0.0001\*\*
Diabetes 11 17.2 0 0.0 11 32.4 0.0006\*\*
Other conditions 17 26.6 4 13.3 13 38.2 0.024\*
Metabolic syndrome conditions 22 34.4 0 0.0 22 64.7 \<0.0001\*\*
Acculturation
Integrated 49 76.6 24 80.0 25 73.5
Traditional 8 12.5 2 6.7 6 17.7
Assimilated 4 6.3 3 10.0 1 2.9
Marginalised 3 4.7 1 3.3 2 5.9 0.462
Anthropometrics P value‡
Age 64 40.6 (22.1) 30 19.5 (2.4) 34 59.3 (12.7) \<0.0001\*\*
Weight (kg) 64 92.9 (20.6) 30 90.5 (18.3) 34 94.9 (22.5) 0.399
Height (cm) 62 166.1 (10.9) 29 170.4 (10.2) 33 162.2 (10.2) 0.002\*
BMI (kg/m^2^) 62 33.7 (7.5) 29 31.0 (6.9) 33 36.1 (7.2) 0.006\*
Waist-to-hip ratio 59 0.9 (0.11) 26 0.84 (0.05) 33 0.94 (0.13) 0.0002\*\*
Waist-to-height ratio 58 0.62 (0.10) 25 0.56 (0.09) 33 0.66 (0.08) \<0.0001\*\*
NZDep2013=quintiles: 1 (lowest deprivation) to 5 (highest deprivation).
\*p values \<0.05; \*\*p values \<0.001.
†χ^2^.
‡Test.
BMI, body mass index.
Regarding the known comorbidities, these were evident primarily in the old group, and in particular, high blood pressure (59.9%) and diabetes (32.4%), with both conditions showing statistically significant differences between the young and old groups. Of note, other conditions (gout, low blood pressure, leg ulcer, arthritis, eczema, allergies) demonstrated significant differences between the old and young. In addition, we combined several conditions (high blood pressure, heart trouble and diabetes) that form part of the metabolic syndrome.[@R34] This condition indicated a significant statistical difference.
Means and SD for the anthropometric measures comparing both groups illustrated that, on average, the old group were heavier (94.9 kg), compared with the young (90.5 kg) group. Across both groups, the average BMI was 33.7 kg/m^2^ (7.5 kg), and the old group showed a higher BMI (36.6 kg/m^2^) compared with the young (31.0 kg/m^2^). Nonetheless, the average BMI data indicated that the study participants were significantly obese. Moreover, central fatness as measured by the WHR and WtHR ratios, the old group showed a very high WHR ratio (mean: 0.94; 0.13), and for the young group, the average WHR ratio was 0.84 (0.05). According to the WHO, this is indicative of a higher than normal risk of developing heart disease and other serious conditions.[@R37] Both young and old groups attained an overall average (WtHR) of 0.62 (0.10), as a measure of body fat distribution,[@R38] and the scores are indicative of being at high risk of developing disease morbidities such as heart attack and stroke[@R23] but not of any new disease diagnoses, like diabetes.[@R39]
Using EFA, standardised scores above 0.3 for any given food grouping were matched to a particular dietary pattern, and we identified three-factor loaded patterns ([table 2](#T2){ref-type="table"}). The patterns provided a reasonable summary of dietary patterns with the scree plot elbow being at approximately 3 and the three factors cumulatively explaining 28% of the variance in dietary intake data, resulting in interpretable dietary patterns. The following are suitable descriptions of the three dietary patterns: (1) dietary pattern 1: 'healthy food': characterised by moderate-to-high intake of proteins/meats, fruits and vegetables; (2) dietary pattern 2: 'processed food': characterised by high intake of sweets, snacks, takeaways and sugary beverages; and (3) dietary pattern 3: 'mixed food': characterised by limited healthy and more processed food group intake. Of particular note, the high intake (ie, ≥70% per food item checked) of sugary beverages (eg, soft drinks, juice and tea), alcohol (eg, beer, wine and kava) and dairy food (eg, ice cream, cheese and dairy food) consumption marks this dietary pattern as being remarkably different from the other two patterns.
######
Food grouping factor loadings for all participants by dietary pattern
Food items Healthy diet Processed diet Mixed diet
--------------------------------------------------------- -------------- ---------------- ------------
Group 1: meat, poultry, fish diversity 0.63 0.17 0.39
Group 2: dairy products diversity 0.38 0.19 0.68
Group 3: bread, cereals and starchy vegetable diversity 0.74 0.36 0.21
Group 4: legume and nut diversity 0.59 0.09 0.27
Group 5: fruit diversity 0.92 0.16 0.16
Group 6: vegetable diversity 0.76 0.14 0.32
Group 7: oil and fat diversity 0.38 0.28 0.47
Group 8: drinks diversity 0.30 0.44 0.57
Group 9: alcohol diversity 0.19 0.07 0.46
Group 10: sauces, spreads and flavouring diversity 0.61 0.41 0.48
Group 11: sweets and sweet snacks diversity 0.16 0.63 0.56
Group 12: savoury snacks diversity 0.22 0.97 0.05
Group 13: take away food diversity 0.18 0.64 0.42
[Table 3](#T3){ref-type="table"} compares the dietary patterns of the young and old generation using the mean scores and two-sample t tests (p value). It showed there were statistically significant dietary differences between these two groups, predominantly in food groupings 1, 3, 5 and 6. The types of food items young people consumed in very high proportions (ie, \>80% consumption) over a 7-day period were: group 1 (meat, poultry and fish diversity): beef (87%), chicken (87%) and eggs (83%); group 3 (bread, cereals and starchy vegetable diversity): white/brown bread (100%), rice (90%) and potatoes (80%); group 5 (fruit diversity): banana (100%); and group 6 (vegetable diversity): onions (93%), carrots (96.7%), lettuce (83%), garlic (80%), broccoli (80%) and tomatoes (80%).
######
Comparing young versus old dietary patterns (7-day measure)
-------------------------------------------------------------------------------------------------------------
Food groups Young\ Old\ P value\*
Phase 1, n=30 Phase 2,\
n=34
----------------------------------------------------- --------------- ----------- ----------- ------- -------
Group 1: Meat, poultry, fish diversity 38.27 15.63 52.72 21.36 0.003
Group 2: Dairy products diversity 33.70 14.29 31.04 20.15 0.550
Group 3: Bread, cereals starchy vegetable diversity 40.42 17.31 49.17 17.00 0.046
Group 4: Legume and nut diversity 28.14 19.29 34.96 23.39 0.212
Group 5: Fruit diversity 31.11 21.75 48.04 25.40 0.006
Group 6: Vegetable diversity 38.65 17.72 53.26 23.45 0.007
Group 7: Oil and fat diversity 43.70 17.00 49.01 20.85 0.272
Group 8: Drinks diversity 46.22 19.57 41.17 19.86 0.311
Group 9: Alcohol diversity 7.92 16.57 8.09 14.06 0.964
Group 10: Sauces, spreads and flavouring diversity 39.84 15.18 44.65 20.22 0.292
Group 11: Sweets and sweet snacks diversity 50.83 22.88 48.04 28.21 0.668
Group 12: Savoury snacks diversity 41.67 20.86 40.59 29.02 0.864
Group13: Take away food diversity 44.05 20.47 38.44 25.66 0.342
Dietary patterns, by mean scores (%)
Healthy dietary pattern 36.07 14.93 47.13 17.90 0.010
Processed dietary pattern 45.51 19.16 42.36 24.38 0.570
Mixed dietary pattern 32.88 13.28 32.33 14.72 0.875
Dietary patterns, by standardised scores
Healthy dietary pattern −0.26 0.90 0.23 1.04 0.052
Processed dietary pattern −0.04 0.93 0.03 1.07 0.789
Mixed dietary pattern −0.09 0.94 0.08 1.06 0.496
-------------------------------------------------------------------------------------------------------------
\*Based on means score and two-sample t-test.
The old generation demonstrated somewhat more variety in the items they consumed (on average) per food grouping. These were: group 1 (meat, poultry and fish diversity): chicken whole/thighs/drumstick (94%), eggs (94%), fresh white fish (eg, hoki and snapper) (91%) and chicken wings (82%); group 3 (bread, cereals and starchy vegetable diversity): white/brown bread (100%), rice (88%) and taro (88%); group 5 (fruit diversity): banana (100%), apple (88%) and orange (85%); and group 6 (vegetable diversity): onions (94%), lettuce (85%), garlic (85%), cabbage (82%) and cauliflower (80%), as indicated by listing the individual food items.
There were also differences between the two old generations (ie, parent vs grandparent) (data not shown) by: group 9 (alcohol diversity): examples of items consumed included wine and kava. The median score for parents was 0.65 and for grandparents was 0.28 (p value=0.004); and group 11 (sweets and sweet snacks diversity): examples of items consumed included plain biscuits, cakes and chocolates. The median score was 0.65 for parents and 0.28 for grandparents (p value=0.033). This indicates that the parent generation consumes statistically significantly more alcohol and high sugar snacks than the grandparents.
Additionally, based on '*percentage dietary patterns scores*', there was a significant difference (p value=0.010) between the young and old groups for the 'healthy dietary pattern', with the older group showing a higher percentage intake of this dietary pattern. Based on the '*standardised dietary pattern scores*', comparing the young and old groups, there was a trend for significance (p value=0.052). The scores indicated that the young group were less likely to consume a healthy dietary pattern than the old group.
We carried out univariate analyses (data not presented here) and identified certain characteristics that contributed to the difference in dietary pattern scores. Therefore, [table 4](#T4){ref-type="table"} illustrates a multivariate regression model using standardised regression coefficients to measure the strength of independent relationships of (known relationships and statistically significant) variables identified from earlier analyses. The key independent variables shown to have a positive influence on the dietary patterns were predominantly *acculturation*, particularly 'assimilation' and 'marginalised' modes, and high *socioeconomic deprivation*, particularly quintiles 7--8 and 9--10. After controlling for other variables, trending for significance for BMI had dissolved, and age indicated no relationship for processed and mixed dietary patterns.
######
Multivariate analyses examining dietary factor patterns and demographic characteristics
Variable (number) Factor 1: healthy diet Factor 2: processed diet Factor 3: mixed diet
--------------------- ------------------------ -------------------------- ---------------------- ------- --------------- -------------- ------- --------------- --------------
Phase
Old (30) Ref Ref Ref
Young (34) 0.05 −0.81 to 0.92 0.904 0.09 −0.86 to 1.04 0.850 0.12 −0.70 to 0.95 0.762
Gender
Male (19) Ref Ref Ref
Female (45) −0.02 −0.58 to 0.54 0.941 −0.14 −0.64 to 0.36 0.575 −0.19 −0.74 to 0.37 0.504
Acculturation
Integrated (49) Ref Ref Ref
Traditional (8) −0.65 −1.15 to 0.15 0.013\* −0.36 −0.86 to 0.14 0.155 −0.62 −1.14 to 0.09 0.021\*
Assimilated (4) −0.88 −1.47 to 0.29 0.004 −1.06 −1.57 to 0.55 0.0001\*\* −1.03 −1.59 to 0.47 0.0006\*\*
Marginalised (3) −1.30 −2.27 to 0.33 0.010\* −1.23 −2.17 to 0.29 0.011\* −1.31 −2.13 to 0.49 0.002\*
NZDep13 (quintiles)
1--2 (4) Ref Ref Ref
3--4 (7) 0.39 0.08 to 0.69 0.013\* 0.45 0.25 to 0.65 \<0.0001\*\* 0.48 0.17 to 0.79 0.003\*
5--6 (5) 0.96 0.14 to 1.78 0.022\* 0.94 0.28 to 1.60 0.006\*\* 0.82 −0.06 to 1.69 0.067
7--8 (16) 1.26 0.81 to 1.71 \<0.0001\*\* 1.10 0.66 to 1.54 \<0.0001\*\* 1.08 0.67 to 1.47 \<0.0001\*\*
9--10 (31) 1.00 0.65 to 1.32 \<0.0001\*\* 0.97 0.66 to 1.28 \<0.0001\*\* 0.90 0.57 to 1.23 \<0.0001\*\*
BMI (n) (SD) (SD) (SD)
62 0.015 0.01 0.226 0.013 0.01 0.302 0.01 0.01 0.140
Age
64 0.012 0.01 0.240 −0.00 0.01 0.952 0.00 0.00 0.797
P value=χ^2^ test.
\*p\<0.05; \*\*p\<0.001.
BMI, body mass index; RCE, regression coefficient estimate; P value=chi square test.
Discussion {#s4}
==========
In a sample of 30 Pasifika youths and 34 older Pasifika adults (parents and grandparents), we identified three distinctive dietary pattern groups: healthy diet, processed diet and mixed diet. In relation to these dietary patterns, there were three major findings. First, although the mixed dietary pattern contained 8 of the total 13 food groups, it had the highest average consumption of dairy products, sweetened beverages and alcohol intake, potentially making it the unhealthiest of the three dietary patterns. Although the questionnaire did not measure the 'actual' amounts, frequency or average volume of drinks per week of the sweetened and alcohol beverages, it has been well established that alcohol is the second most energy dense macronutrient[@R40] and favours fat storage resulting in weight gain.[@R37] Similarly, sugar-sweetened beverages and fast food were more available within the home environment. A recent study reported 58% of Pacific children consume high amounts of fizzy drinks compared with non-Pacific children (15%). Moreover, Pacific youth consumed high (29%) and moderate (45%) amounts (ie, 1--3 times a week) of soft drinks in the past week compared with 25% of children who were considered to be low consumers.[@R41] Data from the NZ Youth Survey 2012 revealed that in the previous 7 days[@R42] youth residing in the highest deprivation decile were almost four times more likely to consume four or more energy drinks, three times more likely to eat fast food at least four times a week and five times more likely to eat other takeaways at least four times. This is compounded by social marketing targeting the younger generation as their main customers due to their spending power, purchasing influence, as emergent behaviours of adult customers.[@R43] With the advent of online advertising and shopping and mobile media, public health policy and researchers are lagging well behind in being aware of and understanding the potential impact of the latest and continuously developing advertising techniques used on children and youth. More work and comprehensive monitoring are needed in this space.[@R44]
Second, there were major significant differences reported from [table 3](#T3){ref-type="table"} between the young and old in relation to the four food groups: (1: meat, poultry and fish; 2: breads, cereal and starchy vegetables; 3: fruit diversity; and 4: vegetable diversity). More specifically, the old generation ate a greater range of items from each food group than the young generation. Furthermore, dietary patterns between the two groups also differed. The mean food scores for the old group being primarily characterised by the 'Healthy diet', in contrast with the younger generation who were more likely to consume a 'Processed diet'. Multiple factors may influence eating behaviours and food choices between young and old. For instance, the idea that eating family meals promotes togetherness and is positively associated with overall well-being within the home food environment is an important factor. However, a NZ-based research study reported no significant relationship between the frequency of family meals and the availability of high sugar/high fat snack foods and fast food. In fact, adolescents who regularly ate with their family were just as likely to consume less healthy snack food. Parental education and family work schedules were regarded as potential explanatory factors for the lack of association.[@R10] For our study, all of our youth lived at home with their parents, and although we did not specifically collect data on the home food environment, we have previously reported data on this study groups' purchasing behaviour. That is, the youth purchased savoury and sweet snack food from specific shops in their local neighbourhoods spending up to \$24 over a 7-day period.[@R19] It is likely that this behaviour is contributing to the difference in dietary diversity between the two generational groups. Food purchasing and eating behaviours outside of the home environment is a tremendously influential force, particularly in regards to the obesogenic environment.[@R45] More understanding around the impact of health education and health promotion messages targeting healthy eating is needed to make mindful decisions and subsequent behavioural changes to support vulnerable communities for the sake of healthier living. However, by comparing standardised food scores, the difference between young and old (particularly for the healthy dietary pattern) trended towards significance (p value=0.052), and it is likely that other factors may explain the difference rather than just the food types consumed between the two generation groups.
Finally, from our multivariate regression analyses, we found that *acculturation* (categorised affiliation with Pasifika and mainstream cultures) and *socioeconomic position* (NZ Deprivation) played a significant role in influencing dietary patterns. For acculturation, those who described themselves as being 'assimilated' (ie, a high degree of affiliation with NZ's mainstream culture) and 'marginalised' (ie, a low affiliation with both Pacific heritage and mainstream culture) were significantly less likely to exhibit characteristics of these dietary pattern groups, based on their high negative coefficients. Although they were significant negative relationships for 'traditional', 'assimilation' and 'marginalised' modes across all dietary patterns, it was more marked (high negative coefficients) for those who affiliated with the 'marginalised' mode for healthy diet (regression coefficient estimate \[RCE\]: −1.30), processed diet (RCE: −1.23) and mixed diet (RCE:−1.31), compared with those identified as being 'integrated' with both Pacific heritage and mainstream culture. Similarly, those who aligned with the 'assimilation' mode also indicated significantly high negative relationships with processed diet (RCE: −1.06) and mixed diet (RCE: −1.03). However, this finding needs to be interpreted with caution (ie, the wide CIs) because of the small number of participants for this specific analyses. Nonetheless, this finding suggests that the 'assimilated' and 'marginalised' groups have different behaviours that may be protective for their overall health (eg, they may do more physical activity and eat more healthily), compared with the majority of this sample (who were 'integrated'). There are studies that suggest greater acculturation increases the risk of obesity among indigenous groups.[@R46] Some studies suggest that the obesogenic environments of host countries promote weight gain among migrants that significantly increase over 10--15 years postmigration, by which time migrants' obesity rates match or become greater than that of the host population.[@R49] The impact of the relationship between acculturation and obesity continues to remain unclear, however, there is a need for validated and comprehensive acculturation scales to be used between studies to enable comparability of results.[@R33]
Socioeconomic deprivation as measured using the NZ Deprivation scale also highlighted strong positive relationship with the three dietary patterns. In particular, those people residing in the high-to-highest deprived areas (quintiles 7--8 and 9--10) had strong positive relationships, compared with those living in the least deprived areas (quintile 1--2), where the coefficients were closer to 0. This finding is not new but provides added support to the knowledge-base that high deprivation plays an important role in financial and economic barriers to have access to good quality food (particularly for processed and mixed dietary patterns).[@R51] However, for those living in the high-to-highest deprived areas, showing a positively strong relationship (quintile 7--8 RCE: 1.26 and quintile 9--10 RCE: 1.00) to a 'healthy diet' maybe reflective of some people instigating the efforts to improve behaviours and preparing and eating food at home, rather than purchasing meals and snacks prepared away from the home, that are higher in fat and saturated fat and contain less nutritional value[@R51]
Study limitations {#s4a}
-----------------
A major limitation of the study is the sample size that restricts our ability to make any definitive inferences of the observed dietary patterns described above. As this is a feasibility study, these patterns reflect the behaviours of the study participants and cannot be generalised to Pasifika youth and adults in general. In addition, the Pacific-focused dietary diversity questionnaire was developed, including both nutritious and discretionary foods and food groups to capture diversity (food groups) and variety (food items) and does not measure quantity and so we cannot be definitive about the defined dietary patterns, which is also reflective of the study participants. The EFA analyses allowed us to examine the highest and lowest variety of food groups that were consumed, and this provided important insight in identifying which dietary components needs to be addressed, and it could guide intervention strategies to improve diet quality to improve health outcomes. Furthermore, we are cognizant that the data collected from the limited sampling frame of food group diversity over a 7-day period may not be completely representative of all food items and food groups that may have been consumed by the different age generations. Finally, although the study highlighted behavioural patterns of diet, the study also showed 'no relationship' between the dietary patterns and obesity-related parameters (BMI, WHR and WtHR) and poor health, and this may be due to limited sample size, as other studies have shown clear associative links.
Conclusion {#s5}
==========
Our investigation of the food consumed by young and old Pacific people allowed us to identify three distinctive dietary patterns based on the high food scores. There was an intergenerational difference in dietary patterns, with the younger generation tending to consume a more limited diet, compared with the old group. The older generation consumed more diversity in their food groups and a healthier dietary pattern. These patterns may be related to the social cultural aspects of obesity in relation to dietary habits, such as the young generation who are opting to eat more high fat, high sugar snacks outside of the home food environment. There was a strong negative relationship between the level of acculturation and dietary patterns, and a strong positive relationship of dietary patterns among those living in the high-to-highest deprivation areas. Our findings provide added social cultural insights that could guide improved health promotion strategies to increase health outcomes of young and older Pacific family members. In particular, improvements in highlighting more healthy food group options, encourage food diversity within the home and social environments and enhance access to health education about food items for the whole family.
Supplementary Material
======================
###### Reviewer comments
###### Author\'s manuscript
The authors would like to acknowledge the partnership funding from the Health Research Council of NZ and the Ministry of Health who supported this study. We also thank our collaborating partners: The Fono and Evolve for participating in this project. We acknowledge the efforts of collaborators: Bernhard Breier, Rozanne Kruger and Te Kani Kingi, and our research assistants: Ms Hana Tuisano and Mrs Moana Manukia for conducting the interviews with the young participants. Finally, the authors are indebted to the efforts and participation of the Pasifika youth and their families.
**Contributors:** RTT-F designed the study and drafted the manuscript. JK, BB and LE-L help informed the study design and JK assisted in interpretation of the acculturation tool. SC analysed the data. All authors read and approved the final manuscript.
**Funding:** This work was supported by the Health Research Council of NZ and the Ministry of Health grant (12/953).
**Competing interests:** None declared.
**Ethics approval:** Ethical approval for the overall study was received from the Central Health and Disability Ethics Committee, NZ (13/CEN/22).
**Provenance and peer review:** Not commissioned; externally peer reviewed.
**Data sharing statement:** No additional data available.
**Patient consent for publication:** Not required.
|
A mix of recently cut and still little used trail from the Heritage Park, with at times a recently laid in base (still soft), some fire roads and shield terrain. Trail is more used from and around the suspension bridge through the town of Pinawa
User Reviews (1)
Showing 1-1 of 1
Ben [Sep 15, 2002]
Interesting mix of various terrain, with sections between the Pinawa Heritage Dam site and the suspension bridge just recently cut and still somewhat soft. This trail is part of the Trans Canada Trail and is well marked and should be well maintained. This is a multi use trail so priority and curtesy should be extended to hikers/walkers. Trail winds also through the town of Pinawa with more users there so be careful with joggers/hikers etc. Shield terrain between the suspension bridge and the town but nothing more than intermediate ability needed and maybe less if you are willing to walk a few limited sections. Good workout, good views particularly from the bridge to the town. Abt 10 mi. one way 15-16km.
Customer Service
see abovemap of trail available at www.mrta.mb.ca
Similar Products Used: Falcon Lake to West Hawk multi use trail - abt 16km one way. Good gravel base single track, not technically difficult but great work out on a tricky surface when pushing hard.
OVERALLRATING
4
★★★★★
★★★★★
VALUERATING
★★★★★
★★★★★
Ben
[Sep 15, 2002]
Interesting mix of various terrain, with sections between the Pinawa Heritage Dam site and the suspension bridge just recently cut and still somewhat soft. This trail is part of the Trans Canada Trail and is well marked and should be well maintained. This is a multi use trail so priority and curtesy should be extended to hikers/walkers. Trail winds also through the town of Pinawa with more users there so be careful with joggers/hikers etc. Shield terrain between the suspension bridge and the town but nothing more than intermediate ability needed and maybe less if you are willing to walk a few limited sections. Good workout, good views particularly from the bridge to the town. Abt 10 mi. one way 15-16km.
Customer Service: see abovemap of trail available at www.mrta.mb.ca
Similar Products Used:
Falcon Lake to West Hawk multi use trail - abt 16km one way. Good gravel base single track, not technically difficult but great work out on a tricky surface when pushing hard. |
Q:
PHP: Text Area echo in form won't echo during validation
Currently I have a form that goes through validation, and echo statement that are entered and returned errors on what needs to be filled in. My commenting area is within a tag. It throws the error when it's empty. But when it's filled and other areas are empty, it DOES NOT echo the previously entered text.
I view another question that claims to have an answer. Previous I was using:<?php echo $_POST['email']; ?> in my value result. The "answer" said to replace value with and htmlentities() as such: <?php echo htmlentities($comments, ENT_COMPAT,'ISO-8859-1', true);?> However, that did not work either.
I want the comments to echo, when text is entered, but other areas still need info.
HTML form text area:
<textarea name="comments" maxlength="500" rows="10" cols="10" placeholder="Please enter your comments here..." value="<?php echo htmlentities($_POST['comments'], ENT_COMPAT,'ISO-8859-1', true);?>"></textarea>
PHP (not sure if needed here in this answer):
<?php
if(!empty($_POST)){
$POST = filter_post($_POST);
$invoice = array_splice($POST,3,1);
$MSG = check_empty($POST);
if(!array_filter($MSG)){
$POST['invoice'] = $invoice['invoice'];
if(send_mail($POST)){
$MSG[] = "Email Success";
}
else{
$MSG[] = "Email Failed";
}
}
}
function filter_post($POST){
$keys = array('name','phone','email','invoice','comments');
$POST = array_intersect_key($POST, array_flip($keys));
$POST = array_map('strip_tags', $POST);
return($POST);
}
function check_empty($POST){
foreach($POST as $key => $value){
if(empty($value)){
$MSG[] = "You need to fill out the $key section";
}
}
return($MSG);
}
function send_mail($POST){
extract($POST);
$to = '[email protected]';
$sbj = 'New Question For Se7en Service!';
$msg = "Name: $name \n Phone: $phone \n Email: $email \n Invoice #: $invoice \n Comments: $comments";
$headers = "From: $email";
return(mail($to, $sbj, $msg, $headers));
}
function output_errors($MSG){
return '<ul><li>' . implode('</li><li>', $MSG) . '</li></ul>';
}
?>
Link to question with answer that didn't work for me.
A:
<textarea> element does not have a value attribute. The 'value' is set between the opening/closing tags ->
<textarea name="comments" maxlength="500" rows="10" cols="10" placeholder="Please enter your comments here...">
<?php echo htmlentities($_POST['comments'], ENT_COMPAT,'ISO-8859-1', true);?>
</textarea>
http://www.w3.org/TR/html401/interact/forms.html#h-17.7
or
http://www.w3.org/TR/html-markup/textarea.html
|
Q:
Create tuples of (lemma, NER type) in python , Nlp problem
I wrote the code below, and I made a dictionary for it, but I want Create tuples of (lemma, NER type) and Collect counts over the tuples I dont know how to do it? can you pls help me? NER type means name entity recognition
text = """
Seville.
Summers in the flamboyant Andalucían capital often nudge 40C, but spring is a delight, with the parks in bloom and the scent of orange blossom and jasmine in the air. And in Semana Santa (Holy Week, 14-20 April) the streets come alive with floats and processions. There is also the raucous annual Feria de Abril – a week-long fiesta of parades, flamenco and partying long into the night (4-11 May; expect higher hotel prices if you visit then).
Seville is a romantic and energetic place, with sights aplenty, from the Unesco-listed cathedral – the largest Gothic cathedral in the world – to the beautiful Alcázar royal palace. But days here are best spent simply wandering the medieval streets of Santa Cruz and along the river to La Real Maestranza, Spain’s most spectacular bullring.
Seville is the birthplace of tapas and perfect for a foodie break – join a tapas tour (try devoursevillefoodtours.com), or stop at the countless bars for a glass of sherry with local jamón ibérico (check out Bar Las Teresas in Santa Cruz or historic Casa Morales in Constitución). Great food markets include the Feria, the oldest, and the wooden, futuristic-looking Metropol Parasol.
Nightlife is, unsurprisingly, late and lively. For flamenco, try one of the peñas, or flamenco social clubs – Torres Macarena on C/Torrijano, perhaps – with bars open across town until the early hours.
Book it: In an atmospheric 18th-century house, the Hospes Casa del Rey de Baeza is a lovely place to stay in lively Santa Cruz. Doubles from £133 room only, hospes.com
Trieste.
"""
doc = nlp(text).ents
en = [(entity.text, entity.label_) for entity in doc]
en
#entities
#The list stored in variable entities is has type list[list[tuple[str, str]]],
#from pprint import pprint
pprint(en)
sum(filter(None, entities), [])
from collections import defaultdict
type2entities = defaultdict(list)
for entity, entity_type in sum(filter(None, entities), []):
type2entities[entity_type].append(entity)
from pprint import pprint
pprint(type2entities)
A:
I hope the following code snippets solve your problem.
import spacy
# Load English tokenizer, tagger, parser, NER and word vectors
nlp = spacy.load("en_core_web_sm")
text = ("Seville.
Summers in the flamboyant Andalucían capital often nudge 40C, but spring is a delight, with the parks in bloom and the scent of orange blossom and jasmine in the air. And in Semana Santa (Holy Week, 14-20 April) the streets come alive with floats and processions. There is also the raucous annual Feria de Abril – a week-long fiesta of parades, flamenco and partying long into the night (4-11 May; expect higher hotel prices if you visit then).
Seville is a romantic and energetic place, with sights aplenty, from the Unesco-listed cathedral – the largest Gothic cathedral in the world – to the beautiful Alcázar royal palace. But days here are best spent simply wandering the medieval streets of Santa Cruz and along the river to La Real Maestranza, Spain’s most spectacular bullring.
Seville is the birthplace of tapas and perfect for a foodie break – join a tapas tour (try devoursevillefoodtours.com), or stop at the countless bars for a glass of sherry with local jamón ibérico (check out Bar Las Teresas in Santa Cruz or historic Casa Morales in Constitución). Great food markets include the Feria, the oldest, and the wooden, futuristic-looking Metropol Parasol.
Nightlife is, unsurprisingly, late and lively. For flamenco, try one of the peñas, or flamenco social clubs – Torres Macarena on C/Torrijano, perhaps – with bars open across town until the early hours.
Book it: In an atmospheric 18th-century house, the Hospes Casa del Rey de Baeza is a lovely place to stay in lively Santa Cruz. Doubles from £133 room only, hospes.com
Trieste.")
doc = nlp(text)
lemma_ner_list = []
for entity in doc.ents:
lemma_ner_list.append((entity.lemma_, entity.label_))
# print list of lemma ner tuples
print(lemma_ner_list)
# print count of tuples
print(len(lemma_ner_list))
|
11-5060
Liang v. Holder
BIA
Grant, IJ
Hom, IJ
A079 399 984
UNITED STATES COURT OF APPEALS
FOR THE SECOND CIRCUIT
SUMMARY ORDER
RULINGS BY SUMMARY ORDER DO NOT HAVE PRECEDENTIAL EFFECT. CITATION TO A SUMMARY ORDER
FILED ON OR AFTER JANUARY 1, 2007, IS PERMITTED AND IS GOVERNED BY FEDERAL RULE OF
APPELLATE PROCEDURE 32.1 AND THIS COURT’S LOCAL RULE 32.1.1. WHEN CITING A SUMMARY ORDER
IN A DOCUMENT FILED WITH THIS COURT, A PARTY MUST CITE EITHER THE FEDERAL APPENDIX OR AN
ELECTRONIC DATABASE (WITH THE NOTATION “SUMMARY ORDER”). A PARTY CITING A SUMMARY ORDER
MUST SERVE A COPY OF IT ON ANY PARTY NOT REPRESENTED BY COUNSEL.
At a stated term of the United States Court of Appeals
for the Second Circuit, held at the Thurgood Marshall United
States Courthouse, 40 Foley Square, in the City of New York,
on the 12th day of September, two thousand thirteen.
PRESENT:
JOSÉ A. CABRANES,
REENA RAGGI,
CHRISTOPHER F. DRONEY,
Circuit Judges.
_______________________________________
ZHU LA LIANG,
Petitioner,
v. 11-5060
NAC
ERIC H. HOLDER, JR., UNITED STATES
ATTORNEY GENERAL,
Respondent.
_______________________________________
FOR PETITIONER: Lewis G. Hu, New York, New York.
FOR RESPONDENT: Stuart F. Delery, Assistant Attorney
General; Greg D. Mack, Senior
Litigation Counsel, Genevieve Holm,
Trial Attorney, Office of Immigration
Litigation, United States Department
of Justice, Washington, D.C.
UPON DUE CONSIDERATION of this petition for review of a
Board of Immigration Appeals (“BIA”) decision, it is hereby
ORDERED, ADJUDGED, AND DECREED that the petition for review is
DENIED.
Zhu La Liang, a native and citizen of the People’s
Republic of China, seeks review of a November 8, 2011, order
of the BIA, affirming the November 17, 2005, decision of
Immigration Judge (“IJ”) M. Christopher Grant, which denied
her application for asylum, withholding of removal, and relief
under the Convention Against Torture (“CAT”). In re Zhu La
Liang, No. A079 399 984 (B.I.A. Nov. 08, 2011), aff’g No. A079
399 984 (Immig. Ct. Arlington, Nov. 17, 2005). We assume the
parties’ familiarity with the underlying facts and procedural
history in this case.1
I. Adverse Credibility Determination
Under the circumstances of this case, we have reviewed
both the IJ’s and the BIA’s decisions. See Yun-Zui Guan v.
Gonzales, 432 F.3d 391, 394 (2d Cir. 2005). The applicable
standards of review are well-established. See 8 U.S.C.
§ 1252(b)(4)(B); Yanqin Weng v. Holder, 562 F.3d 510, 513 (2d
1
Liang did not challenge the IJ’s denial of CAT
relief before the BIA and does not meaningfully challenge
it in this Court. Thus, the claim is forfeited.
2
Cir. 2009). In pre-REAL ID Act cases, such as this one,
inconsistencies and other discrepancies may form the basis of
an adverse credibility determination but must “bear a
legitimate nexus” to the applicant’s claim of persecution and
be “substantial” when measured against the record as a whole.
Secaida-Rosales v. INS, 331 F.3d 297, 307-08 (2d Cir. 2003).
The agency, however, may rely on the cumulative effect of even
minor inconsistencies. See Tu Lin v. Gonzales, 446 F.3d 395,
402 (2d Cir. 2006).
We conclude that substantial evidence supports the
agency’s adverse credibility determination. In finding Liang
not credible, the IJ reasonably relied in part on Liang’s
demeanor, noting that she appeared very nervous when asked to
explain inconsistencies in her testimony. See Majidi v.
Gonzales, 430 F.3d 77, 81 n.1 (2d Cir. 2005). We defer to
this finding. Id.
Further, the agency reasonably relied on inconsistencies
and omissions in Liang’s various statements in concluding she
was not credible. See Xiu Xia Lin v. Mukasey, 534 F.3d 162,
166-67 n.3 (2d Cir. 2008) (holding that for purposes of
analyzing a credibility determination, “[a]n inconsistency and
an omission are functionally equivalent”); see also Secaida-
3
Rosales, 331 F.3d at 308. Contrary to Liang’s argument, the
fact of her forced abortion was material, and bore a
“legitimate nexus,” to her claim that she had suffered past
persecution, and, therefore, the omission of that fact during
her credible fear interview formed a legitimate basis for the
IJ’s adverse credibility determination. See Secaida-Rosales,
331 F.3d at 307-08; see also Xiu Xia Lin, 534 F.3d at 166-67
n.3. The IJ also reasonably relied on discrepancies between:
(1) Liang’s original and amended asylum applications with
respect to the year in which the abortion occurred; (2)
Liang’s and her husband’s testimony as to whether they had
cohabited in China; and (3) Liang’s testimony and abortion
certificate with regard to the date of the abortion procedure.
Liang failed to provide compelling explanations for these
discrepancies. See Majidi, 430 F.3d at 80-81.
Furthermore, the IJ reasonably found implausible Liang’s
assertion that she chose to delay marrying after discovering
that she was pregnant despite her awareness of the significant
risks associated with conceiving a child out of wedlock. See
Wensheng Yan v. Mukasey, 509 F.3d 63, 67 (2d Cir. 2009)
(holding that where the IJ’s findings are “tethered to record
evidence, and there is nothing else in the record from which
4
a firm conviction of error could properly be derived,” we will
not disturb the inherent implausibility finding). Finally,
because Liang does not challenge the IJ’s finding that she
failed adequately to corroborate her claim, it stands as valid
basis for the agency’s adverse credibility determination. See
Shunfu Li v. Mukasey, 529 F.3d 141, 146 (2d Cir. 2008).
Thus, given the absence of corroborating evidence, as well
as the aforementioned omissions and discrepancies in Liang’s
testimony, we identify no error in the agency’s denial of
asylum and withholding of removal on credibility grounds. See
Paul v. Gonzales, 444 F.3d 148, 156 (2d Cir. 2006).
II. Due Process
Despite the IJ’s failure to conduct a de novo hearing on
remand as ordered by the BIA, Liang has not demonstrated that
she was deprived of due process during her proceedings. See Li
Hua Lin v. U.S. Dept. of Justice, 453 F.3d 99, 104-05 (2d Cir.
2006). Indeed, nothing in the record suggests that Liang was
prohibited from fully developing her testimony, that any of
her evidence had been ignored, or that the IJ made a
determination on issues about which she had no notice or
opportunity to be heard. See id. Furthermore, Liang has not
identified anything to suggest that the manner in which the IJ
conducted her proceedings undermined their fairness. See id.
5
Finally, contrary to Liang’s contention, the IJ who certified
the record and returned it to the BIA for adjudication of
Liang’s appeal expressly declined to address the merits of the
prior IJ’s decision, noting that such review was solely within
the purview of the BIA.
For the foregoing reasons, the petition for review is
DENIED. As we have completed our review, any stay of removal
that the Court previously granted in this petition is VACATED,
and any pending motion for a stay of removal in this petition
is DISMISSED as moot. Any pending request for oral argument in
this petition is DENIED in accordance with Federal Rule of
Appellate Procedure 34(a)(2), and Second Circuit Local Rule
34.1(b).
FOR THE COURT:
Catherine O’Hagan Wolfe, Clerk of Court
6
|
Myocardin and Prx1 contribute to angiotensin II-induced expression of smooth muscle alpha-actin.
Previous studies demonstrated that angiotensin II (Ang II)-induced hypertrophy of smooth muscle cells (SMCs) was associated with increased transcription of SM alpha-actin gene. The aim of the present study was to determine whether myocardin, a SMC-selective cofactor of serum response factor (SRF), contributed to Ang II-induced increases in SM alpha-actin transcription. Results showed that Ang II increased myocardin mRNA expression as well as SM alpha-actin mRNA expression via the Ang II type 1 receptor in cultured rat aortic SMCs. Cotransfection studies revealed that CArG elements were required for Ang II-induced transcription of SM alpha-actin gene, and a dominant-negative form of myocardin or a short interfering RNA (siRNA) specific for myocardin decreased Ang II-induced SM alpha-actin transcription. Prx1, a homeodomain protein whose expression was increased by Ang II, also increased SM alpha-actin gene transcription in part via CArG elements, and siRNA specific for Prx1 markedly decreased basal and Ang II-induced SM alpha-actin transcription. Electrophoretic mobility shift assay showed that myocardin and Ang II, respectively, increased formation of a SMC-specific CArG-SRF-myocardin higher order complex. However, Ang II had no effect on binding between myocardin and SRF as determined by a mammalian two-hybrid assay, suggesting that Ang II-induced increases in formation of CArG-SRF-myocardin complex was the result of increased SRF binding to CArG elements and increased myocardin expression. Taken together, these results support a model in which Ang II-induced increases in expression of SM alpha-actin are mediated through Prx1-dependent increases in SRF binding to CArG elements and subsequent recruitment of myocardin. |
require 'brakeman/processors/lib/basic_processor'
#Finds method calls matching the given target(s).
# #-- This should be deprecated --#
# #-- Do not use for new code --#
#
#Targets/methods can be:
#
# - nil: matches anything, including nothing
# - Empty array: matches nothing
# - Symbol: matches single target/method exactly
# - Array of symbols: matches against any of the symbols
# - Regular expression: matches the expression
# - Array of regular expressions: matches any of the expressions
#
#If a target is also the name of a class, methods called on instances
#of that class will also be matched, in a very limited way.
#(Any methods called on Klass.new, basically. More useful when used
#in conjunction with AliasProcessor.)
#
#Examples:
#
# #To find any uses of this class:
# FindCall.new :FindCall, nil
#
# #Find system calls without a target
# FindCall.new [], [:system, :exec, :syscall]
#
# #Find all calls to length(), no matter the target
# FindCall.new nil, :length
#
# #Find all calls to sub, sub!, gsub, or gsub!
# FindCall.new nil, /^g?sub!?$/
class Brakeman::FindCall < Brakeman::BasicProcessor
def initialize targets, methods, tracker
super tracker
@calls = []
@find_targets = targets
@find_methods = methods
@current_class = nil
@current_method = nil
end
#Returns a list of results.
#
#A result looks like:
#
# s(:result, :ClassName, :method_name, s(:call, ...))
def matches
@calls
end
#Process the given source. Provide either class and method being searched
#or the template. These names are used when reporting results.
#
#Use FindCall#matches to retrieve results.
def process_source exp
process exp
end
#Process body of method
def process_defn exp
process_all exp.body
end
alias :process_defs :process_defn
#Look for matching calls and add them to results
def process_call exp
target = get_target exp.target
method = exp.method
process_call_args exp
if match(@find_targets, target) and match(@find_methods, method)
@calls << Sexp.new(:result, @current_module, @current_class, @current_method, exp).line(exp.line)
end
exp
end
#Process an assignment like a call
def process_attrasgn exp
process_call exp
end
private
#Gets the target of a call as a Symbol
#if possible
def get_target exp
if sexp? exp
case exp.node_type
when :ivar, :lvar, :const, :lit
exp.value
when :colon2
class_name exp
else
exp
end
else
exp
end
end
#Checks if the search terms match the given item
def match search_terms, item
case search_terms
when Symbol
if search_terms == item
true
else
false
end
when Enumerable
if search_terms.empty?
item == nil
end
end
end
end
|
Class II transplantation antigens in the late human skin tuberculin reaction.
The presence of class II transplantation antigens on keratinocytes and the phenotypes of the inflammatory cells in the late human skin tuberculin reaction were analysed with immunohistochemical double staining techniques in frozen sections of skin biopsies taken 10-45 days after intradermal purified protein derivative (PPD) injection. Dermal cell infiltrates decreased with time but were found throughout the observation period. Most of the cells in the perivascular infiltrates expressed HLA-DR antigens. Some of these cells are probably 'activated' macrophages, since they expressed OKM1 and OKT9 antigens in consecutive sections. Another less frequent cell population which reacted with RFD1 antibodies are presumably interdigitating cells. About half the perivascular cells were anti-Leu 3a-positive (T 'helper/inducer' phenotype). HLA-DR but not HLA-DQ antigens were detected on keratinocytes. This acquired expression of HLA-DR antigens on the epithelial cells disappeared between 17 and 30 days. If HLA-DR-expressing keratinocytes have immunoregulatory functions these might be different from those of other HLA-DR-expressing cell types that also express HLA-DQ molecules. |
Celebrate Indigenous Peoples’ Day in the Classroom with these Resources
Celebrate Indigenous Peoples’ Day in the Classroom with these Resources
Since just last year, four new major American cities (Seattle, Grand Rapids, Minneapolis, and St. Paul) have followed an example set by Berkeley, CA and renamed Columbus Day as Indigenous Peoples’ Day. In addition to being a landmark decision for long marginalized Native American communities, Seattle’s resolution extends all the way to their classrooms. The city’s resolution strongly encourages schools in Seattle to teach students about the history of indigenous people and to use the day to celebrate vibrant Native American cultures.
Many states, cities, and local communities have opted to celebrate Native American history and culture in lieu of Columbus Day, and the trend is certainly growing. To help educators celebrate this new and inspiring holiday, here are some ideas for teaching about indigenous peoples as well as educational resources on the topic.
Challenge Native Americans Stereotypes
Stereotyping is a problem for many communities. Often Native Americans are depicted as a single homogenous group, when in reality there is huge diversity between tribes, or they are shown as an anachronism from the past, even though they have contemporary lives in thriving communities. Here are some resources that can help deconstruct these and other stereotypes:
• Unlearning “Indian” Stereotypes – This short video teaches students about racial stereotypes and the history of Native Americans through the eyes of a young person. This resource is available for purchase through Rethinking Schools.
Teach the Entire Story of Columbus Arriving in America
Most people learn in school that in “1492 Columbus sailed the ocean blue”, but what is often overlooked is that Columbus started the enslavement and genocide of the Taíno. The details about Columbus’ treatment of Taíno are upsetting, but there are resources for teaching students of all ages about this topic:
• Morning Girl by Michael Dorris and Encounter by Jane Yolen – These two books tell the story of Columbus’ arrival from the perspective of Taíno children. Morning Girl is for grades 4-6, and Encounter is for grades 3-5.
• The Columbus Controversy – This video, by the Zinn Education Project, tells the history of Columbus’ arrival in American and his enslavement of the Taíno. This resource is appropriate for grades 6 and up.
Celebrate Native American Contributions and Culture
There are over 560 federally recognized tribes and many more that are not officially recognized. Each tribe has its own culture, tradition, and identity. Not only do Native American tribes have vibrant cultures, but they have also contributed greatly to everything from modern medicine to the theory of American democracy. Here are some resources for teaching about the rich culture and contributions of indigenous peoples:
• Native Stock – This website contains over 150,000 stock photos and videos of Native Americans. Images show Native Americans wearing both modern and traditional clothing and engaging in a variety of activities – everything from weaving to skateboarding.
• Pre-Columbian Native People and Technology – This lesson from Teaching Tolerance, for grades 6-12, has students explore the generally accepted belief that before Christopher Columbus arrived in America, the indigenous people were “primitive” or “lacked technology”. Through this lesson, students learn that, in reality, Native Americans created sophisticated buildings, culture, and medicine before the arrival of Europeans.
Hi Laura. The organization, Teaching for Change, has a great list of books about American Indian. Here is a link to that section of their webiste [https://socialjusticebooks.org/booklists/american-indians/]
ABOUT
HEART's mission is to foster compassion and respect for all living beings and the environment by educating youth and teachers in Humane Education.
On our blog you will find humane project ideas for kids, an inside looks at HEART's programs, great teacher resources and more. |
1. Introduction {#sec1-ijerph-17-00783}
===============
The decline in youth's healthy behaviors and related consequences \[[@B1-ijerph-17-00783]\] is of concern for public health in general and for national defense in particular, which requires a sufficient number of physically fit and mentally healthy military personnel. In Lithuania, there is evidence that young people do not partake in adequate physical activity; that is, only around 30% of students aged 18 years comply with the recommendation to be active ≥1 h on at least 5 days a week \[[@B2-ijerph-17-00783]\]. The trends for health-related physical fitness among adolescents have deteriorated in the past 20 years, and the indicators of cardiorespiratory fitness have decreased by nearly 50% during this period \[[@B3-ijerph-17-00783]\]. Only 13--14% of high school students comply with recommendations for healthy nutrition \[[@B4-ijerph-17-00783],[@B5-ijerph-17-00783]\], 11% of young people consume alcohol \[[@B6-ijerph-17-00783]\]. Moreover, 22% experience psychological distress \[[@B7-ijerph-17-00783]\]. Multiple health behaviors, psychological distress, and their associated risk factors, such as obesity and poor physical fitness, are associated with poor mental health outcomes, the risk of cardiovascular disease, type 2 diabetes, certain types of cancer \[[@B8-ijerph-17-00783],[@B9-ijerph-17-00783]\], depression \[[@B10-ijerph-17-00783],[@B11-ijerph-17-00783]\], and anxiety \[[@B12-ijerph-17-00783]\]. Unhealthy behaviors also impose an economic burden; for example, one study estimated that physical inactivity alone costs USD 53.8 billion in 2013 for healthcare worldwide \[[@B13-ijerph-17-00783]\].
Health is the main criterion for accepting or rejecting young men into military service (MS) and is strongly related to the ability to perform military duties. Unsatisfactory results of youth recruitment to Lithuanian MS have been presented: on average, 58.6% of Lithuanian young men proceed through the full procedure of military enlistment. Among those who do not pass these procedures, 33%--37% experience psychological problems, 29%--33% have cardiovascular diseases, and 13% have musculoskeletal problems \[[@B14-ijerph-17-00783]\]. Other countries face similar problems of rejection from MS. For instance, analysis of the reasons for rejection from MS in the USA found that about 22% of rejections were because of problems with bones or joints, flat feet, or hernias, 15% because of organ defects, 13% because of defects of the cardiovascular system, 12% because of nervous system or mental problems, and 10% because of communicable diseases \[[@B15-ijerph-17-00783]\]. In the USA, Hispanic men appear to have a better health profile than their white and black peers, except for the prevalence of overweight, which is higher in Hispanic men \[[@B16-ijerph-17-00783]\].
Although health behaviors alone are not criteria for enlistment into MS, they might explain the reasons for some instances of rejection. Given that some health behaviors are risk factors for the occurrence of many lifestyle-related diseases \[[@B17-ijerph-17-00783]\], it is critical to identify whether and how health behaviors differ between young men who are deemed eligible and those who are ineligible for MS and to take appropriate actions to prevent adverse health behaviors from their onset.
Soldiers must be both physically and mentally healthy. However, mental health issues are among the main factors for rejection from MS \[[@B14-ijerph-17-00783],[@B15-ijerph-17-00783]\]. Identifying psychological distress along with health behaviors might help to provide a more complete understanding of health indicators in conscripts as psychological distress is an indicator of mental health \[[@B18-ijerph-17-00783]\].
Given the associations between many health-related behaviors, the complex analysis of a set of risk behaviors instead of evaluation of individual associations may help to reduce the risk of missing potential confounders for enlistment into MS \[[@B19-ijerph-17-00783]\].
Several studies have examined psychological distress, health behaviors \[[@B20-ijerph-17-00783],[@B21-ijerph-17-00783]\], and changes in health behavior \[[@B22-ijerph-17-00783]\] during MS. Enlistment is based on a medical examination of draftees, which may reject unhealthy individuals. As a result, these studies have evaluated health behaviors in relatively healthy youth but have not examined whether health behavior is related to the rejection of military recruits.
The aim of this study is to identify and compare health behaviors and psychological distress between male conscripts rejected for and enlisted into MS. We expect to find that healthier behaviors and low distress level would be related to a higher rate of enlistment into MS.
2. Materials and Methods {#sec2-ijerph-17-00783}
========================
2.1. Study Design and Procedure {#sec2dot1-ijerph-17-00783}
-------------------------------
This nationally representative cross-sectional study was performed among Lithuanian conscripts. In Lithuania, 9-month-long MS is compulsory. In accordance with the conscription procedure of the Lithuanian Armed Forces, a list of potential draftees is created by an automatic electronic selection system each year and includes male Lithuanian citizens of compulsory MS-eligible age (19--26 years). Other male and female young adults can express their wish to be conscripted on a priority basis.
A stratified random sampling was used. There are four centers for military recruitment in Lithuania that recruit conscripts during the whole year. The data were gathered in all four centers for 4 months from June to October 2018. Each conscript in these centers was approached during this period and asked to sign a consent form to participate in the study and to complete the study questionnaire. There was an equal chance (probability) that participants included in the study would be enlisted or rejected for MS.
The decision to accept a recruit for enlistment into MS is made by medical experts and is based on an individual medical examination and previous medical reports. The criteria for rejection from MS are defined in Order V-1142/V-1139, which provides a list of disorders along with their severity, and is signed by the Ministers of State Defense and Health Care. These criteria also indicate the minimum height requirement: 160 and 155 cm for men and women, respectively. Obesity without comorbid illness is not a reason for rejection from MS \[[@B23-ijerph-17-00783]\]. Enlistment in and rejection from MS were identified from the medical records for each study participant.
2.2. Participants {#sec2dot2-ijerph-17-00783}
-----------------
In 2018, there was a list of 10,340 conscripts, 209 of them female. This study included 1427 conscripts (which represented 13.80% of the total population), of whom 1296 returned their completed questionnaire along with their consent to participate in the study. The response rate was 90.82%. Female recruits were invited to participate in the study, but because only 53 agreed to participate, they were later excluded because of the small sample size. Finally, 1243 young male potential conscripts were included in the analysis. The participants were aged 19--26 years and their mean age was 22.50 ± 2.43 years.
The Ministry of National Defense of the Republic of Lithuania approved the research. Ethics approval (No SMTEK-28, 2018) was obtained from the Ethics Committee of Lithuanian Sports University. The investigations were carried out following the rules of the Declaration of Helsinki of 1975, revised in 2013. Participants were informed of the tasks in the study before data collection, and all participants gave their informed consent for inclusion before they participated in the study.
2.3. Measurements {#sec2dot3-ijerph-17-00783}
-----------------
### 2.3.1. Physical Activity {#sec2dot3dot1-ijerph-17-00783}
The World Health Organization (WHO) defines moderate physical activity as activity that noticeably accelerates the heart rate and includes activities equivalent in intensity to brisk walking or bicycling. Vigorous physical activity causes rapid breathing and substantially increases heart rate, and includes activities such as jogging, aerobic dance, and bicycling uphill \[[@B24-ijerph-17-00783]\]. To assess physical activity in the participants in this study, we used the 2005 US Department of Defense Survey of Health Related Behaviors Among Active Duty Military Personnel \[[@B21-ijerph-17-00783]\]. The study participants were asked, "During the past 7 days, for leisure-time physical activity, how often did you usually do each of the following?". Participants were also asked, "During the past 7 days, when you did leisure-time physical activity, how long did you usually do each of the following?" For both questions, detailed descriptions and examples of what constitutes moderate and vigorous physical activity were presented.
In this study, we assessed physical activity during the preceding 7 days instead of the 30 days in the original questionnaire. Also, instead of using categorical answers (such as "5 or 6 days" and "at least 20 minutes") for each question, we provided the opportunity to write the exact numbers of days, hours, and/or minutes per day. The number of minutes spent in was totaled. Participants whose MVPA was \<2.5 h/week were coded as not meeting health-related physical activity requirements and those whose MVPA was ≥2.5 h/week were coded as meeting health-related physical activity requirements \[[@B25-ijerph-17-00783]\].
### 2.3.2. Eating Patterns {#sec2dot3dot2-ijerph-17-00783}
A healthy eating pattern was defined as a diet based on whole or minimally processed foods and that included health-protective ingredients and lacked unhealthy items such as fast food and sugar-sweetened beverages \[[@B26-ijerph-17-00783]\]. Adherence to a healthy eating pattern was evaluated using the Mediterranean Diet Adherence Screener (MEDAS) \[[@B25-ijerph-17-00783]\], which was previously validated in Spanish and German adult populations \[[@B26-ijerph-17-00783],[@B27-ijerph-17-00783]\]. The MEDAS includes 14 items: two indicate food-intake habits such as the use of olive oil and preference for white versus red meat, and the other 12 items capture the frequency of consumption of olive oil, animal fat, vegetables and fruits, fish, nuts, commercial pastries, sugar-sweetened beverages, and dishes with homemade sauce. Each item was scored as 0 (does not meet the healthy eating criteria) or 1 (meets the healthy eating criteria). The total score was calculated by summing all item scores. The MEDAS score was classified into three categories: ≤7 indicated low adherence, 8--9 indicated medium adherence, and ≥10 indicated high adherence to the Mediterranean diet \[[@B26-ijerph-17-00783]\].
### 2.3.3. Alcohol Consumption {#sec2dot3dot3-ijerph-17-00783}
Alcohol consumption was evaluated according to the 2008 US Department of Defense Survey of Health Related Behaviors Among Active Duty Military Personnel \[[@B20-ijerph-17-00783]\]. Participants were asked to indicate the number of drinking occasions during the past month with the question, "During the past 30 days, on how many days did you drink alcohol?". Participants had to identify the quantity of drinks per typical drinking occasion in the table, where columns presented the type of beverage classified as the number of beers (bottle or can = 330 mL), the number of wines (glass = 125 mL), or the quantity of whiskey/vodka (mL), liquor (mL), and other drinks (mL) by indicating the quantity or amount of each of the drinks in the columns. The number of occasions per month when ≥5 drinks were consumed was determined with the question, "During the past 30 days, on how many days did you have 5 or more drinks of beer, wine, or liquor on the same occasion?" (By "drink," we mean a bottle or can of beer, a wine cooler or a glass of wine, a shot of liquor, or a mixed drink or cocktail. By "occasion," we mean at the same time or within a couple of hours of each other.) Following the 2008 Department of Defense Survey of Health-Related Behaviors Among Active Duty Military Personnel \[[@B20-ijerph-17-00783]\] paper, participants were allocated into three groups according to alcohol consumption: abstinent (0 alcoholic drinks in the past month), light--moderate drinker (1--4 drinks per typical drinking occasion or ≥5 drinks per typical drinking occasion 1--3 times/month), heavy drinker (≥5 drinks per typical drinking occasion ≥1/week (on average) in the 30 days before the survey). The classification was adapted from Mulford and Miller (1960) \[[@B28-ijerph-17-00783]\].
To provide a continuous variable indicating the total amount of alcohol consumed, the total number of alcohol units per month was calculated as one standard unit equal to 10 g ethanol. In accordance with the WHO guidelines, the following formula was used: volume (mL) multiplied by the percentage of alcohol and divided by 1000 \[[@B29-ijerph-17-00783]\].
### 2.3.4. Cigarette Smoking {#sec2dot3dot4-ijerph-17-00783}
Cigarette smoking was evaluated as indicated in the 2008 US Department of Defense Survey of Health Related Behaviors Among Active Duty Military Personnel \[[@B20-ijerph-17-00783]\]. Participants were asked to indicate the number of cigarettes smoked in the past month. Given that there is no safe amount of tobacco use, as reported by the 2014 Surgeon General's Report \[[@B30-ijerph-17-00783]\], two categories of smoking were created: current nonsmoker (smoked 0 cigarettes in the past 30 days and never smokers) and current smoker (smoked ≥1 cigarette in the past 30 days).
### 2.3.5. Psychological Distress {#sec2dot3dot5-ijerph-17-00783}
Psychological distress was assessed using the six-item Kessler scale \[[@B31-ijerph-17-00783]\]. Participants were asked to evaluate their nervousness, hopelessness, anxiety, restlessness or fidgety feelings, worthlessness, and depression. Each item was scored from 0 (none of the time) to 4 (all the time). The total score was calculated by summing the scores for each item and ranged from 0 to 24 points, with a lower score indicating a lower level of psychological distress. The internal consistency of the scale was good (Cronbach α = 0.876). The summed score was dichotomized as low psychological distress (0--12 points) and high psychological distress (≥13 points) \[[@B31-ijerph-17-00783]\].
2.4. Covariates {#sec2dot4-ijerph-17-00783}
---------------
Body mass index (BMI) was evaluated using the self-reported height and weight and was calculated as weight (kg)/height (m^2^). Family income was evaluated by asking participants to rate their current family financial situation as having insufficient income, having average income, having higher than average income, wealthy, and rich. Age (in years) was also used as a covariate.
2.5. Statistical Analysis {#sec2dot5-ijerph-17-00783}
-------------------------
The data were analyzed using SPSS (ver. 24, IBM SPSS Statistics; IBM Corp., Armonk, NY, USA). Categorical variables are presented as frequencies and percentages. Differences in categorical variables were tested using the chi-squared test. The relationships between independent continuous variables were examined using Pearson correlational analysis because all scaled variables had a normal distribution. Logistic regression analysis was used to identify significant associations between dependent (enlistment into MS) and independent variables (covariates, health behaviors, and psychological distress level) by adding independent variables individually into the next model and producing odds ratios (ORs) and 95% confidence intervals (95% CIs). The final model contained adjusted OR (95% CI). Statistical significance was set at *p* \< 0.05.
3. Results {#sec3-ijerph-17-00783}
==========
Among 1243 conscripts who went through the enlistment procedures, 624 (50.2%) were rejected for and 619 (49.8%) were enlisted into MS ([Table 1](#ijerph-17-00783-t001){ref-type="table"}). Around half were adequately physically active. Among youth enlisted to MS, there were 63.1% of physically active versus 47.3% of physically active among youth rejected for MS (p \< 0.01). The level of adherence to the Mediterranean diet was low among half of Lithuanian male conscripts, a little bit less than half of them had medium adherence, and only a small percentage (3.5%) of male conscripts complied with healthy eating patterns. However, there were no significant differences between rejected and enlisted youth (*p* \> 0.05). Almost a quarter of all conscripts reported their alcohol abstinence for the previous 30 days, two-thirds reported a light--moderate drinking pattern, and almost one out of ten (9.6%) reported heavy drinking. The percentage distribution after Bonferroni correction indicated that among youth enlisted to MS, there were 6.8% of heavy drinkers versus 12.3% of heavy drinkers among rejected youth (*p* \< 0.01). Percentages of light--moderate drinking and abstinence for the 30 previous days were not significantly different (*p* \> 0.05) between rejected and enlisted youth. Almost two-thirds of male conscripts were current smokers; however, smoking was more frequent among those who were rejected for MS (67.7%) than among those who were enlisted (57.0%) (*p* \< 0.0001). A high level of distress was reported in 9.1% of the total population of male conscripts. However, among rejected youth, high distress had 14.7% of prevalence versus 3.4% of high distress prevalence among enlisted youth (*p* \< 0.0001).
Continuous variables for health behaviors and distress were included in the correlational analysis to examine the relationships between the main predictors of enlistment, and separate analyses were performed for the rejected and enlisted conscripts ([Table 2](#ijerph-17-00783-t002){ref-type="table"}). In both groups, there were significant relationships between better adherence to healthy eating patterns and lower smoking levels (r = −0.011 and r = −018 for rejected and enlisted, respectively) and lower psychological distress levels (r = −0.12 and r = −0.22 for rejected and enlisted, respectively). Smoking and distress were also significantly correlated (r = 0.12 in both groups), which showed that a higher psychological distress level was associated with a higher average number of cigarettes smoked per day. In both groups, higher alcohol consumption was related to higher smoking levels (r = 0.22 and r = 0.24 for rejected and enlisted, respectively) and higher distress levels (r = 0.21 and r = 0.27 for rejected and enlisted, respectively). Among the men enlisted into MS, there were also significant associations between greater alcohol consumption and lower adherence to healthy eating (r = −0.12), and between higher compliance to healthy eating patterns and a higher physical activity level (r = 0.13) (*p*~s~ \< 0.05).
Enlistment into MS was predicted using multiple logistic regression analysis ([Table 3](#ijerph-17-00783-t003){ref-type="table"}). When entered individually into the model, enlistment into military service was associated with MVPA (OR = 1.97; CI 1.57--2.47), adversely associated with heavy drinking (OR = 0.60; CI 0.45--0.79), current smoking (OR = 0.61; CI 0.49--0.78), and psychological distress (OR = 0.20; CI 0.13-0.33). After controlling for all variables included in the regression analysis in Model 7, the significant predictors of enlistment remained higher MVPA, current non-smoking, and low level of distress. Adherence to healthy eating was not significantly related to enlistment neither entered individually nor after controlling for covariates and other study variables (*p* \> 0.05). Among the covariates, only older age predicted a lower chance of being enlisted (OR = 0.77; 95% CI 0.71--0.83). Neither BMI nor perceived family income was associated with enlistment (*p* \> 0.05).
4. Discussion {#sec4-ijerph-17-00783}
=============
This study was aimed at determining the prevalence of healthy behaviors and psychological distress in recruits for MS and at identifying differences in these indicators between young men rejected for and enlisted into MS. The results partly support the premise that young men who are enlisted into MS are more likely to adhere to healthy behaviors and have lower psychological distress levels compared with those rejected for MS.
4.1. Physical Activity {#sec4dot1-ijerph-17-00783}
----------------------
In the regression analysis, after controlling for covariates and other study variables, meeting the recommendations for MVPA was significantly associated with being enlisted into MS. Previous studies have shown that physical activity can help prevent 26 different chronic diseases \[[@B17-ijerph-17-00783]\] and is related to a lower incidence of metabolic syndrome, lower rates of stress, and better mental health and cognitive functions \[[@B17-ijerph-17-00783],[@B32-ijerph-17-00783],[@B33-ijerph-17-00783]\], all of which are important to being able to serve in the military. Physical activity is also a strong predictor of physical fitness \[[@B34-ijerph-17-00783]\], which is a key indicator of physical health during MS. Other research has suggested that physical activity dampens the inflammatory processes in the body \[[@B34-ijerph-17-00783]\]. Higher-intensity physical activity confers greater health benefits, such as reduced body fat and central adiposity, and higher cardiovascular fitness in youth, compared with lower-intensity activity \[[@B35-ijerph-17-00783]\]. In the current study, 55.3% of all conscripts had an adequate level of MVPA, but this percentage was lower in those rejected for MS (47.4%) than in those enlisted (63.1%) into MS. These results are similar to data reported in the general population of similar age in the Eurobarometer (2017) data, which showed that 55% of male youth in Lithuania and 57% of male youth from other European countries aged 15--24 years engage in physical activity regularly or with some regularity \[[@B36-ijerph-17-00783]\]. The physical activity level generally increases in those enlisted into MS after they start their duty because MS enforces its own standards for health behaviors such as physical activity by, for example, requiring daily physical activities. Surprisingly, however, it has been reported that 13% of those serving in the US active duty military perform insufficient exercise \[[@B37-ijerph-17-00783]\].
4.2. Cigarette Smoking {#sec4dot2-ijerph-17-00783}
----------------------
Along with physical activity, current smoking also predicted enlistment into MS. The logistic regression analysis after controlling for covariates and other study variables indicated that current smokers had a 72% lower chance of being enlisted than nonsmokers. In total, around two-thirds of Lithuanian male youth called to serve in the military are current smokers. However, among those enlisted to the military, there are 10.7% less of them than among those rejected for MS. A study in Taiwan reported that 50.8% of young men in their MS smoked before service \[[@B38-ijerph-17-00783]\]; this percentage is 10 percentage points lower than in Lithuania. In the US, 23% of active duty personnel smoke \[[@B36-ijerph-17-00783]\], which is much lower than the 57% smoking rate in Lithuanian conscripts enlisted into MS in our study. The statistics for the general Lithuanian population confirm the high prevalence of smoking: one in three men smoke every day in Lithuania. This is the fourth highest rate in the European Union \[[@B39-ijerph-17-00783]\]. Smoking is related to obesity \[[@B40-ijerph-17-00783]\] and hypertension \[[@B41-ijerph-17-00783]\], and is the most relevant risk factor for the burden of disease and mortality \[[@B39-ijerph-17-00783],[@B42-ijerph-17-00783]\]. A low physical activity level and smoking are the most prevalent health risk factors \[[@B43-ijerph-17-00783]\] and were also negative predictors of enlistment for MS in our study.
4.3. Psychological Distress {#sec4dot3-ijerph-17-00783}
---------------------------
Psychological distress was another significant predictor of enlistment into MS in this study. We found by 11% higher prevalence of high psychological distress among those rejected for than among those enlisted into MS. This effect was independent of health-related behaviors such as physical activity, nutrition, cigarette smoking, and alcohol consumption, which might be interrelated to psychological distress given that these behaviors can act as coping strategies \[[@B7-ijerph-17-00783],[@B44-ijerph-17-00783],[@B45-ijerph-17-00783]\]. However, in total, only 9.1% of these male conscripts reported a high psychological distress level. Another study of the Lithuanian high school male student population, from which the military draws its enlistees, reported a 12.5% prevalence of psychological distress measured using the same Kessler scale \[[@B7-ijerph-17-00783]\]. A study in Massachusetts in the USA found that 20% of high school students of both sexes reported depressive symptoms \[[@B46-ijerph-17-00783]\]. An Australian study of university students reported a prevalence of high psychological distress of 11.1%--22.5% \[[@B44-ijerph-17-00783]\]. A prevalence of high psychological distress of 11%--18% was reported for active duty personnel in the US military, and the prevalence was higher among heavy drinkers than among those who consumed less alcohol \[[@B20-ijerph-17-00783]\]. This finding suggests an interdependence of heavy alcohol consumption and psychological distress. This association was identified in the correlational analysis in our study; in particular, of the associations of psychological distress with other health behaviors, the association with alcohol consumption was the strongest.
4.4. Alcohol Consumption and Nutrition {#sec4dot4-ijerph-17-00783}
--------------------------------------
Alcohol was consumed by 75.8% of the included youth, and 9.6% were heavy drinkers. These figures are similar to the heavy or risky drinking behavior noted in about 12% of Swiss conscripts \[[@B19-ijerph-17-00783]\] and 7.8% of US active duty personnel \[[@B36-ijerph-17-00783]\]. In a report on healthy lifestyle factors among adult Lithuanians, the Lithuanian Department of Statistics reported that 34% of the population consumes alcoholic beverages at least once a month \[[@B47-ijerph-17-00783]\].
The adherence rates for healthy nutrition among potential conscripts in our study are problematic because only 3.5% fully complied and 46.3% partly complied with the healthy eating recommendations. The Country Health Profiles (2019) reported that 32% of deaths in Lithuania could be attributed to dietary risk factors, a rate that is higher than the 18% in other European countries. Dietary risk has the highest risk for mortality among other health behaviors: smoking is related to 15% and 17%, alcohol consumption to 10% and 6%, and physical inactivity to 5% and 3% of deaths in Lithuania and Europe, respectively \[[@B39-ijerph-17-00783]\].
The regression analysis did not find any associations between enlistment and alcohol consumption or dietary habits in the final model after controlling for all study variables included, although the differences in the percentages were shown significant for alcohol consumption. Significantly more of the recruits rejected for MS (12.3%) were heavy drinkers than those enlisted (6.8%). When entered individually into logistic regression, heavy drinking lowered the chances of being enlisted into MS. However, after the addition of covariates and other study variables, this relationship lost its significance. Moreover, study participants are young men and their history of alcohol consumption may be too short to have a noticeable direct effect on their health. This could also be said about their dietary habits. However, other research has shown that both alcohol use and nutrition over the long term are associated with health outcomes such as the risk of diabetes, cardiovascular disease, Parkinson's disease, certain types of cancer, myocardial infarction, and high blood cholesterol level \[[@B48-ijerph-17-00783],[@B49-ijerph-17-00783],[@B50-ijerph-17-00783],[@B51-ijerph-17-00783]\].
Overall, our results correspond with those of other studies where health-related behaviors and psychological distress are linked to physical comorbidities \[[@B52-ijerph-17-00783]\], which were the main reasons for rejection from MS. Public health policies are targeted at strengthening health in the total population and its subpopulations, such as young people. Similarly, state authorities are also interested in having physically fit and healthy conscripts, who are mostly young men. Improving health among youth is most effective when started early in life during behavior development and when behavioral changes are easier to implement. Health education in an organized way that targets the young population may be best implemented at school, which provides the best setting for delivering public health interventions at a young age. In particular, physical development of school children could be based on physical literacy that addresses attributes, characteristics, skills, and behaviors that are related to the ability for, and commitment to, a healthy, active lifestyle \[[@B53-ijerph-17-00783]\]. From the military perspective, these interventions could also be modeled to capture physical capacity (e.g., physical endurance) and psychological resilience (e.g., resistance to stress) and to emphasize the importance of avoiding substance use or abuse. The development of a healthy future military could start at a young age and involve the objectives of both public health and state defense. To implement this, governmental policies and strategies are required to enable intersectional collaboration and shared responsibility among the education, military and health sectors as well as to set up coordinating mechanisms among sectors. Funding and financial incentives should be provided for intervention programs and implementers. National regulations are needed to enable school administrative and staff to expand their competencies and skills in physical and mental health promotion on a basis of compulsory professional training.
4.5. Study Limitations {#sec4dot5-ijerph-17-00783}
----------------------
The study has some limitations. We used a cross-sectional design, and no causal inferences can be drawn. It remains unclear whether the poor health behaviors were the causes or the consequences of the health outcomes, which were the reasons for rejection from MS. Longitudinal studies are needed to evaluate the direction of, and interactions between, the associations demonstrated here. Another limitation is that we did not include objective measures of physical and mental health. Physical and/or mental health may be confounding variables that both prevent conscripts from serving in the military and increase the likelihood of exhibiting unhealthy behaviors and having a high psychological distress level. Another possible confounding factor may be the interaction between psychological distress and health behaviors because the latter can result from the former. However, the logistic regression analysis allowed us to control for this possible confounding effect. That is, the health behaviors that were significant for enlistment remained significant even after psychological distress levels were included in Model 7. Another limitation is that we did not measure the onset of health-damaging behavior, which may have served as a control variable when examining the predictors of enlistment, especially for addictive behaviors such as smoking and alcohol consumption. In addition, we did not assess the use of other substances such as "party drugs," and we did not obtain a full picture of these conscripts' use patterns.
Our study also has some strengths. This was a nationally representative sample that provides a picture of the health behaviors and prevalence of psychological distress among young men called to serve in the military and the differences between those who were enlisted and rejected for MS. Further research should investigate the relationships between health behaviors in conscripts and the reasons they are rejected.
5. Conclusions {#sec5-ijerph-17-00783}
==============
Health behaviors in male conscripts are unsatisfactory because about half are physically inactive, have a poor diet, or smoke, and almost one out of 10 is a heavy drinker and has a high psychological distress level. The latter is a concern because of its association with adverse health behaviors. The enlisted conscripts were more likely to be sufficiently physically active and less likely to be current smokers or have a high psychological distress level. Early intervention programs to provide a heathier population of young men for conscription should focus on mental well-being and target health-related behaviors such as physical activity and smoking. Preferably, these should be implemented as health education programs in schools to help prevent the development of adverse health behaviors among young men. Governmental policies and strategies are required to enable intersectional collaboration and shared responsibility among the education, military and health sectors.
The authors thank the Lithuanian Ministry of Defense and all centers for military recruitment for administrative support.
Conceptualization, B.M. and A.E.; Methodology, B.M., V.J.C., and D.V.; Formal Analysis, B.M. and A.E.; Investigation, D.V., V.J.C., and R.Z.-S.; Resources, A.E.; Data Curation, D.V., V.J.C., and R.Z.-S.; Writing---Original Draft Preparation, B.M.; Writing---Review & Editing, A.E.; Supervision, B.M. All authors have read and agreed to the published version of the manuscript.
The study was supported by the Lithuanian Research Council.
The authors declare no conflict of interest. The sponsors had no role in the study design, execution, interpretation, or writing of the study.
ijerph-17-00783-t001_Table 1
######
Descriptive statistics and comparison (chi-squared test) between recruits rejected for and enlisted into military service.
-----------------------------------------------------------------------------------------------------------------------------
Total\ Rejected for Military Service\ Enlisted Into Military Service\ χ^2^; df; *p*
(%) (%) (%)
------------------------- ------------ -------------------------------- --------------------------------- -------------------
MVPA *N = 1219* 31.0; 1; \<0.0001
Low (\<2.5 h/week) 44.7 52.6 **36.9**
Adequate (≥2.5 h/week) 55.3 47.4 **63.1**
Mediterranean diet *N = 630* 2.3; 2; 0.315
Low adherence 50.2 51.5 49.4
Medium adherence 46.3 44.9 48.0
High adherence 3.5 3.6 2.6
Alcohol consumption *N* = 1082 9.2; 2; 0.010
Abstinent (≥30 days) 24.2 23.4 25.0
Light--moderate drinker 66.2 64.3 68.1
Heavy drinker 9.6 12.3 **6.8 \***
Cigarette smoking *N = 1179* 16.1; 1; \<0.0001
Current nonsmoker 37.7 32.3 **43.0**
Current smoker 62.3 67.7 **57.0**
Psychological distress *N = 1159* 44.4; 1; \<0.0001
Low 90.9 85.3 **96.6**
High 9.1 14.7 **3.4**
-----------------------------------------------------------------------------------------------------------------------------
Note: Boldface indicates significant values (*p* \< 0.05); \* adjusted *p* values for 2 × 3 comparisons using the Bonferroni method. df, degrees of freedom; MVPA, moderate to vigorous physical activity.
ijerph-17-00783-t002_Table 2
######
Correlations between the predictors of enlistment for recruits rejected for (above the diagonal) and enlisted into (below the diagonal) military service.
MVPA (h/Week) Mediterranean Diet Alcohol (Units/Month) Cigarettes (Number/Day) Psychological Distress
------------------------- --------------- -------------------- ----------------------- ------------------------- ------------------------
MVPA (h/week) -- --0.02 0.01 0.05 --0.07
Mediterranean diet **0.13** -- --0.06 **--0.11** **--0.12**
Alcohol (units/month) --0.03 **--0.12** -- **0.22** **0.21**
Cigarettes (number/day) --0.01 **--0.18** **0.24** -- **0.12**
Psychological distress --0.07 **--0.22** **0.27** **0.12** --
Note: Boldface indicates significant values (*p* \< 0.05). MVPA, moderate to vigorous physical activity.
ijerph-17-00783-t003_Table 3
######
Multiple logistic regression predicting enlistment to military service from health behaviors and distress in Lithuanian male youth, controlling for family income, body mass index, and age (crude and adjusted odds ratios (ORs)).
Model 1 Model 2 Model 3 Model 4 Model 5 Model 6 Model 7
------------------------------- ----------------------- ------------------------------ ------------------- ----------------------- ----------------------- ---------------------- -----------------------
Predictors Odds ratio (95% CI) Adjusted odds ratio (95% CI)
Family income 1.15 (0.93--1.43) 1.09 (0.87--1.36)
BMI 0.99 (0.95--1.03) 0.99 (0.95--1.03)
Age **0.76 (0.71--0.82)** **0.77 (0.71--0.83)**
MVPA (≥2.5 h/week) **1.97 (1.57--2.47)** **1.42 (1.11--2.03)**
Mediterranean diet
Low adherence Ref. Ref.
Medium adherence 1.27 (0.96--1.74) 0.90 (0.63--1.29)
High adherence 0.81 (0.34--1.93) 0.83 (0.29--2.39)
Alcohol consumption
Abstinent (≥30 days) Ref. Ref.
Light--moderate drinker 0.52 (0.82--1.49) 1.15 (0.73--1.83)
Heavy drinker **0.60 (0.45--0.79)** 0.64 (0.31--1.34)
Cigarette smoking
Current nonsmoker Ref. Ref.
Current smoker **0.61 (0.49--0.78)** **0.58 (0.39--0.86)**
Psychological distress (high) **0.20 (0.13-0.33)** **0.26 (0.12--0.55)**
Nagelkerke R^2^ 0.06 0.04 0.01 0.02 0.02 0.06 0.16
Note: Boldface indicates significant values (*p* \< 0.05). CI, confidence interval; BMI, body mass index; MVPA, moderate to vigorous physical activity; Ref., reference group.
|
/*
* Copyright (c) 2004, 2014, Oracle and/or its affiliates. All rights reserved.
* DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
*
* This code is free software; you can redistribute it and/or modify it
* under the terms of the GNU General Public License version 2 only, as
* published by the Free Software Foundation. Oracle designates this
* particular file as subject to the "Classpath" exception as provided
* by Oracle in the LICENSE file that accompanied this code.
*
* This code is distributed in the hope that it will be useful, but WITHOUT
* ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
* FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License
* version 2 for more details (a copy is included in the LICENSE file that
* accompanied this code).
*
* You should have received a copy of the GNU General Public License version
* 2 along with this work; if not, write to the Free Software Foundation,
* Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
*
* Please contact Oracle, 500 Oracle Parkway, Redwood Shores, CA 94065 USA
* or visit www.oracle.com if you need additional information or have any
* questions.
*/
package sun.tools.jconsole;
import java.awt.*;
import java.awt.event.*;
import java.io.*;
import java.lang.management.*;
import java.lang.reflect.*;
import javax.swing.*;
import javax.swing.border.*;
import javax.swing.event.*;
import java.util.*;
import java.util.concurrent.*;
import java.util.List;
import static sun.tools.jconsole.Utilities.*;
@SuppressWarnings("serial")
class ThreadTab extends Tab implements ActionListener, DocumentListener, ListSelectionListener {
PlotterPanel threadMeter;
TimeComboBox timeComboBox;
JTabbedPane threadListTabbedPane;
DefaultListModel<Long> listModel;
JTextField filterTF;
JLabel messageLabel;
JSplitPane threadsSplitPane;
HashMap<Long, String> nameCache = new HashMap<Long, String>();
private ThreadOverviewPanel overviewPanel;
private boolean plotterListening = false;
private static final String threadCountKey = "threadCount";
private static final String peakKey = "peak";
private static final Color threadCountColor = Plotter.defaultColor;
private static final Color peakColor = Color.red;
private static final Border thinEmptyBorder = new EmptyBorder(2, 2, 2, 2);
/*
Hierarchy of panels and layouts for this tab:
ThreadTab (BorderLayout)
North: topPanel (BorderLayout)
Center: controlPanel (FlowLayout)
timeComboBox
Center: plotterPanel (BorderLayout)
Center: plotter
*/
public static String getTabName() {
return Messages.THREADS;
}
public ThreadTab(VMPanel vmPanel) {
super(vmPanel, getTabName());
setLayout(new BorderLayout(0, 0));
setBorder(new EmptyBorder(4, 4, 3, 4));
JPanel topPanel = new JPanel(new BorderLayout());
JPanel plotterPanel = new JPanel(new VariableGridLayout(0, 1, 4, 4, true, true));
add(topPanel, BorderLayout.NORTH);
add(plotterPanel, BorderLayout.CENTER);
JPanel controlPanel = new JPanel(new FlowLayout(FlowLayout.CENTER, 20, 5));
topPanel.add(controlPanel, BorderLayout.CENTER);
threadMeter = new PlotterPanel(Messages.NUMBER_OF_THREADS,
Plotter.Unit.NONE, true);
threadMeter.plotter.createSequence(threadCountKey, Messages.LIVE_THREADS, threadCountColor, true);
threadMeter.plotter.createSequence(peakKey, Messages.PEAK, peakColor, true);
setAccessibleName(threadMeter.plotter,
Messages.THREAD_TAB_THREAD_PLOTTER_ACCESSIBLE_NAME);
plotterPanel.add(threadMeter);
timeComboBox = new TimeComboBox(threadMeter.plotter);
controlPanel.add(new LabeledComponent(Messages.TIME_RANGE_COLON,
Resources.getMnemonicInt(Messages.TIME_RANGE_COLON),
timeComboBox));
listModel = new DefaultListModel<Long>();
JTextArea textArea = new JTextArea();
textArea.setBorder(thinEmptyBorder);
textArea.setEditable(false);
setAccessibleName(textArea,
Messages.THREAD_TAB_THREAD_INFO_ACCESSIBLE_NAME);
ThreadJList list = new ThreadJList(listModel, textArea);
Dimension di = new Dimension(super.getPreferredSize());
di.width = Math.min(di.width, 200);
JScrollPane threadlistSP = new JScrollPane(list);
threadlistSP.setPreferredSize(di);
threadlistSP.setBorder(null);
JScrollPane textAreaSP = new JScrollPane(textArea);
textAreaSP.setBorder(null);
threadListTabbedPane = new JTabbedPane(JTabbedPane.TOP);
threadsSplitPane = new JSplitPane(JSplitPane.HORIZONTAL_SPLIT,
threadlistSP, textAreaSP);
threadsSplitPane.setOneTouchExpandable(true);
threadsSplitPane.setBorder(null);
JPanel firstTabPanel = new JPanel(new BorderLayout());
firstTabPanel.setOpaque(false);
JPanel firstTabToolPanel = new JPanel(new FlowLayout(FlowLayout.LEFT, 5, 2));
firstTabToolPanel.setOpaque(false);
filterTF = new PromptingTextField("Filter", 20);
filterTF.getDocument().addDocumentListener(this);
firstTabToolPanel.add(filterTF);
JSeparator separator = new JSeparator(JSeparator.VERTICAL);
separator.setPreferredSize(new Dimension(separator.getPreferredSize().width,
filterTF.getPreferredSize().height));
firstTabToolPanel.add(separator);
JButton detectDeadlockButton = new JButton(Messages.DETECT_DEADLOCK);
detectDeadlockButton.setMnemonic(Resources.getMnemonicInt(Messages.DETECT_DEADLOCK));
detectDeadlockButton.setActionCommand("detectDeadlock");
detectDeadlockButton.addActionListener(this);
detectDeadlockButton.setToolTipText(Messages.DETECT_DEADLOCK_TOOLTIP);
firstTabToolPanel.add(detectDeadlockButton);
messageLabel = new JLabel();
firstTabToolPanel.add(messageLabel);
firstTabPanel.add(threadsSplitPane, BorderLayout.CENTER);
firstTabPanel.add(firstTabToolPanel, BorderLayout.SOUTH);
threadListTabbedPane.addTab(Messages.THREADS, firstTabPanel);
plotterPanel.add(threadListTabbedPane);
}
private long oldThreads[] = new long[0];
public SwingWorker<?, ?> newSwingWorker() {
final ProxyClient proxyClient = vmPanel.getProxyClient();
if (!plotterListening) {
proxyClient.addWeakPropertyChangeListener(threadMeter.plotter);
plotterListening = true;
}
return new SwingWorker<Boolean, Object>() {
private int tlCount;
private int tpCount;
private long ttCount;
private long[] threads;
private long timeStamp;
public Boolean doInBackground() {
try {
ThreadMXBean threadMBean = proxyClient.getThreadMXBean();
tlCount = threadMBean.getThreadCount();
tpCount = threadMBean.getPeakThreadCount();
if (overviewPanel != null) {
ttCount = threadMBean.getTotalStartedThreadCount();
} else {
ttCount = 0L;
}
threads = threadMBean.getAllThreadIds();
for (long newThread : threads) {
if (nameCache.get(newThread) == null) {
ThreadInfo ti = threadMBean.getThreadInfo(newThread);
if (ti != null) {
String name = ti.getThreadName();
if (name != null) {
nameCache.put(newThread, name);
}
}
}
}
timeStamp = System.currentTimeMillis();
return true;
} catch (IOException e) {
return false;
} catch (UndeclaredThrowableException e) {
return false;
}
}
protected void done() {
try {
if (!get()) {
return;
}
} catch (InterruptedException ex) {
return;
} catch (ExecutionException ex) {
if (JConsole.isDebug()) {
ex.printStackTrace();
}
return;
}
threadMeter.plotter.addValues(timeStamp, tlCount, tpCount);
threadMeter.setValueLabel(tlCount+"");
if (overviewPanel != null) {
overviewPanel.updateThreadsInfo(tlCount, tpCount, ttCount, timeStamp);
}
String filter = filterTF.getText().toLowerCase(Locale.ENGLISH);
boolean doFilter = (filter.length() > 0);
ArrayList<Long> l = new ArrayList<Long>();
for (long t : threads) {
l.add(t);
}
Iterator<Long> iterator = l.iterator();
while (iterator.hasNext()) {
long newThread = iterator.next();
String name = nameCache.get(newThread);
if (doFilter && name != null &&
name.toLowerCase(Locale.ENGLISH).indexOf(filter) < 0) {
iterator.remove();
}
}
long[] newThreads = threads;
if (l.size() < threads.length) {
newThreads = new long[l.size()];
for (int i = 0; i < newThreads.length; i++) {
newThreads[i] = l.get(i);
}
}
for (long oldThread : oldThreads) {
boolean found = false;
for (long newThread : newThreads) {
if (newThread == oldThread) {
found = true;
break;
}
}
if (!found) {
listModel.removeElement(oldThread);
if (!doFilter) {
nameCache.remove(oldThread);
}
}
}
// Threads are in reverse chronological order
for (int i = newThreads.length - 1; i >= 0; i--) {
long newThread = newThreads[i];
boolean found = false;
for (long oldThread : oldThreads) {
if (newThread == oldThread) {
found = true;
break;
}
}
if (!found) {
listModel.addElement(newThread);
}
}
oldThreads = newThreads;
}
};
}
long lastSelected = -1;
public void valueChanged(ListSelectionEvent ev) {
ThreadJList list = (ThreadJList)ev.getSource();
final JTextArea textArea = list.textArea;
Long selected = list.getSelectedValue();
if (selected == null) {
if (lastSelected != -1) {
selected = lastSelected;
}
} else {
lastSelected = selected;
}
textArea.setText("");
if (selected != null) {
final long threadID = selected;
workerAdd(new Runnable() {
public void run() {
ProxyClient proxyClient = vmPanel.getProxyClient();
StringBuilder sb = new StringBuilder();
try {
ThreadMXBean threadMBean = proxyClient.getThreadMXBean();
ThreadInfo ti = null;
MonitorInfo[] monitors = null;
if (proxyClient.isLockUsageSupported() &&
threadMBean.isObjectMonitorUsageSupported()) {
// VMs that support the monitor usage monitoring
ThreadInfo[] infos = threadMBean.dumpAllThreads(true, false);
for (ThreadInfo info : infos) {
if (info.getThreadId() == threadID) {
ti = info;
monitors = info.getLockedMonitors();
break;
}
}
} else {
// VM doesn't support monitor usage monitoring
ti = threadMBean.getThreadInfo(threadID, Integer.MAX_VALUE);
}
if (ti != null) {
if (ti.getLockName() == null) {
sb.append(Resources.format(Messages.NAME_STATE,
ti.getThreadName(),
ti.getThreadState().toString()));
} else if (ti.getLockOwnerName() == null) {
sb.append(Resources.format(Messages.NAME_STATE_LOCK_NAME,
ti.getThreadName(),
ti.getThreadState().toString(),
ti.getLockName()));
} else {
sb.append(Resources.format(Messages.NAME_STATE_LOCK_NAME_LOCK_OWNER,
ti.getThreadName(),
ti.getThreadState().toString(),
ti.getLockName(),
ti.getLockOwnerName()));
}
sb.append(Resources.format(Messages.BLOCKED_COUNT_WAITED_COUNT,
ti.getBlockedCount(),
ti.getWaitedCount()));
sb.append(Messages.STACK_TRACE);
int index = 0;
for (StackTraceElement e : ti.getStackTrace()) {
sb.append(e).append('\n');
if (monitors != null) {
for (MonitorInfo mi : monitors) {
if (mi.getLockedStackDepth() == index) {
sb.append(Resources.format(Messages.MONITOR_LOCKED, mi.toString()));
}
}
}
index++;
}
}
} catch (IOException ex) {
// Ignore
} catch (UndeclaredThrowableException e) {
proxyClient.markAsDead();
}
final String text = sb.toString();
SwingUtilities.invokeLater(new Runnable() {
public void run() {
textArea.setText(text);
textArea.setCaretPosition(0);
}
});
}
});
}
}
private void doUpdate() {
workerAdd(new Runnable() {
public void run() {
update();
}
});
}
private void detectDeadlock() {
workerAdd(new Runnable() {
public void run() {
try {
final Long[][] deadlockedThreads = getDeadlockedThreadIds();
if (deadlockedThreads == null || deadlockedThreads.length == 0) {
// Display message for 30 seconds. Do it on a separate thread so
// the sleep won't hold up the worker queue.
// This will be replaced later by separate statusbar logic.
new Thread() {
public void run() {
try {
SwingUtilities.invokeAndWait(new Runnable() {
public void run() {
String msg = Messages.NO_DEADLOCK_DETECTED;
messageLabel.setText(msg);
threadListTabbedPane.revalidate();
}
});
sleep(30 * 1000);
} catch (InterruptedException ex) {
// Ignore
} catch (InvocationTargetException ex) {
// Ignore
}
SwingUtilities.invokeLater(new Runnable() {
public void run() {
messageLabel.setText("");
}
});
}
}.start();
return;
}
SwingUtilities.invokeLater(new Runnable() {
public void run() {
// Remove old deadlock tabs
while (threadListTabbedPane.getTabCount() > 1) {
threadListTabbedPane.removeTabAt(1);
}
if (deadlockedThreads != null) {
for (int i = 0; i < deadlockedThreads.length; i++) {
DefaultListModel<Long> listModel = new DefaultListModel<Long>();
JTextArea textArea = new JTextArea();
textArea.setBorder(thinEmptyBorder);
textArea.setEditable(false);
setAccessibleName(textArea,
Messages.THREAD_TAB_THREAD_INFO_ACCESSIBLE_NAME);
ThreadJList list = new ThreadJList(listModel, textArea);
JScrollPane threadlistSP = new JScrollPane(list);
JScrollPane textAreaSP = new JScrollPane(textArea);
threadlistSP.setBorder(null);
textAreaSP.setBorder(null);
JSplitPane splitPane = new JSplitPane(JSplitPane.HORIZONTAL_SPLIT,
threadlistSP, textAreaSP);
splitPane.setOneTouchExpandable(true);
splitPane.setBorder(null);
splitPane.setDividerLocation(threadsSplitPane.getDividerLocation());
String tabName;
if (deadlockedThreads.length > 1) {
tabName = Resources.format(Messages.DEADLOCK_TAB_N, i+1);
} else {
tabName = Messages.DEADLOCK_TAB;
}
threadListTabbedPane.addTab(tabName, splitPane);
for (long t : deadlockedThreads[i]) {
listModel.addElement(t);
}
}
threadListTabbedPane.setSelectedIndex(1);
}
}
});
} catch (IOException e) {
// Ignore
} catch (UndeclaredThrowableException e) {
vmPanel.getProxyClient().markAsDead();
}
}
});
}
// Return deadlocked threads or null
public Long[][] getDeadlockedThreadIds() throws IOException {
ProxyClient proxyClient = vmPanel.getProxyClient();
ThreadMXBean threadMBean = proxyClient.getThreadMXBean();
long[] ids = proxyClient.findDeadlockedThreads();
if (ids == null) {
return null;
}
ThreadInfo[] infos = threadMBean.getThreadInfo(ids, Integer.MAX_VALUE);
List<Long[]> dcycles = new ArrayList<Long[]>();
List<Long> cycle = new ArrayList<Long>();
// keep track of which thread is visited
// one thread can only be in one cycle
boolean[] visited = new boolean[ids.length];
int deadlockedThread = -1; // Index into arrays
while (true) {
if (deadlockedThread < 0) {
if (cycle.size() > 0) {
// a cycle found
dcycles.add(cycle.toArray(new Long[0]));
cycle = new ArrayList<Long>();
}
// start a new cycle from a non-visited thread
for (int j = 0; j < ids.length; j++) {
if (!visited[j]) {
deadlockedThread = j;
visited[j] = true;
break;
}
}
if (deadlockedThread < 0) {
// done
break;
}
}
cycle.add(ids[deadlockedThread]);
long nextThreadId = infos[deadlockedThread].getLockOwnerId();
for (int j = 0; j < ids.length; j++) {
ThreadInfo ti = infos[j];
if (ti.getThreadId() == nextThreadId) {
if (visited[j]) {
deadlockedThread = -1;
} else {
deadlockedThread = j;
visited[j] = true;
}
break;
}
}
}
return dcycles.toArray(new Long[0][0]);
}
// ActionListener interface
public void actionPerformed(ActionEvent evt) {
String cmd = ((AbstractButton)evt.getSource()).getActionCommand();
if (cmd == "detectDeadlock") {
messageLabel.setText("");
detectDeadlock();
}
}
// DocumentListener interface
public void insertUpdate(DocumentEvent e) {
doUpdate();
}
public void removeUpdate(DocumentEvent e) {
doUpdate();
}
public void changedUpdate(DocumentEvent e) {
doUpdate();
}
private class ThreadJList extends JList<Long> {
private JTextArea textArea;
ThreadJList(DefaultListModel<Long> listModel, JTextArea textArea) {
super(listModel);
this.textArea = textArea;
setBorder(thinEmptyBorder);
setSelectionMode(ListSelectionModel.SINGLE_SELECTION);
textArea.setText(Messages.THREAD_TAB_INITIAL_STACK_TRACE_MESSAGE);
addListSelectionListener(ThreadTab.this);
setCellRenderer(new DefaultListCellRenderer() {
public Component getListCellRendererComponent(JList<?> list, Object value, int index,
boolean isSelected, boolean cellHasFocus) {
super.getListCellRendererComponent(list, value, index, isSelected, cellHasFocus);
if (value != null) {
String name = nameCache.get(value);
if (name == null) {
name = value.toString();
}
setText(name);
}
return this;
}
});
}
public Dimension getPreferredSize() {
Dimension d = super.getPreferredSize();
d.width = Math.max(d.width, 100);
return d;
}
}
private class PromptingTextField extends JTextField implements FocusListener {
private String prompt;
boolean promptRemoved = false;
Color fg;
public PromptingTextField(String prompt, int columns) {
super(prompt, columns);
this.prompt = prompt;
updateForeground();
addFocusListener(this);
setAccessibleName(this, prompt);
}
@Override
public void revalidate() {
super.revalidate();
updateForeground();
}
private void updateForeground() {
this.fg = UIManager.getColor("TextField.foreground");
if (promptRemoved) {
setForeground(fg);
} else {
setForeground(Color.gray);
}
}
public String getText() {
if (!promptRemoved) {
return "";
} else {
return super.getText();
}
}
public void focusGained(FocusEvent e) {
if (!promptRemoved) {
setText("");
setForeground(fg);
promptRemoved = true;
}
}
public void focusLost(FocusEvent e) {
if (promptRemoved && getText().isEmpty()) {
setText(prompt);
setForeground(Color.gray);
promptRemoved = false;
}
}
}
OverviewPanel[] getOverviewPanels() {
if (overviewPanel == null) {
overviewPanel = new ThreadOverviewPanel();
}
return new OverviewPanel[] { overviewPanel };
}
private static class ThreadOverviewPanel extends OverviewPanel {
ThreadOverviewPanel() {
super(Messages.THREADS, threadCountKey, Messages.LIVE_THREADS, null);
}
private void updateThreadsInfo(long tlCount, long tpCount, long ttCount, long timeStamp) {
getPlotter().addValues(timeStamp, tlCount);
getInfoLabel().setText(Resources.format(Messages.THREAD_TAB_INFO_LABEL_FORMAT, tlCount, tpCount, ttCount));
}
}
}
|
Developmental neurotoxicity of chlorpyrifos in vivo and in vitro: effects on nuclear transcription factors involved in cell replication and differentiation.
Chlorpyrifos is a widely used organophosphate insecticide that is a suspected developmental neurotoxin. Although chlorpyrifos exerts some effects through cholinesterase inhibition, recent studies suggest additional, direct actions on developing cells. We assessed the effects of chlorpyrifos on nuclear transcription factors involved in cell replication and differentiation using in vitro and in vivo models. HeLa nuclear protein extracts were incubated with the labeled consensus oligonucleotides for AP-1 and Sp1 transcription factors in the presence and absence of chlorpyrifos. In concentrations previously shown to affect cell development, chlorpyrifos reduced AP-1, but not Sp1 DNA-binding activity. Next, chlorpyrifos was incubated with PC12 cells either during cell replication or after initiation of differentiation with NGF. Chlorpyrifos evoked stage-specific interference with the expression of the transcription factors: Sp1 was reduced in replicating and differentiating cells, whereas AP-1 was affected only during differentiation. Finally, neonatal rats were given apparently subtoxic doses of chlorpyrifos either on postnatal days 1-4 or 11-14 and the effects were evaluated in the forebrain (an early-developing, cholinergic target region) and cerebellum (late-developing region, poor in cholinergic innervation). Again, chlorpyrifos evoked stage-specific changes in transcription factor expression and binding activity, with greater effects on Sp1 during active neurogenesis, and effects on AP-1 during differentiation. The changes were present in both forebrain and cerebellum and were gender-specific. These results indicate that chlorpyrifos interferes with brain development, in part by multiple alterations in the activity of transcription factors involved in the basic machinery of cell replication and differentiation. Noncholinergic actions of chlorpyrifos that are unique to brain development reinforce the need to examine endpoints other than cholinesterase inhibition. |
Comparison of conventional versus computer-navigated acetabular component insertion.
This retrospective study compared the efficacy of computer navigation and conventional freehand techniques to place acetabular component orientation in the target position of acetabular cup inclination of 45 degrees and anteversion of 20 degrees . We selected 69 patients who had undergone total hip arthroplasty with freehand cup insertion who had computed tomography (CT) to plan for acetabular cup placement of the contralateral side. This group was compared with 98 patients who underwent CT-based cup insertion, and all had postoperative CT. After CT-based cup placement, average cup position was 43 degrees inclination (95% confidence interval [CI], 0.97; range, 30 degrees -58 degrees ) and 22.2 degrees anteversion (95% CI, 1.72; range, 5 degrees -38 degrees ). For freehand, average cup position was 45.7 degrees inclination (95% CI, 2.63 degrees ; range, 26 degrees -64 degrees ) and 28.5 degrees anteversion (95% CI, 3.80 degrees ; range, 9 degrees -53 degrees ). F ratio was 5.56 for inclination and 3.67 for anteversion (P < .0001). This study demonstrated substantial statistical improvement in accuracy of cup placement using CT-based navigation compared with freehand methods. |
Pre-Health
The decision to pursue a health profession can be both exciting and challenging. Your educational preparation as an undergraduate is an essential part of your success later on. Many students arrive at the university with the goal to become a physician, dentist, or other health professional, but they have little knowledge of what the profession is really like or of its demands. Only about one-half of students who apply to medical school are actually admitted. Because competition is so intense in medicine and other health professions, you should become as familiar as possible with the career you are pursuing.
The pre-health advisors in Arts & Sciences Advising Services stand ready to assist you as you explore your options and begin your preparation for a health profession. To schedule an appointment with a pre-health advisor, go to MyUTK.edu through your Grades First link or call 865-974-4483 during regular business hours. |
Restorative proctocolectomy with an ileoanal pouch: the role of laparoscopy.
The Aim of this retrospective study was to evaluate early experience with laparoscopic restorative proctocolectomy by analyzing the perioperative results of surgical treatment. Seven major surgeries were performed in six patients with familial adenomatous polyposis and ulcerative colitis. All procedures were performed under laparoscopy at our third-level hospital from June 2003 to October 2004. Mean surgical time was 287.5 +/- 80.7 min, and median blood loss was 300 +/- 249.0 cc. There were no conversions; return of peristalsis began at 32 +/- 12.4 h; average time to first oral intake was 64.0 +/- 32.8 h, and mean duration of hospital stay was 9.3 +/- 1.2 days. There was one case of perineal sepsis due to ileal pouch-anal anastomotic leakage, which was successfully treated with oral intake restriction, parenteral nutrition, and intra-rectal drainage. The most common postoperative complication was postoperative ileus. We believe that the laparoscopic approach to restorative proctocolectomy may be considerably improved in our center. Particular aspects for improvement include efforts to achieve lower operating and hospitalization times to equate our results with those reported by multicenter studies for laparoscopic colon cancer surgery. In our opinion, learning and further training opportunities should be encouraged to improve surgeon experience in the field of laparoscopy, preferably at centers specializing in restorative proctocolectomy. |
Thank you for visiting Dick's Sporting Goods. If you need assistance with shopping on our site, please call us at 1-877-846-9997 and a customer care representative will be happy to assist you. Please inform the Customer Service representative that you require assistance.
Product Selection
Suit Up for Your Training: Shop Under Armour®
Engineered for an unbelievable fit, Under Armour® apparel works as hard as you do—each garment is designed with performance-enhancing features to help you make the most of your training.
Shop Under Armour® for men, women and kids. Experience the remarkable fit and feel of technical fabrics that regulate your body temperature, wick away perspiration and support your muscles as you train.
Buying Tips
It’s Under Armour’s® proprietary technologies that set the brand apart. Drag a tire on an autumn morning. Go the extra mile during your evening run. With Under Armour®, there’s a technology designed just for your workout.
Under Armour® reinvented the cotton T-shirt. Pull on a UA Charged Cotton tee for the super-soft feel of cotton that dries faster—and keeps you cooler
Expert Advice
From performance golf and running clothes to the super hero-inspired Alter Ego collection, Under Armour® crafts gear for athletes of all stripes. Pull on Under Armour® baselayers for thermal warmth and layer with soft Under Armour hoodies and zip-up jackets. Take on your training with air-light tees, sleek gym shorts and compression apparel. |
Nigeria election body declares official vote results
Nigeria’s electoral commission has announced the official results of the country’s presidential election, declaring opposition leader Mohammadu Buhari the winner of the polls.
Buhari, a 72-year-old former military ruler from the All Progressives Congress (APC) Party, won 15,424,921 votes or 53.95 percent of the 28,587,564 total valid ballots cast, the Independent National Electoral Commission (INEC) said on Wednesday.
“Muhammadu Buhari… having satisfied the requirement for the law and scored the highest number of votes is hereby declared the winner,” INEC Chairman Attahiru Jega said.
Jonathan had conceded defeat to Buhari and congratulated him in a statement released on Tuesday.
The vote was the eighth election since Africa’s most populous country won independence from Britain in 1960. It is the first time in Nigeria’s history that a challenger has defeated a sitting president.
Buhari ruled Nigeria from January 1984 until August 1985 following a military coup in December 1983.
In the recent election, he received more votes in Nigeria’s northwestern states, hit hardest by the acts of violence committed by Takfiri Boko Haram terrorists. In Borno state, for instance, he won 94 percent of the votes. Many had criticized Jonathan’s handling of the violence.
Boko Haram extremists have claimed responsibility for a number of deadly shooting attacks and bombings in various parts of Nigeria since the beginning of their militancy in 2009, which has so far left over 13,000 people dead and 1.5 million displaced.
People in the oil-rich West African country turned out en masse to vote on Saturday. The election was extended to Sunday, on the account that ballot papers arrived late or imported card readers failed to recognize the fingerprints of the voters. |
Not known Facts About engineering assignment help
Menu
Not known Facts About engineering assignment help
The engineers In this particular profile use Computer system-based simulation equipment to test the model. Even further earning variations to Increase the efficiency of claimed model. Content Engineers – These engineers perform to acquire & exam all chosen elements which might be utilised to generate a variety of solutions from aircraft wings to a number of biomedical equipment. Content engineers research the property along with the framework of steel, nano-product, plastic and a number of other substances, which might be made use of to create a new materials, even more correcting and screening them to uncover the correct mix of resources. They fight to produce the aircraft as gentle as you can. NASA – This opens the chance to function at NASA. For A lot of people it is a desire for being Section of it. Scoring a great quality helps you safe a place in NASA. Valuable Back links Engineering Assignment Material Engineering Mechanical Engineering Abaqus Assignment Matlab Assignment
When you have to have help With all the fluctuated layout Strategies of Engineering Assignment Help like procedure, illustrations, cryptography, execution assessment, etc. At that point you should go no put else, as you have formally uncovered the ideal position.
As In the event the predicaments were not sophisticated adequate now, the rising amount of Engineering aspirants in Australia has taken the Opposition for the sky-superior stage.
Typically, folks Consider engineering is often a freshly obtained ability of human beings, came in the modern age. Even so, In case the definition of engineering is a little broadened then we will realize even cavemen ended up good engineering, as they tamed hearth and designed lots of resources to create their life additional practical and secured. In a means, human beings by their really mother nature, have innate ability of inventing new applications.
If you feel our selling prices are somewhat earlier mentioned your funds, you are totally free to ask for for a discount via the live chat element or email handle. Equally very first-time customers and returning clients are eligible for a reduction. Place your order now and Allow’s help you simplify engineering.
Every single of us at the least some times a week utilizes a smart card in transport, an average energy doorway… Read additional…
Style or redesign see page mechanical or thermal products or subsystems by means of assessment or computer aided designs
This feat has actually been achieved exclusively as a consequence of our earth class assistance supply sample that ensure all assignments are checked by a reviewer. Don't be worried about deadlines, just get in touch with our gurus, they're going to help you out.
"Just planned to Enable you to understand that, thanks to the foundation I obtained from the math help DVD's (In particular the precalculus DVD) I was in a position to go my precalculus system this semester having an A!"
Our homework tutors assure your son or daughter can utilize new techniques — a deeper level of Understanding. Unlike other homework tutors, we consist of structured talent follow to help Little ones reinforce competencies. This reinforcement is The main element to getting concepts to stay! Experience extra assured and less pressured
On this issue, numerous laws i loved this and Attributes with the fluids are accomplished which helps them get an excellent position following the diploma is above.
Additionally, you should listen that for getting some novel idea while you are choosing on an engineering task subject matter, just scroll throughout the engineering learning weblogs developed and consistently current by our qualified assignment writer.
Complete our get type: It is possible to just go surfing to our Web site My Assignment Providers let's know regarding your assignment, and be sure you give us just as much information and facts as feasible. We’ll use this when developing your solution, so the more element you can give, the more customized your do the job will likely be.
Ambitions To help pupils with their homework, present them the top homework help and secure a much better future. |
Starch analysis
Starch analysis or starch grain analysis is a technique that is useful in archaeological research to determine plant taxa. In certain samples of food plants, spices, drugs and desiccated archaeological plant matter, the histological elements can survive and thus be identified but in other samples, like carbonized (burnt) or older materials this is extremely difficult. However starch grains are much more hardy. The technique relies on the fact that a researcher can analyze or microscopically observe starch grains found on artifacts or in soils. Starch grains, ubiquitous in plants, have individual characteristics and resistance to grinding and drying and even to light burning so they are often preserved when other plant remains are lost - thus providing an additional tool to understand the past use of plants.
Usefulness
Starch grain analysis is not a perfect science, however, plant starch grain analysis is a diagnostic feature of multiple applications according to the peculiarities and to the origin of the plant material.
The size, shape and structure of grains from plant species, varies little, which can lead to identification. Starch grains have been removed and identified from stone tools, ceramic sherds, organic materials, dental calculus, and sediments and animal remains to determine diet and when humans began to exploit wild food varieties.
Disadvantages
In some cases the grains can become degraded. Factors such as heat and water absorption may affect the structure of the grains, making identification more difficult. Even if the remains are well preserved, water logging, dehydration, desiccation or damage from fungi can destroy the starch. In some cases, even within the same species, starch grains can differ in shape and size and the size of the grain affects its survivability in the archaeological record.
Biology of starch
Starch is produced in plants as a form of energy storage through the process of photosynthesis. When the plant is in need of energy, the stored starch is converted back into glucose.
Starch grain identification
There are two basic methods for identifying starch:
Diagnostic tests of chemical and physical properties
Optical properties of the granules.
Starch grains are typically microscopically identified with either optical or electron microscopy. Starch grains can become clearer if they are stained a darker color with Iodine Stains. Logol's Iodine is one, used for staining starch because iodine reagents easily bind to starch but less easily to other materials. Features that allow identification of starch grains include: presence of hilum (core of the grain), lamellae (or growth layers), birefringence, and extinction cross (a cross shape, visible on grains under revolving polarized light) which are visible with a microscope and shape and size.
Low magnification
Archaeological research focused on residue adhering to artifacts start at lower magnifications, commonly using a stereoscope. Most data obtained at this stage is qualitative, an important first stage to fuller analysis. Magnifications of between x10 and x50 are sufficient to locate target residues, describe features and confirm internal structures of the identified residues.
High magnification
Modern light, high powered microscopes have an internal light source, allowing illumination with both transmitted and reflected light. These microscopes can provide a magnification of up to x1000: good enough to provide clear images of starch granules as small as a few micrometres in diameter.
Starch granules show different sizes. For example;
Tapioca starch: 5-35 µm
Potato starch: 15-100 µm
Maize starch: 5-25 µm
Rice starch: 3-8 µm
but all are generally under 100 micrometres in size, and are, therefore, best observed under compound microscopes equipped with various lighting conditions and magnifications from x200 to x800.
The starch grains are also compared to standard reference collections for comparison.
Archaeologists and researchers can consider four issues in classification of the plant(s) and its use(s):
Determination of whether evidence for the utilization of plants is present
Study of the assemblage variation
Determination of the presence of particular plant species
Assign percentages of starch granules within a sample to a particular taxon, and present quantitative data regarding relative abundance within the sample. Identification of ancient starch is fairly easily for the first three levels of classification, whilst the fourth level requires continued improvement in the description, classification, and identification of individual starch granules.
Starch in sediments
Starch granules retrieved from sediments are used to reconstruct the habitats associated with human land use. Such studies address two areas of interest to the archaeologist:
landscapes; specifically the reconstruction of historical plant communities at the widest scale of the environment
specific contexts, such as settlements or activity areas; focusing on individual archaeological sites, or separate contexts within them, with the goal of identify specific human activities at a particular location.
The stages involved in the analysis of starch from sediments are; sampling, extraction of starch, slide mounting and viewing, and interpretation.
Sampling
Sampling a sediment core or stratigraphic profile to gather information about an environment requires a detailed understanding of the way the sediments were formed.
Extraction
Most extraction techniques follow a general methodology of:
sample preparation (sieving, drying, or soaking)
disaggregation and deflocculation to break up the elements of the sample into single particles
removal of undesired particles (sands, silts, minerals, organics).
chemicals preservation of the starch granules.
Slide mounting and viewing
Starch granules are mounted onto a slide, using a variety of mounting medias including, but not limited, to water, glycerol, and glycerine jelly. It is important that the material is dried thoroughly before being mounted to ensure that no further degradation of the sample occurs.
The slide is then viewed, as appropriate, for identification and counting.
Interpretation
After the starch granules have been examined, the findings are then recorded and interpreted with respect to the research questions that are being investigated.
Starch on artifacts
Artifacts collect starch granules and protect them from decay due to microorganisms, thus providing excellent conditions for long-term preservation. The analysis may focus on the function of the tool, to examine a broader range of human behaviour but starch analysis also allows insights into craft activities involving the preparation of adhesives, medicines, or other nonfood items.
Modified starch
Starch can also be investigated when it is not in its raw form. For example, Modified starch is created when the morphological or physico-chemical structure of native starch is disrupted in some way, such as in food preparation. The most common way to modify starch is to apply heat. Cooking pits, hearths, and ovens that may have come into contact with starchy material yield modified starches which can provide other insights.
Modified starch is only likely to be preserved under specific conditions, such as arid regions because of its susceptibility to organic decay. Studies of ancient modified starch aid understanding of ancient food technology, variations in cuisine among different social groups, as well as provide an understanding the function of ancient food-processing equipment.
Preserved forms of modified starch include:
Discrete desiccated macroremains: coherent foods that are not attached to any other object and are among the most easily recognizable ancient starchy prepared foodstuffs. They can be either the intended final prepared food, like loaves of bread, or intermediate products of the food processing sequence, like starch-rich, chaffy lumps.
Attached desiccated residues: collections of starchy foodstuffs adhered to a container or vessel. The ability to identify these residues is affected by the quantity and appearance of the residue, as well as the awareness of the excavators. Residues containing obvious plant tissue are most easily recognizable, while thin smears are not as easy to recognize.
Charred residues: normally the result of accidental overcooking and can be preserved as discrete fragments or remain stuck to the cooking vessel. Due to their charred nature, these residues are very difficult to identify.
See also
Starch
References
Bibliography
Hather, J.G. (ed.) 1994. Tropical Archaeobotany: Applications and New Developments, pp. 86-114. Routledge, London.
Messner, Timothy C. 2011. Acorns and Bitter Roots: Starch Grain Research in the Prehistoric Eastern Woodlands. University of Alabama Press, Tuscaloosa, AL.
Category:Methods in archaeology
Category:Starch |
[weewx]
name=weewx
baseurl=http://weewx.com/yum/weewx/el7
enabled=1
gpgcheck=0
|
Q:
How do I make main a friend of my class from within a library?
Please see my first attempt at answering this
. I neglected to tell the whole story before in an attempt to simplify things. Turns out my example works! Sorry.
The whole story is that this is a library the contains a class in one file and the main in another file, all linked into my library. The library is providing the basis for a Process Framework, which is why the main is in the library and not the process.
Below is a stripped down version of what I have.
pf.hpp
using namespace std;
namespace MyNamespace
{
class ProcessManager
{
public:
friend int main(int argc, char** argv);
private:
void test();
};
};
pf.cpp
#include "pf.h"
namespace MyNamespace
{
ProcessManager::test()
{
cout << "My friend has accessed my member" << endl;
}
};
pfmain.cpp
#include "pf.hpp"
int main(int argc, char** argv)
{
ProcessManager pm;
pm.test();
}
Note that this fails on the compilation of the library
What I have tried is:
Moving the friend all over the place
Making the friend reference to main use global scope (e.g. ::main)
Making friend and main declarations use global scope
What am I missing?
Thanks!
A:
Just declare the main outside the MyNamespace and specify global namespace :: in friend statement
//in header file of ProcessManager
//your pf.h
int main(int argc, char** argv);
namespace MyNamespace
{
class ProcessManager
{
public:
friend int ::main(int argc, char** argv);
private:
void test();
};
};
|
Analysis of MUM1/IRF4 protein expression using tissue microarrays and immunohistochemistry.
The gene encoding MUM1 was characterized as a possible translocation partner in chromosomal abnormalities involving a significant number of multiple myelomas. The overexpression of the MUM1 protein as a result of translocation t(6;14) (p25;q32) identified MUM1 as a putative regulatory molecule involved in B-cell differentiation and tumorigenesis. The expression of MUM1 protein in multiple myelomas supports this hypothesis. In the current study, using tissue microarray technology, we have tested the expression of the MUM1 protein in 1335 human malignancies and normal tissues. Our data show that the MUM1 protein is expressed in a wide spectrum of hematolymphoid neoplasms and in malignant melanomas but is absent in other human tumors. In addition, in tissue microarrays as well as in conventional paraffin sections, MUM1 staining was found to lack specificity in detecting plasmacytic differentiation as compared with two markers, CD138/Syndecan and VS38, commonly used in paraffin immunohistochemistry for detection of plasma cells. |
Share Bazaar (film)
Share Bazaar is a 1997 Bollywood film, directed by Manmohan and released in 1997.
Synopsis
In Bombay's business district, on Dalal Street, stands a multi-storied building called the "Bombay Stock Exchange" or the Share Bazaar. This is where fortunes are made and lost. Two of such traders in shares are the Mehta brothers, Hasmukh and Mansukh. They also manipulate people's lives, and this time they have chosen to financially ruin Shekar, by getting him arrested on trumped-up charges. And on the other hand, they have singled out a street-smart young man by the Raj, and get him to take Shekar's place. Will Raj be the next casualty of the influential Mehta brothers?
Cast
Soundtrack
The Music Was Composed By Utpal Biswas and Released by Sony Music India.
External links
Category:1997 films
Category:1990s Hindi-language films
Category:Indian films |
Adventures in being a volunteer advocate to fight poverty while raising children. My insights are seen through the lens of motherhood and a desire to help moms uplift each other to make a better world for our kids.
By Cynthia Changyit Levin, @ccylevin
Wednesday, February 18, 2009
When my wife and I slipped into our theater seats to watch Slumdog Millionaire, we braced ourselves for a journey into urban slums, a world inhabited by over one billion people globally.
But unlike the movie-goers in the theater that night who pinned their hopes for one chai wallah (tea seller) escaping the horrors of the slums of Mumbai, India, on the long-shot odds of his winning the Indian version of Who Wants to Be a Millionaire, we knew that right now there is a tool that has helped not just one movie character but more than 100 million of the world’s poorest people actually begin to escape the worst devastations of poverty. That opportunity is not a game show but microcredit—small loans to start or expand businesses like selling tortillas or cell phone time to your neighbors. And if there was an Oscar for assisting beggars, thieves, and prostitutes to find a dignified route out of the slums, I’d know where to look for the winner.
I wouldn’t look in the cool dark of a movie theater, but in the bright, hot sun of Nairobi where you can see the success of entrepreneurs in the urban slums, Jami Bora’s “slumdog entrepreneurs.” Jamii Bora, which means good families, is a Kenyan microfinance institution that has grown from lending money to 50 women beggars ten years ago to serving more than 200,000 members today. One of those entrepreneurs is Joyce Wairimu. Wairimu was one of the 50 women beggars who started Jamii Bora with founder Ingrid Munro in 1999. Munro calls Wairimu one of the fast climbers out of poverty. How fast? In ten years Wairimu has built six businesses and employs 62 people.
Another of the fast climbers is Wilson Maina. Before Jamii Bora, Maina was a thief, one of the most wanted criminals in Mathare Valley slum. Starting with a loan of $20, Maina has built four businesses and a new life for himself and his family. Along the way, he has convinced hundreds of youth to get out of crime. Now that’s a “lifeline” that really matters.
Munro didn’t stop at proving microcredit to help the poorest slum dwellers. She decided to build a town with decent housing and business space for her entrepreneurs. “Every poor person’s dream is to move out of the slums,” Munro says, “not patch up the slums.” On January 30th, that’s exactly what happened when the first 246 families moved out of the slums and into the newly created Kaputiei town with nearly 1,800 families to follow. For the same monthly mortgage they had paid for their one-room shacks, each family now lives in a home with two bedrooms, a bath, a kitchen and a living room. But this is ultra sub-prime lending that works because in order to qualify for a mortgage the residents have to have successfully repaid three micro-business loans.
Where does Munro’s capacity to innovate and defy conventional wisdom in the microfinance field come from? It started 20 years ago when she and her husband adopted three street children. It was in the fertile ground of Munro’s relationship with the mothers of her sons’ friends in the streets—women who were beggars— that her profound insights would grow. When Munro, a Swedish trained architect and urban planner, retired from the African Housing Fund in 1999, she thought she would also retire from the little group of 50 beggar women with whom she had been working. But when the women pled with her not leave them, Munro agreed to stay and insisted that they must lift themselves out of poverty. For Munro that meant the women had to start developing the discipline of saving on a regular basis.
She had them come every Saturday with about 50 cents in savings. When they deposited their 50 cents she would give each of them two scoops of corn and one scoop of beans for free. She admits now that for those first two months she was tricking them into saving with the lure of free corn and beans. After two months, the bags were empty, but the beggars continued to save and the free corn and beans never returned.
Another of Munro’s breakthroughs is that all Jamii Bora staff are former members, previously destitute themselves.
Winning the war against poverty won’t come from summoning the right “final answers” to a handful of trivia questions to strike it rich on a game show. Winning the war against global poverty will come when we realize that we have one of the answers—microcredit—and summon the political will to lift up those microcredit programs that have figured out how to reach the world’s most destitute people. This is a final answer we can stand behind.
Sam Daley-Harris is Founder of the Microcredit Summit Campaign which seeks to reach 175 million poorest families with microcredit www.microcreditsummit.org and of RESULTS which seeks to create the political will to end poverty www.results.org.Sam Daley-Harris, FounderRESULTS and Microcredit Summit Campaign750 First Street, NW, Suite 1040Washington, DC 20002C [email protected] |
Q:
How to get list of layers from geoserver
Is it possible to get a list of all the layers served by geoserver? I.e. is there some specific url request to send that does this?
A:
The capabilities links on the geoserver home page each list layers served via various services:
the WMS capabilities lists layers that support requests for tiled images
the WFS capabilities lists layers that support requests for vector data
the WCS capabilities lists layers that support raster queries
A sample WMS request would look like this:
http://demo.opengeo.org/geoserver/wms?request=GetCapabilities&service=WMS&version=1.0.0
A:
So just for completeness, here's an example of how to get a list/array of layers:
var formatter = new OpenLayers.Format.WMSCapabilities();
var endpoint = "path/to/wms/endpoint";
var layers = [];
// async call to geoserver (I'm using angular)
$http.get(endpoint + 'request=GetCapabilities').
success(function(data, status, headers, config) {
// use the tool to parse the data
var response = (formatter.read(data));
// this object contains all the GetCapabilities data
var capability = response.capability;
// I want a list of names to use in my queries
for(var i = 0; i < capability.layers.length; i ++){
layers.push(capability.layers[i].name);
}
}).
error(function(data, status, headers, config) {
alert("terrible error logging..");
});
|
Top Participants
Challenge Walk MS: Door County 2015
3-Days, 50 Miles (30-mile option available)September 18 - 20, 2015
The Walk will Challenge You,The Experience Will Change You.
Challenge Walk MS is as much about the journey as it is the destination. It sets a high bar with a three-day, 50-mile walk and a $1,500 fundraising minimum in support of those living with multiple sclerosis, but it rewards at the same level with an all-inclusive destination getaway in Wisconsin’s scenic Door County. Broken into three day-long increments, the daily routes take you past some of the most spectacular scenery in the state, while friends old and new set a tone that’s all about motivation, inspiration and fun.
Share the Experience with a TeamShare your Challenge Walk MS experience by starting a team. Any group of two or more people can form a team, and there are plenty of places to find members - friends, family, your company or your community.
Learn MoreWant to know more about Challenge Walk MS before signing up? Contact the Wisconsin Chapter at [email protected] or by calling 262-369-4400 or 800-242-3358.
SupportChallenge Walk MS is a fully supported event. You train and fundraise and we'll take care of you at the event. |
Successful communication hinges on keeping track of who and what we are talking about. For this reason, person reference sits at the heart of the social sciences. Referring to persons is an interactional process where information is transferred from current speakers to the recipients of their talk. This dissertation concerns itself with the work that is achieved through this transfer of information.
The interactional approach adopted is one that combines the "micro" of conversation analysis with the 'macro' of genealogically grounded anthropological linguistics. Murriny Patha, a non-Pama-Nyungan language spoken in the north of Australia, is a highly complex polysynthetic language with kinship categories that are grammaticalized as verbal inflections. For referring to persons, as well as names, nicknames, kinterms, minimal descriptions and free pronouns, Murriny Patha speakers make extensive use of pronominal reference markers embedded within polysynthetic verbs. Murriny Patha does not have a formal 'mother-in-law' register. There are however numerous taboos on naming kin in avoidance relationships, and on naming and their namesakes. Similarly, there are also taboos on naming the deceased and on naming their namesakes. As a result, for every speaker there is a multitude of people whose names should be avoided.
At any one time, speakers of the language have a range of referential options. Speakers' decisions about which category of reference forms to choose (names, kinterms etc.) are governed by conversational preferences that shape 'referential design'. Six preferences - a preference for associating the referent to the co-present conversationalists, a preference for avoiding personal names, a preference for using recognitionals, a preference for being succinct, and a pair of opposed preferences relating to referential specificity - guide speakers towards choosing a name on one occasion, a kinterm on the next occasion and verbal cross-reference on yet another occasion. Different classes of expressions better satisfy particular conversational preferences. There is a systematicity to the referential choices that speakers make. The interactional objectives of interlocutors are enacted through the regular placement of particular forms in particular sequential environments. These objectives are then revealed through the turn-by-turn unfolding of conversational interaction. |
1. Field of Invention
The invention relates to a fieldbus gateway and the data transmission method thereof. In particular, the invention relates to a fieldbus gateway using a virtual serial fieldbus port and the data transmission method thereof.
2. Related Art
During the development of fieldbus, the industrial Ethernet-based fieldbus protocols, such as ProfiNet, Modbus TCP, and Ethernet/IP, are later than the serial-based fieldbus protocols, such as Profibus and Modbus RTU/ASCII. Moreover, the architecture of the industrial Ethernet-based fieldbus protocols is more complicated. Therefore, most of current supervisory control and data acquisition (SCADA) systems or human machine interfaces (HMI) only support serial-based fieldbus instead of Ethernet-based fieldbus. Or one has to pay extra fees in order to obtain the Ethernet-based fieldbus support. Users of the SCADA system and HMI can only use the serial fieldbus port to communicate with the controlled device. However, since most of current factory automation requires that the remote control center and factory operators could control the controlled device at the same time, the controlled device should be able to receive the controls of a remote SCADA system and a local HMI concurrently. However, the system only uses serial fieldbus communication is difficult to provide this function. Due to its physical properties, the serial fieldbus cannot transmit data over a long distance directly. Repeaters are always required for extending the transmission distance, but they also increase the cost of wiring.
To avoid the cost increasing on wiring, some factories use a fieldbus gateway at both the remote and local ends, respectively. The two fieldbus gateways communicate via an Ethernet. Although this reduces the cost on long-distance wiring, at least two fieldbus gateways are needed. To reduce the number of required gateways, some factories use a device server for the system only requires RS-232/RS-422/RS-485 based serial fieldbus communication. The COM port redirection technique used on a device server provides a low cost long distance transmission. As shown in FIG. 1, the remote SCADA system 101a uses the COM port redirection driver to generate a mapped virtual COM port, the COM port is mapped to a physical serial port on the local device server 700. That is, all operations on the mapped virtual COM port on the SCADA system would be transmitted via the network to the device server 700. Then the device server 700 does the same operations on the physical serial port. This makes the mapped virtual COM port works as a mapped interface of the physical serial port on the device server 700. For example, as the SCADA server 101a sets the RTS pin of the mapped COM port to output active signals, the RTS pin on the physical serial port of the device server 700 would output active signals. Then the CTS pin of the physical serial port of a programmable logic controller 301a (controlled device) connected with the physical serial port of the device server 700 receives the active signals. On the other hand, if the programmable logic controller 301a transmits data via its serial port to the physical serial port of the device server 700, then the device server 700 would forward the received data to the mapped COM port of the SCADA system 101a via the network. So the SCADA system 101a can concurrently receive the data from the programmable logic controller 301a (controlled device). Through this serial tunnel technology, the physical serial port of the local device server 700 is just like the real COM port of the remote SCADA system 101a, thereby connecting with the programmable logic controller 301a.
Although the COM port redirection technique only needs one additional device server to extend the serial communication distance, the COM port redirection establish a dedicated tunnel between the physical serial port of the device server 700 and the mapped virtual COM port (interface) of the SCADA system 101a. Therefore, when using the COM port redirection technique, the physical serial port of the device server 700 could only be occupied by the established tunnel. The physical serial port of the device server only allows one SCADA system 101a (mapped virtual COM port) to communicate with and/or control over a programmable logic controller at a time. It can't work on the system requires the programmable logic controller 301a to be controlled by multiple remote/local control ends concurrently.
In summary, the prior art always has the problem that it is impossible for more than two remote devices to control the same controlled device via serial fieldbus at the same time. It is therefore imperative to provide a solution. |
Freepovpassport.com Guys
Try the Latest Password Hacks for Free POV Passport web page below, and get into freepovpassport.com without a Credit card…or get a discount deal by using the Free POV Passport site image above to sign up. If you Get a Free POV Passport Account, with this discount offer…You’ll get into the members area for much less! As a Free POV Passport member you’ll get access to Ultra HiDef Videos, Giant HiRes Photos, and Brand New Updates! Don’t feel guilty, this low price is for a limited time… and Free POV Passport is wοrth it, Treat yourself! |
---
abstract: 'A general method is proposed for predicting the asymptotic percolation threshold of networks with bottlenecks, in the limit that the sub-net mesh size goes to zero. The validity of this method is tested for bond percolation on filled checkerboard and “stack-of-triangle" lattices. Thresholds for the checkerboard lattices of different mesh sizes are estimated using the gradient percolation method, while for the triangular system they are found exactly using the triangle-triangle transformation. The values of the thresholds approach the asymptotic values of $0.64222$ and $0.53993$ respectively as the mesh is made finer, consistent with a direct determination based upon the predicted critical corner-connection probability.'
author:
- 'Amir Haji-Akbari'
- 'Robert M. Ziff'
bibliography:
- 'HajiAkbariZiffv3.bib'
title: 'Percolation in Networks with Voids and Bottlenecks\'
---
\[sec:Introduction\]Introduction\
=================================
Percolation concerns the formation of long-range connectivity in random systems [@Stauffer]. It has a wide range of application in problems in physics and engineering, including such topics as conductivity and magnetism in random systems, fluid flow in porous media [@Sukop2002], epidemics and clusters in complex networks [@GoltsevDorogovtsevMendes08], analysis of water structure [@BernabeiEtAl08], and gelation in polymer systems [@YilmazGelirAlverogluUysal08]. To study this phenomenon, one typically models the network by a regular lattice made random by independently making sites or bonds occupied with probability $p$. At a critical threshold $p_c$, for a given lattice and percolation type (site, bond), percolation takes place. Finding that threshold exactly or numerically to high precision is essential to studying the percolation problem on a particular lattice, and has been the subject of numerous works over the years (recent works include Refs. [@Lee08; @RiordanWalters07; @Scullard06; @ScullardZiff06; @ZiffScullard06; @ScullardZiff08; @Parviainen07; @QuintanillaZiff07; @NeherMeckeWagner08; @WiermanNaorCheng05; @JohnerGrimaldiBalbergRyser08; @KhamforoushShamsThovertAdler08; @Ambrozic08; @Kownacki08; @FengDengBlote08; @Wu06; @MajewskiMalarz07; @WagnerBalbergKlein06; @TarasevichCherkasova07; @HakobyanPapouliaGrigoriu07; @BerhanSastry07]).
In this paper we investigate the percolation characteristics of networks with bottlenecks. That is, we consider models in which we increase the number of internal bonds within a sub-net while keeping the number of contact points between sub-nets constant. We want to find how $p_c$ depends upon the mesh size in the sub-nets and in particular how it behaves as the mesh size goes to zero. Studying such systems should give insight on the behavior of real systems with bottlenecks, like traffic networks, electric power transmission networks, and ecological systems. It is also interesting from a theoretical point of view because it interrelates the percolation characteristics of the sub-net and the entire network.
![image](squareFig1.eps)
![image](triFig2.eps)
An interesting class of such systems includes lattices with an ordered series of vacated areas within them. Examples include the filled checkerboard lattices (Fig. \[fig:Checkerboard\_finite\]) and the “stack-of-triangles" (Fig. \[fig:strg\_finite\]). The latter can be built by partitioning the triangular lattice into triangular blocks of dimension $L$, and alternately vacating those blocks. These internal blocks of length $L$ correspond to the sub-nets, which contact other sub-nets through the three contact points at their corners. The checkerboard lattice is the square-lattice analog of the stack-of-triangles lattice, where sub-nets are $L \times L$ square lattices which contact the other sub-nets via four contact points. Note, for the stack-of-triangles sub-nets, we also use the $L \times L$ designation, here to indicate $L$ bonds on the base and the sides.
The problem of finding the bond percolation threshold can be solved exactly for the stack-of-triangles lattice because it fits into a class of self-dual arrangements of triangles, and the triangle-triangle transformation (a generalization of the star-triangle transformation) can be used to write down equations for its percolation threshold [@Ziff_CellDualCell; @ChayesLei06]. This approach leads to an algebraic equation which can be solved using numerical root-finding methods. However due to lack of self-duality in the filled checkerboard lattices, no exact solution can be obtained for their thresholds.
It is of interest and of practical importance to investigate the limiting behavior of systems with sub-nets of an infinite number of bonds, i.e., systems where the size of sub-nets is orders of magnitude larger than the size of a single bond in the system, or equivalently, where the mesh size of the lattice compared to the sub-net size becomes small. Due to reduced connectivity, these systems will percolate at a *higher* occupation probability than a similar regular lattice. The limiting percolation threshold for infinite sub-nets is counter-intuitively non-unity, and is argued to be governed by the connectedness of contact points to the infinite percolating clusters within sub-nets. This argument leads to a simple criterion linking the threshold to the probability that the corners connect to the giant cluster in the center of the sub-net.
In this work, the limiting threshold value is computed for bond percolation on the stack-of-triangles and filled checkerboard lattices using this new criterion. Percolation thresholds are also found for a series of lattices of finite sub-net sizes. For the stack-of-triangles lattices, most percolation thresholds are evaluated analytically using the triangle-triangle transformation method, while for filled checkerboard lattices, the gradient percolation method [@Ziff_Sapoval] is used. The limiting values of $0.53993$ and $0.64222$ are found for percolation thresholds of stack-of-triangles and checkerboard lattices respectively, which are both in good agreement with the values extrapolated for the corresponding lattices of finite sub-net sizes.
We note that there are some similarities between this work and studies done on the fractal Sierpiński gaskets (triangular) [@YuYao1988] and carpets (square), but in the case of the Sierpiński models, the sub-nets are repeated in a hierarchical fashion while here they are not. For the Sierpiński gasket, which is effectively all corners, the percolation threshold is known to be 1 [@GefenAharonyShapirMandelbrot84]. For Sierpiński gaskets of a finite number of generations, the formulae for the corner connectivities can be found exactly through recursion [@TaitelbaumHavlinGrassbergerMoenig90], while here they cannot. Recently another hierarchical model with bottlenecks, the so-called Apollonian networks, which are related to duals of Sierpinski networks, has also been introduced [@AutoMoreiraHerrmannAndrade08]. In this model, the percolation threshold goes to zero as the system size goes to infinity.
\[sec:theory\]Theory\
=====================
Let $p$ be the probability that a bond in the system is occupied. Consider a network with sub-nets of infinitely fine mesh, each individually percolating (in the sense of forming “infinite" clusters but not necessarily connecting the corners) at $p_{c,s}$, and denote the overall bond percolation threshold of the entire network to be $p_{c,n}$. It is obvious that $p_{c,s}<p_{c,n}$, due to reduced connectivity in the entire network compared to connectivity in individual sub-nets. For $p_{c,s} < p < p_{c,n}$, an infinite cluster will form within each sub-net with probability $1$. However, the entire network will not percolate, because a sufficient number of connections has not yet been established between the contact points at the corners and central infinite clusters.
Now we construct an auxiliary lattice by connecting the contact points to the center of each subnet, which represents the central infinite cluster contracted into a single site. The occupation probability of a bond on this auxiliary lattice is the probability that the contact point is connected to the central infinite cluster of the sub-net. Percolation of this auxiliary lattice is equivalent to the percolation of the entire network. That is, if this auxiliary lattice percolates at a threshold $p_{c,a}$, the percolation threshold of the entire network will be determined by: $$\begin{aligned}
\label{eq:bottleneck_general}
P_{\infty,{\rm corner}}(p_{c,n})=p_{c,a}\end{aligned}$$ where $P_{\infty,{\rm corner}}(p)$ gives the probability that the corner of the sub-net is connected to the central infinite cluster given that the single occupation probability is $p$.
In general no analytical expression exists for $P_{\infty,{\rm corner}}(p)$, even for simple lattices such as the triangular and square lattices, and $P_{\infty,{\rm corner}}(p)$ must be evaluated by simulation.
![\[fig:stack\_of\_triangles\] (Color online.) Stack-of-triangles lattice and its auxiliary lattice. The filled blue (dark) triangles represent the sub-net, and the yellow honeycomb lattice represents the effective auxiliary lattice.](Str_LatticeFig3.eps)
\[sec:theory:stack\_of\_triangles\]Stack-of-Triangles Lattice
-------------------------------------------------------------
Fig. \[fig:stack\_of\_triangles\] shows a limiting stack-of-triangles lattice where each shaded triangle represents a sub-net of infinitely many bonds. The contact points are the corners of the triangular sub-nets. As shown in Fig. \[fig:stack\_of\_triangles\], the auxiliary lattice of the stack-of-triangles lattice is the honeycomb lattice, which percolates at ${p_{c,a}=1-2\sin\left(\pi/18\right)\approx0.652704}$ [@SykesEssam1964]. Thus the asymptotic percolation threshold $p_{c,n}$ of the stack-of-triangles will be determined by: $$\begin{aligned}
\label{eq:bottleneck_str}
P_{\infty,{\rm corner}}(p_{c,n})=1-2\sin{\frac{\pi}{18}} \ .\end{aligned}$$ Because the stack-of-triangles lattice is made up of triangular cells in a self-dual arrangement, its percolation threshold can be found exactly using the triangle-triangle transformation [@Ziff_CellDualCell; @ChayesLei06]. Denoting the corners of a single triangular sub-net with $A$, $B$ and $C$, the percolation threshold of the entire lattice is determined by the solution of the following equation: $$\begin{aligned}
\label{eq:dual}
P(ABC)=P(\overline{ABC})\end{aligned}$$ where ${P(ABC)}$ is the probability that $A$, $B$ and $C$ are all connected, and ${P(\overline{ABC})}$ is the probability that none of them are connected. Eq. (\[eq:dual\]) gives rise to an algebraic equation which can be solved for the exact percolation threshold of the lattices of different sub-net sizes.
\[sec:theory:checkerboard\]Filled Checkerboard Lattice
------------------------------------------------------
Unlike the stack-of-triangles lattice, there is no exact solution for percolation threshold of the checkerboard lattice for finite sub-nets because no duality argument can be made for such lattices. However once again an auxiliary lattice approach can be used to find a criterion for the asymptotic value of percolation threshold. Fig. \[fig:checkerboad\_aux\] depicts the corresponding auxiliary lattice for a checkerboard lattice, which is simply the square lattice with double bonds in series. This lattice percolates at ${p_{c,a}= 1/\sqrt{2} \approx{0.707107}}$. Thus for the infinite sub-net ${p_{c,n}}$ will be determined by: $$\begin{aligned}
\label{eq:bottleneck_checkerboard}
P_{\infty,{\rm corner}}(p_{c,n})= \frac{1}{\sqrt{2}}\end{aligned}$$ It is interesting to note that there exists another regular lattice — the “martini" lattice — for which the bond threshold is also exactly $1/\sqrt{2}$ [@ZiffScullard06]. However, that lattice does not appear to relate to a network construction as the double-square lattice does.
![\[fig:checkerboad\_aux\](Color online.) Auxiliary lattice of the checkerboard lattice. The blue (dark) colored areas represent the subnets, and the double-bond square lattice (diagonals) represents the auxiliary lattice.](Checkerboard_auxFig4.eps)
\[sec:methods\]Methods
======================
\[sec:methods:Pc\_finite\]Percolation Threshold of Systems of finite-sized sub-nets
-----------------------------------------------------------------------------------
For the checkerboard lattice, we estimate the bond percolation thresholds using the gradient percolation method [@Ziff_Sapoval]. In this method, a gradient of occupation probability is applied to the lattice, such that bonds are occupied according to the local probability determined by this gradient. A self-avoiding hull-generating walk is then made on the lattice according to the rule that an occupied bond will reflect the walk while a vacant bond will be traversed by the walk. For a finite gradient, this walk can be continued infinitely by replicating the original lattice in the direction perpendicular to the gradient using periodic boundary conditions. Such a walk will map out the boundary between the percolating and non-percolating regions, and the average value of occupation probability during the walk will be a measure of the percolation threshold. Because all bonds are occupied or vacated independent of each other, this average probability can be estimated as [@RossoGouyetSapoval1986]: $$\begin{aligned}
\label{eq:Pc_gradient}
p_c=\frac{N_{occ}}{N_{occ}+N_{vac}}\end{aligned}$$ It is particularly straightforward to implement this algorithm to bond percolation on a square lattice, and the checkerboard lattice can be simulated by making some of the square-lattice bonds permanently vacant. Walks are carried out in a horizontal-vertical direction and the original lattice is rotated $45^{\circ}$.
We applied this approach to checkerboard lattices of different block sizes. Fig. \[fig:chkrbrd\_2b2\] and Fig. \[fig:chkrbrd\_4b4\] show the corresponding setups for lattices with $2\times2$ and $4\times4$ vacancies, where the lattice bonds are represented as dashed diagonal lines and solid horizontal and vertical lines show where the walk goes. Circles indicate the centers of permanently vacant bonds. It should be emphasized that permanently vacated bonds are not counted in Eq. (\[eq:Pc\_gradient\]) even if they are visited by the walk.
The percolation threshold of stack-of-triangles lattices of finite sub-net size were calculated using Eq. (\[eq:dual\]). If the occupation probability is $p$ and $q = 1 - p$, one can express $P(ABC)$ and $P(\overline{ABC})$ as: $$\begin{aligned}
P(ABC)&=&\sum_{i=0}^{3n(n+1)/2} \phi(n,i)p^iq^{3n(n+1)/2-i}
\label{eq:phi_n_i}\\
P(\overline{ABC})&=&\sum_{i=0}^{3n(n+1)/2}\psi(n,i)p^i q^{3n(n+1)/2-i}
\label{eq:psi_n_i}\end{aligned}$$ where $n$ denotes the number of bonds per side of the sub-net, $\phi(n,i)$ denotes the number of configurations of an $n\times n$ triangular block with precisely $i$ occupied bonds where the $A$, $B$ and $C$ are connected to each other and $\psi(n,i)$ denotes the number of configurations where none of these points are connected. There appears to be no closed-form combinatorial expression for $\phi(n,i)$ and $\psi(n,i)$, and we determined them by exhaustive search of all possible configurations.
![\[fig:chkrbrd\_2b2\]Representation of checkerboard lattices for simulation with gradient method. The original bond lattice is represented by dashed diagonal lines, while lattice on which the walk goes is vertical and horizontal. Open circles mark bonds that are permanently vacant.](checkerboard2x2Fig5.eps){width="2.5"}
![\[fig:chkrbrd\_4b4\]Checkerboard lattice with $4\times4$ vacancies, with description the same as in Fig. \[fig:chkrbrd\_2b2\].](checkerboard4x4Fig6.eps){width="2.5"}
\[sec:methods:estimate\_Pinf\]Estimation of ${P_{\infty,{\rm corner}}}$
-----------------------------------------------------------------------
As mentioned in Section \[sec:theory\], the asymptotic value of percolation threshold ${p_{c,n}}$ can be calculated using Eq. (\[eq:bottleneck\_checkerboard\]). However there is no analytical expression for ${P_{\infty,{\rm corner}}(p)}$, hence it must be characterized by simulation. In order to do that, the size distribution of clusters connected to the corner must be found for different values of $p>p_{c,s}$. Cluster sizes are defined in terms of the number of sites in the cluster.
In order to isolate the cluster connected to the corner, a first-in-first-out Leath or growth algorithm is used starting from the corner. In FIFO algorithm, the neighbors of every unvisited site are investigated before going to neighbors of the neighbors, so that clusters grow in a circular front. Compared to last-in-first-out algorithm used in recursive programming, this algorithm performs better for ${p{\ge}p_{c,s}}$ because it explores the space in a more compact way.
At each run, the size of the cluster connected to the corner is evaluated using the FIFO growth algorithm. In order to get better statistics, clusters with sizes between ${2^i}$ and ${2^{i+1}-1}$ are counted to be in the $i-$th bin. Because simulations are always run on a finite system, there is an ambiguity on how to define the infinite cluster. However, when ${p{\ge}p_{c,s}}$, the infinite cluster occupies almost the entire lattice, and the finite-size clusters are quite small on average. This effect becomes more and more profound as $p$ increases, and the expected number of clusters in a specific bin becomes smaller and smaller. Consequently, larger bins will effectively contain no clusters, except the bin corresponding to cluster sizes comparable to the size of the entire system. Thus there is no need to set a cutoff value for defining an infinite cluster. Fig. \[fig:cluster\_size\] depicts the size distribution of clusters connected to the corner obtained for $1024 \times 1024$ triangular lattice at (a): $p=0.40$ and (b): $p=0.55$ after ${10^4}$ independent runs. As it is observed, there is a clear gap between bins corresponding to small clusters and the bin corresponding to the spanning infinite cluster even for small values of $p$, which clearly demonstrates that the largest nonempty bin corresponds to infinite percolating clusters connected to the corner. The fraction of such clusters connected to the corner is an estimate of $P_{\infty,{\rm corner}}(p)$.
In the simulations, we used the four-offset shift-register random-number generator R(471,1586,6988,9689) described in Ref. [@Ziff98].
![image](Cluster_size_0_40Fig7a.eps) ![image](Cluster_size_0_55Fig7b.eps)
\[sec:results\]Results and Discussion
=====================================
\[sec:results:gradient\]Gradient Percolation Data
-------------------------------------------------
The gradient percolation method was used to estimate the bond percolation threshold of checkerboard lattices of five different sub-net sizes, i.e., $2\times2$, $4\times4$, $8\times8$, $16\times16$ and $32\times32$. For each lattice, six values of the gradient were used, and simulations were run for $10^{10}$ to $10^{12}$ steps for each gradient value in order to assure that the estimated percolation thresholds are accurate to at least five significant digits. The gradient was applied at an angle of $45^{\circ}$ relative to the original lattice. Figures \[fig:pc\_2b2\]- \[fig:pc\_8b8\] depict typical simulation results. Measured percolation thresholds for finite gradients were extrapolated to estimate the percolation threshold as $L\rightarrow\infty$. Our simulations show that $p_c$ fits fairly linearly when plotted against $1/L$. Table \[table:pc\_checkerboard\] gives these estimated percolation thresholds.
![image](pc_2b2Fig8a.eps) ![image](pc_4b4Fig8b.eps) ![image](pc_8b8Fig8c.eps)
Sub-net size Estimated $p_{c,n}$
-------------- -- -- -- -- -- ---------------------------
$1\times1$ $0.5^{a}$
$2\times2$ $0.596303\pm0.000001^{b}$
$4\times4$ $0.633685\pm0.000009^{b}$
$8\times8$ $0.642318\pm0.000005^{b}$
$16\times16$ $0.64237\pm0.00001^{b}$
$32\times32$ $0.64219\pm0.00002^{b}$
$\vdots$ $\vdots$
$\infty$ $0.642216\pm0.00001^{c}$
: \[table:pc\_checkerboard\] Percolation threshold for checkerboard lattices of different sub-net sizes: $^a$Exact result, $^{b}$from gradient percolation simulations, $^c$from corner simulations using Eq. (\[eq:bottleneck\_checkerboard\]).
\[section:results:dual\]Percolation Threshold of The Stack-of-triangles Lattice
-------------------------------------------------------------------------------
As mentioned in Sections \[sec:theory:stack\_of\_triangles\] and \[sec:methods:Pc\_finite\], the percolation threshold of stack-of-triangles lattice can be determined by Eq. (\[eq:dual\]). Table \[table:polynomial\] summarizes the corresponding polynomial expressions and their relevant roots for lattices having $1$, $2$, $3$ and $4$ triangles per edge. These polynomials give the $\phi(n,i)$ and $\psi(n,i)$ in Eqs. (\[eq:phi\_n\_i\]) and (\[eq:psi\_n\_i\]) for $n=1,2,3,4$ and $i=0,1,\ldots,3n(n+1)/2$. We show $p_0 = P(\overline{ABC})$, $p_2 = P(AB\overline{C})$ (the probability that a given pair of vertices are connected together and not connected to the third vertex), and $p_3 = P(ABC)$. These quantities satisfy $p_0 + 3 p_2 + p_3 = 1$. Then we use Eq. (\[eq:dual\]) to solve for $p_{c,n}$ numerically.
We also show in Table \[table:polynomial\] the values of $p_0$, $p_2$ and $p_3$ evaluated at the $p_{c,n}$. Interestingly, as $n$ increases, $p_0$ at first increases somewhat but then tends back to its original value at $n= 1$, reflecting the fact that the connectivity of the infinitely fine mesh triangle is identical to that of the critical honeycomb lattice, which is identical to the connectivity of the simple triangular lattice according to the usual star-triangle arguments.
It is not possible to perform this exact enumeration for larger sub-nets, so we used gradient percolation method to evaluate $p_c$ for $5\times5$. (To create the triangular bond system on a square bond lattice, alternating horizontal bonds are made permanently occupied.) The final threshold results are summarized in Table \[table:pc\_stack\_of\_triangles\].
--------- ---------------------------------------- --------------------------------------------------------------------------------------------------------
Sub-net $1\times1$ (simple triangular lattice) $2\times2$ (3 “up" triangles or 9 bonds per sub-net)\
${p_3=P(ABC)}$ & ${p^3+3p^2q}$ & ${9p^4q^5+57p^5q^4+63p^6q^3+33p^7q^2+9p^8q+p^9}$\
$p_2 =P\left(AB\overline{C}\right)$ & ${pq^2}$ & ${p^2q^7+10p^3q^6+32p^4q^5+22p^5q^4+7p^6q^3+p^7q^2}$\
${p_0=P(\overline{ABC})}$ & ${(p+q)^3-p_3-3p_2}$ & ${(p+q)^9-p_3-3p_2}$\
$p_c$ &$0.34729635533$ & $0.47162878827$\
${p_0(p_c)=p_3(p_c)}$ & $0.27806614328$ & $0.28488908000$\
${p_2(p_c)}$ & $0.14795590448$ & $0.14340728000$\
--------- ---------------------------------------- --------------------------------------------------------------------------------------------------------
--------- ------------------------------------------------------------------------------------------------------------------------------------
Sub-net $3 \times 3$ (6 “up" triangles or $18$ bonds per sub-net)\
${p_3=P(ABC)}$ & ${29p^6q^{12}+468p^7q^{11}+3015p^8q^{10}+9648p^9q^9+16119p^{10}q^8+17076p^{11}q^7+12638p^{12}q^6}$\
& ${+6810p^{13}q^5+2694p^{14}q^4+768p^{15}q^3+150p^{16}q^2+18p^{17}q+p^{18}}$\
$p_2 =P\left(AB\overline{C}\right)$ & ${p^3q^{15}+21p^4q^{14}+202p^5q^{13}+1125p^6q^{12}+3840p^7q^{11}+7956p^8q^{10}+9697p^9q^9}$\
& ${+7821p^{10}q^8+4484p^{11}q^7+1879p^{12}q^6+572p^{13}q^5+121p^{14}q^4+16p^{15}q^3+p^{16}q^2}$\
${p_0=P(\overline{ABC})}$ & ${(p+q)^{18}-p_3-3p_2}$\
$p_c$ &$0.50907779266$\
${p_0(p_c)=p_3(p_c)}$ & $0.28322276251$\
${p_2(p_c)}$ & $0.14451815833$\
--------- ------------------------------------------------------------------------------------------------------------------------------------
--------- ----------------------------------------------------------------------------------------------------------------------------
Sub-net $4 \times 4$ ($10$ “up" triangles or $30$ bonds per sub-net)\
${p_3=P(ABC)}$ & ${99p^8q^{22}+2900p^9q^{21}+38535p^{10}q^{20}+305436p^{11}q^{19}+1598501p^{12}q^{18}}$\
& ${+5790150p^{13}q^{17}+14901222p^{14}q^{16}+27985060p^{15}q^{15}+39969432p^{16}q^{14}}$\
& ${+45060150p^{17}q^{13}+41218818p^{18}q^{12}+31162896p^{19}q^{11}+19685874p^{20}q^{10}}$\
& ${+10440740p^{21}q^9+4647369p^{22}q^8+1727208p^{23}q^7+530552p^{24}q^6+132528p^{25}q^5}$\
& ${+26265p^{26}q^4+3976p^{27}q^3+432p^{28}q^2+30p^{29}q+p^{30}}$\
$p_2 =P\left(AB\overline{C}\right)$ & ${p^4q^{26}+36p^5q^{25}+613p^6q^{24}+6533p^7q^{23}+48643p^8q^{22}+267261p^9q^{21}}$\
& ${+1114020p^{10}q^{20}+3563824p^{11}q^{19}+8766414p^{12}q^{18}+16564475p^{13}q^{17}}$\
& ${+24187447p^{14}q^{16}+27879685p^{15}q^{15}+25987202p^{16}q^{14}+19980934p^{17}q^{13}}$\
& ${+12843832p^{18}q^{12}+6950714p^{19}q^{11}+3170022p^{20}q^{10}+1212944p^{21}q^9}$\
& ${+385509p^{22}q^8+100140p^{23}q^7+20744p^{24}q^6+3300p^{25}q^5+379p^{26}q^4+28p^{27}q^3+p^{28}q^2}$\
${p_0=P(\overline{ABC})}$ & ${(p+q)^{30}-p_3-3p_2}$\
$p_c$ &$0.52436482243 $\
${p_0(p_c)=p_3(p_c)}$ & $0.28153957013$\
${p_2(p_c)}$ & $0.14564028658$\
--------- ----------------------------------------------------------------------------------------------------------------------------
Sub-net size Estimated $p_c$
-------------- -- -- -- -- -- ----------------------------
$1\times1$ $0.347296355^{a}$
$2\times2$ $0.471628788^{a}$
$3\times3$ $0.509077793^{a}$
$4\times4$ $0.524364822^{a}$
$5\times5$ $0.5315976\pm0.000001^{b}$
$\vdots$ $\vdots$
$\infty$ $0.53993\pm0.00001^c$
: \[table:pc\_stack\_of\_triangles\] Percolation threshold for stack-of-triangles lattices of different sub-net sizes: $^a$From Eq. (\[eq:dual\]) using exact expressions for $p_0$ and $p_3$ from Table \[table:polynomial\], $^b$from gradient simulation, $^c$Corner simulation using Eq. (\[eq:bottleneck\_str\]).
\[sec:results:estimate\_Pinf\]Estimation of ${P_{\infty,{\rm corner}}(p)}$
--------------------------------------------------------------------------
### \[sec:results:estimate\_Pinf:checkerb\]Square Lattice
The cluster growth algorithm was used to estimate ${P_{\infty,{\rm corner}}(p)}$ for different values of $p$. Simulations were run on a $2048\times2048$ square lattice. For each value of $p>1/2$, $10^5$ independent runs were performed and $P_{\infty,{\rm corner}}$ was estimated by considering the fraction of clusters falling into the largest nonempty bin as described in Section \[sec:methods:estimate\_Pinf\]. Fig. \[fig:p\_inf\_chkrbrd\] demonstrates the resulting curve for the square lattice. In order to solve Eq. (\[eq:bottleneck\_checkerboard\]), a cubic spline with natural boundary conditions was used for interpolation, and an initial estimate of ${p_{c,n}}$ was obtained to be $0.6432$. The standard deviation of $P_{\infty,{\rm corner}}(p)$ scales as $O(1/\sqrt{N})$ where $N$ is the number of independent simulation used for its estimation, so that $N=10^5$ will give us an accuracy in $P_{\infty,{\rm corner}}(p)$ of about two significant figures.
In order to increase the accuracy in our estimate, further simulations were performed at the vicinity of $p=0.6432$ for $N=10^{10}$ trials with a lower cut-off size, and $p_{c,n}$ was found to be $0.642216\pm0.00001$. This number is in good agreement with percolation thresholds given in Table \[table:pc\_checkerboard\]. Note that $p_{c,n}$ for the $16\times16$ sub-net checkerboard lattice actually overshoots the value 0.642216 for the infinite sub-net and then drops to the final value. This non-monotonic behavior is surprising at first and presumably is due to some interplay between the various corner connection probabilities that occurs for finite system.
At the threshold $p_{c,n} = 0.642216$, we found that the number of corner clusters containing $s$ sites for large $s$ behaves in the expected way for supercritical clusters [@Stauffer] $n_s \sim a \exp(-b s^{1/2})$ with $\ln a = -7.0429$ and $b = -0.8177$.
![\[fig:p\_inf\_chkrbrd\]${P_{\infty,{\rm corner}}(p)}$ for the square lattice.](P_inf_checkerboardFig9.eps)
### \[sec:results:estimate\_Pinf:stotr\]Triangular lattice
The cluster growth algorithm was applied to find the size distribution of clusters connected to the corner of a $1024\times1024$ triangular lattice. For each value of $p$, $10^4$ independent runs were performed and $P_{\infty,{\rm corner}}(p)$ was evaluated. Fig. \[fig:p\_inf\_strg\] depicts the results. The root of Eq. (\[eq:bottleneck\_str\]) was determined by cubic spline to be around $0.539$. Further simulations were performed around this value with $N=10^{10}$ runs for each $p$, yielding $p_{c,n}=0.539933\pm0.00001$. This value is also in good agreement with values given in Table \[table:polynomial\] and shows fast convergence as sub-net size increases.
![\[fig:p\_inf\_strg\]${P_{\infty,{\rm corner}}(p)}$ for the triangular lattice.](P_inf_strgFig10.eps)
Discussion {#sec:conclusion}
==========
We have shown that the percolation threshold of checkerboard and stack-of-triangle systems approach values less than 1 as the mesh spacing in the sub-nets goes to zero. In that limit, the threshold can be found by finding the value of $p$ such that the probability a corner vertex is connected to the infinite cluster $P_{\infty,{\rm corner}}$ equals $1/\sqrt{2}$ and $1 - 2 \sin (\pi/18)$, respectively, based upon the equivalence with the double-bond square and bond honeycomb lattices. The main results of our analysis and simulations are summarized in Tables \[table:pc\_checkerboard\] and \[table:pc\_stack\_of\_triangles\].
For the case of the checkerboard, we notice a rather interesting and unexpected situation in which the threshold $p_{c,n}$ slightly overshoots the infinite-sub-net value and then decreases as the mesh size increases. The threshold here is governed by a complicated interplay of connection probabilities for each square, and evidently for intermediate sized systems it is somewhat harder to connect the corners than for larger ones, and this leads to a larger threshold. In the case of the triangular lattice, where there are fewer connection configurations between the three vertices of one triangle (namely, just $p_0$, $p_2$ and $p_3$), the value of $p_{c,n}$ appears to grow monotonically.
To illustrate the general behavior of the systems, we show a typical critical cluster for the $8\times8$ checkerboard system in Fig. \[Pict8x8squaresBW\]. It can be seen that the checkerboard squares the cluster touches are mostly filled, since the threshold $p_{c,n} = 0.642318$ is so much larger than the square lattice’s threshold $p_{c,s} = 0.5$.
In Fig. \[hajisquaredensity\] we show the average density of “infinite" (large) clusters in a single $64\times64$ square at the checkerboard criticality of $p_{c,n} = 0.642216$, in which case the density drops to $1/\sqrt{2}$ at the corners. In Fig. \[haji4density\] we show the corresponding densities conditional on the requirement that the cluster simultaneously touches all four corners, so that the density now goes to 1 at the corners and drops to a somewhat lower value in the center because not every site in the system belongs to the spanning cluster. Similar plots can be made of clusters touching 1, 2, or 3 corners. At the sub-net critical point $p_{c,s}$, the first two cases can be solved exactly and satisfy a factorization condition [@SimmonsKlebanZiff07; @SimmonsZiffKleban08], but this result does not apply at the higher $p_{c,n}$.
The ideas discussed in this paper apply to any system with regular bottlenecks. Another example is the kagomé lattice with the triangles filled with a finer-mesh triangular lattice; this system is studied in Ref. [@ZiffGu].
Acknowledgments
===============
This work was supported in part by the National Science Foundation Grants No. DMS-0553487 (RMZ). The authors also acknowledge the contribution of UROP (Undergraduate Reseach Opportunity Program) student Hang Gu for his numerical determination of $p_{c,n}$ for the triangular lattice of sub-net size $5\times5$, and thank Christian R. Scullard for helpful discussions concerning this work.
|
Fantastic christmas card Tracey - love that image and the colurs you've used. The flowers are just perfect! Thanks for joining us at OSAAT this week for our colour challenge and good luck, love Jacky x
This is such a lovely card. I think your image is so sweet.. but what really caught my eye was the ribbon treatment and those gorgeous flowers!!! Beautiful card, thanks so much for showing us your style at Freshly Brewed Challenges!
Awe this card is just absolutely gorgeous, love your colouring, papers and fabulous image. Sooo cute! Thank you for joining us at Lili of the Valley, good luck in the DT´s individual candy and the Fabulous Grand Prize.Hugs,Nicola -x- |
Role of gastric emptying on ethanol poisoning in rats.
Intraperitoneal glucose was demonstrated to significantly inhibit the absorption of ethanol ( 2 g/kg) administered orally to rats. The effect was due to slowed emptying of the stomach, verified by analysis of the stomach contents and of blood enthanol levels. The observation agrees with previous findings, according to which the rate of stomach emptying is inversely related to the blood glucose level. However, when glucose was given intravenously 15 minutes after oral administration of a lethal dose of ethanol (12.5 g/kg) no significant inhibition of ethanol absorption could be observed. Intravenous propantheline, pyrithioxine and methylene blue were also unable to prolong the survival time or to influence the lethal blood ethanol concentration (about 170 mmol/l) of the enthanol-poisoned rats. |
Las Vegas - Mercedes-Benz has
created an unconventional presentation idea under the heading
“Tuner Challenge”. Ahead of the equally unconventional SEMA Show
in the gaming hotspot of Las Vegas, the Stuttgart company
announced a competition for tuning firms. The object of desire –
the compact GLK-Class. The distinctively styled automotive
character with an edge seems predestined to arouse a wide range
of tuning fantasies.
Tuning operations were tasked with
highlighting the possibilities presented by the GLK’s
wide-ranging talents through their ideas and designs. The four
most convincing concepts were selected and the winners given the
opportunity to implement their proposals. This process saw the
creation of GLK models that are as leading-edge as they are
unorthodox, and that now take centre stage in Mercedes’
participation at this year’s SEMA Show.
“Our GLK is a character bursting
with expressiveness, and a new model for us within a young
market segment in the U.S.,” comments Mercedes-Benz Head of
Design Gorden Wagener. “We selected SEMA in Las Vegas as the
backdrop for its first appearance in North America because we
want to take advantage of the show’s glamour and to underscore
the highly individual character of the GLK. An SUV with an edge
that is so refreshingly alternative, demands a somewhat
alternative setting.”
“Widestar”, “The GLK Urban Whip”,
“The GLK Pikes Peak Rally Racer” and “The GLK Rock Crawler” will
attract attention even at SEMA, which is not exactly short on
highlights and is becoming increasingly important as a
trendsetting springboard for the European tuning scene. This
presentation also represents the GLK premiere on the North
American market, where sales are scheduled to begin in January
2009.
Good market prospects are being forecast
for the compact GLK in the U.S. The visual appeal and functionality of
its exterior design make the GLK a distinctive and versatile vehicle, as
do its exceptional handling and excellent safety characteristics
combined with superb comfort both on and off-road.
GLK-Class freely interpreted four times
Four fundamentally different rebuilds make
one thing abundantly clear – the GLK-Class is one of the most
multi-faceted SUV models ever, and one that retains its distinctive
character, even in the face of somewhat unconventional modifications.
With each respective tuner fantasy and the help of some exotic
ingredients, the SUV has been turned into an exclusive specialist for
the road, beach, city or rally stage. “We wanted to see what kinds of
interpretations were inspired by our GLK and how they would further
sharpen this very strong character. The tuners opted for completely
differing approaches, demonstrating the potential of our GLK concept,”
continues Gorden Wagener.
With its GLK Pikes Peak Rally Racer,
RENNtech from Lake Park, Florida has created a motorsport vehicle
inspired by the unlimited class of the legendary Pikes Peak Hill Climb
in Colorado. The drivetrain of the RENNtech GLK is complemented by a
hybrid module that guarantees excellent acceleration figures.
BRABUS, based in Bottrop, Germany,
represents the German element of this tuning fraternity and presents the
Widestar, a production-ready, high-performance on-road vehicle that also
pays tribute to the distinctive refinement of vehicles bearing the
three-pointed star.
GLK Urban Whip is the name given by
Boulevard Customs from St. Petersburg, Florida to its creation, which
makes its entrance with a significantly widened bodyshell, massive 26
inch wheels and a mighty on-board entertainment system that, according
to the figures, is likely to have an impact at full blast of
seismological proportions.
The team at the Legendary Motorcar Company
from Ontario, Canada, which is more commonly associated with the
restoration of American muscle cars, created The GLK Rock Crawler. The
exotic design for snow and sand includes a winch system that can provide
wakeboarders and snowboarders alike with the necessary impetus.
The base vehicle for Boulevard Customs,
Legendary Motorcar and RENNtech is the series production GLK350 with a
3.5 litre V6 engine generating 200 kW/272 hp, while BRABUS opted for the
diesel-driven GLK 320 CDI 4MATIC. The base versions of all models are
equipped with the 7G-TRONIC seven-speed automatic transmission.
Show vehicles with public voting
Mercedes-Benz is combining a voting
program for the North American public with its appearances at SEMA and
the subsequent Los Angeles Motor Show, where the customized GLKs will
also be presented. At either show, or in the internet at www.mbusa.com,
visitors can cast their vote for their favourite model. The winner of
the “Tuner Challenge” will be announced on 2nd December. |
Sleep Apnea
Oct 02, 2006 Viewed: 632
Sleep Apnea
In people who have sleep apnea (also referred to as sleep-disordered breathing), breathing briefly stops or becomes very shallow during sleep. This change is caused by intermittent blocking of the upper airway, usually when the soft tissue in the rear of the throat collapses and partially or completely closes the airway. Each breathing stop typically lasts 10 - 20 seconds or more and may occur 20 - 30 times or more each sleeping hour.
“I have sleep apnea. In the past, I used to arrange my schedule around whether I’ve had enough sleep. Now I don’t worry about that.
Starting on continuous positive airway pressure and medication have changed my life - now I’m excited to wake up and face each day after a night of restful sleep.”ANNE COLLINS
If you have sleep apnea, not enough air can flow into your lungs through the mouth and nose during sleep, even though breathing efforts continue. When this happens, the amount of oxygen in your blood decreases. Your brain responds by awakening you enough to tighten the upper airway muscles and open your windpipe. Normal breaths then start again, often with a loud snort or choking sound.
Although people who have sleep apnea typically snore loudly and frequently, not everyone who snores has sleep apnea. (See “Is Snoring a Problem?”)
Because people who have sleep apnea frequently arouse from deeper sleep stages to lighter sleep during the night, they rarely spend enough time in deep, restorative stages of sleep. They are therefore often excessively sleepy during the day. Such sleepiness is thought to lead to mood and behavior problems, including depression, and such sleepiness more than triples the risk of being in a traffic or workrelated accident.
The many brief drops in blood-oxygen levels can be associated with morning headaches and decreased ability to concentrate, think properly, learn, and remember. In sleep apnea, the combination of the intermittent oxygen drops and reduced sleep quality triggers the release of stress hormones. These hormones in turn raise your blood pressure and heart rate and boost the risk of heart attack, stroke, irregular heart beats, and congestive heart failure. In addition, untreated sleep apnea can lead to altered energy metabolism that increases the risk for developing obesity and diabetes.
Anyone can have sleep apnea. It is estimated that at least 12 - 18 million American adults have sleep apnea, making it as common as asthma. More than one-half of the people who have sleep apnea are overweight. Sleep apnea is more common in men. More than 1 in 25 middle-aged men and 1 in 50 middle-aged women have sleep apnea along with excessive daytime sleepiness. About 3 percent of children and 10 percent or more of people over age 65 have sleep apnea. This condition occurs more frequently in African Americans, Asians, Native Americans, and Hispanics than in Caucasians.
More than one-half of all people who have sleep apnea are not diagnosed. People who have sleep apnea generally are not aware that their breathing stops in the night. They just notice that they don’t feel well rested when they wake up and are sleepy throughout the day. Their bed partners are likely to notice, however, that they snore loudly and frequently and that they often stop breathing briefly while sleeping. Doctors suspect sleep apnea if these symptoms are present, but the diagnosis must be confirmed with overnight sleep monitoring. (See “How Are Sleep Disorders Diagnosed?”) This monitoring will reveal pauses in breathing, frequent sleep arousals, and intermittent drops in levels of oxygen in the blood.
Like adults who have sleep apnea, children who have this disorder usually snore loudly, snort or gasp, and have brief stops in breathing while sleeping. Small children often have enlarged tonsils and adenoids that increase their risk for sleep apnea. But doctors may not suspect sleep apnea in children because, instead of showing the typical signs of sleepiness during the day, these children often become agitated and may be considered hyperactive. The effects of sleep apnea in children may include diminished school performance and difficult, aggressive behavior.
It's easy to make a financial decision based on what you need right now, but making an informed choice will benefit you in the long run. Meet a former Red Sox pitcher who picked security over an uncertain future |
To link to the entire object, paste this link in email, IM or documentTo embed the entire object, paste this HTML in websiteTo link to this page, paste this link in email, IM or documentTo embed this page, paste this HTML in website
by Katie Dettman Griffin News Reporter Check out Mike Butler's farewell column, in which he muses on the paths we've taken from childhood to the work force. See full story, page 3. This summer, the parking lot behind Old Main is going to be renovated and landscaped, creating a new courtyard that will increase the presence of green space on campus, extending the Quad almost seamlessly to Old Main. The renovation will reduce the number of spots behind Old Main by about twenty, however. The parking area nearest Hughes Avenue will be extended all the way to Main St. to make up for the lost parking space. Members of the faculty were handed four different plans for the renovations, drawn by Cannon Designs, located on Grand Island. All four plans were similar in nature, with slight aesthetic variations. College President Rev. Vincent M. Cooke, S.J. announced to tenured faculty Monday, April 30, the plans for campus renovation that are slated for the next two summers, as well as some "wish list" plans that are planned for after the College raises the necessary funds. Chief James Walkowiak reveals the #1 movie in The Griffin's list of the 20 Greatest Movies Ever Made. Editor in See full story, page 5. See full story, pages 8 and 9. These plans are speculative, and will not be completed for a number of years, according to Franz. The Tower has new elevators, and in the near future they would like to do some improvement work on it. Until the necessary funds are attained, however, these "wish list" plans will remain in the planning stages. The College also would like to build another residence hall in the current Chapel and Eastwood parking lots. Among plans on the College's "wish list" are: a plan to knock down the Churchill Tower, as well as a plan to join Hughes Avenue directly with Main St., and build a median in that area. Should this pan out, Jefferson Ave. would no longer intersect with Main St. According to Dr. Laurence Franz, College Treasurer and Vice President for Business and Finance, the College has borrowed the money to fund these two projects. ment. In the summer of 2002, the Quad will be renovated to improve drainage and sidewalks. The drainage pipes that run under the Quad will be replaced completely to address the yearly flooding problems created by the springtime thaw. Sidewalks will be widened to allow for increased student traffic. (When the current sidewalk system was originally installed, the student population at Canisius was much smaller). Below: Long-term "wishes" for renovation include knocking down the Churchill Academic Tower, blocking Jefferson Ave. for parking, extending Hughes to Main St., and outdoor amphitheater seating. Above: Planned renovations for the next two years include a courtyard that would extend the greenspace to the back of Old Main as well as improved drainage in the quad. In the long-term future, the College wishes to create amphitheater-style seating for classes in the space between the back of Old Main and the Quadrangle. This new seating, compared to the current area located beside the Horan-O'Donnell Science Building, would have a more centralized location, and would be more akin to a lecture-hall environ- Recycling program paying dividends by Valerie Eaton Griffin News Editor Read about the baseball Griffs as their season draws to a close. Sports Reporter Joe Clifford handles all of the inside coverage. Campus renovations to continue Plans include new courtyard, improved drainage The Griffin today She Griffin See full story, page 13. News 1 Editoriat^r—^1 4 Viewpoints 5 Features 7 Sports 13 On the Wing 15 http://www.canisius.edu/griffin Junior Erica Turner is the Chairperson of the Recycling Committee. still need to be completed by students. Any students interested in helping with the program should contact Erica Turner at [email protected]. A Physical Plant website which will handle questions about the program will also be available soon through the Colleges official website. Although, says Erica,"It really wouldn't have been possible without the support from the Physical Plant and Residence Life", the program owes its success to the students. A meeting was held this Wednesday by the USA and RHA to discuss future directions of the project. The administrative departments involved plan to support the project in the future and help open up new opportunities. The College's Physical Plant has several plans for future expansion of the project. According to Kwitzer, the College is "quite pleased with what we've done this year. It was beyond our expectations, and we are looking forward to continuing next year." Plans for future expansion include curbside recycling at campus townhouses, as well as creating a work study position in the physical plant which handles questions concerning the recycling program. Students interested in this position should call the Physical Plant at 888-2989. With the expansion of this project, much of the work will in January, February, and March. The College also networked with other area colleges including the University at Buffalo, Buffalo State, and St. Bonaventure and received support from Erie County. According to Kwitzer, the County was very helpful as a reference in getting the program started and implementing it. The most important thing to note about the success of the program, according to Erica Turner, Chairperson of the Recycling Committee, is that it is due chiefly to the students' efforts and that its success depended on them. Canisius has tried in recent years to implement a recycling program on campus, but until recently the only official programs in progress were paper recycling in offices and the library. This past academic year, students from the Undergraduate Student Association and Residence Hall Association formed a recycling committee to address the issue. With support from Residence Life and the Physical Plant, a successful recycling program was implemented at the beginning of this semester. At the beginning of the semester three 60-gallon recycling containers for plastic, cardboard, and glass were placed in the trash rooms in Bosch and Frisch residence halls. This program was offered on a trial basis, and students were given the responsibility to show that it would work. An initial problem associated with the recycling program was finding individuals to empty the recycling bins, which involved emptying them each week into the main recycling dumpster. As part of a service project requirement, members of Tri-Beta, the biology honor society, volunteered to empty the recycling bins weekly. Their efforts were also a great help to the program. This semester, the program proved to be very successful; the materials recycled in the dorms more than doubled the amount of material recycled on the entire campus in previous years. The entire campus now recycles about 11% of total waste produced, which according to Building Manager Kevin Kwitzer is a significant amount. An average of 4100 lbs. of materials were recycled per month "Serving the Canisius Community Since 1933" The Weekly Student Newspaper of Canisius College ■■MUM ■IB-BTia— Scattered Showers; Sunny; ■FM Hl 61° P n Low 41° Sunny; M Hi ] Low 46° mSSS Maps courtesy of DR. RAYMOND C LOUGH Find out which students were honored at the annual spring Honors Convocation held last Thursday in the Cultural Center. Volume LXXI FRIDAY, MAY 4, 2001 NUMBER 22 NEWS VI EWPOI NTS FEAT U R E S SPORTS INDEX FORECAST
This image is issued by Canisius College Archives. Use of the image requires written permission from the Archives. It may not be sold or redistributed as a photograph, electronic file, or any other media. The image should not be significantly altered through conventional or electronic means. Images altered beyond standard cropping and resizing require further negotiation with a staff member. The user is responsible for all issues of copyright. Please credit: Canisius College Archives and Special Collections, Andrew L. Bouwhuis Library, Canisius College.
This image is issued by Canisius College Archives. Use of the image requires written permission from the Archives. It may not be sold or redistributed as a photograph, electronic file, or any other media. The image should not be significantly altered through conventional or electronic means. Images altered beyond standard cropping and resizing require further negotiation with a staff member. The user is responsible for all issues of copyright. Please credit: Canisius College Archives and Special Collections, Andrew L. Bouwhuis Library, Canisius College.
Technical Data
4890.27 KB
Transcript
by Katie Dettman Griffin News Reporter Check out Mike Butler's farewell column, in which he muses on the paths we've taken from childhood to the work force. See full story, page 3. This summer, the parking lot behind Old Main is going to be renovated and landscaped, creating a new courtyard that will increase the presence of green space on campus, extending the Quad almost seamlessly to Old Main. The renovation will reduce the number of spots behind Old Main by about twenty, however. The parking area nearest Hughes Avenue will be extended all the way to Main St. to make up for the lost parking space. Members of the faculty were handed four different plans for the renovations, drawn by Cannon Designs, located on Grand Island. All four plans were similar in nature, with slight aesthetic variations. College President Rev. Vincent M. Cooke, S.J. announced to tenured faculty Monday, April 30, the plans for campus renovation that are slated for the next two summers, as well as some "wish list" plans that are planned for after the College raises the necessary funds. Chief James Walkowiak reveals the #1 movie in The Griffin's list of the 20 Greatest Movies Ever Made. Editor in See full story, page 5. See full story, pages 8 and 9. These plans are speculative, and will not be completed for a number of years, according to Franz. The Tower has new elevators, and in the near future they would like to do some improvement work on it. Until the necessary funds are attained, however, these "wish list" plans will remain in the planning stages. The College also would like to build another residence hall in the current Chapel and Eastwood parking lots. Among plans on the College's "wish list" are: a plan to knock down the Churchill Tower, as well as a plan to join Hughes Avenue directly with Main St., and build a median in that area. Should this pan out, Jefferson Ave. would no longer intersect with Main St. According to Dr. Laurence Franz, College Treasurer and Vice President for Business and Finance, the College has borrowed the money to fund these two projects. ment. In the summer of 2002, the Quad will be renovated to improve drainage and sidewalks. The drainage pipes that run under the Quad will be replaced completely to address the yearly flooding problems created by the springtime thaw. Sidewalks will be widened to allow for increased student traffic. (When the current sidewalk system was originally installed, the student population at Canisius was much smaller). Below: Long-term "wishes" for renovation include knocking down the Churchill Academic Tower, blocking Jefferson Ave. for parking, extending Hughes to Main St., and outdoor amphitheater seating. Above: Planned renovations for the next two years include a courtyard that would extend the greenspace to the back of Old Main as well as improved drainage in the quad. In the long-term future, the College wishes to create amphitheater-style seating for classes in the space between the back of Old Main and the Quadrangle. This new seating, compared to the current area located beside the Horan-O'Donnell Science Building, would have a more centralized location, and would be more akin to a lecture-hall environ- Recycling program paying dividends by Valerie Eaton Griffin News Editor Read about the baseball Griffs as their season draws to a close. Sports Reporter Joe Clifford handles all of the inside coverage. Campus renovations to continue Plans include new courtyard, improved drainage The Griffin today She Griffin See full story, page 13. News 1 Editoriat^r—^1 4 Viewpoints 5 Features 7 Sports 13 On the Wing 15 http://www.canisius.edu/griffin Junior Erica Turner is the Chairperson of the Recycling Committee. still need to be completed by students. Any students interested in helping with the program should contact Erica Turner at [email protected]. A Physical Plant website which will handle questions about the program will also be available soon through the Colleges official website. Although, says Erica,"It really wouldn't have been possible without the support from the Physical Plant and Residence Life", the program owes its success to the students. A meeting was held this Wednesday by the USA and RHA to discuss future directions of the project. The administrative departments involved plan to support the project in the future and help open up new opportunities. The College's Physical Plant has several plans for future expansion of the project. According to Kwitzer, the College is "quite pleased with what we've done this year. It was beyond our expectations, and we are looking forward to continuing next year." Plans for future expansion include curbside recycling at campus townhouses, as well as creating a work study position in the physical plant which handles questions concerning the recycling program. Students interested in this position should call the Physical Plant at 888-2989. With the expansion of this project, much of the work will in January, February, and March. The College also networked with other area colleges including the University at Buffalo, Buffalo State, and St. Bonaventure and received support from Erie County. According to Kwitzer, the County was very helpful as a reference in getting the program started and implementing it. The most important thing to note about the success of the program, according to Erica Turner, Chairperson of the Recycling Committee, is that it is due chiefly to the students' efforts and that its success depended on them. Canisius has tried in recent years to implement a recycling program on campus, but until recently the only official programs in progress were paper recycling in offices and the library. This past academic year, students from the Undergraduate Student Association and Residence Hall Association formed a recycling committee to address the issue. With support from Residence Life and the Physical Plant, a successful recycling program was implemented at the beginning of this semester. At the beginning of the semester three 60-gallon recycling containers for plastic, cardboard, and glass were placed in the trash rooms in Bosch and Frisch residence halls. This program was offered on a trial basis, and students were given the responsibility to show that it would work. An initial problem associated with the recycling program was finding individuals to empty the recycling bins, which involved emptying them each week into the main recycling dumpster. As part of a service project requirement, members of Tri-Beta, the biology honor society, volunteered to empty the recycling bins weekly. Their efforts were also a great help to the program. This semester, the program proved to be very successful; the materials recycled in the dorms more than doubled the amount of material recycled on the entire campus in previous years. The entire campus now recycles about 11% of total waste produced, which according to Building Manager Kevin Kwitzer is a significant amount. An average of 4100 lbs. of materials were recycled per month "Serving the Canisius Community Since 1933" The Weekly Student Newspaper of Canisius College ■■MUM ■IB-BTia— Scattered Showers; Sunny; ■FM Hl 61° P n Low 41° Sunny; M Hi ] Low 46° mSSS Maps courtesy of DR. RAYMOND C LOUGH Find out which students were honored at the annual spring Honors Convocation held last Thursday in the Cultural Center. Volume LXXI FRIDAY, MAY 4, 2001 NUMBER 22 NEWS VI EWPOI NTS FEAT U R E S SPORTS INDEX FORECAST |
The bolts that hold the crank arm on are 14 or 15mm and are regular right threaded. But you need a "crank arm puller" to take the crank arms off. Then the Bottom bracket (BB) can be disassembled. You will need some bottom bracket tools also. Any bike shop can sell you these tools. The left side of the BB, the non drive side, as you are sitting on the bike looking down, is normal right hand drive and this is the only side that needs to be removed when overhauling the BB. Hope this helps.
It's been a LONG time since I've had/worked on regular, old school style Campy cranks and bottom brackets.
I always remember having to use at least the red LocTite on the crank bolts in order to hold them in place, and not loosen up to the point that they destroyed the softer than the axle, tapered crank openings.
I still have my Campy "peanut butter" spanner which was used on these bolts amd also my track bike's Campy hub bolts.
[quote=oliveoil]The bolts that hold the crank arm on are 14 or 15mm and are regular right threaded. But you need a "crank arm puller" to take the crank arms off. Then the Bottom bracket (BB) can be disassembled. You will need some bottom bracket tools also. Any bike shop can sell you these tools. The left side of the BB, the non drive side, as you are sitting on the bike looking down, is normal right hand drive and this is the only side that needs to be removed when overhauling the BB. Hope this helps. [/quote.
I do not agree that you only need to loosen the non-drive side. To properly clean out and re-grease the bottom bracket, you really need to remove both cups. |
Q:
Encapsulated Group by or conditional aggregation in Vertica DB
I have the following table in a Vertica DB:
+---------+-------+
| Readout | Event |
+---------+-------+
| 1 | A |
| 1 | B |
| 1 | A |
| 2 | B |
| 2 | A |
+---------+-------+
I would like to group each readout and count the frequency of the events, resulting in a table like this:
+---------+----------------+----------------+-----------------+
| Readout | Count(Readout) | Count(Event A) | Count (Event B) |
+---------+----------------+----------------+-----------------+
| 1 | 3 | 2 | 1 |
| 2 | 2 | 1 | 1 |
+---------+----------------+----------------+-----------------+
I am sure there is an easy GROUP BY command, but I can't wrap my head around it.
A:
You want conditional aggregation:
select readout, count(*),
sum(case when event = 'A' then 1 else 0 end) as num_a,
sum(case when event = 'B' then 1 else 0 end) as num_b
from t
group by readout;
|
//
// GDDropboxUploadStateWrapper.m
// GDFileManagerExample
//
// Created by Graham Dennis on 11/08/13.
// Copyright (c) 2013 Graham Dennis. All rights reserved.
//
#import "GDFileManagerUploadState.h"
@implementation GDFileManagerUploadState
@synthesize parentVersionID = _parentVersionID;
- (instancetype)initWithUploadState:(id<NSCoding>)uploadState mimeType:(NSString *)mimeType uploadURL:(NSURL *)uploadURL parentVersionID:(NSString *)parentVersionID
{
return [self initWithUploadState:uploadState mimeType:mimeType uploadURL:uploadURL parentVersionID:parentVersionID extraState:nil];
}
- (instancetype)initWithUploadState:(id <NSCoding>)uploadState mimeType:(NSString *)mimeType uploadURL:(NSURL *)uploadURL parentVersionID:(NSString *)parentVersionID extraState:(NSDictionary *)extraState
{
if ((self = [super init])) {
_uploadState = uploadState;
_uploadURL = uploadURL;
_parentVersionID = parentVersionID;
_mimeType = mimeType;
_extraState = extraState;
}
return self;
}
- (NSURL *)fileServiceSessionURL { return self.uploadURL; }
#pragma mark - NSCoding
static NSString *const kUploadState = @"UploadState";
static NSString *const kUploadURL = @"UploadURL";
static NSString *const kParentVersionID = @"ParentVersionID";
static NSString *const kMIMEType = @"MIMEType";
static NSString *const kExtraState = @"ExtraState";
- (id)initWithCoder:(NSCoder *)aDecoder
{
id <NSCoding> uploadState = [aDecoder decodeObjectForKey:kUploadState];
NSURL *uploadURL = [aDecoder decodeObjectForKey:kUploadURL];
NSString *parentVersionID = [aDecoder decodeObjectForKey:kParentVersionID];
NSString *mimeType = [aDecoder decodeObjectForKey:kMIMEType];
NSDictionary *extraState = [aDecoder decodeObjectForKey:kExtraState];
return [self initWithUploadState:uploadState mimeType:mimeType uploadURL:uploadURL parentVersionID:parentVersionID extraState:extraState];
}
- (void)encodeWithCoder:(NSCoder *)aCoder
{
[aCoder encodeObject:self.uploadState forKey:kUploadState];
[aCoder encodeObject:self.uploadURL forKey:kUploadURL];
[aCoder encodeObject:self.parentVersionID forKey:kParentVersionID];
[aCoder encodeObject:self.mimeType forKey:kMIMEType];
[aCoder encodeObject:self.extraState forKey:kExtraState];
}
@end
|
The accurate diagnosis can be a powerful guarantee for the kidney disease treatment While the accurate dialysis needs the support from the advanced medical inspection equipments which achieve world-class level. More Equipment
Can Dehydration Affect Creatinine Level in Blood
2014-09-09 18:13
Creatinine level is one of the indicator of kidney disease, it can reflect the degrees of kidney damaged, but high creatinine level not always means kidney damage, there are many factors may affect the creatinine level, such as high fever and cold. Then can dehydration affect creatinine levels in blood ? If you want to know it directly, you can chat with our online doctor now.
Dehydration is one of the symptoms of Chronic Kidney Disease, just like weakness, swelling. It can reflect your kidney has been damaged in some degree but it will not affect the creatinine level in blood for a long time. In the following i will share you some reasons which can increase the level of it. There are two main reasons, they are non-disease factors and pathological factors. Non-disease factors including high fever, cold and eat too much foods with high protein in a short time. After eliminate those factors, you can make sure your kidney has been damaged. Serum creatinine level can reflect the damaged degrees of kidney, but it is not the sensitive indicator, only after the GFR declined to 50% the level of creatinine will increase. That is mean when your creatinine level is higher that the normal level and accompanied with other symptoms such as vomit, nausea, dizzy.
From the above we know that dehydration is a kind of symptoms of kidney disease just like vomit,so it will not affect the creatinine level in blood for a long time. If your creatinine level is higher than the normal level, at the same time, occurred dehydration, that means there are something wrong in your kidney. So you need to see your doctor without any delay, that can help you to make further diagnosis and avoid big disease. |
Q:
load overflow topmost address on x86
What would happen when an unaligned load overflows the topmost address on x86? For example, what would happen when loading a 4-byte integer at address 0xfffffffe on 32-bit x86 processor? Of course, the topmost page (0xfffff000-0xffffffff) is mapped to some physical memory and the page is readable/writable, and the current loading program is in operating system kernel in Ring0. You can assume that loading 4-byte at 0xfffffffc is legal for simplicity.
Will such loading generate a page-fault?
A:
It would generate a general protection (#GP) fault due to the limit checking in segments. The processor checks the segment limit when data is accessed with DS segment register which is usual case. The default segment limit of DS segment register is [0,0xffffffff).
The processor causes a general-protection exception any time an attempt is made to access the following addresses in a segment:
A byte at an offset greater than the effective limit
A word at an offset greater than the (effective-limit – 1)
A doubleword at an offset greater than the (effective-limit – 3)
A quadword at an offset greater than the (effective-limit – 7)
According to the Intel x86 spec, "explicitly unaligned" accesses (regardless of whether they're at the edge of your address space) can also cause general protection faults for AVX, FME, VEX, or SSE instructions.
Interestingly, the lowest and highest addresses are not the only boundaries in your address space where this could happen. More boundaries show up in x86_64 address spaces, where there is a sparse / unaddressable space in the middle which your processor can't use (because this way processor manufacturers can cut down the number of bits required for many processor internals -- after all, nobody is using a full 64 bit address space yet).
|
Q:
Xcode code completion, search through whole method name
Is there any way to have Xcode's code completion search the whole method name for the characters I start typing? For example if I start typing [self con I want things like navigationController to show up, whereas now I have to type [self nav to see that.
A:
If you're currently in a file, you can click on the jump bar and start typing:
No, that's not a leak of the official app.
EDIT Now I see you are talking about in-code-writing code completion. No, there isn't a way to do that - imagine how annoying it would be when you type [self a and every single method with an a in the name shows up. Wouldn't be fun.
|
The present invention relates to optical measurement of parameters of interest on samples having diffractive structures thereon, and in particular relates to improvements in real-time analysis of the measured optical signal characteristics from a sample to determine parameter values for that sample.
(This specification occasionally makes reference to prior published documents. A numbered list of these references can be found at the end of this section, under the sub-heading xe2x80x9cReferencesxe2x80x9d.)
In integrated circuit manufacture, the accurate measurement of the microstructures being patterned onto semiconductor wafers is highly desirable. Optical measurement methods are typically used for high-speed, non-destructive measurement of such structures. With such methods, a small spot on a measurement sample is illuminated with optical radiation comprising one or more wavelengths, and the sample properties over the measurement spot are determined by measuring characteristics of radiation reflected or diffracted by the sample (e.g., reflection intensity, polarization state, or angular distribution).
This disclosure relates to the measurement of a sample comprising a diffractive structure formed on or in a substrate, wherein lateral material inhomogeneities in the structure give rise to optical diffraction effects. If the lateral inhomogeneities are periodic with a period significantly smaller than the illuminating wavelengths, then diffracted orders other than the zeroth order may all be evanescent and not directly observable, or may be scattered outside the detection instrument""s field of view. But the lateral structure geometry can nevertheless significantly affect the zeroth-order reflectivity, making it possible to measure structure features much smaller than the illuminating wavelengths.
A variety of measurement methods applicable to diffractive structures are known in the prior art. Reference 7 reviews a number of these methods. The most straightforward approach is to use a rigorous, theoretical model based on Maxwell""s equations to calculate a predicted optical signal characteristic of the sample (e.g. reflectivity) as a function of sample measurement parameters (e.g., film thickness, linewidth, etc.), and adjust the measurement parameters in the model to minimize the discrepancy between the theoretical and measured optical signal (Ref""s 10, 14). (Note: In this context the singular term xe2x80x9ccharacteristicxe2x80x9d may denote a composite entity such as a vector or matrix. The components of the characteristic might, for example, represent reflectivities at different wavelengths or collection angles.) The measurement process comprises the following steps: First, a set of trial values of the measurement parameters is selected. Then, based on these values a computer-representable model of the measurement sample structure (including its optical materials and geometry) is constructed. The electromagnetic interaction between the sample structure and illuminating radiation is numerically simulated to calculate a predicted optical signal characteristic, which is compared to the measured signal characteristic. An automated fitting optimization algorithm iteratively adjusts the trial parameter values and repeats the above process to minimize the discrepancy between the measured and predicted signal characteristic. (The optimization algorithm might typically minimize the mean-square error of the signal characteristic components.)
The above process can provide very accurate measurement capability, but the computational burden of computing the structure geometry and applying electromagnetic simulation within the measurement optimization loop makes this method impractical for many real-time measurement applications. A variety of alternative approaches have been developed to avoid the computational bottleneck, but usually at the expense of compromised measurement performance.
One alternative approach is to replace the exact theoretical model with an approximate model that represents the optical signal characteristic as a linear function of measurement parameters over some limited parameter range. There are several variants of this approach, including Inverse Least Squares (ILS), Principal Component Regression (PCR), and Partial Least Squares (PLS) (Ref""s 1-5, 7, 11, 15). The linear coefficients of the approximate model are determined by a multivariate statistical analysis technique that minimizes the mean-square error between exact and approximate data points in a xe2x80x9ccalibrationxe2x80x9d data set. (The calibration data may be generated either from empirical measurements or from exact theoretical modeling simulations. This is done prior to measurement, so the calibration process does not impact measurement time.) The various linear models (ILS, PCR, PLS) differ in the type of statistical analysis method employed.
There are two fundamental limitations of the linear models: First, the linear approximation can only be applied over a limited range of measurement parameter values; and second, within this range the approximate model does not generally provide an exact fit to the calibration data points. (If the calibration data is empirically determined, one may not want the model to exactly fit the data, because the data could be corrupted by experimental noise. But if the data is determined from a theoretical model it would be preferable to use an approximation model that at least fits the calibration data points.) These deficiencies can be partially remedied by using a non-linear (e.g., quadratic) functional approximation (Ref. 7). This approach mitigates, but does not eliminate, the limitations of linear models.
The parameter range limit of functional (linear or non-linear) approximation models can be extended by the method of xe2x80x9crange splittingxe2x80x9d, wherein the full parameter range is split into a number of subranges, and a different approximate model is used for each subrange (Ref. 7). The method is illustrated conceptually in FIG. 1 (cf. FIG. 2 in Ref. 7), which represents the relationship between a measurement parameter x, such as a linewidth parameter, and an optical signal characteristic y, such as the zeroth-order sample reflectivity at a particular collection angle and wavelength. (In practice one is interested in modeling the relationship between multiple measurement parameters, such as linewidths, film thicknesses, etc., and multiple signal components, such as reflectivities at different wavelengths or collection angles. However, the concepts illustrated in FIG. 1 are equally applicable to the more general case.) A set of calibration data points (e.g., point 101) is generated, either empirically or by theoretical modeling. The x parameter range is split into two (or more) subranges 102 and 103, and the set of calibration points is separated into corresponding subsets 104 and 105, depending on which subrange each point is in. A statistical analysis technique is applied to each subset to generate a separate approximation model (e.g., a linear model) for each subrange, such as linear model 106 for subrange 102 and model 107 for subrange 103.
Aside from the limitations inherent in the functional approximation models, the range-splitting method has additional deficiencies. Although the functional approximation is continuous and smooth within each subrange, it may exhibit discontinuities between subranges (such as discontinuity 108 in FIG. 1). These discontinuities can create numerical instabilities in optimization algorithms that estimate measurement parameters from optical signal data. The discontinuities can also be problematic for process monitoring and control because small changes in process conditions could result in large, discontinuous jumps in measurements.
Another drawback of the range-splitting model is the large number of required calibration points and the large amount of data that must be stored in the model. In the FIG. 1 illustration, each subrange uses a simple linear approximation model of the form
y≅ax+bxe2x80x83xe2x80x83Eq. 1
wherein a and b are calibration coefficients. At least two calibration points per subrange are required to determine a and b (generally, more than two are used to provide good statistical sampling over each subrange), and two coefficients (a and b) must be stored for each subrange. If there are M subranges the total number of calibration points must be at least 2 M, and the number of calibration coefficients is 2 M. Considering a more general situation in which there are N measurement parameters X1, X2, . . . XN, the linear approximation would take the form
y≅a1x1+a2x2+ . . . aNxN+bxe2x80x83xe2x80x83Eq. 2
If the range of each parameter is split into M subranges, the number of separate linear approximation models required to cover all combinations of parameter subranges would be MN, and the number of calibration parameters per combination (a1, a2, . . . , aN, b) would be N+1. Thus the total number of calibration coefficients (and the minimum required number of calibration data points) would be (N+1) MN. For example, FIG. 2 illustrates a parameter space spanned by two parameters, x1 and x2. The x1 range is split into three subranges 201, 202, and 203, and the x2 subrange is split into three subranges 204, 205, and 206. For this case, N=2, M=3, the number of x1 and x2 subrange combinations 207 . . . 215 is 32=9, and the number of linear calibration coefficients would be (2+1) 32=27. Generalizing further, if the optical signal characteristic (y) comprises multiple signal components (e.g., for different wavelengths), the number of calibration coefficients will increase in proportion to the number of components. Furthermore, if a nonlinear (e.g., quadratic) subrange model is used, the number of calibration points and coefficients would be vastly larger.
Another measurement approach, Minimum Mean Square Error analysis (MMSE, Ref""s 2-9, 11, 13, 15), provides a simple alternative to the range splitting method described above. With this approach, a database of pre-computed theoretical optical signal characteristics representing a large variety of measurement structures is searched and compared to a samples"" measured optical signal, and the best-fitting comparison (in terms of a mean-square-error fitting criterion) determines the measurement result. (The above-noted references relate primarily to scatterometry and spectroscopy, but MMSE-type techniques have also been applied in the context of ellipsometry; see Ref""s. 12 and 16.) The MMSE method is capable of modeling strong nonlinearities in the optical signal. But this method, like range-splitting, can exhibit problematic discontinuities in the measurement results due to the database""s discrete parameter sampling.
All of these prior-art methods entail a compromise between measurement resolution and accuracy. The MMSE approach is not limited by any assumed functional form of the optical signal, and can therefore have good accuracy. But measurement resolution is fundamentally limited by the parameter sampling density. The functional approximation models, by contrast, are capable of xe2x80x9cinterpolatingxe2x80x9d between calibration data points, in the sense that the modeled signal is a continuous and smooth function of measurement parameters across the calibration range; hence such models can have essentially unlimited measurement resolution. However, the term xe2x80x9cinterpolationxe2x80x9d is a misnomer in this context because the functional models do not accurately fit the calibration data points, and their accuracy is limited by the misfit. (For example, Ref. 11 reports a fit accuracy of 5-10 nm for linewidth and thickness parameters.)
References
1. R. H. Krukar et al, xe2x80x9cUsing Scattered Light Modeling for Semiconductor Critical Dimension Metrology and Calibration,xe2x80x9d SPIE 1926, pp. 60-71 (1993).
2. C. J. Raymond et al, xe2x80x9cA scatterometric sensor for lithography,xe2x80x9d SPIE Proc. 2336, pp. 37-49 (1994).
3. C. J. Raymond et al, xe2x80x9cMetrology of subwavelength photoresist gratings using optical scatterometry,xe2x80x9d J. Vac. Sci. Technol. B, Vol. 13(4), pp. 1484-1495 (1995).
4. M. R. Murname et al, xe2x80x9cScatterometry for 0.24 um-0.70 um developed photoresist metrology,xe2x80x9d SPIE Proc. 2439, pp. 427-436 (1995).
5. M. R. Murname et al, xe2x80x9cSubwavelength photoresist grating metrology using scatterometry,xe2x80x9d SPIE Proc. 2532, pp. 251-261 (1995).
6. C. J. Raymond et al, xe2x80x9cMulti-parameter process metrology using scatterometry,xe2x80x9d SPIE Proc. 2638, pp. 84-93 (1995).
7. J. Bischoff et al, xe2x80x9cPhotoresist metrology based on light scattering,xe2x80x9d SPIE Proc. 2725, pp. 678-689 (1996).
8. C. J. Raymond et al, xe2x80x9cMulti-parameter CD measurements using scatterometry,xe2x80x9d SPIE Proc. 2725, pp. 698-709 (1996).
9. C. J. Raymond et al, xe2x80x9cScatterometry for CD measurements of etched structures,xe2x80x9d SPIE Proc. 2725, pp. 720-728 (1996).
10. B. K. Minhas et al, xe2x80x9cTowards sub-0.1 um CD measurements using scatterometry,xe2x80x9d SPIE Proc. 2725, pp. 729-739 (1996).
11. J. Bischoff et al, xe2x80x9cLight scattering based micrometrology,xe2x80x9d SPIE Proc. 2775, pp. 251-259 (1996).
12. Xinhui Niu, xe2x80x9cSpecular Spectroscopic Scatterometry in DUV Lithography,xe2x80x9d SPIE 3677, pp. 159-168 (1999).
13. J. Allgair et al, xe2x80x9cManufacturing Considerations for Implementation of Scatterometry for Process Monitoring,xe2x80x9d Proc. SPIE 3998, pp. 125-134 (2000).
14. Conrad, U. S. Pat. No. 5,963,329.
15. McNeil, U.S. Pat. No. 5,867,276.
16. Xu, WO 99/45340.
17. Handbook of Optics, Second Edition, Volume 2, Optical Society of America (1995).
18. xe2x80x9cFormulation and comparison of two recursive matrix algorithms for modeling layered diffraction gratingsxe2x80x9d, Journal of the Optical Society of America, Vol. A 13, No. 5, May 1996.
The invention is a method for measuring parameters of interest of a sample comprising a diffractive structure, wherein the method employs a database-search technique in combination with interpolation to avoid the tradeoff between measurement resolution and accuracy. Following is a summary outline of the steps of the method, which will later be individually described in more detail. (The steps need not be performed in the exact order indicated here, except to the extent that dependencies between steps constrain their order.)
First, a theoretical model is provided, from which a theoretical optical response characteristic of the diffractive structure is calculable as a function of a set of one or more xe2x80x9cinterpolation parametersxe2x80x9d corresponding to measurement parameters. The theoretical model comprises two primary components: a method for translating
any trial set of interpolation parameter values into a computer-representable model of the diffractive structure (including its optical materials and geometry), and a method for numerically simulating electromagnetic interactions within the diffractive structure to calculate the theoretical response characteristic.
Next, a database of xe2x80x9cinterpolation pointsxe2x80x9d and corresponding optical response characteristics is generated. Each interpolation point is defined by a specific interpolation parameter set consisting of specific values of the interpolation parameters. The theoretical model is applied to each interpolation point to calculate its corresponding theoretical optical response characteristic, which is stored in the database.
The database is used by an xe2x80x9cinterpolation modelxe2x80x9d, which calculates an interpolated optical response characteristic as a function of the interpolation parameter set. The interpolation model provides an approximation to the theoretical model, but without the computational overhead. Given any trial interpolation parameter set within a defined parameter domain, the interpolation model computes an approximate corresponding optical response characteristic by interpolating (or perhaps extrapolating) on the database. (The parameter domain is typically limited by the database, although extrapolation can sometimes be used to extend the domain outside of the database limits. The term xe2x80x9cinterpolationxe2x80x9d can be broadly construed herein to include extrapolation.) The diffractive structure""s internal geometry need not be modeled, and electromagnetic interactions within the structure need not be simulated, in the interpolation model. Thus the computational overhead of direct theoretical modeling of the diffractive structure is avoided. The interpolation model represents a substantially continuous function mapping the interpolation parameter set to the optical response characteristicxe2x80x94it does not exhibit the discontinuities or discretization of prior-art methods such as range-splitting and MMSE. Furthermore, although the interpolation is an approximation, the interpolated optical response characteristic accurately matches the theoretical optical response characteristic at the interpolation points represented in the database. Thus it does not suffer the accuracy limitation of prior-art functional approximation methods. (The term xe2x80x9cinterpolationxe2x80x9d broadly connotes a fitting function that fits the interpolation points. A portion of the fitting function might actually be extrapolated, so in this context the distinction between xe2x80x9cinterpolationxe2x80x9d and xe2x80x9cextrapolationxe2x80x9d is not significant.)
The interpolation model is used by a fitting optimization algorithm that determines measurement parameters of a sample based on a measured optical signal characteristic of the sample. The theoretical optical response characteristic, which is approximated by the interpolation model, does not necessarily correspond directly to the optical signal characteristic or to a measurable quantity. However, a predicted optical signal characteristic is calculable from the optical response characteristic by means of a computationally efficient algorithm that, like interpolation, does not require that the diffractive structure""s internal geometry be modeled or that electromagnetic interactions within the structure be simulated. The optimization algorithm automatically selects a succession of trial interpolation parameter sets, applies the interpolation model to calculate corresponding interpolated optical response characteristics, and from these calculates corresponding predicted optical signal characteristics, which are compared to the measured optical signal characteristic. The algorithm selects the trial parameter sets, based on a comparison error minimization method, to iteratively reduce a defined comparison error metric until a defined termination criterion is satisfied.
The measured optical signal characteristic is acquired with a measurement instrument comprising an optical sensor system, which detects radiation diffracted from the sample. The instrument further comprises computational hardware that applies the fitting optimization algorithm to measured signal data and generates measurement results. Subsequent to results generation, the instrument may also generate a computational or graphical representation of the diffractive structure""s geometry. However, this representation is not necessarily required to calculate a corresponding predicted optical response or signal characteristic, and it need not correspond to a particular parameter set in the database. |
File.open(${1:path_to_yml}, "w") { |${2:file}| YAML.dump(${3:obj}, ${4:$2}) }
|
Q:
Gson deserialisation result is null for one type
I'm getting a response which consists of two types of objects : Pagination and a List of ArtistSearch. The model I'm using for the deserialization is :
public class ArtistSearchResults {
List<ArtistSearch> artistSearchList;
Pagination pagination;
// getters and setters...
}
And I deserialize here :
Gson gson = new Gson();
ArtistSearchResults results = gson.fromJson(response.toString(), ArtistSearchResults.class);
List<ArtistSearch> artistSearchList = results.getArtistSearchList();
Pagination pagination = results.getPagination();
Log.i(TAG, "onSuccess Pagination size == " + pagination.getItems() );
Log.i(TAG, "onSuccess RESULTS size == " + artistSearchList.get(0).getTitle() );
and although I get correctly the response for the Pagination object I'm always getting null for the artistSearchList.
I'm not getting any error messages so I'm not sure where the error is.
The kind of results I'm getting looks like this :
07-10 06:11:06.726 6954-6954/jb.ti.discogsball I/SEARCHHANDLER: onSuccess Search-Artist response = {"pagination":{"per_page":5,"pages":3,"page":1,"urls":{"last":"https:\/\/api.discogs.com\/database\/search?q=savage+republic&per_page=5&type=artist&page=3","next":"https:\/\/api.discogs.com\/database\/search?q=savage+republic&per_page=5&type=artist&page=2"},"items":14},"results": [{"thumb":"https:\/\/api-img.discogs.com\/RAHE1vqHWb1xwPUv5y2Q1v5g4Yo=\/150x150\/smart\/filters:strip_icc():format(jpeg):mode_rgb():quality(40)\/discogs-images\/A-121133-1262786660.jpeg.jpg","title":"Savage Republic","uri":"\/artist\/121133-Savage-Republic","resource_url":"https:\/\/api.discogs.com\/artists\/121133","type":"artist","id":121133},{"thumb":"https:\/\/api-img.discogs.com\/GYkPyAYZEcFM0bzyjnBple7P3Yw=\/150x150\/smart\/filters:strip_icc():format(jpeg):mode_rgb():quality(40)\/discogs-images\/A-307086-1160815350.jpeg.jpg","title":"Bruce Licher","uri":"\/artist\/307086-Bruce-Licher","resource_url":"https:\/\/api.discogs.com\/artists\/307086","type":"artist","id":307086},{"thumb":"https:\/\/api-img.discogs.com\/XHvbh885CZ2uTcq7WT3ph0n0gMs=\/150x150\/smart\/filters:strip_icc():format(jpeg):mode_rgb():quality(40)\/discogs-images\/A-71224-1334785233.jpeg.jpg","title":"Medicine (2)","uri":"\/artist\/71224-Medicine-2","resource_url":"https:\/\/api.discogs.com\/artists\/71224","type":"artist","id":71224},{"thumb":"","title":"Val Haller","uri":"\/artist\/492425-Val-Haller","resource_url":"https:\/\/api.discogs.com\/artists\/492425","type":"artist","id":492425},{"thumb":"","title":"Ramona Clarke","uri":"\/artist\/1957827-Ramona-Clarke","resource_url":"https:\/\/api.discogs.com\/artists\/1957827","type":"artist","id":1957827}]}
07-10 06:11:06.732 6954-6954/jb.ti.discogsball I/SEARCHHANDLER: onSuccess Pagination size == 14
and as you can see I get a value for the Pagination object but I get a NPE for the artistSearchList.
The model I'm using for ArtistSearch is :
public class ArtistSearch {
int id;
String title;
String type;
String resource_url;
String uri;
String thumb;
// getters and setters ...
This is the text from the response that parses to null :
"results":[{"thumb":"https://api-img.discogs.com/RAHE1vqHWb1xwPUv5y2Q1v5g4Yo=/150x150/smart/filters:strip_icc():format(jpeg):mode_rgb():quality(40)/discogs-images/A-121133-1262786660.jpeg.jpg","title":"Savage
Republic","uri":"/artist/121133-Savage-Republic","resource_url":"https://api.discogs.com/artists/121133","type":"artist","id":121133},{"thumb":"https://api-img.discogs.com/GYkPyAYZEcFM0bzyjnBple7P3Yw=/150x150/smart/filters:strip_icc():format(jpeg):mode_rgb():quality(40)/discogs-images/A-307086-1160815350.jpeg.jpg","title":"Bruce
Licher","uri":"/artist/307086-Bruce-Licher","resource_url":"https://api.discogs.com/artists/307086","type":"artist","id":307086},{"thumb":"https://api-img.discogs.com/XHvbh885CZ2uTcq7WT3ph0n0gMs=/150x150/smart/filters:strip_icc():format(jpeg):mode_rgb():quality(40)/discogs-images/A-71224-1334785233.jpeg.jpg","title":"Medicine
(2)","uri":"/artist/71224-Medicine-2","resource_url":"https://api.discogs.com/artists/71224","type":"artist","id":71224},{"thumb":"","title":"Val
Haller","uri":"/artist/492425-Val-Haller","resource_url":"https://api.discogs.com/artists/492425","type":"artist","id":492425},{"thumb":"","title":"Ramona
Clarke","uri":"/artist/1957827-Ramona-Clarke","resource_url":"https://api.discogs.com/artists/1957827","type":"artist","id":1957827}]
A:
Could you please replace the following variable declaration in ArtistSearchResults.java:
private List<ArtistSearch> artistSearchList;
by this:
@SerializedName("results")
private List<ArtistSearch> artistSearchList;
and see the results?
|
Locoregional therapies for hepatocellular carcinoma: which patients are most likely to gain a survival advantage?
Locoregional therapies for hepatocellular carcinoma (HCC) are considered to confer a survival advantage, however, the patient group that should be targeted is not clearly defined. This study aimed to determine the impact on survival of locoregional therapies compared with supportive care, within prognostic categories as stratified by the Cancer of the Liver Italian Program (CLIP) scoring system. A prospective database was used to identify those patients who were treated with either locoregional therapy (n = 128) or supportive care (n = 92). Survival analysis was performed for groups matched by CLIP score at presentation. Comparison of important prognostic factors was undertaken and univariate and multivariate analysis was performed to assess determinants of survival. Use of locoregional therapies was only associated with a survival benefit in patients with a CLIP score of 1 or 2. In this group, the median survival in patients who received locoregional therapies was 25.0 months (95% confidence interval 22.7-27.4) compared with 8.9 months (95% confidence interval 7.3-10.5) for supportive care (P = 0.001). For patients with CLIP scores of 3 or greater, no survival benefit of locoregional therapies was observed. Multivariate analysis revealed locoregional intervention, CLIP score, tumor symptoms, alpha-fetoprotein level, bilirubin and alkaline phosphatase level as independent prognostic indicators. Locoregional therapies should be targeted specifically to patients with non-advanced hepatocellular carcinoma as assessed by validated scoring systems. Use of these therapies in patients with advanced disease does not appear to be associated with a survival benefit and may expose patients to unnecessary harm. |
The scientific base for the disposal of spent nuclear fuel.
The main objectives of the Swedish expert seminar on spent nuclear fuel disposal were to identify those safety questions for which there is, or will be, a definitive answer, and to establish the degree of uncertainty surrounding those questions which still cannot be satisfactorily answered. The opinion was that the geological environment of the repository can be defined and its behavior predicted with much confidence, assuming the existing environment remains stable. Thus in the short term (a few hundred to thousands of years), the situation is favorable for safe disposal of spent fuel. In the longer term perspective, it was considered necessary to further investigate the evidence of the geologically recent past to predict future changes. |
Procedure, eligibility, date and forms for RTO exam?
I want to be write a RTO exam, I am mechanical engineer final year give me the exact procedure,eligibility,exam date,when this exam held & from where i collect the exam formssend information related to my doubts on my Email Id ([email protected]) |
Marvel VS Marvel: The MCU Films, Second Only to Their Television Counterparts
With Captain America: Civil War dominating the box office and raking in a nauseating amount of money for Marvel and its parent-company Disney, it’s clear that the superhero genre is one that people won’t be tiring of anytime soon. Since 2008’s Iron Man, Marvel has had success after success with its ever-expanding film franchises as new and old fans flock to the theaters to see their favorite heroes battle with a seemingly endless list of foes. While DC, Marvel’s main competitor, has also begun to crank out these beloved hero flicks, they’ve yet to meet the quality and quantity of Marvel films.
Marvel has been releasing at least two films per year, with its Phase 3 schedule extending into 2020, and, perhaps most importantly, the company has been releasing at least two successful films per year. The company has yet to have a flop on its hands, due large in part to the fact that the, “It’s all connected,” motto links each of the standalones to the larger ensemble flicks in one way or another. Critics as well as fans have continued to sing Marvel praises, making it clear that the company is certainly #1 in the superhero franchise game.
Despite being at the top of the field (the alleged showdown between Batman V Superman: Dawn of Justice and Captain America: Civil War unsurprisingly ended with the latter winning in the eyes of critics and audiences alike) there is one thing that the MCU has almost embarrassingly dropped the ball on: diversity.
Gender diversity. Racial diversity. Diversity in nearly every regard.
With Captain America: Civil War (the twelfth MCU film since Iron Man) Marvel has managed to increase the number of its central black characters to a whopping three.
THREE.
Let’s give a slow-clap to Marvel for providing as many African American actors as white Chrises.
That was sarcasm by the way. Don’t clap for that. Do you realize how absurd it is that if another Chris joins the MCU the white Chrises will outnumber the non-white subsidiary leads?
Until Civil War the Chrises did outnumber the non-white members of the ensemble cast!
That coupled with the fact that, until Black Panther hits theaters in 2018, there won’t be a non-white lead in the MCU is further indicative of Marvel’s glaringly evident lack of ethnic diversity.
Similarly, the lack of women in the MCU is a bit disappointing considering the women that are present are almost universally beloved and, let’s be honest, tend to kick more physical and intellectual ass than their male counterparts.
I mean, sure, Ant-Man was a fun movie, but are you honestly telling me you’d rather team up with Scott Lange over Natasha Romanoff? If your company is failing will you really call up the face of Stark Industries, or Pepper Potts, the one running it? If you’re in a tense situation, do you really want to call on the Hulk for back-up over Scarlet Witch?
No!
And yet, there have been zero standalone films centered around a female hero. (Point for DC and Wonder Woman)
With women making up over 50% of the world’s population, it seems patently ridiculous that we still only have two women, “worthy,” enough to be deemed Avengers.
Lucky for Marvel, its television shows are picking up the MCU’s slack.
While a Black Widow standalone is still seemingly a pipe dream, and the Captain Marvel film has already been pushed back in favor of another male-led flick, shows like AKA: Jessica Jones, Agent Carter, and Agents of S.H.I.E.L.D. are putting women and non-white characters in the forefront.
Agent Carter has gotten a bit more flak for its diversity than some of the other Marvel shows, due large in part to the fact that the show is trying to emphasize how prevalent this issue was during the time period that Margaret Carter was fighting off discrimination as frequently as bad guys. In terms of racial diversity, the show still isn’t quite up to par, but its 1940’s setting likely makes it a bit difficult to integrate non-white characters in an appropriate and respectful manner. The setting isn’t really a great excuse, something that the Agent Carter writers likely picked up on considering Season 2 introduced Jason Wilkes as a certifiable genius. Peggy Carter is clearly a female role model, who proves time and time again that she is just as capable, if not more so, than many of the men she is forced to deal with in the SSR.
While the male to female ratio of Agent Carter isn’t necessarily as progressive as it perhaps should be, that’s kind of the point. Peggy is fighting sexism and striving to prove that she is an agent, full stop. She isn’t a female agent, she’s just an agent. She can fight with the best of them, banter with the lot of them, and tends to save the day more than any of them. And while there may be less women in Agent Carter than shows taking place in present-day, the women who are present are as far from, “damsel in distress,” as they come. We’ve seen Black Widows, cunning geniuses, and sharp-witted actresses who easily fool men without blinking an eye. Agent Carter does a tremendous job of ensuring that all women portrayed in the show are as strong, intelligent, and funny as the gender is in real life.
Jessica Jones, a show whose titular character is in fact a woman, is coming off a recent Peabody win and has received praise across the board for its depiction of a strong, independent, and capable individual. AKA: a woman. The show doesn’t glamorize Jessica in any way. It doesn’t try to put her on a pedestal for men to lust after and women to emulate. Jessica Jones simply takes a character who has endured more hardships than most, and shows you how she is struggling to deal with them. There are consequences and repercussions, good decisions and bad, and, most importantly, there is a woman at the center of them all who is trying to navigate them as best she can. Equally important to note is the fact that the most important person in Jessica’s life is not a boyfriend but a best friend. There’s no dude coming in to save the day and rescue Jessica from Kilgrave. Sure, a couple of guys try, but in the end it’s the bond between women that gives our hero her victory. IMDb’s, “Top Series Cast,” spots go first to Krysten Ritter, second to Rachael Taylor, and third to Eka Darville.
Not a Caucasian dude in the lot.
Better yet? Jessica Jones introduced us to Luke Cage, whose show is set to air in 2017… a full year before Black Panther hits screens.
And now we reach the crowning glory of diversity in Marvel television.
Agents of S.H.I.E.L.D. is, from what I can see, inarguably the most progressive of the Marvel productions.
While everyone has been giving S.H.I.E.L.D. grief for not being more like the movies, it should be pointed out that the show is actually surpassing the movies where diversity is concerned. All of the people who gave up on the show in Season 1 because they were (for one reason or another) expecting a show called Agents of S.H.I.E.L.D. to be rife with Avengers cameos, in addition to failing to grasp the actual premise, failed to realize that the characters on S.H.I.E.L.D. are infinitely more reflective of a world comprised of more than white men.
The much talked about Secret Warriors were introduced not long ago and were evenly represented by characters of Chinese/American, American, Colombian, and Mexican origin (the actors portraying said characters are Chinese/American, Australian, Colombian, and Mexican). Compare that to the two of twelve central characters in Civil War who aren’t Caucasian and it makes Agents of S.H.I.E.L.D. the clear victor in terms of diversity. In fact, not only are multiple ethnicities celebrated, S.H.I.E.L.D. actually makes a point of calling out its own characters when they become a little too Western. When Daisy somewhat irritably requests that the foreign members of her team speak in English, Elena immediately replies, “Aren’t you a spy? Learn Spanish.”
It’s such an eye-opening moment because, yeah Daisy, you are a spy and you should learn some Spanish. (Perhaps a little Russian as well?) English is not the majority language of the world and S.H.I.E.L.D. reminds viewers of that fact in a very real and self-aware way.
Couple the focus on varying ethnicities with the fact that half of this new team of Inhumans is comprised of women, and the actual leader of said team is agent-extraordinaire Daisy Johnson, and the Secret Warriors are already 100% more diverse than their Avengers counterparts.
Best yet? At no point in the show is it even questioned that these women are just as capable, and oftentimes more capable, than the men. Joey, Elena, and Lincoln follow Daisy because she is a leader. Period. She has the most experience with S.H.I.E.L.D, has gone on more missions than anyone else on the Inhuman team, and is in the best position to make the tough calls. Everyone else knows this and are competent enough to realize that those facts are the only ones that matter.
And this isn’t something that Agents of S.H.I.E.L.D. has just started emphasizing.
Since it first premiered, S.H.I.E.L.D. has been a show centered around an even number of male and female characters, with a third of the core 6 characters being of Asian descent. Agents of S.H.I.E.L.D. isn’t as cookie cutter as the Marvel films and strives to put all characters on a relatively even playing field regardless of race or gender. There are some men who are forces to be reckoned with in the field, and others who much prefer being in a lab. And it’s exactly the same situation for the women of the show. The skillset of some lies in dissecting dead bodies, while the skillset of others involves punching baddies in the face. In fact, until recently, the vast majority of the stunt-work on the show has been done by its female field-agents.
Lastly, while I’ve read many an article about the lack of diversity in Hollywood, and particularly in the superhero genre, I’ve not seen much on the topic of disabilities. While the MCU briefly touched upon Tony Stark’s post-Battle of New York PTSD, Hawkeye’s hearing impairment is still noticeably absent, as are many of the more obvious issues that Bucky has faced as a result of his role as the Winter Soldier. Sure, there are some subtle hints and a few brief mentions, but, for the most part, the issue that plague the characters in the MCU are often overlooked or perceived through subtext by observant viewers.
Cut back to Marvel’s television franchises and you see a wide spectrum of very real issues being openly discussed and highlighted. Jessica Jones focuses on a woman who was mentally and physically abused to the point where she developed paranoia, severe depression, and less-than-advisable coping mechanisms. Daredevil focuses on a man, blinded as a child, who used every resource in his possession to train himself to become the protector of Hell’s Kitchen. Agent Carter is a show that, at its heart, focuses on a war vet who is slowly but surely readjusting to life and doing her utmost to take things one day at a time.
And Agents of S.H.I.E.L.D?
Leo Fitz suffered from severe brain damage post-Season 1, Melinda May has been dealing with PTSD since the start of the series due to the incident in Bahrain, Phil Coulson has experienced PTSD since his resurrection as well as the physical loss of a limb, Jemma Simmons has had clear signs of PTSD, depression, and anxiety since returning from her involuntary trip to alien planet Maveth, Daisy Johnson has had to deal with the mental and emotional challenges of physical transforming into an Inhuman, and Grant Ward, though certainly a villain, is another character whose abuse led him down a terrible path. And those are just original characters! Lincoln is a recovering alcoholic, Bobbi underwent psych evals and physical therapy after her run-in with Ward, and (prior to becoming and Inhuman-murdering psycho) Andrew Garner was visible enough to indicate that all Agents of S.H.I.E.L.D. were being evaluated in some way.
S.H.I.E.L.D. has done better than most at not shying away from the reality of an unrealistic show. As black-ops agents, these characters will undoubtedly experience things that will permanently change them forever. But, rather than completely dismissing such changes, S.H.I.E.L.D. does what it can in the allotted time-frame to address them. We’ve seen legitimate therapy sessions, both physical and mental, and have at no point been forced to believe that everyone is perfect and A-ok.
So far, the MCU has been very much, “One step forward, two steps back,” while approaching this problem of diversity. Yay for a Black Panther film with Chadwick Boseman starring, boo that in a sea of white-male-driven films it was Captain Marvelthat got pushed back to make it happen.
The MCU is essentially a web of carefully implemented films that can be linked together in order to provide some semblance of congruity. And while the films themselves connect fairly seamlessly, they unfortunately do not connect with many of the audiences that are viewing them. It’s hard to remember in places like the United States, where companies like Marvel and Disney are based out of, that white men do not make up the majority of the world and are therefore not the only people who should be represented in these film franchises. There are far larger markets that, for some odd reason, are inaccurately being considered the minority simply because their skin color or gender isn’t what Hollywood and the Western culture have deemed worthy of being reflected onscreen.
Considering the next 4+ years of Marvel films have already been planned and scheduled, it seems pretty unlikely that the MCU will make any significant improvements in diversifying the characters it chooses to portray onscreen.
Until then, we thankfully have equally exciting, character-driven, action-packed, shows to watch instead.
Do you think the MCU film are playing catch-up with their TV counterparts? Let us know in the comments section below or send us a Tweet!
2 Comments
[…] oft-overlooked by the head honchos, Agent of S.H.I.E.L.D. has always been the crowning jewel of Marvel in terms of diversity. To see a Latin superhero as the titular character of a series is something that should have […]
Kickstarter Korner
Privacy & Cookies: A Place To Hang Your Cape uses cookies to enhance your experience. By continuing to use our website, you’re agreeing to our use of cookies. To find out more, as well as how to remove or block these, see here:
Cookie Policy |
In the design of the pixel display matrix of the thin film transistor liquid crystal display, It is necessary to carry out a centralized fan-shaped wiring process for a bonding region of a driving integrated circuit, since the distances outputted from the driving integrated circuit to each of the display traces are different, so that the align of the resistance of the fan-shaped region cannot be achieved, thus causing the delay degree of the voltage change of each display traces is not the same, finally make the charging time of each display traces is not consistency and causing color shift, the more the outputting routes of the driving integrated circuit, the more the resistance difference of the fan-out traces in the fan-shaped region, the even more of the delay degree of the voltage change of each display traces, and more seriously color shift.
Conventionally, by usually adapting changing the material of the display traces to reduce the difference of the resistance of the traces, or by reducing the number of the outputting routes of the driving integrated circuit to reduce the interval of the fan-shaped region, by reducing the distance difference of the display traces to reduce the difference of the resistance of the traces. But changing the material of the display traces, the support of the TFT-LCD process is needed, and the change of the process and the issues dealing with the process yield will raise a great cost problem, and reducing the number of the outputting routes of the driving integrated circuit will be corresponding increasing the number of the driving integrated circuit, and leading to increase costs, so the conventional method for improving color shift is costly. |
Indicate by check mark whether the registrant is an emerging growth company as defined in Rule 405 of the Securities Act of 1933 (§230.405 of this chapter) or Rule 12b-2 of the Securities Exchange Act of 1934 (§240.12b-2 of this chapter).
Emerging growth company o
If an emerging growth company, indicate by check mark if the registrant has elected not to use the extended transition period for complying with any new or revised financial accounting standards provided pursuant to Section 13(a) of the Exchange Act. o
Item 8.01 Other Events
On January 7, 2019, Amicus Therapeutics, Inc. ("the Company") issued a press release announcing its full-year 2019 strategic outlook and financial guidance. A copy of this press release is filed as Exhibit 99.1 hereto and is incorporated herein by reference. Additionally, the senior management of the Company will be using the presentation attached as Exhibit 99.2 to this Current Report, and incorporated herein by reference, in its meetings with investors and analysts at the 37th Annual J.P. Morgan Healthcare Conference.
2 Forward-Looking Statements This presentation contains "forward-looking statements" within the meaning of the Private Securities Litigation Reform Act of 1995 relating to preclinical and clinical development of our product candidates, the timing and reporting of results from preclinical studies and clinical trials, the prospects and timing of the potential regulatory approval of our product candidates, commercialization plans, manufacturing and supply plans, market potential projections, financing plans, and the projected revenues and cash position for the Company. The inclusion of forward-looking statements should not be regarded as a representation by us that any of our plans will be achieved. Any or all of the forward-looking statements in this press release may turn out to be wrong and can be affected by inaccurate assumptions we might make or by known or unknown risks and uncertainties. For example, with respect to statements regarding the goals, progress, timing, and outcomes of discussions with regulatory authorities, and in particular the potential goals, progress, timing, and results of preclinical studies and clinical trials, actual results may differ materially from those set forth in this release due to the risks and uncertainties inherent in our business, including, without limitation: the potential that results of clinical or preclinical studies indicate that the product candidates are unsafe or ineffective; the potential that it may be difficult to enroll patients in our clinical trials; the potential that regulatory authorities, including the FDA, EMA, and PMDA, may not grant or may delay approval for our product candidates; the potential that we may not be successful in commercializing Galafold in Europe and other geographies or our other product candidates if and when approved; the potential that preclinical and clinical studies could be delayed because we identify serious side effects or other safety issues; the potential that we may not be able to manufacture or supply sufficient clinical or commercial products; and the potential that we will need additional funding to complete all of our studies and manufacturing. Further, the results of earlier preclinical studies and/or clinical trials may not be predictive of future results. With respect to statements regarding projections of the Company's revenue and cash position, actual results may differ based on market factors and the Company's ability to execute its operational and budget plans. In addition, all forward-looking statements are subject to other risks detailed in our Annual Report on Form 10-K for the year ended December 31, 2017 as well as our Quarterly Report on Form 10- Q for the quarter September 30, 2018 filed November 5, 2018 with the Securities and Exchange Commission. You are cautioned not to place undue reliance on these forward-looking statements, which speak only as of the date hereof. All forward-looking statements are qualified in their entirety by this cautionary statement, and we undertake no obligation to revise or update this news release to reflect events or circumstances after the date hereof.
Introduction 7 Amicus Founding Beliefs WE BELIEVE... WE BELIEVE... WE BELIEVE… In the Fight to Remain In Our Future to Build In Each Other to at the ForefrontWe push of ideas as Longfar-term and Value as for fast as possibleFoster Teamwork and Therapies for Rare and Our Stakeholders Respect for Each Orphan Diseases Individual’s Contribution We encourage and embrace constant innovation • We seek to deliver the highest quality therapies for • We are all owners of this business • Our passion for making a persons living with these diseases difference unites us • We are business led and science • We support the disease communities - and their families We have a duty to obsoletedriven our own technologies• Diversity of experience and • We are passionate about what we do thought is essential • Maximizing value for our • We encourage and embrace constant innovation shareholders is the foundation of our • We communicate openly, • We have a duty to obsolete our own technologies future successes honestly and respectfully • We push ideas as far and as fast as possible We are business• Our medicines led mustand be fairly science priced driven• Our families are part of the • We take smart risks and broadly accessible Amicus experience • We work hard • We build strategic partnerships • Work-life balance keeps us • We keep asking the tough questions healthy • • We will never be constrained by prior thinking We will not lie, cheat or steal • We learn from ourOur mistakes passion for making• We take full responsibility a difference for our unites us • We think differently - very differently actions
Galafold® (migalastat) Global Launch… …taking a leadership role in the treatment of Fabry disease “We push ideas as far and as fast as possible” - Amicus Belief Statement
Galafold: Precision Medicine for Fabry Disease 25 Galafold Snapshot (as of December 31, 2018) ~$91M* $160-180M One of the Most FY18 Galafold FY19 Global Revenue Galafold Successful Rare Rev. Guidance Disease Launches Geographic 24 Countries with Expansion in Pricing & 2019 Reimbursement 8 Regulatory 348 Approvals: Amenable Australia, Canada, EU, Variants in U.S. Israel, Japan, S. Korea, Switzerland , U.S. Label Galafold is indicated for adults with a confirmed diagnosis of Fabry Disease and an amenable mutation/variant. The most common adverse reactions reported with Galafold (≥10%) were headache, nasopharyngitis, urinary tract infection, nausea and pyrexia. For additional information about Galafold, including the full U.S. Prescribing Information, please visit https://www.amicusrx.com/pi/Galafold.pdf. For further important safety information for Galafold, including posology and method of administration, special warnings, drug interactions and adverse drug reactions, please see the European SmPC for Galafold available from the EMA website at www.ema.europa.eu. *Preliminary and unaudited
Galafold: Precision Medicine for Fabry Disease 26 International Update (as of December 31, 2018) Strong Continued Growth with High Compliance and Adherence CURRENT ESTIMATED MARKET SHARE IN EU5* OF TREATED AMENABLE PATIENTS MARKET DYNAMICS • Continued strong uptake in ERT- switch patients • Increasing adoption by diagnosed Galafold ERT untreated patients • Very high rates of adherence and ~53% ~47% compliance (>90%) • Balanced mix of males and females, classic and late-onset patients • Robust interest from physician community *Market share assumptions based on estimated number of treated amenable patients in EU5 as of October 2018
Thank You “Our passion for making a difference unites us” -Amicus Belief Statement
exhibit992
Amicus Therapeutics Provides Full-Year 2019 Strategic Outlook and Financial Guidance Full-Year 2018 Galafold Revenue of ~$91M Exceeds $80M-$90M Guidance 2019 Galafold Revenue Expected to Nearly Double – with Guidance of $160M-$180M Pompe Phase 3 PROPEL Study Expected to Complete Enrollment and Additional Phase 2 Pompe Data in 2019 Additional 2-Year Data from Phase 1/2 CLN6 Batten Disease Clinical Study Anticipated Mid-Year 2019 Ongoing Phase 1/2 CLN3 Batten Disease Study Expected to Complete Enrollment in 2019 Preclinical Proof of Concept for Fabry and Pompe Gene Therapy Programs Expected in 2019 Strong Balance Sheet with $500M+ Cash CRANBURY, NJ, January 7, 2019 – Amicus Therapeutics (Nasdaq: FOLD), a global biotechnology company focused on discovering, developing and delivering novel medicines for rare metabolic diseases, today provided unaudited preliminary Galafold revenue for the full-year 2018 and introduced its full-year 2019 strategic outlook and financial guidance. During 2018 Amicus met or exceeded all five key strategic priorities: • More than doubled global revenue for Galafold (migalastat). Revenue grew from $36.9 million in full-year 2017 to approximately $91 million (preliminary and unaudited) in full-year 2018, exceeding the high end of the full-year 2018 guidance range of $80 million to $90 million. • Successfully secured approvals for migalastat in the U.S. and Japan, with strong initial adoption. As of December 31, 2018, 149 patients in the U.S. have been prescribed Galafold since the August launch. • Achieved clinical, manufacturing and regulatory milestones to advance AT-GAA toward global regulatory submissions and approvals. Highlights included positive 12- and 18-month data from the ongoing Phase 1/2 clinical study, manufacturing scale up (1000L), and first patient dosed in the PROPEL pivotal study. • Pipeline expanded to include 14 new gene therapy programs, including two clinical programs in Batten disease, exceeding target of least one new clinical program in 2019. Target enrollment has been achieved in the Phase 1/2 study in CLN6 Batten disease, and the first patient has been dosed in the Phase 1/2 study in CLN3 Batten disease. • Maintained and strengthened the balance sheet. The current cash position of approximately $505 million (preliminary and unaudited) at December 31, 2018 is expected to fund ongoing operations into at least mid-2021. John F. Crowley, Chairman and Chief Executive Officer of Amicus Therapeutics, Inc. stated, “During 2018 we advanced several steps closer to our 2023 vision to treat at least 5,000 patients and achieve $1 billion in global revenue. Following the new approvals for our Fabry precision medicine Galafold in the U.S. and Japan, and continued growth momentum in international markets, we have exceeded our 2018 guidance. Patients are also now being treated in multiple Amicus clinical studies, including our Phase 1/2 and pivotal studies of AT-GAA for Pompe disease, as well as Phase 1/2 studies of our investigational gene therapies for CLN3 and CLN6 Batten disease. Today we are in a stronger position than ever to become a leading global biotechnology company focused on transforming the lives of people living with these rare, life-threatening conditions and creating significant value for our shareholders.” Amicus is focused on the following five key strategic priorities in 2019:
• Nearly double again annual revenue for Galafold (FY19 guidance of $160M-$180M in worldwide revenue) with 1,000+ Fabry patients on Galafold by year end • Complete enrollment in pivotal study in Pompe disease and report additional Phase 2 data • Report additional two-year results from Phase 1/2 clinical study in CLN6 Batten disease and complete enrollment in ongoing CLN-3 Batten disease Phase 1/2 study • Establish preclinical proof of concept for Fabry and Pompe gene therapies • Maintain a strong financial position Mr. Crowley will discuss Amicus' corporate objectives and key milestones in a presentation at the 37th Annual J.P. Morgan Healthcare Conference on Tuesday, January 8, 2019 at 8:30 a.m. PT (11:30 a.m. ET). A live webcast of the presentation can be accessed through the Investors section of the Amicus Therapeutics corporate web site at http://ir.amicusrx.com/events.cfm, and will be archived for 90 days. Full-Year 2018 Financial Summary and 2019 Guidance Amicus recorded approximately $91 million (preliminary and unaudited) in full-year 2018 revenue from commercial sales and reimbursed expanded access programs for Galafold. For the full-year 2019 the Company anticipates total Galafold revenue of $160 million to $180 million. Prescription growth in 2018 was largely driven by EU and other countries outside the U.S. and Japan. Growth in 2019 is expected to be driven by continued growth in EU markets, further geographic expansion, and further success from the first full year of launch in the U.S. and Japan. Cash, cash equivalents, and marketable securities totaled just over $500 million (preliminary and unaudited) at December 31, 2018. The Company expects to end 2019 with approximately $300 million in cash on hand. The current cash position is anticipated to fund ongoing operations into at least mid- 2021. Program Highlights Galafold (Migalastat) Oral Precision Medicine for Fabry Disease Galafold is an oral precision medicine for Fabry disease approved in the EU and other geographies to treat Fabry disease in patients 16 years or older who have amenable genetic mutations. The U.S. FDA approved Galafold under Subpart H for the treatment of adult patients with a confirmed diagnosis of Fabry disease and an amenable genetic variant. An estimated 35% to 50% of the global Fabry population may be suitable for treatment with Galafold on the basis of their genetic mutations, or variants. For patients who are not suitable for treatment with Galafold on the basis of their genetic mutations, or variants, Amicus is advancing a next-generation gene therapy. Global Galafold Updates: • 650+ patients (naïve and ERT-switch) on reimbursed Galafold worldwide as of December 31, 2018. • Approvals secured in eight geographies including Australia, Canada, EU, Israel, Japan, South Korea, Switzerland, and United States and pending in Taiwan and several additional markets. • U.S. launch exceeded internal expectations with 149 new patient prescriptions, also known as patient referral forms (PRFs), as of December 31, 2018. Time to shipment was up to 60 days, limiting 2018 revenue impact but providing a strong foundation for 2019. • Pricing and reimbursement secured in 24 countries. • Registry and other Phase 4 supportive studies underway. AT-GAA for Pompe Disease AT-GAA is a novel treatment paradigm in Phase 3 development that consists of ATB200, a unique recombinant human acid alpha-glucosidase (rhGAA) enzyme with optimized carbohydrate structures, particularly mannose 6-phosphate (M6P), to enhance uptake, co-administered with AT2221, a pharmacological chaperone. Positive results from a global Phase 1/2 clinical study (ATB200-02) have shown consistent and durable responses across key measures of safety, functional outcomes and biomarkers in both ERT-switch and ERT-naïve Pompe patients following up to 18 months of treatment with AT-GAA. The Company’s strategy is to enhance the body of clinical data for AT-GAA in ongoing clinical studies, including the pivotal study (PROPEL, also referred to as ATB200-03) to deliver this potential new therapy to as many people living with Pompe disease as soon as possible. Based on regulatory feedback from both the U.S. FDA and European Medicines Agency (EMA), the PROPEL study is expected to support approval for a broad indication, including ERT-switch and treatment-naïve patients.
Pompe Program Updates: • 1000L scale material released for pivotal PROPEL study. • Dosing initiated in PROPEL study. • WuXi partnership strengthened with 5-year supply agreement. Anticipated Pompe Program Milestones in 2019: • New data from the Phase 1/2 ATB200-02 clinical study, including final 24-month data in Cohorts 1-3, and initial 6- month data in additional ERT-switch patients (Cohort 4). • Retrospective natural history study data in approximately 100 ERT-treated Pompe patients. • Additional supportive studies, including an open-label study in pediatric patients. • Full enrollment in Phase 3 PROPEL study. • Advance agreed upon CMC requirements to support BLA. Gene Therapy Programs for Rare Metabolic Diseases During the third quarter and early fourth quarter of 2018, Amicus expanded its pipeline and future growth platform [link here] to include 14 new gene therapy programs and future growth platform for rare metabolic diseases, including 10 preclinical and clinical stage adeno associated virus 9 (AAV9) programs (intrathecal delivery) for neurologic lysosomal storage disorders (LSDs). Together these 10 programs have the potential to address 10,000+ people living with these neurologic LSDs and represent a $1 billion recurring revenue opportunity. Amicus is also developing four next-generation AAV gene therapies for Fabry disease, Pompe disease, CDKL5 deficiency disorder (CDD) and one additional undisclosed rare metabolic disorder. In Batten disease, compelling proof of concept has been demonstrated in preclinical studies in CLN6, CLN3, and CLN8, as well as initial clinical safety and efficacy in a Phase 1/2 study in patients with CLN6. The Company has also shown early proof of principle for Amicus DNA constructs for optimized gene therapies for Fabry and Pompe diseases. Gene Therapy Program Updates: • First patient treated in CLN3 Batten disease Phase 1/2 study with no serious adverse events reported to date. • Target enrollment achieved in CLN6 Batten disease Phase 1/2 study, with 12 patients receiving a single administration of gene therapy (exposure ranging from ~1 to 34 months). Anticipated Gene Therapy Pipeline Milestones in 2019: • Additional two-year data from CLN6 Batten disease Phase 1/2 study. • Full enrollment of ongoing CLN3 Batten disease Phase 1/2 study. • Preclinical data for next-generation gene therapies for Fabry, Pompe and CDD. • Preclinical work across additional neurologic LSDs. About Galafold Galafold® (migalastat) 123 mg capsules is an oral pharmacological chaperone of alpha-Galactosidase A (alpha-Gal A) for the treatment of Fabry disease in adults who have amenable GLA variants. In these patients, Galafold works by stabilizing the body’s own dysfunctional enzyme so that it can clear the accumulation of disease substrate. Globally, Amicus Therapeutics estimates that approximately 35 to 50 percent of Fabry patients may have amenable GLA variants, though amenability rates within this range vary by geography. Galafold is approved in Australia, Canada, European Union, Israel, Japan, South Korea, Switzerland and the U.S. U. S. INDICATIONS AND USAGE Galafold is indicated for the treatment of adults with a confirmed diagnosis of Fabry disease and an amenable galactosidase alpha gene (GLA) variant based on in vitro assay data. This indication is approved under accelerated approval based on reduction in kidney interstitial capillary cell globotriaosylceramide (KIC GL-3) substrate. Continued approval for this indication may be contingent upon verification and description of clinical benefit in confirmatory trials. U.S. IMPORTANT SAFETY INFORMATION ADVERSE REACTIONS The most common adverse reactions reported with Galafold (≥10%) were headache, nasopharyngitis, urinary tract infection, nausea and pyrexia.
USE IN SPECIFIC POPULATIONS There is insufficient clinical data on Galafold use in pregnant women to inform a drug-associated risk for major birth defects and miscarriage. Advise women of the potential risk to a fetus. It is not known if Galafold is present in human milk. Therefore, the developmental and health benefits of breastfeeding should be considered along with the mother’s clinical need for Galafold and any potential adverse effects on the breastfed child from Galafold or from the underlying maternal condition. Galafold is not recommended for use in patients with severe renal impairment or end-stage renal disease requiring dialysis. The safety and effectiveness of Galafold have not been established in pediatric patients. To report Suspected Adverse Reactions, contact Amicus Therapeutics at 1-877-4AMICUS or FDA at 1-800-FDA-1088 or www.fda.gov/medwatch. For additional information about Galafold, including the full U.S. Prescribing Information, please visit https://www.amicusrx.com/pi/Galafold.pdf. EU Important Safety Information Treatment with Galafold should be initiated and supervised by specialists experienced in the diagnosis and treatment of Fabry disease. Galafold is not recommended for use in patients with a nonamenable mutation. • Galafold is not intended for concomitant use with enzyme replacement therapy. • Galafold is not recommended for use in patients with Fabry disease who have severe renal impairment (<30 mL/min/1.73 m2). The safety and efficacy of Galafold in children 0–15 years of age have not yet been established. • No dosage adjustments are required in patients with hepatic impairment or in the elderly population. • There is very limited experience with the use of this medicine in pregnant women. If you are pregnant, think you may be pregnant, or are planning to have a baby, do not take this medicine until you have checked with your doctor, pharmacist, or nurse. • While taking Galafold, effective birth control should be used. It is not known whether Galafold is excreted in human milk. • Contraindications to Galafold include hypersensitivity to the active substance or to any of the excipients listed in the PRESCRIBING INFORMATION. • It is advised to periodically monitor renal function, echocardiographic parameters and biochemical markers (every 6 months) in patients initiated on Galafold or switched to Galafold. • OVERDOSE: General medical care is recommended in the case of Galafold overdose. • The most common adverse reaction reported was headache, which was experienced by approximately 10% of patients who received Galafold. For a complete list of adverse reactions, please review the SUMMARY OF PRODUCT CHARACTERISTICS. • Call your doctor for medical advice about side effects. For further important safety information for Galafold, including posology and method of administration, special warnings, drug interactions and adverse drug reactions, please see the European SmPC for Galafold available from the EMA website at www.ema.europa.eu. About Amicus Therapeutics Amicus Therapeutics (Nasdaq: FOLD) is a global, patient-dedicated biotechnology company focused on discovering, developing and delivering novel high-quality medicines for people living with rare metabolic diseases. With extraordinary patient focus, Amicus Therapeutics is committed to advancing and expanding a robust pipeline of cutting-edge, first- or best-in-class medicines for rare metabolic diseases. For more information please visit the company’s website at www.amicusrx.com, and follow us on Twitter and LinkedIn. Forward-Looking Statements This press release contains "forward-looking statements" within the meaning of the Private Securities Litigation Reform Act of 1995 relating to preclinical and clinical development of our product candidates, the timing and reporting of results from preclinical studies and clinical trials, the prospects and timing of the potential regulatory approval of our product candidates, commercialization plans, manufacturing and supply plans, financing plans, and the projected revenues and cash position for the Company. The inclusion of forward-looking statements should not be regarded as a representation by us that any of our plans will be achieved. Any or all of the forward-looking statements in this press release may turn out to be wrong and can be affected by inaccurate assumptions we might make or by known or unknown risks and uncertainties. For example, with respect to statements regarding the goals, progress, timing, and outcomes of discussions with regulatory authorities, and in particular the potential goals, progress, timing, and results of preclinical studies and clinical trials, actual results may differ materially from those set forth in this release due to the risks and uncertainties inherent in our business, including,
without limitation: the potential that results of clinical or preclinical studies indicate that the product candidates are unsafe or ineffective; the potential that it may be difficult to enroll patients in our clinical trials; the potential that regulatory authorities, including the FDA, EMA, and PMDA, may not grant or may delay approval for our product candidates; the potential that we may not be successful in commercializing Galafold in Europe and other geographies or our other product candidates if and when approved; the potential that preclinical and clinical studies could be delayed because we identify serious side effects or other safety issues; the potential that we may not be able to manufacture or supply sufficient clinical or commercial products; and the potential that we will need additional funding to complete all of our studies and manufacturing. Further, the results of earlier preclinical studies and/or clinical trials may not be predictive of future results. With respect to statements regarding projections of the Company's revenue and cash position, actual results may differ based on market factors and the Company's ability to execute its operational and budget plans. In addition, all forward-looking statements are subject to other risks detailed in our Annual Report on Form 10-K for the year ended December 31, 2017 as well as our Quarterly Report on Form 10-Q for the quarter September 30, 2018. You are cautioned not to place undue reliance on these forward- looking statements, which speak only as of the date hereof. All forward-looking statements are qualified in their entirety by this cautionary statement, and we undertake no obligation to revise or update this news release to reflect events or circumstances after the date hereof. CONTACTS: Investors/Media: Amicus Therapeutics Sara Pellegrino, IRC Vice President, Investor Relations and Corporate Communications [email protected] (609) 662-5044 Media: Pure Communications Jennifer Paganelli [email protected] (347) 658-8290 FOLD–G |
5. Why did Mr. Stewart forbid Elinore from seeing the woman in #61 on Christmas Day?(a) She lived in sheep country. (b) She lived in Indian territory. (c) A snowstorm was coming. (d) She insulted Mr. Stewart.
Short Answer Questions
1. Which of the following is NOT true about Zebulon?
2. What did Elinore make for Ms. Lane?
3. LETTERS OF A WOMAN HOMESTEADER is a series of _________________.
4. What does Elinore's daughter use for a baby doll?
5. Elinore reports that if a Yankee had spoken to her like Zebulon had, she would have ___________________. |
Q:
Searching with Hash in Perl
I am using a hash containing 5000 items to match words in a sentence, it so occurs that when I match for eg: if($hash{$word}){Do Something} sometimes it happens that the period occurs in the word and even if it is a match the presence of period results in a non-match. Can anything be done to ignore any punctuations when matching with hashes?
A:
You would have to redefine the words you look up to exclude the punctuation, remembering that you might or might not want to eliminate all punctuation (for example, you might want to keep dashes and apostrophes - but not single quotes).
The crude technique - not recognizing any punctuation is:
$key = $word;
$key ~= s/\W//g; # Any non-word characters are removed
if (defined $hash{$key}) { DoSomething; }
You can refine the substitute command to meet your needs.
But the only way to make sure that the hash keys match is to make sure that the hashed key matches - so you need to be consistent with what you supply.
|
Specific anticancer activity of a new bisabolane sesquiterpene against human leukemia cells inducing differentiation in vitro.
A bisabolane sesquiterpene, rel-(1S,4R,5S,6R)-4,5-diacetoxy-6- [(R)-5-hydroxy-1,5-dimethylhex-3-enyl]- 3-methylcyclohex-2-enyl (Z)-2-methylbut-2 -enoate, which was newly isolated from the roots of Leontopodium longifolium, presented specific anticancer activity against human leukemia HL-60 cells, but did not inhibit proliferation of human hepatoma SMMC-7721 cells and human normal hepatocytes L02 cells. Nitroblue tetrazolium (NBT) reduction, phagocytosis of latex beads, and cell electrophoresis all demonstrated that this bisabolane sesquiterpene presented its anticancer activity against human leukemia HL-60 cells in vitro via inducing cell differentiation. Our results may have implications for treatment of human leukemia with the sesquiterpene. |
The invention relates generally to mobile (cellular) telephone communications services. More specifically, the invention relates to methods and systems that enable businesses to subscribe to a mobile telephone service that allows subscriber's to a mobile telephone service provider to place a telephone call to a business and not have their allotted contract airtime minutes (subscriber-based measured-per-minute call charge) debited.
Presently, mobile telephone service provider subscriber service contracts include a predetermined number of contracted-for airtime minutes. When a subscriber (customer) uses more than their allotted airtime minutes in a given billing period, the over minutes are charged at an inflated rate. Therefore, subscribers usually monitor their airtime minute usage to prevent over minutes, or if their airtime use warrants it, change to a service plan that includes more airtime minutes.
Calling businesses for general information, pricing inquiries and orders from a mobile telephone consumes airtime minutes. Especially if a call is placed on hold for several minutes.
Due to the proliferation of mobile telephone service, many consumers are dropping landline telephone services. This becomes more troublesome for business owners. If consumers minimize time spent shopping from one business to another due to mobile telephone airtime minute usage, business in general suffers and competition between like businesses is affected.
What is desired are methods and systems that forward a call placed from a mobile telephone to a preexisting business landline telephone number not using airtime minutes. |
Q:
Possible to compare date strings in mongodb?
I have a collection that contains documents with a date attribute like so:
{
title: "whatever",
created: ISODate("2013-05-27T03:36:50Z")
}
I would like to select records that were created on a certain day. I was hoping I could use toDateString() and compare the values but when I do a search like the one below:
db.myCollection.find({ 'created.toDateString()': new Date('05/27/2013').toDateString() }).pretty()
But this does not work. Is there any way to do what I am attempting above?
A:
If you want to select records then use a date range:
db.collection.find({
created: { "$gte": new Date("2013-05-27"), "$lt": new Date("2013-05-28") }
})
And that selects all the contained hours, minutes etc, falling between the two dates.
So you should be trying to use the date values and not coerce into strings.
If you want this for doing aggregation or otherwise need the results in a day only format then do this using $project and the date operators:
db.collection.aggregate([
// Still match on the normal date forms, this time whole month
{ "$match": {
created: {
"$gte": new Date("2013-05-01"),
"$lt": new Date("2013-05-31")
}
}},
// Project the date
{ "$project": {
"date": {
"year" : { "$year" : "$created" },
"month" : { "$month" : "$created" },
"day": : { "$dayOfMonth": "$created" }
},
"title": 1
}},
// Group on day and title
{ "$group": {
"_id": {
"date" : "$date",
"title" : "$title"
},
"count": { "$sum": 1 }
}},
// Sort by date
{ "$sort": {
"_id.date.year": 1,
"_id.date.month": 1,
"_id.date.day": 1,
}},
// Project nicer dates and document
{ "$project": {
"_id": 0,
"date": { "$concat": [
{ "$substr": [ "$_id.date.year", 0, 4 ] },
"-",
{ "$substr": [ "$_id.date.month", 0, 2 ] },
"-",
{ "$substr": [ "$_id.date.day", 0, 2 ] }
]},
"title": "$_id.title",
"count": 1
}}
])
|
#ubuntu-qc 2010-11-08
<Mobidoy> Quelqu'un connais un bon tuto pour apprendre a monter un serveur ? Lamp, Samba, Print, Squid, File, un peu de tout quoi... ?
<MattQC> Ãllo
<qwebirc32442> allo tout le monde
<Mobidoy> Quelqu'un connais un bon tuto pour apprendre a monter un serveur ? Lamp, Samba, Print, Squid, File, un peu de tout quoi... ?
<deuxpi> Mobidoy: personnellement je trouve le sujet tellement vaste que le mieux me semble d'installer un 'serveur' et en faire quelque chose d'intéressant
<deuxpi> Mobidoy: avec des machines virtuelles c'est très facile de faire le "set-up"
<deuxpi> et la référence : https://help.ubuntu.com/10.04/serverguide/C/index.html
<Mobidoy> ok merci :)
<deuxpi> le Server Guide est vraiment bien
<Mobidoy> ok good.... je me suis fait prendre a court pour ce qui est du LVM, j'ai 2 disques de 80 GB pis il en a pris juste 1 et le partitionement n'etait pas tres tres utile.... :) Donc, Un mauvais départ lol...
<Mobidoy> c'est avec un serveur comme ca qui tu reste toujours connecter sur le irc Deuxpi ?
<deuxpi> oui, j'ai une petite instance sur Linode qui me sert pour le e-mail et quelques blogues
<Lrrr> pas besoin d'un serveur comme ça pour rester connecter.
<deuxpi> Lrrr: effectivement, mais c'est ça que je fais quand même :)
<Lrrr> les ordinateurs chez moi reste toujours ouvert
<Mobidoy> Lrrr, je suis sur un portable qui me suis ou je vais donc, je dois l'eteindre :) et quand je me reconnecte rendus a destination, il me manque un bout :)
<Mobidoy> Comme pour aller au Launch party d'Ubuntu :)
<kanouk> coucou!
#ubuntu-qc 2010-11-09
<GringoStar> Bonsoir
<Lrrr> bonsoir
<GringoStar> J'ai reformaté et j'ai oublié de faire une sauvegarde de mes bookmarks :( Quelqu'un ici m'avait donné un lien vers un site vraiment bien et en français pour apprendre linux mais j'ai uoblié le nom.
<GringoStar> Il est séparré en différentes lecons et tres complet
<Lrrr> oh
<Lrrr> moi les tutos :P
<nicduff> google est le meilleur site de référence
<nicduff> GringoStar:
<GringoStar> J'ai déjà beaucoup de document pdf mais ce site était surtout dédié à ceux qui font la transition de win à ubuntu...
<nicduff> GringoStar: Tu veux faire du desktop ou du server
<GringoStar> Desktop
<nicduff> ok
<nicduff> GringoStar: tu as toujours le chanel pour t'aidé. Mais tu peux aussi allé dans la doc ubuntu-fr.org très bien construit
<nicduff> http://doc.ubuntu-fr.org/debutant
<GringoStar> Oui merci mais je le connait déjà , j'espérait en retrouver un en particulier mais je vais probablement devoir demander directement à ceux quii étaient en ligne ce soir là ...
<nicduff> désolé
<GringoStar> C'est pas ta faute...
<GringoStar> Mais si je ne me trompe pas, ve2dmn participait à la conversation
<GringoStar> Anyway, merci quand même...
<nicduff> GringoStar: si tu retombe sur cette doc essaye de me la faire suivre
<nicduff> des foix que sa pourait me servire
<GringoStar> C'était la meilleure documentation pour débutant que j'ai trouvé et c'est la seule dont je n'ai pas de copie...
<ve2dmn> http://irclogs.ubuntu.com/2010/11/09/%23ubuntu-qc.html
<ve2dmn> Le logs de ce chat existe...
<Mobidoy> C,est le site du Zero Gringostar
<ve2dmn> Il est parti
<Mobidoy> doh
<ve2dmn> C'est dommage que la seule reference Ubuntu que j'ai pu trouver sur Etsy c'est un stiker pour MacBook
<Mobidoy> C'est quoi Etsy ?
<ve2dmn> etsy.com
<Mobidoy> GringoStar, tu cherche le Site Du Zero :)
<Mobidoy> http://www.siteduzero.com
<ve2dmn> GringoStar: autre detail, les archive ce ce chat sont sur irclogs.ubuntu.com
<ve2dmn> exemple: http://www.etsy.com/listing/59547910/ubuntu-mashup-vinyl-skin-sticker-decal?ref=sr_gallery_5&ga_search_query=ubuntu&ga_search_type=handmade&ga_page=&order=&includes[0]=tags&includes[1]=title&filter[0]=handmade
<ve2dmn> oups...
<ve2dmn> http://irclogs.ubuntu.com/2010/11/09/%23ubuntu-qc.html
<Mobidoy> Et pour le tutoriel de Linux c'est au http://www.siteduzero.com/tutoriel-3-12827-reprenez-le-controle-a-l-aide-de-linux.html
<GringoStar> Oui c'est ça merci!!!
<Mobidoy> fait plaisir :)
<GringoStar> Une dernière question (pour ce soir), j'utilise ubuntu 10.04 Netbook edition et je trouve l'interface vraiment bien faite et fonctionnelle mais elle a un défaut que j'aimerais corriger, le tableau de bord n'est pas éditable. J'ai trouvé ceci comme solution : https://help.ubuntu.com/community/UbuntuNetbookEdition/ConvertGnomeSession mais j'aimerais savoir si il y aurait un moyen de garder l'acces au bureau gnome.
<GringoStar> Quitte à n'avoir qu'un tableau de bord dans gnome.
<deuxpi> GringoStar: si je comprends bien les insructions, il s'agit d'utiliser le bureau gnome standard, mais en le modifiant pour qu'il ait des fonctionalités semblables au bureau Netbook...
<GringoStar> Et que ce passera t-il si je suis cette procédure et que plutard, je decide d'essayer le bureau KDE.
<GringoStar> eu... 1 min
<GringoStar> Ok je ne comprend pas les commandes mais la description au début dit que le panel dans netbook est barré car le modifier modifierait aussi celui de gnome
<GringoStar> donc les commande devrait enlever le bureau gnome pour pouvoir editer le bureau netbook
<GringoStar> Est-ce logique?
<GringoStar> Ou si je me trompe royalement
<Musashimaru> je comprend rien...
<deuxpi> hypothèse: les réglages du panel sont stockés dans "gconf", mais la version netbook ne lit pas ces réglages ?
<Musashimaru> enfin ca change à toutes les sorties...
<Musashimaru> bon, bonne nuit....
<GringoStar> Je crois quelle a ses propre réglages (hypothese)
<deuxpi> mais peut-être pas configurables
<deuxpi> euh
<GringoStar> Google trouve beaucoup de questions a ce sujet mais peu de réponses
<deuxpi> en gros le panel du netbook edition est séparé conceptuellement et la seule façon de le remettre normal est de démarrer une session normale
<GringoStar> Ce que je voudrais faire est plutot simple dans gnome. Mettre le tableau de bord sur auto-hide et y ajouter quelques icones pour mes programes
<deuxpi> ensuite c'est possible de modifier la session gnome normale pour qu'elle ressemble au netbook
<GringoStar> Ha ce serait peut-etre ma solution
<deuxpi> c'est un peu ce que je comprends de ces instructions
<GringoStar> Le zero c'est vraiment bien fait!!!
<Mobidoy> Oui c'est un bon site... Si tu veux par la suite parfaire tes connaissances, laisse le moi savoir, je suis le meme cheminement que toi :)
<Musashimaru> bhaaaaaaaaaaa
<Musashimaru> faut juste tout casser.
<Musashimaru> puis essayer de réparer... :)
<Mobidoy> tout casser et... lol oui, mais quand tu n'as plus acces a internet et que tu ne connais pas la console... La seul solution que tu vois c'est de re installer avec le cd :)
<GringoStar> En un mois sous linux, j'ai déjà tout cassé 3 fois!!! Assez c'est assez!!!
<Mobidoy> je viens de decouvrire w3m, ont peut vraiment en faire bcp en console...
<GringoStar> C'est un auter OS?
<Musashimaru> ben ouais...
<Mobidoy> non, w3m c'est un fureteur, pour aller sur internet mais, en consol...
<Musashimaru> mais à mon époque j'avais pas internet chez moi, pas de documentation... alors j'ai réinstallé des dizaines de fois
<Musashimaru> Ca marchais pas aussi bien qu'aujourd'hui à l'époque
<Mobidoy> ouvre toi une fenetre de terminal et tappe w3m www.google.com
<Mobidoy> ou un autre site de ton choix :)
<Mobidoy> Deuxpi, sais-tu ou est l'option pour ne pas voir les messages systemes comme ,quelqu'un qui entre ou qui quitte dans Xchat ?
<GringoStar> nice
<GringoStar> C'est surement plus rapide et sécuritaire
<Musashimaru> GringoStar, pas plus rapide, et pas forcément plus sécuritaire...
<Musashimaru> GringoStar, joue avec lynx alors
<Musashimaru> ca a mis 10 secondes pour charger goole
<GringoStar> pas d'images, pas de flash
<Mobidoy> oui... mais surtout pratique si jamais tu decide de prendre une vieille tour, ou comme j'ai fait, demander au gens sur Facebook de donner leurs vielles équipements et de monter un serveur... Y a pas de GUI la dedans :)
<GringoStar> L'info direct en text
<Musashimaru> utilise telnet alors tu auras même pas d'interpreteur... super rapide
<Musashimaru> Mobidoy, pas de serveur X empache pas le graphique en remote
<GringoStar> Pour l'instant je vais me concentrer sur ubuntu
<GringoStar> et apprendre les lignes de commandes
<Musashimaru> GringoStar, teste une petite slackware 3, comme j'Avais à mes debuts, tu vas voir comme c'est plus moins facile.... :)
<Musashimaru> tu en auras de la ligne de commande... :)
<GringoStar> Mon premier ordi n'avait meme pas de disque dur!
<Mobidoy> ca vas etre justement ma prochaine etape Musa, de savoir comment aller en mode graphique en remote :)
<Mobidoy> Le miens non plus... Texas instrument TI-99A
<Musashimaru> Mobidoy, ssh -X ou ssh -Y, tu dois juste penser à mettre le X11forwarding à yes dans la config du serveur ssh.
<Mobidoy> Merci :)
<Mobidoy> Et je dois le redémmarer ensuite ?
<Musashimaru> Mobidoy, comme ca c'Est sécurisé, tout passse par ssh. Tu te connecte à ton serveur avec l'option -X ou -Y (en majuscule) et tu lances tes appications, elle apparaitrons sur ton écran
<Musashimaru> Mobidoy, oui tu dois le redémarrer
<Mobidoy> Comment tu fais pour mettre le message a mon attention comme ca ?
<Musashimaru> qui moi?
<Mobidoy> oui :)
<Musashimaru> J'écris juste ton nom, et ton logiciel le reconnait et surligne le message
<Mobidoy> Ahh ok :)
<GringoStar> Cool merci
<Musashimaru> pour écrire un nom, tu commence à l'écrire, puis tab pour completer, ou plusieurs fois tab pour faire tourner les noms possibless
<Mobidoy> je dois m'habituer a utiliser tab... surtout en console :)
<GringoStar> Moi aussi
<Mobidoy> Musashimaru, tu as un programme que je pourrais essayer en mode graphique voir si ca fonctionne.... rien ne me viens en tete...
<GringoStar> nautilus?
<Mobidoy> il est pas installer par default sous la version serveur... y a pas grand chose en fait.... je vais l'installer lui ou bien gedit :)
<Mobidoy> GringoStar, merci de ta suggestion.... j'etait brain dead :)
<GringoStar> Moi je vous laisse maintenant, bonne nuit...
<Mobidoy> GringoStar, ok bonne nuit, a demain
<GringoStar> Encore merci
<Mobidoy> comment voir en console combien d'update il y a quand ont fait un apt-get update ? et meme, si possible, le nom des package qui seront upgrader ?
<MattQC> Ãllo
<MattQC> Allo Prof
<hay09> bonjour
<hay09> je veux configurer mon proxy squid pour qu'il puisse diminuer la bande passante après un certains temps
<Mobidoy> Quelqu'un connais des bonnes écoles qui ont des formations à distances sur linux ainsi que les serveurs Linux ?
<IdleOne> Mobidoy: http://www.savoirfairelinux.com/services/training
<Mobidoy> Merci Idle0ne
<kanouk> bonsoir
<Ankman> guten abend
<kanouk> bonsoir Ankman
<Ankman> :-)
<MattQC> Ankman: Salut
<Ankman> salut MattQC
<kanouk> salut MattQC
<MattQC> Kanouk: salut
<kanouk> :)
<MattQC> Bien, il y a du monde cet après-midi
<MattQC> T'es où?
<MattQC> Je suis en train de vasciler entre Ubuntu et Fedora
<kanouk> du Québec
<kanouk> et toi?
<MattQC> :)
<MattQC> Oh, je suis à Montréal
<kanouk> ok
<kanouk> je suis pas loin de Montréal
<MattQC> Il semble qu' il y a un local de Cannonical en ville?
<MattQC> sur le boul. Saint-Laurent?
<kanouk> j'en sais rien faudrait s'informer
<MattQC> Oui
<MattQC> Bien, j'suis toujour à l'école. Je viens tout juste de faire un petit arrêt. Faut que je pars. Je serai de retour après
<kanouk> regarde ce lien : http://doc.ubuntu-fr.org/lettre_hebdo_019#une_presentation_d_ubuntu_realisee_par_l_equipe_support_technique_de_canonical_a_montreal_canada
<kanouk> @ +++ tout le monde
#ubuntu-qc 2010-11-10
<ve2dmn_work> J'ai des problemes avec mon docking station pour mon laptop.
<ve2dmn_work> Mon ecran externe fonctionne bien, mais pas l'ecran de mon laptop...
<ve2dmn_work> ca...hum... "reset" de tant a autre et j'ai ces mesages qui apparaissent dans X.org.log:
<ve2dmn_work> (II) intel(0): EDID vendor "LGD", prod id 599
<ve2dmn_work> (II) intel(0): Printing DDC gathered Modelines:
<ve2dmn_work> (II) intel(0): Modeline "1440x900"x0.0 86.50 1440 1488 1520 1568 900 903 909 920 +hsync -vsync (55.2 kHz)
<ve2dmn_work> (II) intel(0): Modeline "1440x900"x0.0 60.00 1440 1488 1520 1632 900 903 909 920 +hsync -vsync (36.8 kHz)
<ve2dmn_work> j'ai rien trouver sur Google.
<ve2dmn_work> Ca ne m'epeche pas de travailler, mais ca tape sur les nerf...
<MattQC> Salut
#ubuntu-qc 2010-11-11
<kanouk> bonjour!
#ubuntu-qc 2010-11-12
<GringoStar> Salut à tous!
<ve2dmn> bonsoir
<GringoStar> Est-ce que ve2 c'est pour radio amateur?
<GringoStar> Ok c'est pas une question sur linux mais ça m'intrigue
<ve2dmn> Oui
<ve2dmn> Mais j'ai pu access a une radio depuis des anees
<ve2dmn> C'est aussi ma plaque de licence de voiture :)
<GringoStar> J'ai vu qu'il y a plusieurs package en liens avec la radio, tu as déja essayé?
<GringoStar> C'est ce que je pensait
<ve2dmn> J'aimerais bien mais mon temps est utiliser sur mon Makerbot ces jours-ci
<ve2dmn> Sinon je me prendrais un systeme comme celui-la: http://www.ettus.com/
<ve2dmn> http://en.wikipedia.org/wiki/Universal_Software_Radio_Peripheral
<GringoStar> J'ai fait du CB (longue distances) durant quelques années à l'epoque oû internet n'était pas populaire et ont entendait parfois des sons du genre data de modem, je me demand esi ces pakages peuvent servir à emmener internet dans les endroit éloignées...
<ve2dmn> Ca peut servir pour ca, mais c'est tres lent
<ve2dmn> Et il est interdit d'utiliser une encryption sur un lien publique
<ve2dmn> (ce qui rend l'utilisation de courriel impossible)
<GringoStar> ho
<ve2dmn> http://en.wikipedia.org/wiki/Packet_radio
<ve2dmn> Le protocole que je connais pour faire ca s'appelle AX.25
<ve2dmn> http://en.wikipedia.org/wiki/AX.25
<ve2dmn> Tout ces protocoles sont surporte par Linux et Mac OS X... mais pas par Windows
<GringoStar> Est-ce que ce c'est plus lent qu'un modem téléphonique?
<GringoStar> Find it : rarely higher than 9,600 bit/s, and typically 1,200 bit/s
<GringoStar> vraiment trop lent pour faire quoi que ce soit
<GringoStar> Ouvrir la google.com prendrait +ou_ une minute
<ve2dmn> Oui mais ca peux quand meme servir de relais courriel...
<ve2dmn> meme si tout le courriel va etre lisible par tous...
<ve2dmn> Ca peux pas servir a beaucoup plus...
<GringoStar> Il existe surement des protocoles qui permette d'augmenter le débit un peu comme ils ont fait pour les téléphones cellulaires.
<ve2dmn> La question tourne plus autour de ce que:
<ve2dmn> 1) la loi permet
<ve2dmn> 2) la largeur de bande utilise
<ve2dmn> Il est interdit pour un radio amateur de prendre 40-50 bandes en meme temps pour augementer sa propre transmission...
<ve2dmn> L'encryption (sous toute ses formes) est interdite, mais la compression serait possible...
<ve2dmn> Par contre la compression ne donne pas du 1000% plus de bande passante... plutot entre 10% et 90% supplementaire...
<GringoStar> et les les frequences permises sont plutot basse je croit (à l'époque je crois que je jouais dans les 27Mhz jusqu'à 52Mhz mais je n'ai jamais eu de license.)
<ve2dmn> Les cellulaire sont dans le 900MHz, le 850MHz et le 1800MHz
<ve2dmn> (et autres)
<GringoStar> wifi 2.4 Ghz
<GringoStar> 5
<GringoStar> En gros une fréquence plus haute permet de transmettre plus d'info
<ve2dmn> plus ou moins...
<GringoStar> Je me demande ce qu'utilise la nasa pour ses comm
<mdeslaur> ve2dmn: quel makerbot as-tu?
<ve2dmn> une difference de 3Hz autour de 5Ghz donne la meme largeur de bande qu'il difference de 3Hz autour de 27MHz
<ve2dmn> mdeslaur: j'ai un Makerbot Industry Batch XVI
<GringoStar> C'est pour le travail ou comme hobby?
<mdeslaur> ve2dmn: oh, nice
* mdeslaur est jaloux
<GringoStar> il n'est pas le seul
<ve2dmn> Mon Makerbot? Il ne marche pas bien encore
<ve2dmn> J'ai pas encore reussi a faire un print que je suis satisfait...
<GringoStar> quel type de fichier tu utilise
<ve2dmn> Des "test" que j'ai pris sur Thigiverse
<ve2dmn> Le "Cupcake" comme le mien est maintenant desuet: http://store.makerbot.com/makerbot-thing-o-matic.html
<ve2dmn> Je prend mes fichiers ici: http://www.thingiverse.com/
<ve2dmn> En passant le logiciel qui "drive" le Makerbot fonctionne bien sous tout les platformes que j'ai tester...
<GringoStar> C'est vraiment abordable!!!
<GringoStar> La seule machine de prototypage rapide que j'ai vu était chez bombardier...
<ve2dmn> Mais ca demande beaucoup de travail...
<ve2dmn> En passant j'ai trouver un tableau qui donne le nombre de bit par Hz pour la pluspart de technologies "wireless"
<ve2dmn> http://en.wikipedia.org/wiki/Spectral_efficiency
<ve2dmn> Chaque cellulaire utilise 20MHZ donc un cellulaire qui utilise 850MHz utilise la bande de 840MHz-860MHz
<ve2dmn> En fait, j'ai fait une erreur: c'est 1.22MHz, et non 20MHz
<GringoStar> Et pour faire passer un fichier de CAD 3D en fichier de programation pour l'impression 3D est-ce que c'est un peu comme de programmer des CNC (outils trajectoire, vitesse)...
<ve2dmn> oui... mais c'est un outil appeller ReplicatorG qui fait le travail...
<ve2dmn> http://replicat.org/
<ve2dmn> la gros du travail est fait par Skeinforge (qui est inclut dans ReplicatorG): http://www.bitsfrombytes.com/wiki/index.php?title=Skeinforge
<GringoStar> Et est-ce que tu peux jouer avec le matériel utilisé
<ve2dmn> Le plastique utilisé: ABS. Même chose que des LEGO
<GringoStar> Puisqu'il faut tout monter sois meme, est-ce que tu as de la difficulté à trouver de l'info pour solutionner les problemes?
<ve2dmn> non
<ve2dmn> La majorite des problemes que j'ai c'est à cause de ma propre incompétence :/
<ve2dmn> J'ai essayé d'aller trop vite
<GringoStar> Comme tout le monde
<GringoStar> Tu y travaille depuis longtemps?
<ve2dmn> J'ai mis 10-20h en tout... incluant tout défaire la tête et tout remonter 3 fois parce que j'avais mal lu....
<ve2dmn> la Wiki est bien fait: http://wiki.makerbot.com/cupcake-cnc-10:cupcake-y-stage-assembly
<ve2dmn> Ca prend un bon 6-10h pour monter...
<ve2dmn> et 90% des problèmes viennent de 1 pièce: la tête: http://wiki.makerbot.com/cupcake-cnc-10:cupcake-y-stage-assembly
<ve2dmn> oups: http://wiki.makerbot.com/plastruder-mk4
<GringoStar> et quel genre de précision ça peut donner?
<ve2dmn> Je peux pas répondre....
<ve2dmn> Il y a des modèles de LEGO et je ne sais pa si ca marche
<ve2dmn> Je viens de faire un test et ca a fonctionner :)
<GringoStar> Cool
<GringoStar> Je te laisse faire tes test, on s'en reparle une autre fois
<GringoStar> Bonne chance et à la prochaine
<GringoStar> Bonsoir tout le monde
<Gringostar> Salut, y a quelqu'un?
<Gringostar> J'avais cisaillement (tearing) horizontal dans mon écran lorsque je visionnais des videos et les recherches que j'ai fait disait que la solution était de cocher les case vsync dans mon menu nvidia ce que j'ai fait mais maintenant les tears sont moins évidentes mais forme un grand Z dans mon écran. Le décalage est d'à peine une ou deux pixels mais constament au meme endroit. Quelqu'un aurait une solution? Il y a plusieurs
<qwebirc85112> Il y a-t-il âme qui vive?
<Gringostar> Salut
<Gringostar> Ãa va?
<Gringostar> En fait j'allais me coucher...
<Gringostar> Et je crois que tout le monde ici est déjà parti...
<Gringostar> Du moins il n'y a eu aucune conversation depuis plus d'une heure...
<Gringostar> Ã demain...
<Calysto> bonjour tout le monde
<Lrrr> bonjjour
<Calysto> bonjour Lrrr
<Calysto> dites moi, j'aimerais bien acheter un bonnet pour l'hiver, est ce que Canonical à Montréal à quelques goodies Ubuntu à vendre ou est ce que je dois forcément commander sur le net?
<alexxx> Salut à tous
<Calysto> bonjour alex :P
<Mobidoy> Calysto, MagicFab ou Cyphermox seront plus en mesure de te répondre
<Calysto> oui, mais j'espèrais qu'ils soient là , je suppose que soit ils ont un max de boulot soit c'est la bière du vendredi soir ^^
<Calysto> bon, bah j'y vais dans ce cas, bonne soirée à tous :)
<cyphermox> FWIW, Mobidoy, on a pas de trucs à vendre au bureau... malheureusement je suis trop tard :)
<Mobidoy> Au moins, j'ai la réponse donc, si il ce reconnecte, je saurais quoi lui répondre :)
<MagicFab> faut rester au moins qqs minutes pour avoir une réponse :)
<Mobidoy> cyphermox et MagicFab, pendant que je vous ai, je suis sur le point de sortir de l'armée et, comme je sors médicale, ils vont me payer une formation... Je veux apprendre les serveurs Linux/Ubuntu, connaissez-vous une école ou un institut qui donne ces formations à distance (elearning) et qui sont reconnus ?
<MagicFab> Mobidoy, selon ton budget tu peux regarder ici:
<MagicFab> http://shop.canonical.com/index.php?cPath=21
<MagicFab> et ici: http://webapps.ubuntu.com/course_locator/
<Mobidoy> MagicFab, Merci, c'est pas mon Budget, c'est leurs budget lol :) Ils ont scrapper mon corps donc, ils payent pour que j'ai une nouvelles formation / un emplois :)
<MagicFab> Mobidoy, sorry ! Bonne chance pour les cours, fais-moi savoir ton choix, je suis Ubuntu Certified Instructor et je peux répondre si tu as des questions au sujet des cours.
<Mobidoy> MagicFab, Tu as pas a etre sorry, de un, tu es pas responsable et 2, ca parait pas pentoute lol, en tout cas, y a aucun de vous qui à remarquer quelque chose lors du lancement de Meerkat au St-Sulpice ;)
<MagicFab> On a tous nos secrets :)
<MagicFab> si le serveur t'interesse tu peux aussi aller voir #ubuntu-server
<Mobidoy> MagicFab, j'ai récupérer des pièces de mes amis et voisin et jusqu'à maintenant, j'ai un P4 2.3Ghz avec 512Mb de ram et 2X 80 Gb hdd, la version serveur est déjà dessus mais sans aucun daemon, je le monte tranquilement pour savoir ce que je fais, j'ai même mon adresse web d'enregistrer... donc, il me manque juste la formation. Je me fis à ce que je trouve ici et là sur le web mais je veux être certifié donc oui, to
<Mobidoy> ut ça vas m'aider... Merci :)
<MagicFab> Mobidoy, il n'y a pas de certification serveur chez Canonical, par contre tu pourrais passer LPI1 & 2 et même 3 si tu veux.
<GringoStar> Hola!
<Mobidoy> Bonsoir GringoStar, Comment vas la formation du site du zéro ???
<GringoStar> J'en suis à la 4eme lecon seulement...
<GringoStar> Mais c'est vraiment très bien fait
<Mobidoy> tu vas voir, apres cette formation, tu vas en redemander lol.... Comprends tu bien l'anglais ? J'ai d'autre formation un peu plus poussé que je fais présentement que tu pourrais aimer par la suite
<GringoStar> Was AFK, no problems with writen english, just need practice
<GringoStar> Have to reboot should be back in a minute...
<herbiemilie> salut
<herbiemilie> j ai un petit pb depuis ma derniere mise a jour c est a dire ce matin quand je vais dans raccourci cherchait un dossier que ça soit document viseo musique a chaque fois il m ouvre banshee
<herbiemilie> alors que quand je passe par mon dossier partage que j ai sur le bureau pas de pb
<herbiemilie> est ce que quelqu un d entre vous pourrait me filer un coup de main
<herbiemilie> merci
#ubuntu-qc 2010-11-13
<Mobidoy> Herbiemilie, si je resume bien, quand tu passes par le menu Places pour ouvrir un dossier, Banshee s'ouvre mais tout vas bien quand tu ouvres les même dossiers via les raccourcies sur le bureau, tout vas bien ???
<herbiemilie> oui
<GringoStar> Salut
<herbiemilie> Mobidoy, c'est bien ça
<herbiemilie> j'ai enleve l'ouverture par default par banshee pour voir si ça venait de la, j'ai un ami qui a regarde et on voit pas d'ou ça vient
<Mobidoy> Herbiemilie, je vais voir si je trouve quelque chose, GringoStar, re-salut, ok donc, quand tu voudras d'autre tuto ou formation, laisse moi savoir, j'en ai trouvé plein :)
<GringoStar> Merci
<herbiemilie> Merci,c'est gentil :)
<Mobidoy> herbiemilie, regarde le 2ieme post ici... http://ubuntuforums.org/showthread.php?p=9775898
<Mobidoy> Si il y a quelque chose que tu ne comprends pas, laisse le moi savoir.
<Mobidoy> est-ce que ca fonctionne herbiemilie ?
<herbiemilie> Mobidoy, super merci beaucoup ça fonctionne à la perfection:))
<GringoStar> Salut, ça va?
* Ankman yawns
#ubuntu-qc 2010-11-14
<qwebirc79526> salut
<Mobidoy> Bonsoir
<qwebirc79526> Je vien commencer a utilisé ubuntu et j'y comprend pas grand chosse c'est normale?
<qwebirc79526> Je suis incapable d'instaler des jeux linux, window et en ligne. Je ne comprend pas non plus comment m'en servir j'ai beau lire et relire les guide j'y comprend rien
<qwebirc> -.- ubuntu répond pas à moitié...
<Musashimaru> la moitié répond quand même
<qwebirc> -.- je comprend rien a ubuntu et demain je dois en mêtre dans 12 ordie...
<qwebirc> J'ai un dosier bureau sur le bureau qui veux pas se suprimer
<Musashimaru> il s'est créé comment ce dossier?
<Musashimaru> si il s'efface pas c'Est que tu n'as probablement pas les droits
<Musashimaru> click droit sur le dossier, propriété, et regarde si tu est le propriéTaire du dossier et si tu as le droit d'cériture dessus
<qwebirc> -.- je l'ai prit de raccourcis et j'ai glisé sur le bureau
<qwebirc> Erreur de l'interrogation du fichier « /home/francis/Bureau/Bureau » : Aucun fichier ou dossier de ce type
<Musashimaru> haaaaaaaaaaaa
<Musashimaru> click droit sur le bureau->Ã rrange by name
<Musashimaru> ton fichier existe plus. Ãtrange qu'il soit encore affiché
<qwebirc> sa fait rien cliquer sur droit
<Musashimaru> quand tu clicque droit sur le fond d'écran, tu n'As pas un menu qui s'affiche?
<qwebirc> non il aparait pas
<Musashimaru> un truc à du chier... tu dervais te déconnecter et te reconnecter pour voir
<qwebirc> ma souri capte rien sur le bureau...
<Musashimaru> je veux dire te delogger et te relogger
<qwebirc> ok je peux le faire si un jeu rentre?
<Musashimaru> un jeu?
<qwebirc> alien-arena est en cour d'instalation
<Musashimaru> ben attends, sinon les programmes qui s'executent vont s'Arrêter
<qwebirc> ok
<qwebirc> Au fait sa prend un programe spécial pour faire ca Â----http://www.youtube.com/watch?v=1zoXquJdwMI
<Musashimaru> oui et non...
<Musashimaru> tu dois installer compizconfig-settings-manager pour pouvoir régler les effets.
<Musashimaru> Pour activer les effets, tu vas dans menu->préférences->Apparence.
<Musashimaru> Tu vas dans la tabulation Effets visuels et tu selectione "extra"
<Musashimaru> Une fois activé, si tu nA'S pas d'erreur, tes fenetre deiviendront molles quand tu les bougeras
<Musashimaru> Ensuite, tu vas dans menu->préférences->Compizconfig settings manager pour ajouter ou configurer les effets
<qwebirc> je le prend ou compizconfig-seting...
<tottto-drummond> salut la gang
<Musashimaru> lance Ubuntu Software Center
<Musashimaru> C'est ton logiciel pour installer tous les programmes. On ne télécharge pas les logiciels sur internet avec ubuntu, sauf cas exceptionnel
<Musashimaru> dans le logiciel, dans la barre de recherche, tappes juste compiz
<qwebirc> c'est pas gestionaire de paquet syn... je dois ouvrir?
<Musashimaru> tu verras un truc Compiz déjà installé, et tu dois installer en plus "Advanced Destop Effect Settings"
<Musashimaru> l'un ou l'autre
<Musashimaru> Je ne savais pas si tu connaissais synaptic... :)
<qwebirc> le seule j'ai vu a mon stage
<Musashimaru> ce sont deux intarfaces pour la même chose. Synaptic est juste un peu moins "user friendly", mais mieux pour les gens qui connaissent un peu
<qwebirc> Question comme sa comment on instale les jeux en ligne?
<Musashimaru> quel jeu?
<qwebirc> conquete 2.0
<Musashimaru> http://conquete.91.com/
<Musashimaru> ?
<qwebirc> oui sa
<Musashimaru> c'est un jeu windows?
<qwebirc> surment
<qwebirc> mais sur le site FR de ubuntu sa dit il marche
<Musashimaru> tu dois l'installer comme sous windows... mais il faut avoir Wine d'installer pour que les porgrames windows fonctionnent. Mais ca fonctionne pas toujours parfaitement
<tottto-drummond> play on linux aussi
<Musashimaru> pas toujours pour Play on linux...
<tottto-drummond> oui c est vrai
<Musashimaru> surtout, je ne crois pas que conquete ait été officiellement testé
<qwebirc> je trouve pas advanced Destop Effect Setting...
<Musashimaru> qwebirc, Wine est une suite de librairies qui permettent aux applications windows de tourner sous linux. Ca marche quand même trés bien, mais tout ne fonctionne pas toujours
<Musashimaru> qwebirc, installe le
<Musashimaru> tu as besoin que de ca
<Musashimaru> compiz est installé par defaut
<qwebirc> ok sa marche
<qwebirc> bon wine maintenant
<Musashimaru> si tu veux de l'info sur wine, et sur les logiciels supportés et l'état de leur support, le site officiel de wine est: http://www.winehq.org/
<Musashimaru> et ici c'est la base de donnée des logiciels testés avec wine: http://appdb.winehq.org/
<qwebirc80922> wine est instaler donc j'instale mon jeu comment pour il ouvre avec wine?
<Musashimaru> comme sous windows... tu clique sur l'executable
<Musashimaru> LEs icones de lancement se trouveront dans ton menu
<qwebirc80922> The file '/home/francis/Bureau/Conquete/play.exe' is not marked as executable. If this was downloaded or copied from an untrusted source, it may be dangerous to run. For more details, read about the executable bit.
<Musashimaru> click droit propriété, tabultion permission, en bas, coche executable
<qwebirc80922> -.- vérifier pilote et direct X
<qwebirc80922> comment on met direct X a jour?
<tottto-drummond> juste une question comme ca.. quel player de musique utilisez vous
#ubuntu-qc 2011-11-07
<Chex> dejuren: hey drago!! :)
<dejuren> Chex: Hi Stefan
<dejuren> what's new?
<Chex> dejuren: just settling in at the new job :)
<dejuren> Chex: nothing exciting on my site as well.. just got some oneiric strange behaviour, like the old days hehe
<Chex> dejuren: yeah same for me, fixes some things, breaks others
<MagicFab> dejuren, hi
<dejuren> MagicFab: hi, what's up
<MagicFab> learning about OpenVPN ALS (aka SSL VPN)
<dejuren> good... I'm digging some simple stuff like scp host1 host2... which turns out to be realy tricky
<MagicFab> just copying stuff around ?
<dejuren> yep... getting involved the ssh-agent and key forwarding
<dejuren> and the sh...t is scp adds automatically -a to _disable_ key FW
<dejuren> and the copy fails....
<Chex> dejuren: funny I am fighting with ssh host keys with ssh remote acces, as well
<Chex> one host is working, another is not.. I setup the public key properly on the remote site, but no luck..
* dejuren thinks to anonce ssh week on #ubuntu-qc
<dejuren> Chex: ssh -v doesn't help?
<MagicFab> get a support contract :)
<Chex> ssh -vvv, and nope
<dejuren> :-?
<Chex> MagicFab: heh, these are centos systems :P
<dejuren> Chex: maybe you should try with a new key (temporary one)
<Chex> dejuren: cant really do that, stuff is in production on that server
<Chex> I am going to punt to the admin who is training me tomorrow
<dejuren> but you should be able to try with test account and ssh key i guess... but you're right, depends on how strictly is that box monitored and what policy permitts to do there
<MagicFab> Chex, if you can copy the private key + config to a sandboxed local box (test ?), try to reproduce/debug there
<MagicFab> box/VM
<Chex> yeah
<Chex> something I never had at canonical
<Chex> and I need it here, actually, I can do that..
#ubuntu-qc 2011-11-08
<Ankman> anyone knows this feeling: you start your debian and the gnome looks like all messed up and way different?
<Chex> Ankman: doesnt really happen to me on ubuntu
<Ankman> seems it's gnome 3 here now
#ubuntu-qc 2011-11-09
<faiob> Bonjour comment fais-ton pour lancer un scripte-iptable a chaque démarrage de l'ordinateur?
<faiob> je sais que Cron n'est pas la solution mais seulement avec le startup de gnome
<Ankman> iptables-save et iptables-restore
<faiob> merci ankman, je me suis appercu de sa en regardent /sbin mais la je suis entrain de teste avec rc2 ;-)
#ubuntu-qc 2011-11-10
<faiob> Bonjour tout le monde, je n'arrive pas a garder la configuration iptable après chaque reboot. J'ai pourtant tout éssayer: https://help.ubuntu.com/community/IptablesHowTo
<faiob> Je suis sous ubuntu 10.04.2 LTS
<faiob> esque ca pourrait avoir un rapport avec mon libc6 cassé? http://paste.ubuntu.com/734326/
<faiob> je vais me refair l'installation, comme ca je serais fixé bonne journée
#ubuntu-qc 2011-11-11
<d2_racing> bonsoir
#ubuntu-qc 2011-11-12
<d2_racing> bonjour
#ubuntu-qc 2012-11-07
<Chex> IdleOne: hey bro
<Chex> IdleOne: how goes it?
<IdleOne> Good thanks, yourself?
#ubuntu-qc 2012-11-09
<anthony> Bonsoir, j'ai installé Lubuntu 12.04 et je n'ai pas l'icône du volume, est-ce normal ? Que puis-je faire s.v.p ?
<anthony> Je n'ai pas eu ce problème quand j'ai installé Ubuntu.
#ubuntu-qc 2012-11-11
<Max_LeLiseux> salut tous
<Max_LeLiseux> J'suis enfin passer à Linux Ubuntu après 1ans 1/2 de réflexion
<Max_LeLiseux> salut tous
<Max_LeLiseux> J'suis enfin passer à Linux Ubuntu:D
<Max_LeLiseux> J'ai un probleme dans Ubuntu
<Max_LeLiseux> Qui peut m'aider?
#ubuntu-qc 2013-11-05
<mammuth> bonsoire
<mammuth> bonsoir mon compt admin refuse mon password que dois-je faire ? merci
<Ankman> umm
<Ankman> well... :-)
#ubuntu-qc 2013-11-06
<qwebirc17257> bonjour je veux réinstaller ubuntu parce qu'il bogue mais quand je debute linstallation mais le logo disparait pas je l'ai laisser faire toute la journer je suis arriver le soir il y était encore je voudrais le rénitialiser
<qwebirc33043> bonjour je veux réinstaller ubuntu parce qu'il bogue mais quand je debute linstallation mais le logo disparait pas je l'ai laisser faire toute la journer je suis arriver le soir il y était encore je voudrais le rénitialiser
#ubuntu-qc 2013-11-09
<qwebirc10526> salut à tou(te)s, j'aimerai acheter un PC sans OS, je suis nouvel arrivant au Québec. Y aurait il un magasin ou un site qui permet d'acheter ou de se monter son propre PC sans OS ??
<qwebirc10526> merci de votre réponse !
<qwebirc10526> ps : je suis actuellement à Montréal :)
<Ankman> hmm...
<Ankman> je pense il coute plus cher d'acheter un PC "customized"
<Ankman> laptop, dektop?
<Ankman> sorry for my bad french. am not born here
<qwebirc10526> no probleme i can speak english
<qwebirc10526> but i m afraid it may be wors than your french :)
<qwebirc10526> it would be a desktop PC, maybe a mini-pc
<Ankman> but no rasperry?
<qwebirc10526> i don't know but i m looking for a place where you can make and / or custumize your own pc
<Ankman> one with keyboard, may be monitor
<qwebirc10526> no raspberry ;)
<Ankman> ok
<Ankman> where are you from?
<qwebirc10526> I'm from france, but i live in Montreal since 3 weeks, and i'll stay permanently
<Ankman> anyway, there are three big retailers. one dumber than the other. futureshop, bestbuy and staples
<Ankman> staples you might know from france
<Ankman> called "buereau en gros" here because they rename everthing french. not even people in france do this
<qwebirc10526> ha ok... I know FShop (not very great :( ) and i heard about BBuy... i ll try staples
<Ankman> you probably get cheaper PCs there. then delete windows or split the hard drive and install linux
<Ankman> Best Buy worse than futureshop
<qwebirc10526> yep... :(
<qwebirc10526> what a shame
<Ankman> staples is probably the best of the three
<Ankman> then there are online retailers. http://www.tigerdirect.ca for example
<qwebirc10526> we have to pay for a product that we won't use (windows :( )
<Ankman> yes, but because thePCs are often very cheap it's still cheaper than customizing your own computer
<Ankman> of course hardware on these cheap PCs is cheap (budget class usually)
<Ankman> if you want good hardware you have to customize yourself
<Ankman> there is another channel here. may be there are more people who know stores here where you can do this
<qwebirc10526> thancks for your answers !
<qwebirc10526> first time in this IRC
<Ankman> can you see the invitation?
<qwebirc10526> no x_x
<Ankman> if not type "/join #linux-quebec"
<Ankman> oh, it's empty there too
<qwebirc10526> where u from ?
<Ankman> germany
<Ankman> am here since almost 10 years now
<Ankman> was a few months in france before i came here
<qwebirc10526> Ok ! nice in Montréal ?
<qwebirc10526> sorry don't spragen zi deutsc X_o
<Ankman> no problem
<Ankman> didn't speak german myself since a long time
<Ankman> usually you get away with english everywhere. also some quebecois don't like that
<qwebirc10526> even if i come frome France, i can understand that ... historically ... I need to practice my english... thancks for your support :D I'd like to find a GNU/Linux group (IRL) Thancks IXQuick i got some unswers :) did you join one ?
<qwebirc10526> tigerdirect.ca is only in english... :( i'll send a message to the webmaster :B
<Ankman> eh, should be french too
<Ankman> oh, cannot find it
<qwebirc10526> neither do I :(
<qwebirc10526> your distrib is ubuntu ?
<Ankman> don't buy there then
<Ankman> i had. now debian
<Ankman> first i used here was mandriva
<Ankman> bought a french magazine on Rue St. Catherine here with a CD on it
<qwebirc10526> under debian7.0 testing to :p with some packages under sid :D
<Ankman> then i had ubuntu on my server
<Ankman> same here
<Ankman> testing and some sid in it
<Ankman> say do you have thunderbird (icedove) with enigmail installed?
<Ankman> there is currently a dependency problem since weeks
<qwebirc10526> yes icedove with pgp :)
<qwebirc10526> ho ??
<Ankman> and i fear they gave up on enigmail
<Ankman> it might depend on the spanish version i also have installed. put all on hold not to lose enigmail
<qwebirc10526> i ve got enigmail 1.6 and can send crypt and signed messages
<qwebirc10526> arf did you try to remove spanish packages ?
<Ankman> no
<Ankman> the main icedove package is also listed
<qwebirc10526> it's a stable version of enigmail ?
<qwebirc10526> or icedove
<Ankman> i guess so
<Ankman> 10.0.12-1
<qwebirc10526> strange... my policy : icedove: Installé : 17.0.9-2 Candidat : 17.0.9-2
<qwebirc10526> did you post your probleme on a forum ?
<Ankman> not yet
<qwebirc10526> mmmmmm I'd like to read it if you don't matter
<qwebirc10526> (when you'll post it)
<Ankman> i usually post in german usenet groups
<qwebirc10526> arf ok ^^
<Ankman> but this issue is not important. i use mutt as my main mailer
<qwebirc10526> ha ok ^^
<Ankman> enigmail here is 2:1.4.1-2
<Ankman> trying to get more people in here which might be able to help you
<Ankman> http://ncix.com might help too. but no french page either. they are from the USA :-)
<Ankman> and may be http://microbytes.com having french page and local stores in montreal
<qwebirc10526> thancks that great ! i'll go to see there... if you're in the mood of posting in french : https://www.debian-fr.org/support-debian.html
<qwebirc10526> :D
<Ankman> and http://comments.gmane.org/gmane.comp.mozilla.enigmail.general/17989 for my icedove problem
<Ankman> known problem. they gave up on enigmail;l it seems
<Ankman> ah
<Ankman> thunderbird's enigmail got fixed. might just be a matter of time until icedove is also fixed
<qwebirc10526> Oh ?
<Ankman> so at ubuntu you don't have this problem
<qwebirc10526> no of corse :D
<Ankman> yes, all in the page i posted above
<qwebirc10526> ubuntu is patched to be very stable
<qwebirc10526> even his "testing" is very stable !
<Ankman> ok
<Ankman> how long are you in montreal? and where are you from in france if i may ask?
<qwebirc10526> after, those who want to learn GNU / Linux will love to have "surprises" every update is a mystake... :) It's a choice
<qwebirc10526> I'm from Paris
<qwebirc10526> I'm a resident, permanentl
<qwebirc10526> so i can stay here all my life if i want :)
<qwebirc10526> young resident... who is looking for a job :D
<qwebirc10526> what about U ?
<Ankman> cool
<Ankman> from mannheim in germany
<qwebirc10526> I'll have to leave :)
<qwebirc10526> Have a nice day and hope that yoour probleme will be solved
<qwebirc10526> thancks for your answers !
#ubuntu-qc 2014-11-03
<BaieSurfee> bonjours /all
#ubuntu-qc 2014-11-08
<dagnachew> allo tlm
<qwebirc12296> Bonjour
<qwebirc12296> Je suis nouveau sur ce site; il y a-t-il quelqu'un qui peut me renseigner?
<qwebirc12296> Je me préparer à former des aînés à l'informatique et je me questionne sur "UBANTU".
<Ankman> ubantu?
#ubuntu-qc 2017-11-09
<qwebirc61361> do you speaks french?
<qwebirc61361> j'ai une seule question: ou on peut avoir un ou des cours pour ce familiariser avec ubuntu a quebec ville c'est ma seule question,merci
<qwebirc61361> adresse courielle :[email protected]
<Ankman> french, english
<Ankman> german
<Ankman> je sais pas des courses en quebec-city
#ubuntu-qc 2017-11-10
<beaver> les utilisateurs, ils viennent sur le fr ^^
<cyphermox> beaver: c'est bien.
<beaver> du coup, c'est quoi le but ?.
<beaver> désolé, le vendredi, toussa, bonne continuation les ami(e)s
#ubuntu-qc 2019-11-06
<be49> salut comment utilliser tor sur ubuntustudio lowlatency sil vous plais merci
<be49> dans insstall aplication ca sinstall mais ca ce lance pas , en insttallant dans un terminal pareil !
|
# matchPath
Re-exported from core [`matchPath`](../../../react-router/docs/api/matchPath.md)
|
MSiMass list: a public database of identifications for protein MALDI MS imaging.
The clinical application of mass spectrometry imaging has developed into a sizable subdiscipline of proteomics and metabolomics because its seamless integration with pathology enables biomarkers and biomarker profiles to be determined that can aid patient and disease stratification (diagnosis, prognosis, and response to therapy). Confident identification of the discriminating peaks remains a challenge owing to the presence of nontryptic protein fragments, large mass-to-charge ratio ions that are not efficiently fragmented via tandem mass spectrometry or a high density of isobaric species. A public database of identifications has been initiated to aid the clinical development and implementation of mass spectrometry imaging. The MSiMass list database ( www.maldi-msi.org/mass ) enables users to assign identities to the peaks observed in their experiments and provides the methods by which the identifications were obtained. In contrast with existing protein databases, this list is designed as a community effort without a formal review panel. In this concept, authors can freely enter data and can comment on existing entries. In such, the database itself is an experiment on sharing knowledge, and its ability to rapidly provide quality data will be evaluated in the future. |