text
stringlengths 8
5.77M
|
---|
An evolutionary computing approach for parameter estimation investigation of a model for cholera.
We consider the problem of using time-series data to inform a corresponding deterministic model and introduce the concept of genetic algorithms (GA) as a tool for parameter estimation, providing instructions for an implementation of the method that does not require access to special toolboxes or software. We give as an example a model for cholera, a disease for which there is much mechanistic uncertainty in the literature. We use GA to find parameter sets using available time-series data from the introduction of cholera in Haiti and we discuss the value of comparing multiple parameter sets with similar performances in describing the data.
|
Impacts of Lipase Enzyme on the Surface Properties of Marine Aerosols.
Triacylglycerol lipases have recently been shown to be transferred from the ocean to the atmosphere in atmospheric sea spray aerosol (SSA). Lipases have the potential to alter the composition of SSA; however, the structure and properties of enzymes in the high salt, high ionic strength, and low pH conditions found in SSA have never been explored. Here, we study the dynamics of Burkholderia cepacia triacylglycerol lipase (BCL) at SSA model surfaces comprised of palmitic acid and dipalmitoylphosphatidic acid (DPPA), two commonly found lipids at SSA surfaces. Surface adsorption Langmuir isotherm experiments and all-atom explicit solvent molecular dynamics simulations together illuminate how and why BCL expands the ordering of lipids at palmitic acid surfaces the most at pH < 4 and the least in DPPA surfaces at pH 6. Taken together, these results represent a first glimpse into the complex interplay between lipid surface structure and protein dynamics within enzyme-containing aerosols.
|
1 - (-6)/10). Sort k, 1, 5 in descending order.
5, k, 1
Let s be (-4)/(-2 - 6/3). Put s, -2, -1 in ascending order.
-2, -1, s
Suppose -4 = 5*q + p + p, 3*p + 6 = -5*q. Sort -4, -1, q in decreasing order.
q, -1, -4
Let t(a) = -a**2 + 4*a + 1. Let z be t(5). Let l be 0 + 4 + (z - -3). Suppose -5*f - 15 = 5*o, -2*f - f = 12. Sort o, l, -3 in descending order.
l, o, -3
Let d = 5 - 1. Let y be (-2)/d - 10/(-4). Suppose -3 = -y*i + 1. Sort i, 4, 1 in descending order.
4, i, 1
Let n = 0.08 - 4.08. Put n, 2, -3 in increasing order.
n, -3, 2
Let q = 13 + -13. Sort -4, -0.2, q, -2 in decreasing order.
q, -0.2, -2, -4
Let w(u) be the first derivative of -u**4/4 - u**3 + u**2/2 + 3*u - 1. Let t be w(-3). Suppose 4*j = -0*j + 8. Put -4, t, j in increasing order.
-4, t, j
Let a = -3.2 + 2.8. Put -0.7, a, -1 in ascending order.
-1, -0.7, a
Let x = -0.08 + 2.08. Let d = 1 + x. Let o = -64 + 194/3. Sort d, o, -3 in descending order.
d, o, -3
Let i = 0.06 - 0. Let g = -5.06 + i. Let k = 3 - 3.2. Put k, 1/2, g in increasing order.
g, k, 1/2
Suppose 0 = -5*g - 2*t - 9, -6 - 3 = 3*g + 3*t. Put 5, g, -18, -4 in decreasing order.
5, g, -4, -18
Suppose 0 = 55*m - 58*m + 3. Sort 3, -5, m, -1 in decreasing order.
3, m, -1, -5
Suppose 0 = 4*o - m - 5 - 7, 2*o - m - 8 = 0. Suppose -2*n + 11 = -3*p, -3*n + o*p = -3 - 16. Let u be 33/(-7) + (-2)/n. Put 5, u, 4 in ascending order.
u, 4, 5
Suppose 7*k - 4 = 11*k. Sort 2/11, 1/6, k in ascending order.
k, 1/6, 2/11
Let f = 1.2 - -3.8. Let b = -660/7 - -94. Let v be -1*96/42 - 2/(-7). Sort f, b, v in descending order.
f, b, v
Let q be (4/8 - 1)*2. Let x(k) = 6*k - 1. Let z be x(-1). Sort q, z, -2 in increasing order.
z, -2, q
Let q = 0.02 - 0.42. Let j = 3.5 - 3.5. Suppose -3*v = -0*v - 5*f - 4, -6 = 2*v + f. Sort q, j, v in descending order.
j, q, v
Let z = 0.01 + -4.01. Sort 3, z, 0.2.
z, 0.2, 3
Suppose 4*m + 1 = -3. Sort -3, m, -5, 1/6.
-5, -3, m, 1/6
Suppose -5*f = -2*r + 16, -r - 10 = 2*f - 0*f. Let z(b) = 5*b - 1. Let u be z(1). Sort u, f, -1 in increasing order.
f, -1, u
Let t be 5/(-30) + 2/(-12). Sort -2, t, 4.
-2, t, 4
Let v(y) = 2*y - 2*y - 1 - 3*y. Let h be v(-3). Let g = h - 12. Sort 5, -2, g in decreasing order.
5, -2, g
Let y be -5*(-3)/9*3. Let g = 0 + -0.5. Put -1, y, g in descending order.
y, g, -1
Let z = -4/189 - -494/5481. Sort 2/15, z, 3 in ascending order.
z, 2/15, 3
Let o(w) = 7*w - 2. Let r be o(2). Let b be (r/16)/((-3)/(-12)). Suppose -5*d + 2*c = -d, -3*d = 3*c + 9. Put b, d, -3 in decreasing order.
b, d, -3
Let c be (-15)/5 + -1 + 6. Put c, -2, -1 in descending order.
c, -1, -2
Let o be (3/12 - 0)*4 - 1. Sort o, 2, -1/3.
-1/3, o, 2
Let v(x) = -x**2 - 8*x + 10. Let p(m) = -m - 18. Let i be p(-9). Let b be v(i). Put -1, b, 10 in increasing order.
-1, b, 10
Suppose -1 - 5 = 3*h. Let w = h + -3. Let m = 6 - 3. Sort w, -3, m.
w, -3, m
Let x(k) = k**3 + 6*k**2 + 5*k - 4. Suppose -2 = -c - 6. Let n be x(c). Suppose 0 = 5*s - 33 + n. Put -5/6, -1/10, s in ascending order.
-5/6, -1/10, s
Let k be (6/10)/(12/(-60)). Let w = -10 - -5. Put -2/5, w, k in descending order.
-2/5, k, w
Suppose 0 = -w + 4, -4*p + 3*w - 1 - 7 = 0. Put -5, 6, p in descending order.
6, p, -5
Suppose 4*m + 2*y - 20 = 0, -2*m = 3*m + 4*y - 28. Let t(a) = -a - 4. Let x be t(-3). Suppose -v - 4*v - 25 = 0. Sort v, m, x.
v, x, m
Let i = -2.06 + 0.06. Let m = 1.2 + -0.2. Let n = i + m. Put -1/4, 2/13, n in ascending order.
n, -1/4, 2/13
Let u = -22 - -40. Let v = -14 + u. Put -0.2, v, -5 in ascending order.
-5, -0.2, v
Let k = 0.16 + 3.24. Let a = k + -3. Suppose -3*i + 21 = -4*r, 3 = 4*i - 3*i. Sort a, 3/2, r in decreasing order.
3/2, a, r
Let g = 6 - 9. Let y = g - -3.4. Sort -2, y, 3 in decreasing order.
3, y, -2
Let i = -6 - -8. Let c be 0*(-3)/(8 + 1). Sort 0.4, i, c in descending order.
i, 0.4, c
Let d be 2 + 1 - (-2)/(-2). Put d, 0.5, 1 in decreasing order.
d, 1, 0.5
Let j = -11 + 5. Let d = -11 + 22. Let f = j + d. Sort f, 2/17, -2/13 in descending order.
f, 2/17, -2/13
Let r(f) = -1 - 5 + 5 - 2*f. Let d be r(1). Sort -2, d, -5 in increasing order.
-5, d, -2
Suppose 4*x + 20 = 0, -5*g + 2*x + x + 10 = 0. Suppose 5*s - 2*m = -7*m, 0 = 5*s - m + 24. Sort s, 2, g in descending order.
2, g, s
Let d = -2 + 5. Suppose -k = -2 + d. Put k, -3, -5 in decreasing order.
k, -3, -5
Let s = 99.2 - 99. Put -2/3, -0.8, s in decreasing order.
s, -2/3, -0.8
Let k = -22 - -12. Let g = -14 - k. Put -3, g, 1 in descending order.
1, -3, g
Let f be (-2)/(-4)*(0 + 0)/2. Sort 2, -2, f, -3 in descending order.
2, f, -2, -3
Let c(b) = -b**3 - 5*b**2 + b + 2. Let n be c(-5). Put 5, n, 1 in ascending order.
n, 1, 5
Suppose 5*j - 12 = 2*j. Suppose 0 = -3*k + r, -j*k = -3*r - 2*r. Put 1, k, 3 in decreasing order.
3, 1, k
Let a be 355/(-10)*(-2)/(-3). Let n = -23 - a. Suppose 2*f + 2*f + 8 = 0. Sort f, n, -1.
f, -1, n
Suppose -m + 10*m = m. Sort m, -14, -5 in descending order.
m, -5, -14
Let z = 184 + -188.14. Let d = z + 0.14. Let u = 147/20 - 38/5. Put -0.5, u, d in increasing order.
d, -0.5, u
Suppose 6 = -4*v + 2*v. Suppose 4*t + j - 6*j = -9, 0 = 5*t - 2*j - 10. Sort v, t, -4 in decreasing order.
t, v, -4
Let b = 2.058 - 0.058. Put b, -4/7, -20 in descending order.
b, -4/7, -20
Suppose 5*j + 3*g + 2*g = -40, -4*g + 45 = -3*j. Let r be 2 - (1 - 2)*j. Let t = r + 8. Put t, 4, -5 in descending order.
4, t, -5
Let l = 0.05 + 0.1. Let i = l - -5.85. Let z = i - 2. Sort z, 0, 1 in descending order.
z, 1, 0
Let t = -0.044 + 0.001. Let j = t + -3.857. Let l = j + -0.1. Put l, -0.4, 3 in increasing order.
l, -0.4, 3
Let m = 81 - 83. Suppose -2*l + 12 = 5*a, 5*a - 15 = -5*l - 0*a. Sort l, m, -0.4 in ascending order.
m, -0.4, l
Let k = 1/6 + -2/3. Let n = 0.09 - 3.09. Sort 0.5, n, k.
n, k, 0.5
Let c = -44 + 36. Put c, 3, -4 in increasing order.
c, -4, 3
Let d = -3.285 + -0.075. Let c = d - 0.74. Let u = c + 4. Sort 0, u, 4 in descending order.
4, 0, u
Let s = 0 - 0.3. Let h = s - 0.5. Let t = h - -0.4. Sort 2, -2/3, t in increasing order.
-2/3, t, 2
Let f = -25 - -26. Sort f, 4, -1 in ascending order.
-1, f, 4
Let q(m) = m**2 + 0*m**2 + 0*m**2. Let v be q(0). Put v, -2, -12 in decreasing order.
v, -2, -12
Let x be 4/(-14) - 18/(-14). Let p be (9 - 8)*0/(-2). Let u = x - p. Sort -5, u, -4 in decreasing order.
u, -4, -5
Suppose 15 = -s - 4*s + 3*d, 5*d + 9 = -3*s. Sort s, 2, 0 in ascending order.
s, 0, 2
Let h(u) = u**2 + 4*u. Let f(a) = a**2 + a. Let w(v) = -4*f(v) + h(v). Let y be w(1). Let c = 0 - y. Sort c, -5, -4 in decreasing order.
c, -4, -5
Let c = 2 + -18. Let x = c + 5. Let l = x - -6. Sort 0.5, l, 5 in increasing order.
l, 0.5, 5
Let f(v) = v**2 + 4*v + 4. Let d be f(-4). Let k be (60/(-18))/(4/(-6)). Suppose -s + 2*s = -k. Sort 0, s, d in decreasing order.
d, 0, s
Let l(m) = -m**2 + 6. Let h be l(-6). Let b be ((-2)/5)/(6/h). Let d be (0/(b/(-2)))/2. Sort 3, d, -1 in descending order.
3, d, -1
Let b = 477 - 145. Let g = b - 4318/13. Let m = 2 + -1. Put m, -5, g in decreasing order.
m, g, -5
Let j = 3.8 + -4.1. Let w(r) = r**3 + 5*r**2 + 5*r + 5. Let g = -6 - -2. Let s be w(g). Put j, 2, s in descending order.
2, s, j
Suppose 2*t - 18 = -t + 3*y, -2*t + 16 = -3*y. Let o be (t - 3) + 1 + -1. Let w be o/(((-21)/3)/(-1)). Put w, 0.2, -2 in ascending order.
-2, w, 0.2
Let s = 0.6 + -4.6. Put s, 0.1, -5 in ascending order.
-5, s, 0.1
Let d = 11 - 7. Let f(m) = m**3 - 5*m**2 + 5*m - 3. Let o be f(d). Sort o, -1, 5 in increasing order.
-1, o, 5
Let q = -6 + 5.7. Suppose 0 = -43*t + 42*t. Put -4, t, q in descending order.
t, q, -4
Let d(u) = 3*u**3 - 2*u + 1. Let b be d(1). Sort b, -2, 4, 1 in descending order.
4, b, 1, -2
Let a = 98 + -100. Sort -1/2, -1/4, a, -0.07 in decreasing order.
-0.07, -1/4, -1/2, a
Let l(r) = r + 3. Let n be l(-3). Suppose n = -3*u - 0*u + 18. Suppose u = -g + 2. Put 0, g, 5 in decreasing order.
5, 0, g
Let x = -33 - -35. Sort -31, 1, x in decreasing order.
x, 1, -31
Let b be (2 - 3)*(-2 - -1). Let s = b - 1. Suppose -5*j + 2 = 3*h, 0*j + 4*h + 1 = -3*j. Sort -1, s, j in decreasing order.
j, s, -1
Let t = -1104/145 - -2/145. Let x = t + 36/5. Sort 2, 3, x.
x, 2, 3
Suppose 5*l + 53 + 22 = -3*p, -56 = 3*l + 4*p. Let w(a) = a + 16. Let h be w(l). Suppose -9 = -5*j + 6, 4*g + 4*j + 8 = 0. Sort -3, g, h.
g, -3, h
Suppose -19 = -2*f - 3*f - 2*c
|
Excellent! Homer Simpson takes it upon himself to play matchmaker when Waylon Smithers comes out as gay in The Simpsons‘ Sunday, April 3, episode.
The venerable Fox series’ new episode centers on the Springfield Nuclear Power Plant’s executive assistant coming out as gay to his boss, Mr. Burns, who rebuffs his advances. Homer nobly takes it upon himself to help his coworker find Mr. Right.
“Can I get you a Tom Collins?” Homer (voiced by Dan Castellaneta) offers Smithers (Harry Shearer) in a sneak-peek clip. As it turns out, the lovable family man is referring not to the cocktail but to an actual guy by that name.
“I see what’s going on here,” Smithers replies. “Fix up your boss so he won’t be so hard on you. Well, nice try!”
Sunday’s season 27 episode is highly anticipated among the Emmy-winning series’ fans. Previous episodes have suggested that the purple bow tie–loving character is gay, and he has had numerous fantasies about Mr. Burns, although Smithers has remained in the closet until now.
The episode’s writer, Rob LaZebnik, told the New York Post that the idea for the episode came to him several years ago as a show of support for his 21-year-old son, Johnny, who is gay.
“I am a Midwestern guy, so I don’t tend to wear my emotions on my sleeve, but I thought, What better way to tell my son I love him than to write a cartoon about it?” Rob said.
Watch the clip in the video above to see a cameo by a TV icon, who is also a gay-rights activist.
The Simpsons airs on Fox on Sundays at 8 p.m. ET.
|
Virgin Galactic Should Add a “50-Mile High Club” to Rocket Ship Flights
FOR IMMEDIATE RELEASE
Air Force Amy – a U.S. Air Force veteran, star of HBO’s “Cathouse” TV series, and legal sex provider at the world-famous Moonlite Bunny Ranch brothel in Nevada – announced today that she’s ready, willing and able to share her “out of this world” talents on Richard Branson’s Virgin Galactic rocket ship flights once commercial space tourism finally gets off the ground.
I’m already a longtime Charter Member of the Mile-High Club,” Amy noted, referencing the unofficial guild of individuals who have engaged in sexual activity on an airplane. “Who better to take that experience to a whole new level 50 miles off the ground?”
Virgin Galactic’s VSS Unity reached space altitude for the first time during a test flight over California earlier this month; a big step toward fulfilling Branson’s dream of ferrying civilian tourists into outer space and back.
“That’s music to my ears,” Amy replied. “Nobody has more experience conquering virgin territory than me!”
More than 600 people have already signed up for rides in the six-passenger rocket ship for fees of up to $250,000.
“It’s hard to imagine anything more exciting than space travel for the average person,” Amy said. “But that’s only because they haven’t thought about taking me with them. I guarantee they won’t be thinking about Mission Control. Instead, they’ll be focusing on Missionary Position Control!”
Amy acknowledged there might be some legal issues involved with adding her services as an upsell on space voyages, as sex-for-fee services are only legal in certain parts of Nevada and “out-dates” to other states are prohibited.
“I understand that interstate commerce laws against sex-for-fee services could be a challenge,” Amy said. “But what we’re talking about here is inter-planetary commerce. I’m not sure what governing body would have jurisdiction. Maybe the United Federation of Planets? Anybody got Bill Shatner’s number?”
Amy noted that commercial airlines offer various upgrade options, especially the option to fly first-class, and believes offering a sex-included option with a professional courtesan would be a valuable add-on for some of the affluent customers who Virgin Galactic is seeking to attract.
“Sir Richard is well-known as a risk-taking entrepreneur and world-class marketer who strives to provide luxury services that are out of this world,” Amy continued. “So adding a clothes-less experience to the weightless experience seems like a natural fit. And it’s a simple ‘want fries with that’ question for ticketing agents.”
Amy added that she might even be able to provide passengers the “ultimate” sex-in-space fantasy adventure.
“Some of my co-workers might be up for this, as well,” Amy concluded. “So I’m already thinking of offering an ‘Orgy in Orbit’ special. It sure as heck won’t be cheap, but it will absolutely be priceless!”
|
// Copyright (c) 2014 The Chromium Embedded Framework Authors. All rights
// reserved. Use of this source code is governed by a BSD-style license that
// can be found in the LICENSE file.
#include "CefCallback_N.h"
#include "include/cef_callback.h"
#include "jni_scoped_helpers.h"
namespace {
CefRefPtr<CefCallback> GetSelf(jlong self) {
return reinterpret_cast<CefCallback*>(self);
}
void ClearSelf(JNIEnv* env, jobject obj) {
// Clear the reference added in ResourceHandler.
SetCefForJNIObject<CefCallback>(env, obj, NULL, "CefCallback");
}
} // namespace
JNIEXPORT void JNICALL
Java_org_cef_callback_CefCallback_1N_N_1Continue(JNIEnv* env,
jobject obj,
jlong self) {
CefRefPtr<CefCallback> callback = GetSelf(self);
if (!callback)
return;
callback->Continue();
ClearSelf(env, obj);
}
JNIEXPORT void JNICALL
Java_org_cef_callback_CefCallback_1N_N_1Cancel(JNIEnv* env,
jobject obj,
jlong self) {
CefRefPtr<CefCallback> callback = GetSelf(self);
if (!callback)
return;
callback->Cancel();
ClearSelf(env, obj);
}
|
Eletrônica
Primeira escrita e leitura digital em moléculas sintéticas
Redação do Site Inovação Tecnológica - 19/10/2017
É um passo importante rumo ao armazenamento de dados em escala molecular.
[Imagem: Jean-François Lutz, Institut Charles Sadron (CNRS).]
Dados em polímeros
Usando a bem conhecida técnica de espectrometria de massas, químicos conseguiram pela primeira vez ler vários bytes de dados digitais gravados em escala molecular.
Abdelaziz Al Ouahabi e seus colegas do Centro Nacional de Pesquisas Científicas da França (CNRS) usaram polímeros sintéticos, que são mais estáveis e mais simples de trabalhar do que moléculas naturais, como o DNA, também muito cotado para armazenamento de dados pela eletrônica molecular.
Os bits são gravados em elementos do polímero conhecidos como monômeros, que ocupam um espaço 100 vezes menor do que os bits dos discos rígidos atuais.
Os polímeros são formados por dois tipos de monômeros, com grupos fosfato correspondentes a 0 e 1. Após cada conjunto de oito desses bits - um byte - foi adicionado um separador molecular. O primeiro passo na leitura da informação é dividir o polímero em bytes, identificando os separadores; a seguir, as ligações fosfato são quebradas para o sequenciamento de cada byte.
A equipe conseguiu sintetizar polímeros capazes de armazenar até oito bytes. Com isto, eles conseguiram gravar a palavra "Sequência" em código ASCII, que atribui um byte exclusivo a cada letra e marca de pontuação.
Como ainda não existe equipamento adequado para a tarefa, a decodificação dos sinais lidos por espectrometria foi feita manualmente, o que levou várias horas. Mas a equipe se apressa em esclarecer que um software adequado faria a mesma interpretação dos dados em poucos milissegundos.
Bibliografia:
Artigo: Mass spectrometry sequencing of long digital polymers facilitated by programmed inter-byte fragmentation.
Autores: Abdelaziz Al Ouahabi, Jean-Arthur Amalian, Laurence Charles, Jean-François Lutz
Revista: Nature Communications
Vol.: 8, Article number: 967
DOI: 10.1038/s41467-017-01104-3
Outras notícias sobre:
Mais tópicos
|
“While we’ve all started to feel like the European crisis is over, there are clearly many aspects of it that can easily reappear,” O’Neill, 55, said Thursday in a Bloomberg Radio interview with Carol Massar. The corruption allegation in Spain isn’t “just noise, it’s news,” and the re-emergence of Berlusconi, the former premier who vowed to undo some policies of successor Mario Monti, wasn’t anticipated, O’Neill said.
Political events may weigh on perceptions of the euro, O’Neill said. Investors should sell Italian bonds before the election later this month as Berlusconi’s resurgence may push 10-year yields to 5 percent, analysts at Royal Bank of Scotland Group Plc said Wednesday in a note. Rajoy’s effort to rebut graft allegations adds to the risk of holding Spanish government debt, Andrew Bosomworth, a managing director at Pacific Investment Management Co., said earlier this week.
The European Central Bank today left interest rates unchanged at a record low of 0.75 percent. The euro’s gains could thwart a recovery by curbing exports and pushing inflation too low.
“It’s certainly become very fashionable to be super bullish on the euro,” said O’Neill, who’s retiring this year as chairman of Goldman Sachs’s asset-management division. “But I’m not sure it’s so smart now.”
The euro weakened 0.9 percent to $1.3398 at 3:39 p.m. in New York, after touching a 14-month high last week.
O’Neill formed the BRIC investing strategy, binding Brazil to Russia, India and China, following the Sept. 11 terrorist attacks to reflect the waning influence of the U.S. on the world’s economy. The theory became central to Goldman Sachs’s economic outlook.
In Thursday’s interview, O’Neill described China’s ability to control a housing bubble and its shift to a more consumer-focused economy as “really impressive.”
“It’s pretty clear that the Chinese leadership is very good at worrying about all the things that everybody else worries about, but faster and quicker than we do,” he said. “They stopped the housing bubble, I’ve never seen that happen in a big country ever in my career.”
O’Neill, who’s based in London, said he plans to take time to think about what he’ll do after retiring and that he doesn’t know whether he would consider entering politics.
|
Microsurgical aspects of the treatment of azoospermia. The BMFT Study Group for Microsurgery.
Technical advances in microsurgery have produced a calculable success rate for reconstructive surgery in cases of obstructive azoospermia. Nevertheless, in standardized vasovasostomy and tubulovasostomy, the different outcomes for patency and pregnancy indicate that further comprehensive clinical and basic scientific studies are required to improve the results of surgery. The aspiration of epididymal and testicular spermatozoa in combination with intra-cytoplasmic sperm injection (ICSI) is one example of a fruitful integration of microsurgery into new areas of reproductive medicine. Where there is ejaculatory duct obstruction, the continuity with the posterior urethra can be restored by a transurethral operation.
|
News
Free webinar: Planting the Seeds of Healthy Eating through School Gardens
Interest in schools gardens is on the rise nationally and here in Montana. School gardens provide an experiential classroom for endeavors across the curriculum while supporting healthy eating and nutrition among school children. Through this webinar learn about some basic steps in creating a school garden, ideas for connecting the school garden to the cafeteria, and some exciting garden-based learning curriculum resources. Case study examples of Montana-grown school garden projects will be shared throughout the webinar. The Montana Rural Health Initiative and this webinar is brought to you by: Montana Rural Health, Montana State University, Schering-Plough, and Blue Cross Blue Shield of Montana.
Robin Vogler – School Food Service Director, Somers Lakeside School District #29
If you are unable to attend the live session, this webinar will be recorded and posted online to view at your convenience. Please contact Carolyn Pollari to receive the link. For connection details or any other questions, please contact:
About Post Author
As a parent, nutrition professional and a longtime member of the Bozeman community, Sam is deeply committed to Gallatin Valley Farm to School, which brings together all of her passions. “It’s preventative health, food system reform and community economic development – all in one tidy package,” she says.
|
/*
TestLink Open Source Project - http://testlink.sourceforge.net/
@filesource: tl_ckeditor_config.js
Configure CKEditor
See: http://docs.cksource.com/ for more information
List of all config parameters that can be set here can be found on:
http://docs.cksource.com/Main_Page
*/
CKEDITOR.editorConfig = function( config )
{
// choose your prefered ckedtior skin
// available skins for version 4.x: moono-lisa => default
// For skins present on version 3.x => http://ckeditor.com/addons/skins/all
config.skin = 'moonocolor';
// set css of ckeditor content to testlink.css
config.contentsCss = fRoot + '/gui/themes/default/css/testlink.css';
// do not check "Replace actual contents" checkbox as default
config.templates_replaceContent = false;
// default Toolbar
config.toolbar_Testlink =
[
['Source','Templates','SpellChecker','Find','Undo','Redo','-',
'NumberedList','BulletedList','-',
'JustifyLeft','JustifyCenter','JustifyRight','JustifyBlock','-',
'Outdent','Indent','-',
'Table','HorizontalRule',],
'/',
['Format','Bold','Italic','Underline','Strike','-',
'Subscript','Superscript','-','TextColor','BGColor','RemoveFormat','-',
'Link','Image','Anchor','SpecialChar']
];
// mini Toolbar
config.toolbar_TestlinkMini =
[
['NumberedList','BulletedList','-',
'JustifyLeft','JustifyCenter','JustifyRight','-',
'Bold','Italic','TextColor','-',
'Link','Image','Table']
];
// Toolbar with all available features - can be used as template for custom toolbars
// '-' creates toolbar seperator
// '/' creates a new toolbar "line"
// [...] defines sub-toolbars
config.toolbar_Full =
[
['Source','-','Save','NewPage','Preview','-','Templates'],
['Cut','Copy','Paste','PasteText','PasteFromWord','-','Print', 'SpellChecker', 'Scayt'],
['Undo','Redo','-','Find','Replace','-','SelectAll','RemoveFormat'],
['Form', 'Checkbox', 'Radio', 'TextField', 'Textarea', 'Select', 'Button', 'ImageButton', 'HiddenField'],
'/',
['Bold','Italic','Underline','Strike','-','Subscript','Superscript'],
['NumberedList','BulletedList','-','Outdent','Indent','Blockquote','CreateDiv'],
['JustifyLeft','JustifyCenter','JustifyRight','JustifyBlock'],
['BidiLtr', 'BidiRtl' ],
['Link','Unlink','Anchor'],
['Image','Flash','Table','HorizontalRule','Smiley','SpecialChar','PageBreak'],
'/',
['Styles','Format','Font','FontSize'],
['TextColor','BGColor'],
['Maximize','ShowBlocks','-','About']
];
/* Configuration of File Browser
You can use theses definitions if you buy ckfinder
more informations on http://ckfinder.com/
download ckfinder and put into third party folder
*/
//config.filebrowserBrowseUrl = '/third_party/ckfinder/ckfinder.html';
//config.filebrowserImageBrowseUrl = '/third_party/ckfinder/ckfinder.html?Type=Images';
//config.filebrowserFlashBrowseUrl = '/third_party/ckfinder/ckfinder.html?Type=Flash';
// uncomment these lines only if you want to allow quick upload
//config.filebrowserUploadUrl = '/third_party/ckfinder/core/connector/php/connector.php?command=QuickUpload&type=Files';
//config.filebrowserImageUploadUrl = '/third_party/ckfinder/core/connector/php/connector.php?command=QuickUpload&type=Images';
//config.filebrowserFlashUploadUrl = '/third_party/ckfinder/core/connector/php/connector.php?command=QuickUpload&type=Flash';
}
|
Assam: Around 40 lakh people, Mostly Muslims may Be Deported if Citizenship unproved
Around 40 lakh people in Assam have been left out of a draft list of citizens released today, and are liable to face deportation if they are unable to prove their citizenship.
The state’s National Register of Citizens or NRC has been updated for the first time since 1951 to account for illegal migration from neighbouring Bangladesh.
Releasing the updated list, officials underscored that no one would be deported or arrested as this is only a draft.
The recount is seen by critics as a move to target Assam’s Muslim population on the pretext of weeding out Bangladeshi migrants. Thousands of central forces are in the state to prevent any unrest over the new list.
“Some people are unnecessarily trying to create an atmosphere of fear… This is a draft and not the final list,” Home Minister Rajnath Singh had recently stated.
According to the United Nations refugee agency, an estimated 10 million people worldwide are stateless, including three million officially, a status that deprives them of an identity, rights, and often jobs.
If the numbers from the National Register of Citizens (NRC) hold, this scenario could change. Assam’s stateless population then could constitute almost one third of the whole world’s stateless population.
|
be ((-3)/6)/(2/(-40)). Let n = o - 6. Suppose 3*y + 4*v = n + 21, 2*y + 2*v - 16 = 0. Solve 12 = 2*w + 3*z + z, -w - 3*z = -y for w.
4
Let q(i) = -2*i**2 - 11*i. Let v be q(-5). Solve 7*t - 2*t - 2*u - 20 = 0, v*u + 20 = 5*t for t.
4
Suppose 0 = 8*h - 3*h - 25. Solve -5*v = 4*i, -h*i + 2*v + 33 = -0*v for i.
5
Let y be -2 - 1 - 5/(-1). Solve -3*v = -2*l - y*l - 11, -4*l - 2*v = 26 for l.
-5
Suppose 0*f + 3*f - 15 = 0. Let s = f - 5. Solve s = -3*x - l + 2*l - 6, 0 = -2*x + 3*l + 3 for x.
-3
Let k = -3 - -3. Suppose 0 = -j - f + 2, -5*f + 5 = k. Solve -3*d - 2*x - j = 0, 4*d + 2*x = -0*x for d.
1
Suppose -14*o = -12*o - 10. Solve -a - j + 2 = 0, -3*a - 26 = -0*a - o*j for a.
-2
Let p(l) = 6*l**2 - 1. Let f be p(-1). Suppose -4 = f*v + 6. Let c be -1 - (0 + -2 + v). Solve 6*m + 15 = m + 4*q, 0 = c*m - q + 2 for m.
1
Let n = -7 - -15. Solve 2*a - 4*d + n = 0, 2*a = -d + 5 - 3 for a.
0
Suppose 4 - 18 = -7*b. Suppose 3*k - z - 20 = 0, -b*z - 15 = -4*k - 3*z. Solve -k*o - 15 = 0, 3*n = -0*n + o + 9 for n.
2
Let n = 0 - -4. Let i be -4*(0 + n/(-8)). Solve 4*z - 4*b = 4, i*z - 5 = 6*z + 5*b for z.
0
Let p(d) = 2*d**3 - 33*d**2 - 16*d - 14. Let j be p(17). Solve j*g + o - 2 = 0, 5*g - o + 2*o = 0 for g.
-1
Let t(y) = -y**2 + 3*y + 18. Let g be t(6). Solve g = x - 2*u - u - 14, 0 = 5*u + 15 for x.
5
Let k(c) = -2*c + 2. Let m be k(3). Let g = 9 + m. Solve -4*l + 3*t = -3, -4*l - 40 = g*t - 3 for l.
-3
Suppose 86 + 1 = 3*n. Solve 0 = 4*o + 3*t + n, 0 = -7*o + 4*o + 2*t - 9 for o.
-5
Let l(t) = -t**3 + 3*t**2. Suppose -q + 2*d = -2, 3*q + 2*d = -3 + 9. Let x be l(q). Let j be 2/5 - 189/(-15). Solve -2*f + 5*r = j, -x*r = -8*r + 4 for f.
-4
Let o = 17 + -12. Solve -t = -3*t + 5*x + 10, 5*t = o*x - 5 for t.
-5
Let b = 0 + 0. Solve -c - 13 = -4*d, -5*d = -b*d + 2*c - 13 for d.
3
Suppose 4*p + n + n = 64, 20 = 5*n. Let m = -11 + p. Solve -5*t = -2*i + 35, 0*t - m*t = -2*i + 25 for t.
-5
Let u(n) = -n**3 + 7*n**2 + 7*n + 4. Let v be u(8). Let q(c) = -c**3 - 5*c**2 - 5*c + 4. Let o be q(v). Solve -l - 3*w = -7, 4*l - o = -3*w + 2 for l.
1
Let z(d) = d**3 + 2*d**2 - d - 2. Let h be z(2). Solve -3*v + 23 = 2*g, -5*g - h = -4*v - 3*g for v.
5
Let c = -65 - -73. Solve 0 = -2*k + 5*h + 27, k = 2*h + c + 3 for k.
1
Let s = 50 - 15. Solve 3*y + 4*j = s, 4*j = 3*j + 5 for y.
5
Suppose d + 3 + 3 = -4*s, -2*s = d + 2. Solve 5 = -3*b - 3*c + 2, d*b - 3*c = -7 for b.
-2
Let l(a) = -2*a. Suppose -2*d + 6 - 23 = -5*x, -5*d + 7 = 4*x. Let m be l(d). Suppose m = -g + 5. Solve -2*t - 4*o + 10 = 0, -5*t + g*o = 2*o - 25 for t.
5
Suppose -5*y - 16 = 4*a - y, -2*a + 8 = -2*y. Solve 6*r - 2*r + 2*l = a, -4*r = 3*l + 2 for r.
1
Suppose 6*k - 20 = 2*k. Suppose -k*a + 2*z - 2 + 7 = 0, 4*a = -z + 17. Let p be 3 - (0 - (-1 + 1)). Solve -27 = 3*l - a*g, -2*g - p = -11 for l.
-5
Let n = -26 - -35. Solve n = 5*d - b, -d + 4*b = -20 + 3 for d.
1
Let n(m) = m. Let a be n(2). Solve -4*p + 5*g + 5 = 0, -3*p = -0*g - a*g + 5 for p.
-5
Let n(y) be the first derivative of -1 - 1/3*y**3 - 3*y**2 - 6*y. Let k be n(-4). Solve 2*c - 9 = 3*t, 0 = -7*c + k*c for t.
-3
Suppose -8 = -3*j + j. Suppose -4*u - w + 9 = 0, -j*u - 5*w = -u - 28. Solve -r = -3*o - u, 0*r - r - 3*o - 11 = 0 for r.
-5
Let s(z) = -z - 1. Let q be s(-6). Solve 12 = q*k - 3*l, 3*k - 4*l + 7 = 4*k for k.
3
Suppose -3*x + 15 = -2*c - 25, -2*x = -3*c - 20. Let d be 6*(x/6 + -2). Solve -3*l = -p + d*p - 9, 4*l - 12 = 0 for p.
0
Let a(g) = -4 + g**2 - 4*g**2 + 3*g - g**2 + g**3 + g**2. Let h be a(3). Solve -h*f - 8 = -n + 11, -n = f + 5 for n.
-1
Suppose 0 = 4*y - 2*n - 2, -7*n + 9 = -3*y - 2*n. Solve -x - y = 4*k + x, 5*k + 4*x = -1 for k.
-1
Let l be 3*(2 + -1)*1. Suppose l*m - 5*m + 4 = 0. Solve -3*q = -m*b + 17, -5 + 2 = -3*q - 3*b for q.
-3
Suppose -4*z + 20 = -5*t, 5*z + t = 2*z + 15. Let c = 207 + -195. Solve -z*b - 2*v = -c, 0*v + v = 2*b - 12 for b.
4
Let k(p) = -p + 9. Let t be k(9). Suppose 0 = 2*q - t*q. Suppose 4*f - 76 = -q*f. Solve 0 = 3*o - 2*c + 4*c - 7, 0 = 3*o - c - f for o.
5
Let o be 12/30 - (-94)/(-10). Let h be 3*((-12)/o + -1). Let y be (-6*h)/2 - -3. Solve -3*q + g + 13 = 0, y = -2*q - q + 2*g + 14 for q.
4
Suppose -4*v = -3 - 5. Let x be 2*v/(-4)*-5. Solve x*t = -3*c - 31, -4*t - 16 = c - 3*c for t.
-5
Let w be 1 + -6 + 20/4. Solve 2*y + w*y + n = -6, -y - 5 = n for y.
-1
Let q = -10 - 11. Let z = 5 + -11. Let s = z - q. Solve 0 = -4*g - 2*v - 20, 2*v = -3*g - 0*v - s for g.
-5
Suppose 2*v - 4 = -2. Let f be -1 + 1 + 5/v. Solve 2*a - f*q - 5 = -3*a, -2*a + q + 3 = 0 for a.
2
Let g(o) = 2*o - 3. Let w(i) = i + 1. Let y(p) = g(p) - w(p). Let z be y(6). Solve 5*j + 17 = -4*b, z*b = 2 + 2 for j.
-5
Let f = 200 - 124. Suppose d + 3*d - f = 0. Suppose 4*k - d = 2*k - 5*m, -4*k + 11 = m. Solve 5*t - k*s + 5 = -3, -4*t = 2*s + 10 for t.
-2
Let b(y) = -6*y - 7. Let c(q) = 2*q + 2. Let o(k) = 3*b(k) + 8*c(k). Let z be o(-4). Let n be 27/(-12)*8/(-3). Solve 0 = -4*j - z*x - 17, x - 3*x = n for j.
-2
Let m(a) = -a**3 - 9*a**2 + 10*a + 5. Let z be m(-10). Suppose 2*o = -3*d + 3*o + 14, 2 = -2*d - 5*o. Solve 2*y + z*f = 2*f + d, -5*f = -y - 24 for y.
-4
Let h(a) = -2*a**2 - 19*a - 5. Let n be h(-9). Solve n*w = -20, -3*w - 1 - 14 = -5*b for b.
0
Suppose 4*m = -21 + 1. Let q be 182/12 + m/30. Let b(s) = -s + 10. Let p be b(7). Solve -3*n - q = p*h, 0*n = -n + 2*h + 10 for n.
0
Suppose -3*w = 3*p - 21, -p - 5*w + 19 = -0. Solve 2*l = p*k - 2*l - 16, 4*l + 20 = 0 for k.
-1
Let m = -16 + 20. Solve 2*x = m*h + 6, 0 = -6*h + h - 2*x + 15 for h.
1
Let f(o) = o**2 - 5*o + 4. Let t be f(4). Suppose 15 + 13 = 4*n - 4*r, 4*r + 8 = t. Solve -x = w - 4, -2*w = n*x + 2*w - 20 for x.
4
Let c(y) = -y**2 - 5*y + 8. Let k be c(-6). Solve -k*b + 2 = 0, 5*v - 10 + 28 = -2*b for v.
-4
Let p(g) = 0*g**3 - 4*g**2 + 0*g - 11 + g**3 + 0*g**2 - 2*g. Let y be p(5). Solve -2*w + y*v + 16 = 0, -3*w + 19 = v - 6*v for w.
-2
Suppose 3*v - 9 = -0*v. Solve 2*k - 10 = 5*t + 15, v*k = 4*t + 20 for t.
-5
Let p = 67 - 67. Solve 0 = 2*t + 4*x + 10, 4*t + p*t - 4 = -2*x for t.
3
Suppose 0*o - 3*o - 9 = 0, 2*k + 2*o = 60. Solve 5*j + 0*c - 20 = -2*c, -4*j - 5*c = -k for j.
2
Suppose -2*r = -2*j + 14, 2*j + 4*r - 17 = j. Let d = j + -6. Solve -t = -p - d, -3*p = 5*t - 31 - 0 for t.
5
Let x(y) = 2*y**2 + y. Let b be x(4). Solve u + u = 5*l - 28, 5*l - 4*u = b for l.
4
Let l(u) = 11*u**2 + u. Let d be l(-1). Let t = 14 - d. Solve -m - 5*o + 2 = 0, 5*m - o - t*o = 10 for m.
2
Let n(t) = t + 13. Let v be n(-9). Solve a - v = -x - 3, x - a - 7 = 0 for x.
4
Suppose 3*z - 8 = 1. Let v = 8 + -5. Solve -f - w + z = 0, -3 = v*f - 5*f + w for f.
2
Let h(s) = 2*s**3 - 6*s**2 - s + 6. Let p be h(3). Solve o = 5*y - 13, p*y + 6 = -4*o - 0*y for o.
-3
Suppose 3*i - 5*b = -15, i + 2*b - 6 = 5*i. Solve -y + 2*l + 4 = i, -2*y - 1 = 5*l + 27 for y.
-4
Suppose -5*v - 2 = -7*v - 4*f, 0 = -4*f - 12. Suppose -c + 0*c + 3*l = -4, 18 = 2*c - 4*l. Suppose -3 = 2*w - 9. Solve w*k - t = 5, -3*t + v*t - c = -k for k.
3
Suppose -3*s + 4*s = 0. Let g = s - 0. Suppose 3*f - o - 25 = 0, g*f - 3*f + 3*o + 15 = 0. Solve 0*n = 4*n + 2*k + 10, 0 = -2*k - f for n.
0
Suppose -4*o + 20 = 6*o. Solve -l - 5*b - 3 = -0*b, -2 = o*b for l.
2
Suppose -14 = -3*g - 5. Solve 0*p - 3*p = g*f - 9, 3*f - 3*p = 9 for f.
3
Suppose 5*d - 19 + 4 = 0. Let z = -50 + 50. Solve 5*a - k = 27, z = d*a + 2*k - 11 - 0 for a.
5
Let a(h) = 2*h**2 - 3*h - 1. Let w be 0 - (24/3)/(-2). Let c be a(w). Solve 0 = -s - 3*j - 15, 5*s + 3*j + c = 2*j for s.
-3
Let r = -1 - -3. Let n be r + (0 - (-4)/2). Solve -5*u + 12 = s + 37, -n*s + 5 = -u for s.
0
Let u be 1*((-2 - 1) + -2). Let i be u/3*3/(-1). Suppose 5 = 3*c - 1. Solve -2*b - i*a - 25 = 3*b, 10 = 2*b - c*a for b.
0
Let s = 2 + 3. Solve -u - s = 5*o + 3, -2*u - 5*o = 6 for u.
2
Suppose 3*t - 35 - 25 = 0. Suppose 0 = -l + 4*j - 16, 3*j - t = -4*l - 2*j. Solve -2*x + 18 = 4*m, 2*m = 2*x - l*m for x.
3
Let g(u) = u**3 + 2*u**2 - 2*u - 2. Let s be g(-2). Let w be 4 + s/((-1)/(-1)). Solve -6 = 2*i - 0, t + 3*i = -w for t.
3
Suppose 4*f = -0*l + l - 7, 7 = 3*l - 5*f. Let d = l + 3. Solve 4 = -2*z - d*i + 2, 20 = -2*z + 4*i for z.
-4
Let s be 5*24/20*5 + -3. Solve y + 5*n - 21 = -3*y, 0 = -2*y + 5*n - s for y.
-1
Let l = -6 + 9. Solve -4*x + 22 = -l*a, 3*x = 4*a + 16 + 4 for x.
4
Let g
|
MATCH REPORTS
1st TEAM
2nd TEAM
3rd TEAM
After a pep talk from Ally, warning us of the opposition’s league position we were reared and ready to take on the challenge to remain in our top spot promotional position. A strong start of tight marking and quick passes led to two sleek goals from Kelly, the smooth...
Word from Merchants’ Academy Sports Centre is that the snow on the pitch has been melting away, however the 'feels like temperature' is bitter and there's a yellow ice warning from 7pm this eve. We'll get an update from Merchants at 3pm and make a decision then with a view to pitch condition and travel.
Best Warmer-Upper
The only player who we practically had to wake-up from a pitchside nap to play…
Ally Blaa, 1s 2017
Manager of the Year
The most committed but still pants at Fantasy Six Nations Team management.
Sophie Fox, 1s 2017
Miss Clevedon 2017
For living closest to our home pitch, and still only turning up at half-time due to a slight navigational oopsie…
Fran Mason, 1s 2017
Geographically Challenged
For believing Messi and Marcela to be friends because they both speak Spanish… and then being surprised there’s a whole Atlantic Ocean between Spain and South America… doh.
Ella Harvey, 1s 2017
Most Inappropriate Car for a Captain
For having the most impractical car in terms of ferrying players or kit, etc…
Sarah Lloyd, 2s 2017
Player of the Season
How low can she go?? Really low! Legs of the defence and nearly impossibly to get through!
Kate McDougall, 1s 2017
Most Improved Player
Came on leaps and bounds and did a grand job for the team before scooting off to help Madagascar for the second half of the season… #selfishnotselfish
Hope Silk, 1s 2017
Malcolm Kingshott Award
For going above and beyond the call of duty in the name of Knowle. In this case, spending a season fighting with Lloyds about online banking.
Interestingly, she was also awarded ‘Most likely to steal your goal’…
Cristina ‘Messi’ Perez, Treasurer
Top Scorer
Again.
‘Though Kelly and Chloe came close this year. #Bringiton
Sam Russe, 1s 2017
Top Scorer
Those long arms and legs steal important inches from defenders!
Grace Evans, 2s 2017
Alex Plumb, 2/3s 2017
Vikkie Bell, 3s 2017
Players' Player of the Season
As voted for by her teammates…
Holly Crompton, 2s 2017
Nat Kent, 2s 2017
Marcela Paz Montecino, 2s 2017
Charlotte Hain, 2s 2017
Contact Us
Name
Email Address
Message
Simply put…
...we're an awesome club where fun and friendships through sport is our aim. If you want to achieve international standards we're happy to get you started and introduce you to the great game of hockey, then recommend another club that can take you the rest of the way to the highest level.
|
IMG leaders Ang Jangbu and Greg Vernovage
report that plans for fixing the Lhotse Face and above are
proceeding smoothly. Contrary to other published reports,
they say that the leaders' meeting at Base Camp was very
amicable and that the plans were discussed and agreed upon
with zero problems among the various teams. It is a credit
to all the teams working together — thanks to all the
climbers who are a part of this effort! Each year there
are a few teams that don't want to work together, but this
number is getting fewer and fewer each year.
Starting last year we (the teams that come
each year) decided it was simpler to have one team buy all
the rope and then everyone would contribute on a per-head
basis. In 2010, IMG bought the rope and shipped it to EBC
from the US, while Henry Todd supplied the hardware. This
year Russell Brice bought all the rope (about 7800 meters
total, from Europe, predominantly 10mm) and Willie Benegas
bought all the hardware. All total, 53 loads of fixed rope
and gear have been transported to EBC. Now, the various
teams are all working to haul this gear up to Camp 2 by
April 23, when the fixing will begin (IMG will be
responsible for carrying 9 of the loads to C2).
Hopefully the route will be opened to the
South Col by the end of April. Pickets will be used in the
snow and screws and V-thread anchors for the ice. For the
rock sections, the fixing crew will continue the efforts
of the last several years to keep replacing the old piton
anchors with bolts. The goal is for the new ropes to be as
secure as possible and for the unsightly old ropes to be
removed and carried down for proper disposal.
Also, to prevent traffic jams, we will
continue the efforts of the past few years to fix double
ropes (one for up-traffic and one for down-traffic) on all
the steep, high traffic areas (below Camp 3, the Yellow
Band, Geneva Spur, South Summit, Hillary Step, etc).
—Eric Simonson, IMG Partner
April 17, 2011
40 sherpas carried to Camp 2 today, and Ang
Karma, Datenji, Mingma Tsering 2, Pemba Dorje 2, Lhakpa, and
Ang Nima stayed up there to do more work on Camp 2. In
addition, cooks Shyam and Tashi also moved up to work on
getting the C2 kitchen set up.
The Hybrid team headed up into the Icefall this morning to
do some training before they move to Camp 1. Both climbers
and sherpas were back down to BC in time for a late
breakfast.
Eben and Justin are back down at Lobuche Base
Camp getting ready for that climb with some of our team
members, and Adam and his gang are moving up to Lobuche
today from Pheriche. The Classic Team is at Base Camp, and
this is their second full day of rest: time for more laundry
and relaxation.
As Jangbu and I sat in the communication tent planning the
day's events, we got to talking about how communications
have changed over the years. Ang Jangbu's first Everest
expedition was in 1981, and on that trip the communication
was two "mail runners." They would go from Base Camp to
Lukla with letters. As Jangbu said, they were mostly Love
Letters. He could not pinpoint the year, but he said the
first sat phone to BC took up a full porter load to move it,
and included a big dish antenna. Now, we have email, cell
phones, radios, and a whole tent of communication gear. Lots
of changes!
—Greg Vernovage, Expedition Leader
Earlier:
Camps 1 and 2
IMG leader Ang Jangbu reports from Base Camp
that 28 sherpas carried to Camp 2 today, which makes that camp
essentially ready for occupation. Now there only remains all
the oxygen to carry up there. Another 2 sherpas carried to
Camp 1 today and now that camp is also basically ready for
climbers to occupy.
Many of the Lobuche climbers have now returned
to Base Camp, and after a few rest days, they will be ready to
start heading up! Before they do that, the team will hold a
puja ceremony tomorrow morning, to receive the blessings of
the lama for safe climbing (they will hold another puja in a
few days, for the climbers arriving later). Jangbu reports
that he and Russell are coordinating a multi team meeting for
tomorrow afternoon, to start working on the plans for fixing
the Lhotse Face and beyond. So far so good!
IMG guide Eben Reckord, with Stuart and
Martin (aka the Geezer Team), made it to Base Camp safe and
sound. Way to go, you guys! After a day exploring the
environs, the Geezers headed out via the Air Dynasty heli.
Eben will be heading down to Lobuche in the next few days to
climb with the Lhotse and C2/C3 climbers.
—Eric Simonson, IMG Partner
April 14, 2011
IMG Leader Greg Vernovage called on the sat phone
at 8am Nepal time from the summit of Lobuche Peak to say that
the Classic climbers had a nice climb this morning and are doing
well .
Further down the valley, IMG guide Adam Angel
reports that all on his team are doing well at Tengboche and are
heading on to Pheriche today.
Back up at Everest BC, Chef Kaji and the other 9
sherpa cooks have our two kitchens running smoothly, with the
team dining and leisure tents all ready for some serious hanging
out action when the climbers get back to Base Camp from their
Lobuche excursion!
—Eric Simonson, IMG Partner
Earlier:
Ang Jangbu reports that the Hybrid team summited
Lobuche Peak at 8:15 this morning. This is a nice 20,000+ foot
summit with a fantastic view of Mt. Everest. The route involves
some steeper snow and ice, requiring crampons and fixed-rope
skills, and it is a great acclimatization climb. We normally fix
about 500 meters of fixed rope on the climb.
After summiting, the Hybrid climbers descended to
Lobuche BC, and the Classic climbers ascended to the High Camp for
their Lobuche ascent tomorrow.
On Everest we had 27 sherpas carry to Camp 2 today
directly from Base Camp, so the stocking of that camp is well
under way.
—Eric Simonson, IMG Partner
Earlier:
MG leader Greg Vernovage reports from Base
Camp that the Icefall Doctors have finished the route in
the Icefall, and immediately IMG sherpas Chewang Lendu and
Mingma Tenzing blasted up the hill to claim prime real
estate for our IMG campsites at Camp 1 and Camp 2. That is
great news!
Tomorrow the sherpas do their first big
carry to start building those camps. Meanwhile, the Hybrid
climbers did training at BC today and head for Lobuche
Peak in the morning. Classic climbers will train tomorrow
and head down the next day.
The Dominican climbers rolled into Base
Camp today and are doing well. Eben and the Geezer Team
are at Lobuche for acclimatization, while Adam and the
C2/C3/Lhotse team are in Namche. Today Adam and his group
did an acclimatization hike to Everest view hotel and they
are all doing great. So far, so good!
—Eric Simonson, IMG Partner
Earlier:
IMG guide Mike Hamill reports that Hybrid
climbers and trekkers pulled into Everest Base Camp
yesterday and everyone is doing well with only slight
headaches. The 9th was Rick and Loretta's 23rd wedding
anniversary, and they celebrated by reaching BC as well as
with a specially made chocolate cake from Chef Kaji.
Congratulations!
Greg Vernovage gave a call on the sat phone to
report that the Classic crew was only a couple hours
out of BC and would be there later today. Other than the fact
that it was snowing hard, he said everything was going well
for them.
Ang Jangbu reports that the sherpas have
started work on the EBC heli pad, HRA has their clinic
set up, and the Icefall Doctors have the route almost
to Camp 1 now. The IMG Lobuche sherpa crew is working
on setting up Lobuche Base Camp now, and he is sending three
more climbing sherpas down tomorrow to start doing the
rope-fixing to the summit. The IMG climbers will rest
for two nights at EBC, then head down to Lobuche Peak the next
day. Hybrid climbers are scheduled to summit Lobuche on
the 14th, and the Classic climbers on the 15th.
Eben Reckord reports from Pheriche that the
Geezer Team pulled into Pheriche and are doing well. He
says that the first half of the day was in the snow with
unusually cold temps and wind. On the way, the team met with
Lama Geshe of Pangpoche where they received a blessing for
safe passage to EBC. They will take a rest day tomorrow.
Adam Angel reports from Namche that his
crew pulled into town, and his group is healthy, strong, and
happy. They had a little rain, hail and thunder today, which
kept the climb up the hill nice and cool. They will be taking
a couple acclimatization days there before moving higher.
—Eric Simonson, IMG Partner
Earlier:
Ang Jangbu made it to Everest BC today and reports
that everything is looking good up there. The sherpas have now all
reported for duty, the tents are all up, and the communications (VHF
and Bgan) are established. The Icefall Doctors are almost done
fixing the Icefall, just a couple days of work left to go before the
route is opened.
Mike and the Hybrid team
are in Lobuche and some of them will be moving to BC tomorrow. Greg
and the Classic team are in Lobuche, but will be taking another rest
day. The Dominican team is in Pheriche, and the Khumbu Icefall and
Lobuche peak team led by Eben Reckord has reached Deboche, right on
schedule. The two-man team of Stewart and Martin have given their
team a name, the climbing geezers, with a 136 years between the two
of them. All are in good health and feeling strong.
Down in Kathmandu, IMG guide Adam Angel with the
C2/C3, Lhotse, and Lobuche climbers are ready to fly to Lukla in the
morning. Everything continues on smoothly and on schedule. So far so
good!
—Eric Simonson, IMG Partner
Earlier:
Classic Climbers Reach Pheriche
The Classic Team had a great couple of nights in
Deboche. On the rest day we walked back up the hill to visit the
Tengboche Monastery, and while we were there, made a point to drop
into the local Bakery. This group's favorite was the chocolate cake
and Crazy Wacky Cake. Today, we left Deboche early and headed for
Pangboche monastery, where we stopped in to see Lama Geshe and get his
blessing for our upcoming climbs. An added bonus to the visit was
running into ten more of our IMG Sherpas, doing the same!
After a fun visit in Pangboche, we continued up the valley towards
Pheriche, eventually crossing the small pass and dropping down to
cross the river, dodging a few yaks along the way. We are now entering
the upper valley, and as we head into Pheriche, we can look up and see
one of our first mountain objectives, Lobuche. It was a pretty sweet
view of the route, and it fired up the climbers.
Further up the valley to the west was Cho Oyu, but it
was partially hidden in the clouds today. In the Himalayan Hotel, we
bump into the Hybrid team again; it is always nice to see some welcome
faces and teammates. We are all traveling well, and most important, we
are all healthy!
Tomorrow for the Hybrid group
is to move up to the village of Lobuche. For the Classic team, a short
hike up the ridge for a view of Island Peak, Dingboche and Lhotse and
maybe a visit to the HRA clinic in Pheriche to see our friends at
Himalayan Rescue Association. The word from some people walking down
valley from Base Camp is that there has been some snow and wind up
there. Translation for the IMG Team: take our time. All is well, and
everyone wants to say hello to everyone back home!
—Greg Vernovage, Expedition Leader
IMG Teams on the Move
Everyone is where they should be right now, which is good news.
Yesterday we had IMG guide Eben Reckord with Martin and Stuart fly to
Lukla, and they are heading to Namche today. The Dominican Team made
it to Deboche yesterday, and the Hybrid team is up in Pheriche, both
on schedule, and both teams are doing well. Greg reports from Deboche
that his Classic team of climbers and trekkers are all looking good
and ready to move to Pheriche today. He says there was fresh snow
overnight and this morning it is clear as a bell, so it is going to be
an absolutely spectacular day as they walk below Ama Dablam. Today we
have the first members of the April 7 team of trekkers, Lobuche,
C2/C3, and Lhotse climbers arriving to Kathmandu. I will be working
with them and IMG guide Adam Angel over the next couple days to make
sure everyone is all set before they fly to Lukla on the 9th. So far
so good!—Eric Simonson, IMG Partner
Earlier:
Another Great Day in the Khumbu
We woke up and had not a cloud in the sky. For our team
acclimatization hike today we headed up to Shyangboche (the small
airport above town), then continued up to the Everest View Hotel for a
great view of Everest, Lhotse and Ama Dablam. After taking in the
sights, we looped back down to Khumjung and walked through the Hillary
school grounds. Back in Namche in time for lunch and a few showers.
—Greg Vernovage, Expedition Leader
Classic Climbers Reach Namche (11,300')
Smooth sailing so far. We landed with all of our bags in
Lukla and hit the trail. Perfect trekking weather, cool with a few
afternoon clouds to keep the sun off of us. Pulled into Phakding
yesterday and relaxed outside. We got a big treat when we noticed a
Langur monkey sitting up in the tree and looking as interested in us as
we were of him. Neither Justin or I had ever seen or heard of these
animals and we were fired up to get a few photos.
Friday we were up early and on
the trail. Good cloud cover and a cool day gave up a great opportunity
to move up Namche hill. The hill is still there, and the team handled it
perfectly: slow and steady. We pulled into Namche and the Khumbu Lodge,
where we ran into our friends with the Hybrid group and congratulated
each other on the trek so far. We are all having a great time and
laughing like crazy.
This morning we got some breakfast and then climbed up
to the top of Namche to Sherwi Khangba Lodge where Phil's old friend
Lhakpa Sonam runs the Sherpa Museum. Lhakpa says hello to all the IMG
friends and especially Phil and Sue Ershler. A little further up we got
our first glimpse of just the very top of Everest as it poked out of the
clouds. We also got a glimpse of a team favorite, Ama Dablam.
On the walk down to the Saturday market, a few of our
Phortse sherpas walked up. Danuru 2, Karma Rita, and Dawa gave us a
quick hello as they were headed home with the weekly shopping. We will
see them again once we get to Base Camp. The market was great and now we
have an afternoon of rest at the lodge. All is well and everyone is
doing very well.
—Greg Vernovage, Expedition Leader
Earlier:
IMG guides Greg Vernovage and Justin Merle,
along with the Classic Climbers and Trekkers, got up early this morning.
After a quick breakfast they loaded the bus at 5am for the trip to the
airport. The flights went on schedule, and by 8am the whole team and all
their luggage was successfully in Lukla.
After
hitting the bakery in Lukla for some tasty treats, the team is on the
trail, headed for Phakding today.
Expedition Sirdar Ang Pasang reports from Base Camp that
most of the tent platforms are now done and he will be coming down to
Namche tomorrow to meet Mike and Greg do the team's registration with the
SPCC (for the Icefall permit fees and counting the number of oxygen
bottles and fuel cartridges for the garbage deposit). The weather is good
and everything is going smoothly, so we are all psyched that the trip is
off to a great start.
—Eric Simonson, IMG Partner
Earlier:
IMG guides Greg Vernovage and Justin Merle did the briefing
at the Ministry today, and received our official Everest permits. The 2011
IMG Everest Expedition has now officially begun. The team members will be
arriving in Kathmandu over the next couple days, and we will have our team
welcome dinner on the evening of the 29th. So far so good!
—Eric Simonson, IMG Partner
Earlier:
We had our final guide meeting yesterday, and Merle, Hamill,
and Vernovage are heading out the door to Kathmandu tomorrow, with the rest
of us following over the next couple days. Next stop, Kathmandu!
Up at Everest Base Camp, Chewang Lendu (4-time Lhotse
summiter) called to report that the weather has been clear and windy, and
that the Sherpa team has been making good progress building the camp. So
far, they have managed to built the platforms and erect the Sherpa kitchen
and dining tents, the member kitchen tent, one of our two big Eureka MGPTS
US Army tents (eurekamilitarytents.com), and one big storage tent. Now they
are working on building the sites for the big, member dining tents and
communication tent. After that, they will start on all the platforms for the
sleeping tents. Chewang reports that the SPCC (Icefall doctors) and a
handful of other teams are now at BC also working on their camps.
Our third shipment of food and gear has now reached
Kathmandu, and everything is moving forward on schedule. With the conclusion
of the Losar Festival (Tibetan New Year), ten more IMG sherpas and two cooks
are heading to Base Camp today to continue work on the tent platforms.
Every year we have to literally carve the camp out of the
rocks and ice of glacier, which is constantly moving and changing. The sherpas
will be making spaces for a number of very large kitchen, dining, and
socializing tents, dozens of sleeping tents, several shower tents, toilet
tents, storage tents, and our communications nerve center. It takes lots of
chopping ice and prying, pushing, lifting, and rolling the heavy stones to
build a spectacular Base Camp!
This is a
picture of the popular South Col Route up Mt. Everest. Base camp is located
at 17,500 feet. This is where climbers begin their true trip up the
mountain. This is also where support staff often remain to monitor the
expeditions and provide medical assistance when necessary. Many organizations
offer hiking trips which just go to base camp as the trip is not technically
challenging (though you must be very fit).
From base
camp, climbers typically train and acclimate (permitting the body to adjust to
the decreased oxygen in the air) by traveling and bringing supplies back and
forth through the often treacherous Khumbu Icefall. This training and
recuperation continues throughout the climb, with the final summit push often
being the only time to climbers do not go back and forth between camps to
train, bring supplies, and recuperate for the next push.
The Icefall
is in constant motion. It contains enormous ice seracs, often larger than
houses, which dangle precariously over the climbers heads, threatening to fall
at any moment without warning, as the climbers cross endless crevasses and
listen to continuous ice creaking below. This often acts as a testing ground
to judge if less experienced climbers will be capable of continuing. The
Icefall is located between 17,500 and 19,500 feet.
Camp I -
5900 meters
After the
Icefall, the climbers arrive at Camp I, which is located at 19,500 feet.
Depending on the type of expedition, Camp I will either be stocked by the
climbers as they ascend and descend the Icefall, or by Sherpas in advance.
The area
between Camp I and Camp II is known as the Western Cwm. As the climbers reach
Camp II at 21,000 feet, they may be temporarily out of sight of their support
at Base camp. Nonetheless, modern communication devises permit the parties to
stay in contact.
Camp II -
6500 meters
As the
climbers leave Camp II, they travel towards the Lhotse face (Lhotse is a
27,920 foot mountain bordering Everest). The Lhotse face is a steep, shiny
icy wall. Though not technically extremely difficult, one misstep or slip
could mean a climber's life. Indeed, many climbers have lost their lives
through such mishaps.
Camp III -
23,700 feet (7200 meters)
To reach Camp
III, climbers must negotiate the Lhotse Face. Climbing a sheer wall of ice
demands skill, strength and stamina. It is so steep and treacherous that many
Sherpas move directly from Camp II to Camp IV on the South Col, refusing to
stay on the Lhotse Face.
Camp IV -
26,300 feet (8000 meters)
As you’re leaving C4…it’s a
little bit of a down slope, with the uphill side to the left. There are
typically snow on the ledges to walk down on, interspersed with rock, along
with some fixed rope. The problem with the rope is that the anchors are bad,
and there’s not much holding the rope and a fall could be serious. Fortunately
it’s not too steep, but there is a ton of exposure and people are usually
tired when walking down from camp. The rock is a little down sloping to the
right as well, and with crampons on, it can be bit tricky with any kind of
wind. There’s a little short slope on reliable snow which leads to the top of
the Geneva Spur, and the wind pressure gradient across the spur can increase
there as you’re getting set up for the rappel. Wearing an oxygen mask here can
create some footing issues during the rappel, because it’s impossible to see
over the mask and down to the feet. For that reason, some people choose to
leave Camp 4 without gas, as it’s easier to keep moving down the Spur when
it’s important to see all the small rock steps and where the old feet are
going. Navigating down through all of the spaghetti of fixed ropes is a bit of
a challenge, especially with mush for brains at that point. One lands on some
lower ledges which aren’t so steep, where fixed ropes through here are solid.
At this point, it’s just a matter of staying upright, and usually, the wind
has died significantly after dropping off the Spur. The route turns hard to
the left onto the snowfield that leads to the top of the Yellow Bands.
Camp IV,
which is at 26,300 on the Lhotse face, is typically the climbers' first
overnight stay in the Death Zone. The Death Zone is above 26,000 feet.
Though there is nothing magical about that altitude, it is at this altitude
that most human bodies lose all ability to acclimate. Accordingly, the body
slowly begins to deteriorate and die - thus, the name "Death Zone." The
longer a climber stays at this altitude, the more likely illness (HACE - high
altitude cerebral edema - or HAPE - high altitude pulmonary edema) or death
will occur. Most climbers will use oxygen to climb and sleep at this altitude
and above. Generally, Sherpas refuse to sleep on the Lhotse face and will
travel to either Camp II or Camp IV.
Camp IV is
located at 26,300 feet. This is the final major camp for the summit push. It
is at this point that the climbers make their final preparations. It is also
a haven for worn-out climbers on their exhausting descent from summit attempts
(both successful and not). Sherpas or other climbers will often wait here
with supplies and hot tea for returning climbers.
From Camp IV,
climbers will push through the Balcony, at 27,500 feet, to the Hillary Step at
28,800 feet. The Hillary Step, an over 70 foot rock step, is named after Sir.
Edmond Hillary, who in 1953, along with Tenzing Norgay, became the first
people to summit Everest. The Hillary Step, which is climbed with fixed
ropes, often becomes a bottleneck as only one climber can climb at a time.
Though the Hillary Step would not be difficult at sea level for experienced
climbers, at Everest's altitude, it is considered the most technically
challenging aspect of the climb.
Summit -
29,028 feet (8848 meters)
Once the
climbers ascend the Hillary Step, they slowly and laboriously proceed to the
summit at 29,028 feet. The summit sits at the top of the world. Though not
the closest place to the sun due to the earth's curve, it is the highest peak
on earth. Due to the decreased air pressure, the summit contains less than
one third the oxygen as at sea level. If dropped off on the summit directly
from sea level (impossible in reality), a person would die within minutes.
Typically, climbers achieving the great summit will take pictures, gain their
composure, briefly enjoy the view, then return to Camp IV as quickly as
possible. The risk of staying at the summit and the exhaustion from
achieving the summit is too great to permit climbers to fully enjoy the great
accomplishment at that moment.
As most
readers of this page know, the return trip can be even more dangerous than the
climb to the summit.
Millet One
Sport Everest Boot Expedition and mountaineering boot for high altitude
and extremely cold conditions. The Everest has conquered all 14
mountains over 8,000m and also the Seven Summits- and has now had a
makeover to ensure continued peak preformance. With a newer sung, Alpine
Fit, and even lighter Expedition footwear for
mountaineering in conditions of extreme cold. NOTE US
SIZES LISTED. See more here.
|
Q:
Folder with special characters py2exe
In my code, I call a file that is located in a folder called "Física" (please note that the "i" is acute).
I don't have any problem running this in my IDE (Spyder), but after I turn my program into an executable with py2exe I get an error:
"UnicodeEncodeError: 'ascii' codec can't encode character u'\xed'"
The problem is because of these special characters. How can I solve this problem?
I tried to do the following
path = unicode(path).encode('utf-8')
to treat the path with utf-8 encoding. But if I do this my path will be:
F\xc3\xadsica instead of Física
A:
I found out what I was doing wrong:
I wanted to read a file from that path, and then write a file to the same path. I was encoding the path in utf-8 when saving it in a variable. However, I was not using the decode when using that variable to write in the path.
I need to use ´encode('utf-8')´ when saving the path to a variable and then use ´decode('utf-8')´ when setting the destination path. Thank you so much and sorry for the poor explanation
|
Just how generous are Detroit's pensions?
Bankruptcy or not, Detroit's emergency manager, Kevyn Orr, says the city simply can't afford the pensions it has promised tens of thousands of retired and current city workers, many of whom are counting on the checks to make ends meet.
So how much money do Detroit's retirees actually get?
On average Detroit's firefighters, police officers and other city employees receive pension checks that are similar or slightly smaller in size than the national average of $30,000 a year, according to pension experts. But compared with larger cities that have higher living costs, like Chicago and Los Angeles, Detroit's pensions checks often pale in comparison.
"My basic takeaway was that [Detroit's] pension system itself was not overly generous," said Jean-Pierre Aubry, assistant director of State and Local Research at Boston College's Center for Retirement Research.
While workers who reach the city's top posts, like police or fire chief for example, can retire with annual pensions that reach into the six-figures, the vast majority receive much smaller payments, Aubry said.
Retired general city workers, such as librarians or sanitation workers, received average payments of $18,275 a year in 2011, according to the Detroit General Retirement System. But those who put in the most time (or earn higher salaries) can see far healthier payments. A general city employee who retired in 2011 with an average ending salary of $60,000 and 40 years of service could receive around $45,000 a year.
Such benefits are more or less on par with the Detroit-area union auto workers. Retirees of the three big automakers receive average annual benefits of about $18,000 per year, in addition to another roughly $15,000 to $18,000 in Social Security payments, according to the United Automobile Workers, or UAW.
That's a big distinction: While retired Detroit firefighters and police officers receive more generous pension checks than auto workers -- checks averaged almost $30,000 a year in 2011 -- they often don't receive the added bonus of Social Security payments.
A 30-year veteran of the fire department who retired last year withan average ending salary of $60,000 would have qualified to receive around $44,000 a year, according to calculations using the plan's pension formula.
Police officers and firefighters in big cities often take home much more lavish pension checks. For example, with average annual benefits of $55,104, retirees of Chicago's police force took in nearly double Detroit's retirees. Meanwhile, retired Chicago firefighters had average annual payments of more than $60,000.
Even retired police and firefighters in Kansas City, Mo. -- a city with roughly two-thirds the population of Detroit and a similarly affordable cost of living -- take in more, with average annual payments of almost $42,500.
Why Detroit filed for bankruptcy
Still, it isn't all bad news for city workers. Since Detroit's firefighters and police offers are able to retire a decade (or more) before they reach the typical retirement age of 65, retirees can receive their benefits for decades. In addition, many retired officers have time to pursue other careers and accumulate additional savings.
In addition to a lifetime of payouts, city workers also receive retiree healthcare, a benefit that is rarely offered by private sector employers.
They can also extend their pension benefits to a spouse after they die by opting for smaller monthly pension checks, said Don Taylor, president of the Retired Detroit Police and Firefighters Association. The amount the payments are reduced by depends on the spouse's age.
Taylor himself receives about $2,500 a month from his 26 years in the Detroit Police Department, about a few hundred less than he would receive if he hadn't opted to include his wife in the plan. Taylor, 64, will also receive a small Social Security check from his 10 years as a travel agent. But other than that, he has no other retirement savings.
Regardless of whether Orr's proposed cuts go through, pension checks for younger employees will be less generous, said Leon LaBrecque, founder of a Michigan-based wealth management firm, who has worked with hundreds of Detroit city retirees.
Current workers have already agreed to pension cuts. For example, in 2011, Detroit police and firefighters agreed to a roughly 15% cut for pension benefits accrued from future years of service.
"There's this myth that everyone in Detroit is getting a fat pension," LaBrecque said. "But that's clearly not true."
|
Q:
First-order Peano Axioms and order-completeness of $\mathbb{N}$
Definition: An ordered set is order-complete if any nonempty subset with an upper bound, has a lowest upper bound or supremo.
Notation: We denote the system of first-order Peano Axioms (along with axioms for addition and multiplication) by PA1.
1.- Can we express the order-completeness of $\mathbb{N}$ using first-order logic?
How does it look?
2.- Can we prove that natural numbers are order-complete using PA1 or it has to be considered as an axiom?
A:
By compactness, first order $\mathsf{PA}$ is not enough to describe the least upper bound property. This follows from the existence of non-standard models of $\mathsf{PA}$, which is an obvious consequence of compactness (let $c$ be a new constant symbol, and consider the result of adding to $\mathsf{PA}$ the axioms "$c>\underline n$" for all $n$). Now, any non-standard model has an initial segment isomorphic to $\mathbb N$. This segment has no supremum. Because if $a$ is larger than all the standard integers, then so is $a-1$. What you have is that any definable set with an upper bound has a supremum, since for each definable set, the corresponding statement is an easy consequence of an appropriate instance of (first-order) induction.
By the way, this gives us the nice and very useful property of overspill in non-standard models: Given a non-standard model $\mathcal N$, if $\phi(x)$ is a first order property (perhaps with parameters from $\mathcal N$), and $\phi(n)$ holds in $\mathcal N$ for infinitely many standard integers, then it holds of some non-standard integers as well. Otherwise, there would be a first $m$ such that $\phi(k)$ fails for all $k\ge m$, and this $m$ would be a supremum of the standard part.
|
# Openflow Unit Test Writer
#
# Uses RYU to construct test request/reply messages of all types and shapes. Then:
# serializes each message to data/openflow0x04/OfpMessageType.hex in hex format
#
# You should only have to run this if the RYU library changes
#
# Craig Riecke, Programmer/Analyst CoSciN
# September, 2015
from ryu.ofproto.ofproto_v1_3_parser import *
from ryu.ofproto.ofproto_v1_3 import *
from ryu.ofproto import ofproto_v1_3, ofproto_v1_3_parser
import binascii, re
class Datapath(object):
ofproto = ofproto_v1_3
ofproto_parser = ofproto_v1_3_parser
msgs = {}
openflow_constants = dir(ofproto_v1_3)
# These classes extend the base RYU classes to serialize incoming messages, which is something
# they really don't have to do in a production setting (RYU doesn't need to send a GET_CONFIG_REPLY,
# for example, because it's a controller and not a switch.) We don't handle the full generality of
# each message, just enough to write a test packet.
class OFPHelloSerializable(OFPHello):
def _serialize_body(self):
assert self.elements is not None
# We are just doing one version bitmap in this incarnation.
assert max(self.elements.versions) < 32
msg_pack_into(OFP_HELLO_ELEM_VERSIONBITMAP_HEADER_PACK_STR, self.buf,
OFP_HEADER_SIZE, OFPHET_VERSIONBITMAP, 8)
# Create a bitmap where bit n means version n
bitmap = 0
for v in self.elements.versions:
bitmap |= (1<<v)
msg_pack_into('!I', self.buf, OFP_HEADER_SIZE+OFP_HELLO_ELEM_VERSIONBITMAP_HEADER_SIZE, bitmap)
class OFPSwitchFeaturesSerializable(OFPSwitchFeatures):
def _serialize_body(self):
msg_pack_into(OFP_SWITCH_FEATURES_PACK_STR, self.buf,
OFP_HEADER_SIZE, self.datapath_id, self.n_buffers, self.n_tables,
self.auxiliary_id, self.capabilities, 0)
class OFPGetConfigReplySerializable(OFPGetConfigReply):
def _serialize_body(self):
msg_pack_into(OFP_SWITCH_CONFIG_PACK_STR, self.buf,
OFP_HEADER_SIZE, self.flags, self.miss_send_len)
class OFPPacketInSerializable(OFPPacketIn):
def _serialize_body(self):
msg_pack_into(OFP_PACKET_IN_PACK_STR, self.buf,
OFP_HEADER_SIZE, self.buffer_id, len(self.data), self.reason,
self.table_id, self.cookie)
# Fill in match parameters
offset = OFP_HEADER_SIZE + 16
self.match.serialize(self.buf, offset)
# Fill in 2 bytes of padding and data
self.buf += "\000\000" + self.data
class OFPFlowRemovedSerializable(OFPFlowRemoved):
def _serialize_body(self):
msg_pack_into(OFP_FLOW_REMOVED_PACK_STR0, self.buf,
OFP_HEADER_SIZE, self.cookie, self.priority, self.reason,
self.table_id, self.duration_sec, self.duration_nsec,
self.idle_timeout, self.hard_timeout, self.packet_count,
self.byte_count
)
# Fill in match parameters
offset = OFP_HEADER_SIZE + 40
self.match.serialize(self.buf, offset)
class OFPPortStatusSerializable(OFPPortStatus):
def _serialize_body(self):
port = self.desc
msg_pack_into(OFP_PORT_STATUS_PACK_STR, self.buf,
OFP_HEADER_SIZE, self.reason,
port.port_no, port.hw_addr , port.name, port.config , port.state , port.curr,
port.advertised , port.supported , port.peer , port.curr_speed, port.max_speed
)
class OFPQueueGetConfigReplySerializable(OFPQueueGetConfigReply):
def _serialize_body(self):
msg_pack_into(OFP_QUEUE_GET_CONFIG_REPLY_PACK_STR, self.buf,
OFP_HEADER_SIZE, self.port)
offset = OFP_HEADER_SIZE + 8 # 4 for port, 4 for padding
for queue in self.queues:
start_of_queue = offset
msg_pack_into(OFP_PACKET_QUEUE_PACK_STR, self.buf,
offset, queue.queue_id, queue.port, 0)
offset += OFP_PACKET_QUEUE_SIZE
for prop in queue.properties:
# We cheat, since all the properties have the same shape
msg_pack_into(OFP_QUEUE_PROP_HEADER_PACK_STR, self.buf,
offset, prop.property, OFP_QUEUE_PROP_MIN_RATE_SIZE)
offset += OFP_QUEUE_PROP_HEADER_SIZE
msg_pack_into(OFP_QUEUE_PROP_MIN_RATE_PACK_STR, self.buf,
offset, prop.rate)
offset += OFP_QUEUE_PROP_MIN_RATE_SIZE - 8 # I have no idea why I have to do this.
msg_pack_into(OFP_PACKET_QUEUE_PACK_STR, self.buf,
start_of_queue, queue.queue_id, queue.port, offset - start_of_queue)
class OFPDescStatsReplySerializable(OFPDescStatsReply):
def _serialize_body(self):
msg_pack_into(OFP_MULTIPART_REPLY_PACK_STR, self.buf,
OFP_HEADER_SIZE, OFPMP_DESC, 0)
msg = self.body
msg_pack_into(OFP_DESC_PACK_STR, self.buf,
OFP_HEADER_SIZE + 8,
msg.mfr_desc, msg.hw_desc, msg.sw_desc, msg.serial_num, msg.dp_desc)
class OFPFlowStatsReplySerializable(OFPFlowStatsReply):
def _serialize_body(self):
msg_pack_into(OFP_MULTIPART_REPLY_PACK_STR, self.buf,
OFP_HEADER_SIZE, OFPMP_FLOW, 0)
flow_stats = self.body
start_of_reply = offset = OFP_HEADER_SIZE + 8
msg_pack_into(OFP_FLOW_STATS_0_PACK_STR, self.buf, offset,
0, flow_stats.table_id, flow_stats.duration_sec, flow_stats.duration_nsec,
flow_stats.priority, flow_stats.idle_timeout, flow_stats.hard_timeout, flow_stats.flags,
flow_stats.cookie, flow_stats.packet_count, flow_stats.byte_count
)
offset = OFP_HEADER_SIZE + 8 + OFP_FLOW_STATS_0_SIZE
offset += flow_stats.match.serialize(self.buf, offset)
for instruction in flow_stats.instructions:
instruction.serialize(self.buf, offset)
offset += instruction.len
# Backfill length
msg_pack_into("!H", self.buf, start_of_reply, offset - start_of_reply)
class OFPAggregateStatsReplySerializable(OFPAggregateStatsReply):
def _serialize_body(self):
msg_pack_into(OFP_MULTIPART_REPLY_PACK_STR, self.buf,
OFP_HEADER_SIZE, OFPMP_AGGREGATE, 0)
offset = OFP_HEADER_SIZE + 8
aggregate_stats = self.body
msg_pack_into(OFP_AGGREGATE_STATS_REPLY_PACK_STR, self.buf, offset,
aggregate_stats.packet_count, aggregate_stats.byte_count, aggregate_stats.flow_count
)
class OFPTableStatsReplySerializable(OFPTableStatsReply):
def _serialize_body(self):
msg_pack_into(OFP_MULTIPART_REPLY_PACK_STR, self.buf,
OFP_HEADER_SIZE, OFPMP_TABLE, 0)
offset = OFP_HEADER_SIZE + 8
table_stats = self.body
msg_pack_into(OFP_TABLE_STATS_PACK_STR, self.buf, offset,
table_stats.table_id, table_stats.active_count, table_stats.lookup_count,
table_stats.matched_count
)
class OFPPortStatsReplySerializable(OFPPortStatsReply):
def _serialize_body(self):
msg_pack_into(OFP_MULTIPART_REPLY_PACK_STR, self.buf,
OFP_HEADER_SIZE, OFPMP_PORT_STATS, 0)
offset = OFP_HEADER_SIZE + 8
port_stats = self.body
msg_pack_into(OFP_PORT_STATS_PACK_STR, self.buf, offset,
port_stats.port_no, port_stats.rx_packets, port_stats.tx_packets,
port_stats.rx_bytes, port_stats.tx_bytes, port_stats.rx_dropped,
port_stats.tx_dropped, port_stats.rx_errors, port_stats.tx_errors,
port_stats.rx_frame_err, port_stats.rx_over_err, port_stats.rx_crc_err,
port_stats.collisions, port_stats.duration_sec, port_stats.duration_nsec
)
class OFPQueueStatsReplySerializable(OFPQueueStatsReply):
def _serialize_body(self):
msg_pack_into(OFP_MULTIPART_REPLY_PACK_STR, self.buf,
OFP_HEADER_SIZE, OFPMP_QUEUE, 0)
offset = OFP_HEADER_SIZE + 8
queue_stats = self.body
msg_pack_into(OFP_QUEUE_STATS_PACK_STR, self.buf, offset,
queue_stats.port_no, queue_stats.queue_id,
queue_stats.tx_bytes, queue_stats.tx_packets, queue_stats.tx_errors,
queue_stats.duration_sec, queue_stats.duration_nsec
)
class OFPGroupStatsReplySerializable(OFPGroupStatsReply):
def _serialize_body(self):
msg_pack_into(OFP_MULTIPART_REPLY_PACK_STR, self.buf,
OFP_HEADER_SIZE, OFPMP_GROUP, 0)
start_of_reply = offset = OFP_HEADER_SIZE + 8
group_stats = self.body
msg_pack_into(OFP_GROUP_STATS_PACK_STR, self.buf, offset,
0, group_stats.group_id, group_stats.ref_count,
group_stats.packet_count, group_stats.byte_count, group_stats.duration_sec,
group_stats.duration_nsec
)
offset += OFP_GROUP_STATS_SIZE
for bucket in group_stats.bucket_stats:
msg_pack_into(OFP_BUCKET_COUNTER_PACK_STR, self.buf, offset,
bucket.packet_count, bucket.byte_count)
offset += OFP_BUCKET_COUNTER_SIZE
# Backfill length
msg_pack_into("!H", self.buf, start_of_reply, offset - start_of_reply)
class OFPGroupDescStatsReplySerializable(OFPGroupDescStatsReply):
def _serialize_body(self):
msg_pack_into(OFP_MULTIPART_REPLY_PACK_STR, self.buf,
OFP_HEADER_SIZE, OFPMP_GROUP_DESC, 0)
start_of_reply = offset = OFP_HEADER_SIZE + 8
group_desc = self.body
msg_pack_into(OFP_GROUP_DESC_STATS_PACK_STR, self.buf, offset,
0, group_desc.type, group_desc.group_id
)
offset += OFP_GROUP_DESC_STATS_SIZE
for bucket in group_desc.buckets:
bucket.serialize(self.buf, offset)
offset += bucket.len
# Backfill length
msg_pack_into("!H", self.buf, start_of_reply, offset - start_of_reply)
class OFPGroupFeaturesStatsReplySerializable(OFPGroupFeaturesStatsReply):
def _serialize_body(self):
msg_pack_into(OFP_MULTIPART_REPLY_PACK_STR, self.buf,
OFP_HEADER_SIZE, OFPMP_GROUP_FEATURES, 0)
offset = OFP_HEADER_SIZE + 8
group_features = self.body
msg_pack_into(OFP_GROUP_FEATURES_PACK_STR, self.buf, offset,
group_features.types, group_features.capabilities,
group_features.max_groups[0], group_features.max_groups[1],
group_features.max_groups[2], group_features.max_groups[3],
group_features.actions[0], group_features.actions[1],
group_features.actions[2], group_features.actions[3]
)
class OFPMeterStatsReplySerializable(OFPMeterStatsReply):
def _serialize_body(self):
msg_pack_into(OFP_MULTIPART_REPLY_PACK_STR, self.buf,
OFP_HEADER_SIZE, OFPMP_METER, 0)
start_of_reply = offset = OFP_HEADER_SIZE + 8
meter_stats = self.body
msg_pack_into(OFP_METER_STATS_PACK_STR, self.buf, offset,
meter_stats.meter_id, 0,
meter_stats.flow_count, meter_stats.packet_in_count,
meter_stats.byte_in_count, meter_stats.duration_sec,
meter_stats.duration_nsec
)
offset += OFP_METER_STATS_SIZE
for band in meter_stats.band_stats:
msg_pack_into(OFP_METER_BAND_STATS_PACK_STR, self.buf, offset,
band.packet_band_count, band.byte_band_count)
offset += OFP_BUCKET_COUNTER_SIZE
# Backfill length
msg_pack_into("!IH", self.buf, start_of_reply, meter_stats.meter_id, offset - start_of_reply)
class OFPMeterConfigStatsReplySerializable(OFPMeterConfigStatsReply):
def _serialize_body(self):
msg_pack_into(OFP_MULTIPART_REPLY_PACK_STR, self.buf,
OFP_HEADER_SIZE, OFPMP_METER_CONFIG, 0)
start_of_reply = offset = OFP_HEADER_SIZE + 8
meter_config = self.body
msg_pack_into(OFP_METER_CONFIG_PACK_STR, self.buf, offset,
0, meter_config.flags, meter_config.meter_id
)
# I'm not going to program bands because I'm oh so tired.
offset += OFP_METER_CONFIG_SIZE
# Backfill length
msg_pack_into("!H", self.buf, start_of_reply, offset - start_of_reply)
class OFPMeterFeaturesStatsReplySerializable(OFPMeterFeaturesStatsReply):
def _serialize_body(self):
msg_pack_into(OFP_MULTIPART_REPLY_PACK_STR, self.buf,
OFP_HEADER_SIZE, OFPMP_METER_FEATURES, 0)
offset = OFP_HEADER_SIZE + 8
meter_features = self.body
msg_pack_into(OFP_METER_FEATURES_PACK_STR, self.buf, offset,
meter_features.max_meter, meter_features.band_types,
meter_features.capabilities, meter_features.max_bands,
meter_features.max_color
)
class OFPTableFeaturesStatsReplySerializable(OFPTableFeaturesStatsReply):
# Mostly we just rip off the serializers for TableFeatures since they're used on the request
def _serialize_body(self):
msg_pack_into(OFP_MULTIPART_REPLY_PACK_STR, self.buf,
OFP_HEADER_SIZE, OFPMP_TABLE_FEATURES, 0)
bin_body = bytearray()
for p in self.body:
bin_body += p.serialize()
self.buf += bin_body
class OFPPortDescStatsReplySerializable(OFPPortDescStatsReply):
# Mostly we just rip off the serializers for PortDesc since they're used on the request
def _serialize_body(self):
msg_pack_into(OFP_MULTIPART_REPLY_PACK_STR, self.buf,
OFP_HEADER_SIZE, OFPMP_PORT_DESC, 0)
offset = OFP_HEADER_SIZE + 8
for port in self.body:
msg_pack_into(OFP_PORT_PACK_STR, self.buf,
offset,
port.port_no, port.hw_addr , port.name, port.config , port.state , port.curr,
port.advertised , port.supported , port.peer , port.curr_speed, port.max_speed
)
offset += OFP_PORT_SIZE
class OFPRoleReplySerializable(OFPRoleReply):
def _serialize_body(self):
# OFP_ROLE_REQUEST_PACK_STR is used because the packets have the same shape
msg_pack_into(OFP_ROLE_REQUEST_PACK_STR, self.buf,
OFP_HEADER_SIZE, self.role, self.generation_id)
class OFPGetAsyncReplySerializable(OFPGetAsyncReply):
def _serialize_body(self):
msg_pack_into(OFP_ASYNC_CONFIG_PACK_STR, self.buf,
OFP_HEADER_SIZE,
self.packet_in_mask[0], self.packet_in_mask[1],
self.port_status_mask[0], self.port_status_mask[1],
self.flow_removed_mask[0], self.flow_removed_mask[1])
# This class actually implements the OXM header length correctly, which Frenetic does as well
class OFPOxmIdSerializable(OFPOxmId):
def serialize(self):
# Note we don't overwrite self.length. Otherwise, this is just like OFPOxmId.serialize
(n, _v, _m) = oxm_from_user(self.type, None)
oxm = (n << (1 + 8)) | (self.hasmask << 8) | self.length
buf = bytearray()
msg_pack_into(self._PACK_STR, buf, 0, oxm)
return buf
####################################################################################
# Sample Data
# Temproarily set at not-quite-all-f's because Frenetic doesn't handle all f's
simple_match = OFPMatch(in_port=1, eth_dst='00:ff:ff:ff:ff:ff')
pipeline_match = OFPMatch(in_port = 1, in_phy_port = 2, metadata = (3, 0xff), tunnel_id = 4)
nasty_match = OFPMatch(
in_port = 1,
in_phy_port = 2,
metadata = (3, 0xff),
eth_dst = 4,
eth_src = 5,
eth_type = 6,
vlan_vid = 7,
vlan_pcp = 8,
ip_dscp = 9,
ip_ecn = 2, # This is necesary because it's only two bits
ip_proto = 11,
ipv4_src = 12,
ipv4_dst = 13,
tcp_src = 14,
tcp_dst = 15,
udp_src = 16,
udp_dst = 17,
sctp_src = 18,
sctp_dst = 19,
icmpv4_type = 20,
icmpv4_code = 21,
arp_op = 22,
arp_spa = 23,
arp_tpa = 24,
arp_sha = 25,
arp_tha = 26,
ipv6_src = 27,
ipv6_dst = 28,
ipv6_flabel = 29,
icmpv6_type = 30,
icmpv6_code = 31,
ipv6_nd_target = 32,
ipv6_nd_sll = 33,
ipv6_nd_tll = 34,
mpls_label = 35,
mpls_tc = 36,
mpls_bos = 1,
pbb_isid = 38,
tunnel_id = 39,
ipv6_exthdr = 40
)
one_action = [ OFPActionOutput(666, 0) ]
lotsa_actions = [
OFPActionOutput(983745, 0),
OFPActionOutput(OFPP_IN_PORT, 0),
OFPActionOutput(OFPP_TABLE, 0),
OFPActionOutput(OFPP_NORMAL, 0),
OFPActionOutput(OFPP_FLOOD, 0),
OFPActionOutput(OFPP_ALL, 0),
OFPActionOutput(OFPP_CONTROLLER, 6),
OFPActionOutput(OFPP_LOCAL, 0),
OFPActionOutput(OFPP_ANY, 0),
OFPActionGroup(9),
OFPActionSetQueue(10),
OFPActionSetMplsTtl(11),
OFPActionDecMplsTtl(),
OFPActionSetNwTtl(13),
OFPActionDecNwTtl(),
OFPActionCopyTtlOut(),
OFPActionCopyTtlIn(),
OFPActionPushVlan(17),
OFPActionPushMpls(18),
OFPActionPopVlan(),
OFPActionPopMpls(20),
# We test all the set field possibilities in OFPT_FLOW_MOD
OFPActionSetField(eth_src="00:00:00:00:00:15") # 21 = 0x15
]
one_table_property = [
OFPTableFeaturePropInstructions(OFPTFPT_INSTRUCTIONS, [ OFPInstructionId(OFPIT_GOTO_TABLE) ])
]
lotsa_table_properties = [
OFPTableFeaturePropInstructions(OFPTFPT_INSTRUCTIONS, [ OFPInstructionId(OFPIT_GOTO_TABLE) ]),
OFPTableFeaturePropInstructions(
OFPTFPT_INSTRUCTIONS_MISS,
[ OFPInstructionId(OFPIT_WRITE_METADATA), OFPInstructionId(OFPIT_WRITE_ACTIONS),
OFPInstructionId(OFPIT_APPLY_ACTIONS), OFPInstructionId(OFPIT_CLEAR_ACTIONS),
OFPInstructionId(OFPIT_METER)
]
),
OFPTableFeaturePropNextTables(OFPTFPT_NEXT_TABLES, [100, 150, 200, 250]),
OFPTableFeaturePropNextTables(OFPTFPT_NEXT_TABLES_MISS, [1, 2, 3, 4]),
OFPTableFeaturePropActions(OFPTFPT_WRITE_ACTIONS, [ OFPActionId(OFPAT_OUTPUT) ]),
OFPTableFeaturePropActions(
OFPTFPT_WRITE_ACTIONS_MISS,
[ OFPActionId(OFPAT_COPY_TTL_OUT), OFPActionId(OFPAT_COPY_TTL_IN),
OFPActionId(OFPAT_PUSH_VLAN), OFPActionId(OFPAT_POP_VLAN),
OFPActionId(OFPAT_PUSH_MPLS), OFPActionId(OFPAT_POP_MPLS),
]
),
OFPTableFeaturePropActions(OFPTFPT_APPLY_ACTIONS, [ OFPActionId(OFPAT_SET_QUEUE) ]),
OFPTableFeaturePropActions(
OFPTFPT_APPLY_ACTIONS_MISS,
[ OFPActionId(OFPAT_GROUP), OFPActionId(OFPAT_SET_NW_TTL),
OFPActionId(OFPAT_DEC_NW_TTL), OFPActionId(OFPAT_SET_FIELD),
OFPActionId(OFPAT_PUSH_PBB), OFPActionId(OFPAT_POP_PBB)
]
),
# We don't bother matching all fields here because matches are covered elsewhere
OFPTableFeaturePropOxm(OFPTFPT_MATCH, [ OFPOxmIdSerializable('tunnel_id', length=8) ]),
OFPTableFeaturePropOxm(OFPTFPT_WILDCARDS, [ OFPOxmIdSerializable('vlan_pcp', length=1) ]),
OFPTableFeaturePropOxm(OFPTFPT_WRITE_SETFIELD, [ OFPOxmIdSerializable('ipv6_flabel', length=4) ]),
OFPTableFeaturePropOxm(OFPTFPT_WRITE_SETFIELD_MISS, [ OFPOxmIdSerializable('metadata', length=8) ]),
OFPTableFeaturePropOxm(OFPTFPT_APPLY_SETFIELD, [ OFPOxmIdSerializable('ipv6_nd_target', length=16) ]),
OFPTableFeaturePropOxm(OFPTFPT_APPLY_SETFIELD_MISS, [ OFPOxmIdSerializable('eth_dst', length=6) ]),
]
####################################################################################
# OFPT_HELLO
hevb = OFPHelloElemVersionBitmap([1,4]) # This is Openflow 1.0 = 0x01 and 1.3 = 0x04
msgs["OfpHello"] = OFPHelloSerializable(Datapath, elements=hevb)
####################################################################################
# OFPT_ERROR Error Messages - This is a little different in that we dump all the hex
# to one file OfpErrorMsg.hex
# We could introspect these types, but there's no good way to match them with their codes
error_types = {
"OFPET_HELLO_FAILED": ("OFPHFC","Hello"),
"OFPET_BAD_REQUEST": ("OFPBRC","Req"),
"OFPET_BAD_ACTION": ("OFPBAC","Act"),
"OFPET_BAD_INSTRUCTION": ("OFPBIC","Inst"),
"OFPET_BAD_MATCH": ("OFPBAD","Mat"),
"OFPET_FLOW_MOD_FAILED": ("OFPFMFC","Fl"),
"OFPET_GROUP_MOD_FAILED": ("OFPGMFC","Gr"),
"OFPET_PORT_MOD_FAILED": ("OFPPMFC","Po"),
"OFPET_TABLE_MOD_FAILED": ("OFPTMFC","Ta"),
"OFPET_QUEUE_OP_FAILED": ("OFPQOFC","Qu"),
"OFPET_SWITCH_CONFIG_FAILED": ("OFPSCFC","Sc"),
"OFPET_ROLE_REQUEST_FAILED": ("OFPRRFC","Ro"),
"OFPET_METER_MOD_FAILED": ("OFPMMFC","Me"),
"OFPET_TABLE_FEATURES_FAILED": ("OFPTFFC","Tf"),
}
with open('data/openflow0x04/OfpErrorMsg.hex', 'w') as f:
for error_type, (error_code_prefix,fr_prefix) in error_types.iteritems():
error_codes = [cn for cn in openflow_constants if re.match(error_code_prefix + "_", cn)]
for error_code in error_codes:
msg_name = '{0}_{1}'.format(error_type, error_code)
msg = OFPErrorMsg(
Datapath,
type_=getattr(ofproto_v1_3,error_type),
code=getattr(ofproto_v1_3,error_code),
data=msg_name
)
msg.serialize()
f.write( msg_name + "," + binascii.hexlify(msg.buf) + "\n" )
####################################################################################
# OFPT_ECHO_REQUEST
msgs["OfpEchoRequest"] = OFPEchoRequest(Datapath, data="OfpEchoRequest")
####################################################################################
# OFPT_ECHO_REPLY
msgs["OfpEchoReply"] = OFPEchoReply(Datapath, data="OfpEchoReply")
####################################################################################
# OFPT_FEATURES_REQUEST
msgs["OfpFeaturesRequest"] = OFPFeaturesRequest(Datapath)
####################################################################################
# OFPT_FEATURES_REPLY
msgs["OfpFeaturesReply"] = OFPSwitchFeaturesSerializable(Datapath,
datapath_id = 9210263729383,
n_buffers = 897345987,
n_tables = 250,
auxiliary_id = 65,
capabilities = OFPC_FLOW_STATS | OFPC_GROUP_STATS | OFPC_PORT_BLOCKED
)
####################################################################################
# OFPT_GET_CONFIG_REQUEST
msgs["OfpGetConfigRequest"] = OFPGetConfigRequest(Datapath)
####################################################################################
# OFPT_GET_CONFIG_REPLY
msgs["OfpGetConfigReply"] = OFPGetConfigReplySerializable(Datapath,
flags=OFPC_FRAG_DROP | OFPC_FRAG_REASM,
miss_send_len = 603
)
####################################################################################
# OFPT_SET_CONFIG
msgs["OfpSetConfig"] = OFPSetConfig(Datapath,
flags=OFPC_FRAG_NORMAL,
miss_send_len = 603
)
####################################################################################
# OFPT_PACKET_IN
msgs["OfpPacketInBuffered"] = OFPPacketInSerializable(Datapath,
buffer_id = 2348957,
reason = OFPR_INVALID_TTL,
cookie = 0,
table_id = 100,
match = pipeline_match,
data = "Hi mom! This is a buffered packet in."
)
msgs["OfpPacketInUnbuffered"] = OFPPacketInSerializable(Datapath,
buffer_id = OFP_NO_BUFFER,
reason = OFPR_ACTION,
cookie = 98374,
table_id = 200,
match = pipeline_match,
data = "Hi mom! This is an unbuffered packet in."
)
####################################################################################
# OFPT_FLOW_REMOVED
msgs["OfpFlowRemoved"] = OFPFlowRemovedSerializable(Datapath,
cookie = 98374,
priority = 8977,
reason = OFPRR_HARD_TIMEOUT,
table_id = 200,
duration_sec = 8127346,
duration_nsec = 1213414,
idle_timeout = 999,
hard_timeout = 9999,
packet_count = 872364012876751,
byte_count = 198237501837540,
match = nasty_match
)
####################################################################################
# OFPT_PORT_STATUS
ports = OFPPort(
77, # port_no
"\x10\x20\x30\x40\x50\x60", # hw_addr
"Port 77", # name,
OFPPC_PORT_DOWN | OFPPC_NO_FWD, # config
OFPPS_BLOCKED | OFPPS_LIVE, # state
OFPPF_10MB_HD | OFPPF_10GB_FD | OFPPF_COPPER, # curr
OFPPF_10MB_FD | OFPPF_40GB_FD | OFPPF_FIBER, # advertised
OFPPF_100MB_HD | OFPPF_100GB_FD | OFPPF_AUTONEG, # supported
OFPPF_1GB_HD | OFPPF_1TB_FD | OFPPF_PAUSE, # peer
10000000, # curr_speed
100000000 # max_speed
)
msgs["OfpPortStatus"] = OFPPortStatusSerializable(Datapath,
reason = OFPPR_MODIFY,
desc = ports
)
####################################################################################
# OFPT_PACKET_OUT
msgs["OfpPacketOutBuffered"] = OFPPacketOut(Datapath,
buffer_id = 81349218,
in_port = 987245,
actions = one_action
)
msgs["OfpPacketOutUnbuffered"] = OFPPacketOut(Datapath,
buffer_id = OFP_NO_BUFFER,
in_port = 987145,
actions = lotsa_actions
)
####################################################################################
# OFPT_FLOW_MOD
msgs["OfPFlowModAddSingleAction"] = OFPFlowMod(Datapath,
cookie = 0x12754879,
table_id = 100,
command = OFPFC_ADD,
idle_timeout = 0x0190,
hard_timeout = 0x0600,
priority = 0x5678,
buffer_id = OFP_NO_BUFFER,
flags = OFPFF_SEND_FLOW_REM | OFPFF_NO_PKT_COUNTS,
match = simple_match,
instructions = [ OFPInstructionActions(OFPIT_APPLY_ACTIONS, one_action) ]
)
msgs["OfPFlowModAddMultiAction"] = OFPFlowMod(Datapath,
cookie = 0x12554879,
table_id = 200,
command = OFPFC_ADD,
idle_timeout = 0,
hard_timeout = 0,
priority = 0x5478,
buffer_id = 0x87132,
flags = OFPFF_CHECK_OVERLAP | OFPFF_NO_BYT_COUNTS,
match = nasty_match,
instructions = [ OFPInstructionActions(OFPIT_APPLY_ACTIONS, lotsa_actions) ]
)
msgs["OfPFlowModModify"] = OFPFlowMod(Datapath,
cookie = 0x12753838,
cookie_mask = 0xffffffff,
table_id = 200,
command = OFPFC_MODIFY_STRICT,
idle_timeout = 0x0191,
hard_timeout = 0x0601,
priority = 0x5678,
buffer_id = OFP_NO_BUFFER,
flags = OFPFF_RESET_COUNTS,
match = OFPMatch(tcp_src=8000),
instructions = [
OFPInstructionGotoTable(table_id=200),
OFPInstructionWriteMetadata(metadata=2134987, metadata_mask=0xffffffff),
OFPInstructionActions(OFPIT_WRITE_ACTIONS, one_action),
OFPInstructionActions(OFPIT_CLEAR_ACTIONS, []),
OFPInstructionMeter(meter_id = 271)
]
)
msgs["OfPFlowModDelete"] = OFPFlowMod(Datapath,
table_id = OFPTT_ALL,
command = OFPFC_DELETE,
flags = OFPFF_RESET_COUNTS,
priority = 0,
out_port = 0x921474,
out_group = OFPG_ANY,
match = OFPMatch(udp_src=800),
instructions = [ ]
)
####################################################################################
# OFPT_GROUP_MOD
msgs["OfpGroupModAddNoActions"] = OFPGroupMod(Datapath,
command = OFPGC_ADD,
type_ = OFPGT_ALL,
group_id = 391247,
buckets = []
)
buckets = [ OFPBucket(actions=one_action) ]
msgs["OfpGroupModAddOneAction"] = OFPGroupMod(Datapath,
command = OFPGC_ADD,
type_ = OFPGT_INDIRECT,
group_id = 321347,
buckets = buckets
)
buckets = [
OFPBucket(actions=one_action, weight=40),
OFPBucket(actions=one_action, weight=10)
]
msgs["OfpGroupModAddSelect"] = OFPGroupMod(Datapath,
command = OFPGC_ADD,
type_ = OFPGT_SELECT,
group_id = 121347,
buckets = buckets
)
broadcast_actions = [ OFPActionOutput(p, 0) for p in range(1,4) ]
buckets = [ OFPBucket(actions=[a]) for a in broadcast_actions ]
msgs["OfpGroupModAddAll"] = OFPGroupMod(Datapath,
command = OFPGC_ADD,
type_ = OFPGT_ALL,
group_id = 121340,
buckets = buckets
)
buckets = [ OFPBucket(actions=[a], watch_port=(i+17), watch_group=(int(i/2))) for i, a in enumerate(broadcast_actions) ]
msgs["OfpGroupModAddFf"] = OFPGroupMod(Datapath,
command = OFPGC_ADD,
type_ = OFPGT_FF,
group_id = 205793,
buckets = buckets
)
buckets = [
OFPBucket(actions=one_action, weight=10),
OFPBucket(actions=one_action, weight=40)
]
msgs["OfpGroupModModify"] = OFPGroupMod(Datapath,
command = OFPGC_MODIFY,
type_ = OFPGT_SELECT,
group_id = 121347,
buckets = buckets
)
msgs["OfpGroupModDelete"] = OFPGroupMod(Datapath,
command = OFPGC_DELETE,
type_ = OFPGT_ALL,
group_id = 391247,
buckets = []
)
####################################################################################
# OFPT_PORT_MOD
msgs["OfpPortMod"] = OFPPortMod(Datapath,
port_no = 77,
hw_addr = "10:20:30:40:50:60",
config = OFPPC_PORT_DOWN | OFPPC_NO_FWD,
mask = 0xff,
advertise = OFPPF_10MB_FD | OFPPF_40GB_FD | OFPPF_FIBER
)
####################################################################################
# OFPT_TABLE_MOD
msgs["OfpTableMod"] = OFPTableMod(Datapath,
table_id = 156,
config = 3
)
####################################################################################
# OFPT_MULTIPART_REQUEST
msgs["OfpDescStatsRequest"] = OFPDescStatsRequest(Datapath, flags=0)
msgs["OfpFlowStatsRequest"] = OFPFlowStatsRequest(Datapath,
flags = 1, # A "more" bit set just to make sure it works OK. We're not going to send > 1
table_id = 199,
out_port = 12325,
out_group = 9712346,
cookie= 871625978634,
cookie_mask = 0xffffffffffff,
match = simple_match
)
msgs["OfpAggregateStatsRequest"] = OFPAggregateStatsRequest(Datapath,
flags = 0,
table_id = 201,
out_port = 12325,
out_group = 9712346,
cookie= 871625978634,
cookie_mask = 0xffffffffffff,
match = simple_match
)
msgs["OfpTableStatsRequest"] = OFPTableStatsRequest(Datapath, flags=0)
msgs["OfpPortStatsRequest"] = OFPPortStatsRequest(Datapath, flags=0, port_no=555)
msgs["OfpQueueStatsRequest"] = OFPQueueStatsRequest(Datapath, flags=0, port_no=565, queue_id=192834)
msgs["OfpGroupStatsRequest"] = OFPGroupStatsRequest(Datapath, flags=0, group_id=5123456)
msgs["OfpGroupDescStatsRequest"] = OFPGroupDescStatsRequest(Datapath, flags=0)
msgs["OfpGroupFeaturesStatsRequest"] = OFPGroupFeaturesStatsRequest(Datapath, flags=0)
msgs["OfpMeterStatsRequest"] = OFPMeterStatsRequest(Datapath, flags=0, meter_id=6234324)
msgs["OfpMeterConfigStatsRequest"] = OFPMeterConfigStatsRequest(Datapath, flags=0, meter_id=6234324)
msgs["OfpMeterFeaturesStatsRequest"] = OFPMeterFeaturesStatsRequest(Datapath, flags=0)
tbs = [
OFPTableFeaturesStats(
table_id=1,
name="Init Table",
metadata_match=0,
metadata_write=0,
config=3, # OFPTC_DEPRECATED_MASK,
max_entries=10,
properties=one_table_property
),
OFPTableFeaturesStats(
table_id=100,
name="ACL Table",
metadata_match=0xfffff,
metadata_write=0xff,
config=3, # OFPTC_DEPRECATED_MASK,
max_entries=500,
properties=lotsa_table_properties
),
]
msgs["OfpTableFeaturesStatsRequest"] = OFPTableFeaturesStatsRequest(Datapath,
flags = 0,
body = tbs
)
msgs["OfpPortDescStatsRequest"] = OFPPortDescStatsRequest(Datapath, flags=0)
####################################################################################
# OFPT_MULTIPART_REPLY
msgs["OfpDescStatsReply"] = OFPDescStatsReplySerializable(Datapath,
body = OFPDescStats(
mfr_desc = "Manufacturer Description",
hw_desc = "Hardware Description",
sw_desc = "Software Descriptiuon",
serial_num = "0123456789-JHJH",
dp_desc = "Dataplane Description"
)
)
msgs["OfpFlowStatsReply"] = OFPFlowStatsReplySerializable(Datapath,
body = OFPFlowStats(
table_id = 100,
duration_sec = 999,
duration_nsec = 888,
priority = 0x5678,
idle_timeout = 0x0190,
hard_timeout = 0x0600,
flags = OFPFF_SEND_FLOW_REM | OFPFF_NO_PKT_COUNTS,
cookie = 0x12754879,
packet_count = 4000,
byte_count = 3000,
match = simple_match,
instructions = [ OFPInstructionActions(OFPIT_APPLY_ACTIONS, one_action) ]
)
)
msgs["OfpAggregateStatsReply"] = OFPAggregateStatsReplySerializable(Datapath,
body = OFPAggregateStats(
packet_count = 4000,
byte_count = 3000,
flow_count = 2000
)
)
msgs["OfpTableStatsReply"] = OFPTableStatsReplySerializable(Datapath,
body = OFPTableStats(
table_id = 100,
active_count = 600,
lookup_count = 2000,
matched_count = 666
)
)
msgs["OfpPortStatsReply"] = OFPPortStatsReplySerializable(Datapath,
body = OFPPortStats(
port_no = 574190793,
rx_packets = 1113204397,
tx_packets = 2702231185,
rx_bytes = 2451900840,
tx_bytes = 2654217578,
rx_dropped = 2311349152,
tx_dropped = 2340791430,
rx_errors = 1441457975,
tx_errors = 3861416712,
rx_frame_err = 3760794366,
rx_over_err = 3471122481,
rx_crc_err = 38255885,
collisions = 4183796980,
duration_sec = 327091,
duration_nsec = 417782
)
)
msgs["OfpQueueStatsReply"] = OFPQueueStatsReplySerializable(Datapath,
body = OFPQueueStats(
port_no = 574190793,
queue_id = 98734,
tx_bytes = 2654217578,
tx_packets = 2702231185,
tx_errors = 3861416712,
duration_sec = 327091,
duration_nsec = 417782
)
)
msgs["OfpGroupStatsReply"] = OFPGroupStatsReplySerializable(Datapath,
body = OFPGroupStats(
group_id = 37135343,
ref_count = 30334666,
packet_count = 16467336,
byte_count = 31159107,
duration_sec = 18179039,
duration_nsec = 36282180,
bucket_stats = [
OFPBucketCounter(packet_count=3575169166, byte_count=2156878186),
OFPBucketCounter(packet_count=3664701344, byte_count=998359161)
]
)
)
buckets = [ OFPBucket(actions=one_action) ]
msgs["OfpGroupDescStatsReply"] = OFPGroupDescStatsReplySerializable(Datapath,
body = OFPGroupDescStats(
type_ = OFPGT_SELECT,
group_id = 321347,
buckets = buckets
)
)
msgs["OfpGroupFeaturesStatsReply"] = OFPGroupFeaturesStatsReplySerializable(Datapath,
body = OFPGroupFeaturesStats(
types = (1 << OFPGT_INDIRECT) | (1 << OFPGT_FF),
capabilities = OFPGFC_SELECT_WEIGHT | OFPGFC_CHAINING,
max_groups = [ 100, 0, 200, 0 ],
actions = [
(1 << OFPAT_GROUP) | (1 << OFPAT_POP_PBB),
0,
(1 << OFPAT_PUSH_MPLS) | (1 << OFPAT_PUSH_PBB),
0
]
)
)
msgs["OfpMeterStatsReply"] = OFPMeterStatsReplySerializable(Datapath,
body = OFPMeterStats(
meter_id = 356936,
flow_count = 381305,
packet_in_count = 283995,
byte_in_count = 28555,
duration_sec = 382212,
duration_nsec = 139569,
band_stats = [
OFPMeterBandStats( 137645, 330608),
OFPMeterBandStats( 92874353, 1254987)
]
)
)
msgs["OfpMeterConfigStatsReply"] = OFPMeterConfigStatsReplySerializable(Datapath,
body = OFPMeterConfigStats(
flags = OFPMF_KBPS | OFPMF_BURST,
meter_id = 19857,
bands = [ ]
)
)
msgs["OfpMeterFeaturesStatsReply"] = OFPMeterFeaturesStatsReplySerializable(Datapath,
body = OFPMeterFeaturesStats(
max_meter = 987234,
band_types = (1 << OFPMBT_DROP) | ( 1 << OFPMBT_DSCP_REMARK ),
capabilities = OFPMF_KBPS | OFPMF_BURST,
max_bands = 100,
max_color = 200
)
)
tbs = OFPTableFeaturesStats(
table_id=1,
name="Init Table",
metadata_match=0,
metadata_write=0,
config=3, # OFPTC_DEPRECATED_MASK,
max_entries=10,
properties=one_table_property
)
msgs["OfpTableFeaturesStatsReply"] = OFPTableFeaturesStatsReplySerializable(Datapath, body = [ tbs ] )
msgs["OfpPortDescStatsReply"] = OFPPortDescStatsReplySerializable(Datapath, body = [ ports ] )
####################################################################################
# OFPT_BARRIER_REQUEST
msgs["OfpBarrierRequest"] = OFPBarrierRequest(Datapath)
####################################################################################
# OFPT_BARRIER_REPLY
msgs["OfpBarrierReply"] = OFPBarrierReply(Datapath)
####################################################################################
# OFPT_QUEUE_GET_CONFIG_REQUEST
msgs["OfpQueueGetConfigRequest"] = OFPQueueGetConfigRequest(Datapath,
port= 2387456
)
####################################################################################
# OFPT_QUEUE_GET_CONFIG_REPLY
msgs["OfpQueueGetConfigReply"] = OFPQueueGetConfigReplySerializable(Datapath,
port=2387456,
queues = [
OFPPacketQueue(queue_id=2134, port=2387456, properties=[
OFPQueuePropMinRate(rate=20), OFPQueuePropMaxRate(rate=46),
]),
OFPPacketQueue(queue_id=284570349, port=2387456, properties=[
OFPQueuePropMinRate(rate=33), OFPQueuePropMaxRate(rate=0xffff),
])
]
)
####################################################################################
# OFPT_ROLE_REQUEST
msgs["OfpRoleRequest"] = OFPRoleRequest(Datapath,
role = OFPCR_ROLE_EQUAL,
generation_id = 92580291354
)
####################################################################################
# OFPT_ROLE_REPLY
msgs["OfpRoleReply"] = OFPRoleReplySerializable(Datapath,
role = OFPCR_ROLE_SLAVE,
generation_id = 92581791354
)
####################################################################################
# OFPT_GET_ASYNC_REQUEST
msgs["OfpGetAsyncRequest"] = OFPGetAsyncRequest(Datapath)
####################################################################################
# OFPT_GET_ASYNC_REPLY
msgs["OfpGetAsyncReply"] = OFPGetAsyncReplySerializable(Datapath,
packet_in_mask = [ 1 << OFPR_NO_MATCH, 1 << OFPR_ACTION | 1 << OFPR_INVALID_TTL ],
port_status_mask = [ 1 << OFPPR_ADD | 1 << OFPPR_MODIFY , 1 << OFPPR_DELETE ],
flow_removed_mask = [ 1 << OFPRR_IDLE_TIMEOUT | 1 << OFPRR_DELETE, 1 << OFPRR_HARD_TIMEOUT | 1 << OFPRR_GROUP_DELETE ]
)
####################################################################################
# OFPT_SET_ASYNC
msgs["OfpSetAsync"] = OFPSetAsync(Datapath,
packet_in_mask = [ 1 << OFPR_ACTION | 1 << OFPR_INVALID_TTL, 1 << OFPR_NO_MATCH ],
port_status_mask = [ 1 << OFPPR_DELETE, 1 << OFPPR_ADD | 1 << OFPPR_MODIFY ],
flow_removed_mask = [ 1 << OFPRR_HARD_TIMEOUT | 1 << OFPRR_GROUP_DELETE, 1 << OFPRR_IDLE_TIMEOUT | 1 << OFPRR_DELETE ]
)
####################################################################################
# OFPT_METER_MOD
msgs["OfpMeterMod"] = OFPMeterMod(Datapath,
command = OFPMC_ADD,
flags = OFPMF_KBPS | OFPMF_BURST,
meter_id = 19857,
bands = [
OFPMeterBandDrop(rate=187236, burst_size=4345234),
OFPMeterBandDscpRemark(rate=234214, burst_size=2359834, prec_level=66)
]
)
####################################################################################
# Finally, dump them all out.
for msg_name, msg in msgs.iteritems():
msg.serialize()
hex_file_name = 'data/openflow0x04/{0}.hex'.format(msg_name)
with open(hex_file_name, 'w') as f:
f.write( binascii.hexlify(msg.buf) )
|
Katharine Coman
Katharine Ellis Coman ( – ) was an American historian, economist, sociologist, educator, and social activist. Coman worked at Wellesley College for 35 years as an instructor, professor, and dean. Believing that the field of political economy could be harnessed to solve the pressing social problems of the day, Coman created new courses in the discipline. She specialized in research and teaching about the development of the American West, and British and American industrialism. In her work, she criticized capitalism and supported the labor movement. She wrote the first history of American industry as well as the first paper published in The American Economic Review. She was the first female statistics professor in the US and the only woman co-founder of the American Economics Association. Throughout her life, she traveled widely to conduct her economics research. A social activist, Coman supported the settlement movement and the labor movement. She shared a home with poet Katharine Lee Bates for 25 years, and the two women often traveled together. Coman died of breast cancer in 1915. Wellesley College created the Katharine Coman Professorship of Industrial History in her honor.
Early life
Coman was born on November 23, 1857, to Martha Ann Seymour Coman (1826–1911) and Levi Parsons Coman (1826–1889) in Newark, Ohio. Her mother had graduated from an Ohio female seminary, and her father had been educated at Hamilton College, and thus Coman received much of her early education at home. She attended the University of Michigan for two years, left college to teach in Ottawa, Illinois for two years, and then returned to university. She earned a Bachelor of Philosophy (PhB) degree in 1880, one of only a handful of women to do so. She was heavily influenced by the work of John Stuart Mill, which is evident in her later work as economist and historian. Coman attended lectures about socialism while traveling in London. Later in her career, she was influenced by Alfred Marshall (1890), Francis Amasa Walker (1883), and social Darwinism. While at the University of Michigan, Coman studied under Professors Charles Kendall Adams of the German Historical School; James Burrill Angell, then president of the university; and Henry Carter Adams, a renowned statistician.
Wellesley College
After earning her PhB, she joined the faculty at Wellesley College, a newly established private college for women. Angell recommended her for the position, noting her talent for teaching. She first taught English rhetoric, and in 1881 became an instructor in history. In 1883, she was promoted to full professor of history. Because Coman believed that economics could address social problems, she urged the Wellesley administration to offer courses on the subject, and in 1883, she taught the college's first political economy class. Coman was the first American woman to teach statistics and Wellesley became the only American women's college to offer statistics courses before 1900.
Coman developed and taught several new courses in economics, history, and rhetoric, including Statistical Study of Economic Problems, Industrial History of the United States, and Conservation of Our Natural Resources, all framed by sociological insights related to social justice. To teach students about the practicality of applying economic theory to real world economic and social problems, Coman escorted her students on field trips to Boston's tenement houses, labor union meetings, factories, and sweatshops. In 1885, at the age of 28, she became professor of history and economics. That same year, she turned down the offer of a position as dean of women at the University of Michigan, stating that she preferred to remain at Wellesley and continue teaching. She was acting dean from 1899 to 1900, during which time she established a new department of economics and sociology, becoming its head in 1900.
According to historian Melinda Ponder, Coman was a popular teacher. Two of her students, Helen Frances Page Bates and Helen Laura Sumner Woodbury, were among the first American women to earn PhDs in economics. Woodbury is recognized as an important historian of labor and a noted economist, while Helen Bates became a noted social worker.
She retired from full-time teaching at Wellesley in 1913, becoming professor emeritus. In writing about the farewell dinner held in her honor, the New York Times said: "Miss Coman has been so closely associated with the history and development of Wellesley for so long a time that her loss is felt very deeply by the whole college." Coman continued to research and write until her death in 1915.
Coman's papers are held by the Wellesley College Archives. In 1921, the college established the Katharine Coman Professorship of Industrial History to honor her service.
Notable works
Coman and Elizabeth Kendall coauthored the 1902 book A Short History of England for School Use based on research that Coman conducted in England between 1886 and 1894. Coman published The Industrial History of the United States in 1910, the first industrial history of the United States. It was reprinted nine times before 1915. Her 1911 article, "Some Unsettled Problems of Irrigation," was the first article published in the newly formed journal The American Economic Review.
Her 1912 work Economic Beginnings of the Far West: How We Won the Land Beyond the Mississippi was considered by contemporaneous scholars to be her magnum opus, and "one of the most important fruits of the Carnegie Foundation for the Advancement of Teaching." The book outlined the economic history of the American West. In this work, Coman describes the historical economic processes that led to the Far West coming under the control of settlers. She found that settlers were more economically successful than explorers, traders, trappers, and indigenous peoples because the settlers built permanent settlements, reproduced at a higher rate, and established networks of collaboration.
Settlement movement activist Jane Addams, a close friend, urged Coman to research social insurance programs in Europe in order to establish similar programs in the United States. Coman studied social insurance in England, Spain, Denmark, and Sweden, but poor health prevented her from continuing her research. Her manuscript, "Unemployment Insurance: A Summary of European Systems" was published after her death in 1915.
Social activism
Coman was passionate about social and economic issues, especially women's education, poverty, immigration, and labor. Throughout her life, she was active in social reform movements, especially the labor movement and the settlement movement. She served as the president of the electoral board and chair of the standing committee of the National College Settlements Association in 1900. Coman organized a group of immigrant women who worked in Boston sweatshops, naming the group an "Evening Club for Tailoresses," and attempted to found a tailor shop that could have been an alternative to sweatshops. She assisted in organizing the 1910 Chicago garment workers' strike, which involved 40,000 factory workers. Coman also worked with the Women's Trade Union League. Working with her economist and sociologist friend Emily Greene Balch and other women, Coman co-founded Denison House in 1892, a college women's settlement house located in Boston, serving as its first chair. Denison House provided a center for Boston's labor activists, and is thought to be the first settlement house on the East Coast.
Personal life
For 25 years, Coman lived in a "Boston marriage" with Wellesley professor and poet Katharine Lee Bates, the author of "America the Beautiful". Such partnerships were so common among Wellesley faculty that they were called "Wellesley marriages". Coman and Bates shared a house they named "the Scarab" with Bates' mother, Cornelia, and her sister, Jeannie. The women reportedly enjoyed life together as family. Coman frequently traveled for her research on economic history; she visited Europe, the American West, Scandinavia, and Egypt. Bates accompanied her on many of these trips. Some scholars believe the two women were a lesbian couple.
Breast cancer and death
Coman first discovered a lump in her left breast in the fall of 1911 and underwent two surgeries in the following months. At the time, medical doctors did not understand the nature of breast cancer, its causes or its treatments, so the prognosis for Coman was poor. Coman died at home in January 1915 at the age of 58. At the time of her death, Coman was working on an industrial history of New England.
During Coman's illness, friends of her and Bates—many of them also in "Wellesley marriages"—took Coman out for walks and visits, and invited her to stay at their country homes. They prepared meals for Coman and Bates, brought flowers and fresh vegetables, and performed tasks and services to keep Coman's spirits up. Bates chronicled Coman's illness in her diary, noting hospital visits, surgical procedures, and details about Coman's pain and suffering. According to cancer historian Ellen Leopold, in the days after Coman's death, Bates wrote a memorial to her that was designed to be circulated privately among the women's close friends and family. Leopold believes that the book, For Katharine Coman's Family and Innermost Circle of Friends, is the first breast cancer narrative in American literature. Near the end of Coman's life, the two women exchanged loving farewells through reciting poems and psalms to each other. Several years after Coman's death, Bates continued to mourn and to recall Coman's suffering. In 1922, Bates published a book of poems about Coman's illness, Yellow Clover: A Book of Remembrance. The book's title emerged from the fact that the "two Katharines," as the women were known, would send each other sprigs of yellow clover as tokens of affection.
Assessment
A review of Coman's book Economic Beginnings of the Far West: How We Won the Land Beyond the Mississippi (1912) in the San Francisco Chronicle stated that "the author is one of those new women who have shown what may be accomplished in the way of research by method and industry and a great deal of enthusiasm." In a 1913 review of her book, economist Thomas Nixon Carver praised Coman's narrative style and lively prose. Also writing in 1913, economist Frederic Paxson criticized the book, arguing that there were factual errors and inaccurate citations, and that the data for the book were already widely available in university research libraries. Paxson does credit Coman with having prepared an extensive bibliography and for providing extensive notes. The two-volume book is today hailed as a classic and was reprinted twice; Macmillan in 1925, and Kelly in 1969. The University of Michigan "Naming Project" notes that she was one of the first historians to use local newspaper articles and government documents as primary sources in her teaching and writing.
Gerald F. Vaughn, a contemporary economist writing in 2004, proposes that Coman was America's first female institutional economist. Vaughn notes other important facts about Coman that frame her as a pioneer for women academics, including the fact that at the time, the discipline and profession of economics was dominated by men. She was the only woman among the group of economists who founded the American Economic Association in 1885 and she was the first American woman to become a statistics professor. Vaughn notes that her contributions to economics and social history went beyond being the "first woman," for example writing the first article to be published in The American Economic Review and authoring the first industrial history of the US. Coman's extensive work on the processes of institutional change in the American West made her an influential industrial historian and The Industrial History of the United States was widely used as a textbook for decades.
In 2011, The American Economic Review commemorated its first hundred years by publishing a list of the top twenty articles in the journal's history. Coman's 1911 article "Some Unsettled Problems of Irrigation," published in 1911, was the first article published by the journal and was reprinted in the 2011 issue. The article analyzed water rights, access, and availability. Also in this issue of The American Economic Review, economist Gary D. Libecap noted that Coman's work continued to be relevant, particularly for scholars interested in the economics of climate change. Elinor Ostrom, an American political economist, believes that Coman's article continues to provide "insight into the problems of collective action related to irrigation in the American West."
Selected publications
Books
(reprinted 1908, 1911, 1914)
(reprinted in 1906, 1907, 1908; revised 1910; reprinted 1912, 1918, 1973)
(reprinted 1925; 1969)
Articles
Coman, Katharine. (1911). "Some Unsettled Problems of Irrigation." The American Economic Review 1(1): 1–19. Reprinted in 2011 as The American Economic Review 101: 36–48.
References
Notes
Citations
External links
Category:1857 births
Category:1915 deaths
Category:American women economists
Category:People from Newark, Ohio
Category:University of Michigan alumni
Category:Deaths from cancer in Massachusetts
Category:Wellesley College faculty
Category:Women statisticians
Category:Statistics educators
Category:Deaths from breast cancer
Category:Activists from Ohio
Category:Economists from Ohio
Category:American women historians
|
Q:
How to place 2 ListViews in Navigation Drawer?
Here is the xml schema for my navigation drawer_main...
i have to place user image in upper listview and other data via 2nd listview just like soundcloud. but i get 2nd listview in navigation drawer button and by moving edge i get first drawer.. help me to combine both
XML code
<android.support.v4.widget.DrawerLayout xmlns:android="http://schemas.android.com/apk/res/android"
android:id="@+id/drawer_layout"
android:layout_width="match_parent"
android:layout_height="match_parent" >
<FrameLayout
android:id="@+id/content_frame"
android:orientation="vertical"
android:layout_width="match_parent"
android:layout_height="match_parent" />
<ListView
android:id="@+id/linerlayout_drawer"
android:layout_height="match_parent"
android:layout_width="240dp"
android:layout_gravity="start"
android:background="@color/white"
android:choiceMode="singleChoice"
android:divider="@android:color/transparent"
android:dividerHeight="0dp"
android:layout_weight="1"/>
<ListView
android:id="@+id/listview_drawer"
android:layout_height="match_parent"
android:layout_width="240dp"
android:layout_gravity="start"
android:background="@color/white"
android:choiceMode="singleChoice"
android:divider="@android:color/transparent"
android:dividerHeight="0dp"
android:layout_weight="1" />
</android.support.v4.widget.DrawerLayout>
Errors if i wrap them in linear layout
04-08 21:08:36.605: E/AndroidRuntime(9373): FATAL EXCEPTION: main
04-08 21:08:36.605: E/AndroidRuntime(9373): java.lang.RuntimeException: Unable to start activity ComponentInfo{com.ZDevelopers.Workmania/com.ZDevelopers.Workmania.MainActivity}: java.lang.ClassCastException: android.widget.LinearLayout$LayoutParams cannot be cast to android.support.v4.widget.DrawerLayout$LayoutParams
04-08 21:08:36.605: E/AndroidRuntime(9373): at android.app.ActivityThread.performLaunchActivity(ActivityThread.java:2295)
04-08 21:08:36.605: E/AndroidRuntime(9373): at android.app.ActivityThread.handleLaunchActivity(ActivityThread.java:2349)
04-08 21:08:36.605: E/AndroidRuntime(9373): at android.app.ActivityThread.access$700(ActivityThread.java:159)
04-08 21:08:36.605: E/AndroidRuntime(9373): at android.app.ActivityThread$H.handleMessage(ActivityThread.java:1316)
04-08 21:08:36.605: E/AndroidRuntime(9373): at android.os.Handler.dispatchMessage(Handler.java:99)
04-08 21:08:36.605: E/AndroidRuntime(9373): at android.os.Looper.loop(Looper.java:176)
04-08 21:08:36.605: E/AndroidRuntime(9373): at android.app.ActivityThread.main(ActivityThread.java:5419)
04-08 21:08:36.605: E/AndroidRuntime(9373): at java.lang.reflect.Method.invokeNative(Native Method)
04-08 21:08:36.605: E/AndroidRuntime(9373): at java.lang.reflect.Method.invoke(Method.java:525)
04-08 21:08:36.605: E/AndroidRuntime(9373): at com.android.internal.os.ZygoteInit$MethodAndArgsCaller.run(ZygoteInit.java:1046)
04-08 21:08:36.605: E/AndroidRuntime(9373): at com.android.internal.os.ZygoteInit.main(ZygoteInit.java:862)
04-08 21:08:36.605: E/AndroidRuntime(9373): at dalvik.system.NativeStart.main(Native Method)
04-08 21:08:36.605: E/AndroidRuntime(9373): Caused by: java.lang.ClassCastException: android.widget.LinearLayout$LayoutParams cannot be cast to android.support.v4.widget.DrawerLayout$LayoutParams
04-08 21:08:36.605: E/AndroidRuntime(9373): at android.support.v4.widget.DrawerLayout.isDrawerView(DrawerLayout.java:857)
04-08 21:08:36.605: E/AndroidRuntime(9373): at android.support.v4.widget.DrawerLayout.closeDrawer(DrawerLayout.java:1058)
04-08 21:08:36.605: E/AndroidRuntime(9373): at com.ZDevelopers.Workmania.MainActivity.selectItem(MainActivity.java:203)
04-08 21:08:36.605: E/AndroidRuntime(9373): at com.ZDevelopers.Workmania.MainActivity.onCreate(MainActivity.java:142)
04-08 21:08:36.605: E/AndroidRuntime(9373): at android.app.Activity.performCreate(Activity.java:5372)
04-08 21:08:36.605: E/AndroidRuntime(9373): at android.app.Instrumentation.callActivityOnCreate(Instrumentation.java:1104)
04-08 21:08:36.605: E/AndroidRuntime(9373): at android.app.ActivityThread.performLaunchActivity(ActivityThread.java:2257)
04-08 21:08:36.605: E/AndroidRuntime(9373): ... 11 more
A:
@Zain wrap both your Listviews into a LinearLayout.
Like so:-
<android.support.v4.widget.DrawerLayout xmlns:android="http://schemas.android.com/apk/res/android"
android:id="@+id/drawer_layout"
android:layout_width="match_parent"
android:layout_height="match_parent" >
<FrameLayout
android:id="@+id/content_frame"
android:orientation="vertical"
android:layout_width="match_parent"
android:layout_height="match_parent" />
<LinearLayout
android:id="@+id/mainLinearLayout"
android:layout_width="match_parent"
android:layout_height="match_parent">
<ListView
android:id="@+id/linerlayout_drawer"
android:layout_height="match_parent"
android:layout_width="240dp"
android:layout_gravity="start"
android:background="@color/white"
android:choiceMode="singleChoice"
android:divider="@android:color/transparent"
android:dividerHeight="0dp"
android:layout_weight="1"/>
<ListView
android:id="@+id/listview_drawer"
android:layout_height="match_parent"
android:layout_width="240dp"
android:layout_gravity="start"
android:background="@color/white"
android:choiceMode="singleChoice"
android:divider="@android:color/transparent"
android:dividerHeight="0dp"
android:layout_weight="1" />
</LinearLayout>
</android.support.v4.widget.DrawerLayout>
Then change your
mDrawerLayout.isDrawerOpen(mainLinearLayout);
and
mDrawerLayout.closeDrawer(mainLinearLayout);
|
YES, BUT HE ALSOWAS A PROPHET
WHO KNEW THE SECRET TRUTHABOUT THE NATURE OF LIFE.
THIS IS JUSTTOO MUCH...
WE WANT TOREVEAL TO STAN
THE GREAT SECRET OF LIFEBEHIND OUR CHURCH.
THE SAFELY GUARDEDSCIENTOLOGY DOCTRINE.
PLEASE, YOUR SON DESERVESTO BE ENLIGHTENED.
STAN, DO YOUWANT TO HEAR
THE GREAT SECRET DOCTRINE OF LIFE BEHIND SCIENTOLOGY ?
SURE.
ALRIGHT, GO AHEADAND TELL HIM.
WOULD YOUEXCUSE US, PLEASE.
THIS IS HIGHLY CLASSIFIEDCHURCH INFORMATION.
AW, RATS !
USUALLY, TO HEARTHE SECRET DOCTRINE
YOU HAVE TO BE IN THE CHURCHFOR SEVERAL YEARS, STAN.
ARE YOU READYTO HEAR THE TRUTH ?
I... I GUESS.
YOU SEE, STAN.
THERE IS A REASON FOR PEOPLEFEELING SAD AND DEPRESSED...
AN ALIEN REASON.
IT ALL BEGAN SEVENTY-FIVEMILLION YEARS AGO...
BACK THEN, THERE WAS A GALACTICFEDERATION OF PLANETS,
WHICH WAS RULED OVERBY THE EVIL LORD XENU !
HA HA HA HAAA !
XENU THOUGHT HIS GALAXYWAS OVERPOPULATED
AND SO HE ROUNDED UPCOUNTLESS ALIENS
FROM ALLDIFFERENT PLANETS...
AND THEN HADTHOSE ALIENS FROZEN !
ZBAATAAA !
HA HA HA HAAAA !
THE FROZEN ALIEN BODIES
WERE LOADED ONTOXENU'S GALACTIC CRUISERS,
WHICH LOOKED LIKE DC-8s,EXCEPT WITH ROCKET ENGINES.
THE CRUISERS THEN TOOKTHE FROZEN ALIEN BODIES
TO OUR PLANET... EARTH.
AND DUMPED THEM INTOTHE VOLCANOES OF HAWAII.
THE ALIENS WERENO LONGER FROZEN
THEY WERE DEAD.
THE SOULS OF THOSE ALIENSHOWEVER, LIVED ON
AND ALL FLOATED UPTOWARDS THE SKY...
BUT, THE EVIL LORD XENUHAD PREPARED FOR THIS !
HA HA HA HAAAAA !
XENU DIDN'T WANTTHEIR SOULS TO RETURN,
AND SO HE HAD BUILT GIANTSOUL CATCHERS IN THE SKY !
AAAAAGHGHGH !ZZZZZZBAAAAA !
THE SOULS WERE TAKEN TO A HUGESOUL BRAINWASHING FACILITY
WHICH XENU HAD ALSOBUILT ON EARTH !
THERE THE SOULSWERE FORCED TO WATCH
DAYS OF BRAINWASHING MATERIAL
WHICH TRICKED THEM INTOBELIEVING A FALSE REALITY.
XENU THEN RELEASEDTHE ALIEN SOULS,
WHICH ROAMED THE EARTHAIMLESSLY IN A FOG OF CONFUSION.
AT THE DAWN OF MAN,
THE SOULS FINALLY FOUND BODIESWHICH THEY COULD GRAB ONTO.
THEY ATTACHED THEMSELVESTO ALL MANKIND
WHICH STILL TO THIS DAY,CAUSES ALL OF OUR FEARS,
OUR CONFUSIONSAND OUR PROBLEMS.
L. RON HUBBARDDID AN AMAZING THING,
TELLING THE WORLDTHIS INCREDIBLE TRUTH.
NOW ALL WE'REASKING YOU TO DO...
IS PICK UPWHERE HE LEFT OFF.
BUT I DON'T KNOWANY OF THIS STUFF !
NEITHER DID L. RONWHEN HE STARTED.
HE SAID HE JUSTCLOSED HIS EYES
AND WROTE DOWNWHATEVER CAME TO MIND.
YOU CAN DO THE SAME,JUST LET IT FLOW.
OKAY, I'LL TRY.
I JUST WISH I COULDWRITE IN MY ROOM,
BUT TOM CRUISE WON'TCOME OUT OF THE CLOSET.
I KNOW, WE'VE SENTNICOLE KIDMAN UP THERE
TO SEE IF SHE CAN HELP.
TOM...TOM IT'S NICOLE.
HI NICOLE.
TOM, DON'T YOU THINK THISHAS GONE ON LONG ENOUGH ?
IT'S TIME FOR YOU TOCOME OUT OF THE CLOSET.
|
[Surgical treatment of pain syndrome in lumbar spine in patients with obesity].
To analyze the reduction of pain severity, time of surgery, intraoperative blood loss, incidence of unintentional lesion of dura mater, infectious complications and hospital-stay after lumbar microdiscectomy. The study included 104 patients aged 24-58 years (37 men and 67 women, mean age 45 years) who underwent lumbar microdiscectomy within January 2015 - June 2016. The main and control groups consisted of 48 and 56 patients with and without obesity respectively. In all cases lumbar microdiscectomy was made. Pain syndrome was assessed by visual analogue scale and Oswestry questionnaire. In 6 weeks, 6 and 12 months after surgery significant improvement of both lumbar and leg pain was observed. Significantly reduced pain was stable and similar in both groups within follow-up although there was a tendency to increased pain in long-term period in group 1. Blood loss and infections were slightly higher in obese group while surgery time and hospital-stay were significantly higher in these patients. Features of patients with excessive body weight should be considered prior to elective surgery. Probably, implants are advisable to stabilize spinal motion segment and improve the outcomes among patients with excessive body weight.
|
East Sussex pensioner to have sex change op Published duration 2 May 2012
media caption Ruth Rose, from Newhaven, started living as a woman six years ago
A 78-year-old from East Sussex is set to become the oldest person to have a sex change operation on the NHS.
Ruth Rose, from Newhaven, has spent most of her life as James, a former RAF navigator, and said she has dreamed of being female since she was a child.
Ms Rose has been living as a woman for about three years, and has changed her name by deed poll.
She said her ex-wife and children had not reacted well to the news and it had been difficult for her family.
She said: "They are critical of it and would rather it hadn't happened. It concerns them.
"Naturally children like to feel that they have a dad and he's still there - well I'm still there, but it's not dad any more."
A spokeswoman from East Sussex Downs and Weald Primary Care Trust said gender reassignment surgery would only be considered after "completion of a long and robust process of diagnosis and assessments involving psychiatrists and other clinicians".
She added: "As in the case of all operations, this procedure is to meet clinical needs and would be carried out only if the patient is deemed fit enough.
image caption James Rose worked as an engineer and RAF navigator
"We cannot and would not want to discriminate on grounds of age."
Ms Rose said the surgeons told her it was not a difficult operation, and she would heal very quickly.
"I've converted myself over to living as a female completely, and what it [the surgery] is going to do is to remove a few awkward bits and allow me to develop something of a different shape which is more in keeping with the person I am."
She hopes to have the operation at Charing Cross Hospital in London in October 2013, when she will be 80 years old.
She said: "The operation is purely a tidying up arrangement. The true work is what I've done already. I have taken my life into a female gender completely."
Ms Rose said that jobs and responsibilities meant that she had not even considered gender reassignment until she was in her 40s.
"It posed a lot of problems before I was able to say: 'Yes this is definitely it' to a point where there is no going back.
"I have had no negative reactions, no-one being dismissive," she said.
|
Standard array
In coding theory, a standard array (or Slepian array) is a by array that lists all elements of a particular vector space. Standard arrays are used to decode linear codes; i.e. to find the corresponding codeword for any received vector.
Definition
A standard array for an [n,k]-code is a by array where:
The first row lists all codewords (with the 0 codeword on the extreme left)
Each row is a coset with the coset leader in the first column
The entry in the i-th row and j-th column is the sum of the i-th coset leader and the j-th codeword.
For example, the [5,2]-code = {0, 01101, 10110, 11011} has a standard array as follows:
The above is only one possibility for the standard array; had 00011 been chosen as the first coset leader of weight two, another standard array representing the code would have been constructed.
The first row contains the 0 vector and the codewords of (0 itself being a codeword). Also, the leftmost column contains the vectors of minimum weight enumerating vectors of weight 1 first and then using vectors of weight 2. Also each possible vector in the vector space appears exactly once.
Constructing a standard array
Because each possible vector can appear only once in a standard array some care must be taken during construction. A standard array can be created as follows:
List the codewords of , starting with 0, as the first row
Choose any vector of minimum weight not already in the array. Write this as the first entry of the next row. This vector is denoted the 'coset leader'.
Fill out the row by adding the coset leader to the codeword at the top of each column. The sum of the i-th coset leader and the j-th codeword becomes the entry in row i, column j.
Repeat steps 2 and 3 until all rows/cosets are listed and each vector appears exactly once.
Adding vectors is done mod q. For example, binary codes are added mod 2 (which equivalent to bit-wise XOR addition). For example, in , 11000 + 11011 = 00011.
That selecting different coset leaders will create a slightly different but equivalent standard array, and will not affect results when decoding.
Construction example
Let be the binary [4,2]-code. i.e. C = {0000, 1011, 0101, 1110}. To construct the standard array, we first list the codewords in a row.
We then select a vector of minimum weight (in this case, weight 1) that has not been used. This vector becomes the coset leader for the second row.
Following step 3, we complete the row by adding the coset leader to each codeword.
We then repeat steps 2 and 3 until we have completed all rows. We stop when we have reached rows.
In this example we could not have chosen the vector 0001 as the coset leader of the final row, even though it meets the criteria of having minimal weight (1), because the vector was already present in the array. We could, however, have chosen it as the first coset leader and constructed a different standard array.
Decoding via standard array
To decode a vector using a standard array, subtract the error vector - or coset leader - from the vector received. The result will be one of the codewords in . For example, say we are using the code C = {0000, 1011, 0101, 1110}, and have constructed the corresponding standard array, as shown from the example above. If we receive the vector 0110 as a message, we find that vector in the standard array. We then subtract the vector's coset leader, namely 1000, to get the result 1110. We have received the codeword 1110.
Decoding via a standard array is a form of nearest neighbour decoding. In practice, decoding via a standard array requires large amounts of storage - a code with 32 codewords requires a standard array with entries. Other forms of decoding, such as syndrome decoding, are more efficient.
Decoding via standard array does not guarantee that all vectors are decoded correctly. If we receive the vector 1010, using the standard array above would decode the message as 1110, a codeword distance 1 away. However, 1010 is also distance 1 away from the codeword 1011. In such a case some implementations might ask for the message to be resent, or the ambiguous bit may be marked as an erasure and a following outer code may correct it. This ambiguity is another reason that different decoding methods are sometimes used.
See also
Linear code
References
Category:Coding theory
|
Q:
How to programmatically send SMS on the iPhone without "MFMessageComposeViewController "?
I would like to send an SMS from an iPhone but MFMessageComposeViewController pops up the message,I would like to send the SMS when an event or notification occurs in the application.Is it possible through iOS SDK or are there any legitimate low level function which can be used to accomplish the same.
A:
It's not possible to send SMS messages programmatically through the iOS SDK. As you can imagine, if the SDK allowed this, it would open a huge can of worms in terms of developer abuse.
If the SMS messages don't have to come from the user's phone number, you can take a look at the Twilio API (http://www.twilio.com/sms).
|
Individual cathodoluminescence and photoluminescence spectroscopy of zinc oxide nanoparticles in combination with in situ transmission electron microscopy.
The functions of scanning near-field optical microscopy (SNOM) were installed in high-resolution transmission electron microscopy (TEM) for cathodoluminescence spectroscopy and photoluminescence spectroscopy of individual nanostructures. Optical fiber probes used in SNOM were allowed to approach nanoparticles by piezomanipulation with simultaneous observation by TEM. As an application of this method, cathodoluminescence and photoluminescence from zinc oxide nanoparticles were measured at room temperature and 130 K. It was demonstrated that the present method directly provides the relationships between structural features of individual nanoparticles and spectra.
|
Morning sickness control in early pregnancy by Neiguan point acupressure.
To evaluate the antiemetic effect of acupressure at the Neiguan point. Sixty women in early pregnancy were entered into a randomized, double-blind, cross-over, placebo-controlled trial. During a 12-day period, organized in four steps of 3 days each, the women were divided into two homogeneous groups to test the effectiveness of unilateral and bilateral acupressure. Use of acupressure resulted in a significantly lower frequency of morning sickness compared with placebo treatment. More than a 60% positive effect was found with unilateral and bilateral acupressure, compared with an approximately 30% positive effect of placebo acupressure. Changing from unilateral to bilateral pressure on the Neiguan point caused no significant statistical difference. No noteworthy side effects occurred. Acupressure on the Neiguan point relieves morning sickness.
|
Mr. Jones has adopted a different playbook. While he has voted with Mr. Trump half of the time, according to the website FiveThirtyEight, more than nearly any other Senate Democrat, he has stood with national Democrats on high-profile issues, including opposing Justice Kavanaugh. He used his first speech on the Senate floor to call for new gun control measures, tackling an issue that has long been anathema to many Southern Democrats.
Democrats hope voters will value Mr. Jones’s decision to stick with his gut when it comes to difficult political issues, even if that means siding with the national party.
“He’s a guy who’s going to be true to himself,” said John Anzalone, a Birmingham-based Democratic pollster. “Authenticity is what sells in a place like Alabama.”
But there’s also little question that Mr. Jones hit the political jackpot with his special election in 2017 by facing Roy S. Moore, an already-controversial Republican opponent who became all but radioactive after charges of sexual assault against underage girls. Even with that baggage, Mr. Jones beat Mr. Moore by only about 20,000 votes.
A number of Republican officials in the state, including Representative Bradley Byrne and the Alabama State Senate president pro tempore, Del Marsh, are considering challenging Mr. Jones next year. None have the liabilities of Mr. Moore, who motivated a surge of black Democratic voters while prompting some Alabama Republicans to cross party lines and others to stay home from the polls.
On top of those local challenges, Mr. Jones will also be running against the backdrop of the 2020 presidential election, a contest that will both highlight the national Democratic platform and bring out conservative voters eager to support the president.
Even some of his supporters don’t expect to be represented by Mr. Jones for much longer.
“Senator Jones, bless his heart, he’ll be a one-term senator,” said Sheila Pressnell, 61, as she walked through a Huntsville shopping center popular with employees of NASA and other government agencies. “The only reason he got it was because he was up against a child predator.”
|
Experimental evidence for the existence of an electronically excited state of the proposed dihydrogen radical cation He-H-H-He+.
Survival of the weakest: The existence of a new class of centrosymmetric radical cations in which H(2) bridges two identical main group elements was recently proposed in this journal by Uggerud and co-workers. By growing complexes inside helium nanodroplets at subkelvin temperatures, we obtained experimental evidence for the existence of the most weakly bound member of this class, He-H-H-He(+) (see picture), although in a metastable, electronically excited state.In a recent report, Uggerud and co-workers (A. Krapp et al., Chem. Eur. J. 2008, 14, 4028) proposed the existence of a new class of radical cations in which a dihydrogen bridges two identical main group elements. Upon electron impact ionization of helium nanodroplets doped with one or more H(2) molecules we observe various He(x)H(y) (+) cluster ions, including He(2)H(2) (+), which would belong to the proposed class of radical cations. Mass-analyzed kinetic energy scans reveal that the ion is metastable; it dissociates in the field-free region of the mass spectrometer. One reaction is into HeH(2) (+) + He with a low kinetic energy release of 15+/-4 meV. Surprisingly, another unimolecular reaction is observed, into HeH(+) + HeH (or He + H). The probability of this reaction is an order of magnitude higher, and the average kinetic energy release is four times larger. These findings suggest the presence of a metastable electronically excited state; they are consistent with the proposed linear, centrosymmetric ion structure of He-H-H-He(+).
|
Your vacation to London turns into an investigation into one of its most notorious mysteries ever! Explore the city through 360-degree photographs of locations such as Buckingham Palace, Westminster Abbeyeven the tailor shop where James Bond buys his shirts! Gather clues and challenge the locals to unearth the truth behind a murderous past.
|
Q:
How transliterate unicode text with PyICU to ASCII?
There is the PyICU library, which I understand can be used to transliterate strings. However there are no docs. Anyone have a simple example which transliterates a unicode string to ASCII, with PyICU?
The C++ ICU documentation for transliteration is here, but I don't understand how to call it from Python.
A:
There is a nice cheat sheet for PyICU here: https://gist.github.com/dpk/8325992
Here's a slightly modified example:
>>> import icu
>>> tl = icu.Transliterator.createInstance('Any-Latin; Latin-ASCII')
>>> tl.transliterate('Ψάπφω')
'Psappho'
|
const { accounts, contract } = require('@openzeppelin/test-environment');
require('@openzeppelin/test-helpers');
const ContextMock = contract.fromArtifact('ContextMock');
const ContextMockCaller = contract.fromArtifact('ContextMockCaller');
const { shouldBehaveLikeRegularContext } = require('./Context.behavior');
describe('Context', function () {
const [ sender ] = accounts;
beforeEach(async function () {
this.context = await ContextMock.new();
this.caller = await ContextMockCaller.new();
});
shouldBehaveLikeRegularContext(sender);
});
|
Pet number limits. Mandatory spaying and neutering of most dogs and cats. A partial ban on chaining animals to trees or posts.
These are among the recommendations Dallas' Animal Shelter Commission unanimously approved Thursday night, agreeing that the city's stray animal population is out of control and too many pets are being neglected by owners....
•Requiring all dogs and cats to be spayed and neutered, except those owned by people with breeder permits issued by the city government. Animals under 4 months old and those exhibiting applicable medical conditions would also be exempt. Breeder permits would cost $500 annually and would subject those in possession to random city inspections....
|
News
PLYMOUTH, Mich. - Henrik Zetterberg has learned how to lead from Steve Yzerman and Nicklas Lidstrom, two of best captains in hockey history.
Now it's his turn.
The Detroit Red Wings are expected to officially name Zetterberg their captain soon, a role the Swedish forward has already assumed during practices this week.
He has deflected questions about the honour everyone in the Motor City knows he's about to get.
Zetterberg will open up only a little bit about how much he learned from his former captains—Yzerman and Lidstrom—but makes it clear that a "rah-rah" approach isn't suddenly going to become his style when there's a 'C' on his red sweater.
"I will pick my spots to speak up," Zetterberg said Tuesday after practicing at Compuware Arena. "The good thing with this team is we've always had a lot of leaders and we still do. It isn't just the captain that leads around here.
"I don't think I'll need to do a lot more than I did before, so it'll be an easy transition."
The 32-year-old Zetterberg has been an alternate captain for the team and could've been one again this season if Lidstrom took Red Wings general manager Ken Holland up on an offer. Holland asked Lidstrom if he wanted to postpone his retirement because the 42-year-old Swede would have to play just 48 games during the lockout-shortened regular season.
Lidstrom's reply? Thanks, but no thanks.
"I told him I'm happily retired and enjoying my time with the family," Lidstrom wrote in an email to The Associated Press this week.
Lidstrom started wearing the captain's letter in 2006 after Yzerman retired, ending a two-decade run that made him the longest-serving captain in NHL history.
Both former captains led by actions first and spoke second. Zetterberg will as well, but his teammates expect to hear more from their new captain.
"He's definitely going to be more vocal than Nick," goaltender Jimmy Howard said. "Nick was quiet, only spoke when he needed to and led by example. Z is a little bit more vocal throughout the room.
"I think he's going to transition very easily."
Another teammate, and fellow Swede, agrees that Zetterberg is ready for his new role.
"I think he's going to be the same guy, the hardest-working guy, who leads by example and isn't afraid to speak up in the room," Niklas Kronwall said. "He's been groomed to be our leader for many, many years.
"He just needed the opportunity. He's the perfect captain."
It helps that he's pretty talented.
Zetterberg led the team last season with 69 points—two more than Pavel Datsyuk—to extend a string of consistent production. Zetterberg, Joe Thornton, Henrik Sedin and Eric Staal, according to STATS, are the only NHL players with at least 68 points in each of the seven seasons since the last lockout.
When Zetterberg helped the Red Wings win the Stanley Cup in 2008, he had 27 points in the post-season and earned the Conn Smythe Trophy as playoff MVP for his two-way play. His biggest contribution during the series might've been when he locked down Sidney Crosby's stick at the side of the net to prevent him from scoring during Pittsburgh's critical 5-on-3 power play to help the Red Wings win Game 4.
He was rewarded with a 12-year, $73 million deal that keeps him under contract until 2021.
Not bad for a player Detroit drafted 210th overall in 1999.
Zetterberg, though, is determined to have more team success as a part of his legacy as Detroit's on-ice leader.
He wants the Red Wings to extend the longest post-season streak in North American major professional sports to 22 straight seasons this year and hopes to help them win their fifth Stanley Cup since 1997 before his career is over.
"Nobody ever wants the team to not be as good on their watch—believe me," Red Wings coach Mike Babcock said.
|
Q:
Ace Editor Live Preview
I'm playing around with trying to create a live preview of ace editor of what's being typed into the editor.
I tried:
<pre id="editor"></pre>
<div id="return"></div>
<script src="vendor/ace/ace.js" type="text/javascript" charset="utf-8"></script>
<script type="text/javascript" charset="utf-8">
var editor = ace.edit("editor");
editor.setTheme("ace/theme/twilight");
editor.getSession().setMode("ace/mode/javascript");
</script>
<script src="vendor/jquery/jquery-2.1.4.min.js" type="text/javascript" charset="utf-8"></script>
<script type="text/javascript" charset="utf-8">
function showHTML () {
$('#return').html($('#editor').val());
}
</script>
The editor works, but the live preview of what's being typed in the editor isn't. I can get it working for a textarea, but not the editor. What can I do to get the live preview working for the editor?
A:
looks like showHTML is never called, try adding editor.on("input", showHTML)
and use editor.getValue() in showHTML
<script src="https://ajax.googleapis.com/ajax/libs/jquery/2.1.1/jquery.min.js"></script>
<script src="https://ajaxorg.github.io/ace-builds/src/ace.js"></script>
<style>
html, body { height: 100% }
#editor, #return { height: 50% }
</style>
<pre id="editor">xxx</pre>
<div id="return"></div>
<script>
var editor = ace.edit("editor");
editor.setTheme("ace/theme/twilight");
editor.session.setMode("ace/mode/html");
function showHTML() {
$('#return').html(editor.getValue());
}
// or use data: url to handle things like doctype
function showHTMLInIFrame() {
$('#return').html("<iframe src=" +
"data:text/html," + encodeURIComponent(editor.getValue()) +
"></iframe>");
}
editor.on("input", showHTMLInIFrame)
</script>
|
Army has scrapped a mammoth tender to replace INSAS rifles, like the ones carried by these soldiers in J-K.
In a setback to the Indian soldier's quest for a reliable assault rifle, the Army has scrapped a four-year-old tender for purchasing 1.8 lakh weapons. In a June 15 letter to the four short-listed international firms, the Army said it was retracting the Rs 4,848-crore contract.
In 2011, the Army floated a contract to supply Multi-Caliber Assault Rifles (MCAR) for the Army and the Navy to replace the existing INSAS rifles. An initial 65,678 assault rifles and 4,680 under barrel grenade launchers were to be procured off the shelf for Rs 2,500 crore. With over 1 lakh more rifles to be built by the Ordnance Factory Board through technology transfer, it was the world's largest such rifle contract.
The scrapping of the seven-year quest is a setback to the Army's modernisation plans. Army chief general Dalbir Singh had, in January this year, identified assault rifles as one of 20 'critical requirements' including bulletproof jackets and artillery guns for the Army. The Army cannot blame anyone but itself.
The rifle quest began with the Army's unhappiness with the indigenous 5.56 mm INSAS assault rifle which entered service in the late 1990s. But the solution to the INSAS's quality issues was to ask for a weapon so expensive with specifications so outlandish that it raised questions on the Army's competence in framing General Staff Qualitative Requirements.
The Army wanted a rifle with interchangeable barrels firing different calibers, the 5.56 mm INSAS round and the 7.62 mm AK-47 round. The requirement originated in the present practice of soldiers in counterinsurgency operations using AK-47s and switching over to INSAS rifles in peace stations. Army officials say the specifications were deeply flawed.
Five international firms - Beretta of Italy, Israeli Weapons Industries (IWI), Colt Defense of the US, Ceska Zbplojovka of Czech Republic - were shortlisted. All the weapons they presented for the trials were prototypes, meaning, none of them were actually in service with their respective armies.
The contract appeared doomed right at the start in 2012 when the Army first delayed the technical evaluation of the rifles. Companies then began asking for extensions for sample submission. As of 2015, no trials of the competing weapons were conducted. A whiff of corruption accompanied the contract. It was speculated that the GSQRs were tailor-made by Army brass to favour one of the vendors.
Another concern the Army had was cost. At over Rs 2 lakh a piece, each multi-caliber assault rifle with a conversion kit cost twice the price of a regular imported assault rifle and six times the cost of a Rs 35,000 OFB-made INSAS rifle.
A General called the MCAR contract the equivalent of equipping a mass transport taxi service with Mercedes S-class saloons. Major General Mrinal Suman (retired) says the failure of the rifle contract shows the Army's deeply flawed system of framing GSQRs. "Just because you drive a car for 20 years does not give you the capability to design one.
Acquisition staff are neither trained nor equipped to select weapons," he says. Experts say it will now take the Army at least five years to acquire rifles. The infantryman's wait continues.
|
CHARLOTTESVILLE, Va. -- Charlottesville Police Chief Tim Longo said investigators did not find evidence to support that a sexual assault happened at a fraternity house at the University of Virginia in September of 2012. Police began investigating after Rolling Stone last November published a story detailing the account of "Jackie," a college student who said she was raped at the Phi Kappa Psi house.
Long also noted that just because police found no evidence to support the article's content, "That doesn't mean that something terrible didn't happen to Jackie" on the day in question," he said, only that law enforcement were unable to gather facts to legally prove it.
The article
"A Rape on Campus," horrified readers when it was published last November. It described how a University of Virginia freshman named Jackie was sexually assaulted by seven attackers during a fraternity party, and how the university failed to adequately respond. The article sparked conversation about sexual violence on college campuses, but the details of the story soon came under withering scrutiny.
Days after the article's publication, critics began to ask questions about some of the details in the alleged victim’s account and about Rolling Stone’s decision not to contact the seven alleged attackers. On December 5, the magazine published an extraordinary editor’s note that said “we apologize to anyone who was affected by the story and we will continue to investigate the events of that evening” in late 2012 when the alleged attack occurred.
On December 22, it enlisted Columbia University's graduate journalism school to conduct an independent review. Columbia University's review of Rolling Stone's disputed article about the college gang rape will be published in the magazine in early April.
Last month, Charlottesville police "informed the university at the start of the spring semester that its investigation has found no evidence that the brutal gang rape happened at the Phi Kappa Psi fraternity, as the Rolling Stone story alleged. However, the police have not ruled out that Jackie was raped -- possibly even gang raped, somewhere else, perhaps on a different day."
A news conference will be held Monday at 2 p.m. in Charlottesville.
The CNN Wire was used for this report.
|
Man who shot at GOP lawmakers had history of criminal run-ins Five people were injured this morning at a baseball practice.
-- James T. Hodgkinson, the man who allegedly opened fire at a congressional baseball practice in Virginia on Wednesday, had a number of run-ins with the law before this morning’s shooting.
Multiple law enforcement sources have identified the alleged shooter as 66-year-old Hodgkinson of Belleville, Illinois.
President Donald Trump said this morning that the gunman died in the hospital from wounds sustained in a shootout with police. The FBI has released a statement saying the agency is "actively investigating Hodgkinson, to include his associates, whereabouts, social media impressions and potential motivations."
A Facebook profile believed to have belonged to Hodgkinson included a number of posts related to politics, some of which were critical of Trump. In some, Hodgkinson labelled Trump a traitor and called for him to be impeached. The profile has since been removed from Facebook.
In March, Hodgkinson met with sheriff's deputies in Illinois after they received calls that he fired 50 shots on his property. He had a valid firearms owner's identification card, and authorities determined that no law was violated.
Another incident took place in 2006, involving alleged domestic battery and unlawful discharge of a shotgun. That case was dismissed.
Separately, Hodgkinson had an extensive history of traffic violations and petty offenses in St. Clair County, Illinois, spanning from 1989 to 2011, according to online county court records. The vast majority of the cases were traffic violations, and nearly all of them were dismissed. The most recent conviction on his record was for a petty offense of failure to obtain an electrical contractor's license in 2009.
Hodgkinson's wife told ABC News that he had been living in Alexandria, Virginia, for the past two months. Illinois secretary of state corporate records show that he had voluntarily dissolved his home inspection business, JTH Services Inc., in December.
Hodgkinson was reportedly a regular at the Pork Barrel BBQ restaurant in Alexandria's Del Ray neighborhood. The restaurant is about eight blocks from the baseball field.
Pork Barrel bartender Jamie Craig said she "immediately recognized" Hodgkinson when his photo was released and remembered him being "a little shady."
"Most of the bartenders here are women," she told ABC News, and he "came off a little creepy, apparently."
"I just remember him being extremely quiet, didn't really make eye contact," she added.
Craig said she served Hodgkinson "a handful of times" in the past couple of months.
"I just kind of kept it light and easy talking to him, because he kind of gave me the creeps," she said.
FBI Special Agent in Charge Tim Slater said at a Wednesday evening press conference that since March Hodgkinson had been living out of his vehicle -- a white cargo van -- in Alexandria.
Slater said that it appears he was not working during his time in Virginia.
The FBI is asking for information from the public about any interactions they had with Hodgkinson, either during his time in Virginia or as he drove from his home in Illinois to Virginia.
Sen. Bernie Sanders, D-Vt., said that Hodgkinson supported his bid for the presidency.
"I have just been informed that the alleged shooter at the Republican baseball practice is someone who apparently volunteered on my presidential campaign. I am sickened by this despicable act. Let me be as clear as I can be. Violence of any kind is unacceptable in our society, and I condemn this action in the strongest possible terms," Sanders said this morning on the Senate floor.
The St. Clair County Sheriff's Office has been contacted for information about Hodgkinson by authorities investigating the Alexandria shooting, an official with the office told ABC News. Calls to the Belleville Police Department were not immediately returned.
Around 7 a.m. ET, at least five people, including Rep. Steve Scalise, R-La., were injured when the shooter opened fire at the baseball field in Del Ray. Republican lawmakers were practicing for Thursday's annual charity congressional baseball game.
A law enforcement source told ABC News that the suspect was injured and transported to George Washington University Hospital. Authorities later confirmed at a press conference that the suspect was in custody.
Police said the suspect's motives are unknown at this point. Police described the scene as stable.
Authorities confirmed that Capitol Police officers were on scene when the shooting began and exchanged fire with the gunman. Victims were transported to local hospitals, police said.
The FBI has taken control of the crime scene, which is some 7 miles from the White House.
The Bureau of Alcohol, Tobacco and Firearms is conducting urgent traces on two firearms — a rifle and a handgun — from the scene.
Scalise is undergoing surgery, and his injury is not life-threatening, his office said in a statement.
"Prior to entering surgery, the whip was in good spirits and spoke to his wife by phone," the statement said. "He is grateful for the brave actions of U.S. Capitol Police, first responders and colleagues. We ask that you keep the Whip and others harmed in this incident in your thoughts and prayers."
All the injured individuals have been identified. Zach Barth, a legislative correspondent in the office of Rep. Roger Williams, R-Texas, was injured, as well as Matt Mika, the director of government relations at Tyson Foods.
Two Capitol Police officers, Crystal Griner and David Bailey, who were protecting Scalise, were also injured in the shooting.
|
Q:
How to determine which diode conducts in diode-OR application
Say I have two 12V power sources - 12V_A and 12V_B. What happens in the following scenarios:
If 12_A = 12_B = 12V. Do both diodes conduct?
If 12_A is slightly higher than 12V_B. Does the top diode conduct? Or both?
If 12_A = 12V and 12V_B = 0. We know that top diode conducts for sure, but is there also leakage through the bottom diode?
A:
You have to understand diodes are resistors that change value depending on the voltage across them.
You should be familiar with the voltage current relationship of a diode.
But if you take that graph and plot the slope versus the voltage, you get V/I which is the resistance vs voltage graph, you are likely less familiar with and looks something like this.
So, having that in mind, lets look at your cases.
In case 1, if they are matched diodes, they will both have the same voltage across them and will both conduct equally. In reality they will differ and whichever diode has the smaller threshold voltage will conduct a lot more.
In case 2, the top diode will have the higher voltage across it and will conduct more than the bottom one. What the bottom one does depends on your definition of slightly. If the right side of the diode is lower voltage than the left it will still conduct but at a higher resistance. If the voltage is reversed it will leak a bit.
In case 3, obviously the top diode is conducting, the bottom diode will either present a large resistance and leak some current back to the left, or the voltage will exceed the reverse breakdown voltage and it will conduct back to the left and pull down the output.
|
Title
Author Information
Document Type
Paper
Start Date
15-5-1999 9:00 AM
End Date
17-5-1999 5:00 PM
Abstract
The Truth and Reconciliation Committee (TRC) is a constitutional body dealing with South Africa's history of human rights abuses. A commitment to forms of religio-political language is evident in the stories presented to the TRC and in subsequent repo rts. The relationship between this religio-political language and a moral civil society is explored by analysing religious topoi in discourses reflecting the TRC's activities. Religious justification and evaluation of actions are not noticeable whilst m oral implications and assessment are often left implicit. Possibly there is continuation rather than intervention in the value systems generating these topoi.
Response to Submission
Reader's Reactions
Included in
Share
COinS
May 15th, 9:00 AMMay 17th, 5:00 PM
Argumentation topoi and South Africa's Truth and Reconciliation Committee
The Truth and Reconciliation Committee (TRC) is a constitutional body dealing with South Africa's history of human rights abuses. A commitment to forms of religio-political language is evident in the stories presented to the TRC and in subsequent repo rts. The relationship between this religio-political language and a moral civil society is explored by analysing religious topoi in discourses reflecting the TRC's activities. Religious justification and evaluation of actions are not noticeable whilst m oral implications and assessment are often left implicit. Possibly there is continuation rather than intervention in the value systems generating these topoi.
|
Q:
How delete warning Unmapped target property in Mapper?
Since I upgrade my project from jhipster 5.8.2 to jhipster 6.5.1, I have a lot of warnings with Mapper.
I would treat properly this warning and not addd this property in all Mapper :
(unmappedTargetPolicy = ReportingPolicy.IGNORE)
For example I have this error :
service\mapper\PermissionMapper.java:25: warning: Unmapped target property: "removeEntite".
Permission toEntity(PermissionDTO permissionDTO);
In my object Permission, I have :
@Entity
@Table(name = "permission")
@Cache(usage = CacheConcurrencyStrategy.NONSTRICT_READ_WRITE)
public class Permission implements Serializable {
private static final long serialVersionUID = 1L;
@Id
@GeneratedValue(strategy = GenerationType.IDENTITY)
private Long id;
@ManyToOne
private Profil profil;
@ManyToOne
private User user;
@ManyToMany
@Cache(usage = CacheConcurrencyStrategy.NONSTRICT_READ_WRITE)
@JoinTable(name = "permission_entite",
joinColumns = @JoinColumn(name = "permissions_id", referencedColumnName = "id"),
inverseJoinColumns = @JoinColumn(name = "entites_id", referencedColumnName = "id"))
private Set<Entite> entites = new HashSet<>();
....
public Set<Entite> getEntites() {
return entites;
}
public Permission entites(Set<Entite> entites) {
this.entites = entites;
return this;
}
public Permission addEntite(Entite entite) {
this.entites.add(entite);
entite.getPermissions().add(this);
return this;
}
public Permission removeEntite(Entite entite) {
this.entites.remove(entite);
entite.getPermissions().remove(this);
return this;
}
public void setEntites(Set<Entite> entites) {
this.entites = entites;
}
And the PermissionDTO :
public class PermissionDTO implements Serializable {
private Long id;
private Long profilId;
private String profilNom;
private Long userId;
private String userLogin;
private Set<EntiteDTO> entites = new HashSet<>();
...
public Set<EntiteDTO> getEntites() {
return entites;
}
public void setEntites(Set<EntiteDTO> entites) {
this.entites = entites;
}
And the Mapper :
@Mapper(componentModel = "spring", uses = {ProfilMapper.class, UserMapper.class, EntiteMapper.class, })
public interface PermissionMapper extends EntityMapper <PermissionDTO, Permission> {
@Mapping(source = "profil.id", target = "profilId")
@Mapping(source = "profil.nom", target = "profilNom")
@Mapping(source = "user.id", target = "userId")
@Mapping(source = "user.login", target = "userLogin")
PermissionDTO toDto(Permission permission);
@Mapping(source = "profilId", target = "profil")
@Mapping(source = "userId", target = "user")
@Mapping(target = "entites", ignore = true)
Permission toEntity(PermissionDTO permissionDTO);
The ligne with "ignore = true" does not work.
Have you an idea please ?
A:
@Mapper(componentModel = "spring", uses = {ProfilMapper.class, UserMapper.class, EntiteMapper.class, }, unmappedTargetPolicy = ReportingPolicy.IGNORE)
You can define the property on each mapper or use a shared mapper config.
The solution to your problem is defined in the below link
Ignore unmapped properties
|
Nomenclature
The present invention provides composition of matter for novel mitosene analogues funtionalized at the N-2 nitrogen. The term mitosene is an abbreviation of the chemical name 2,3-dihydro-9-hydroxymethyl-6-methyl-1-H-pyrrolo[1,2a]indole-5,8-dione, carbamate (Webb, et. al. J. Am. Chem. Soc. 84, 3185 (1962)). The common name 2,7-diaminomitosene, for example, has amino groups at the 2 and 7 carbon positions of the mitosene structure as follows: ##STR1##
General Description of the Invention
Rationale for designing compounds of the present invention is an extension of the finding that the mitomycin C reductive activation product 2,7-diaminomitosene forms noncovalent bonds with deoxyribonucleic acid (DNA) (D. M. Peterson, Diss-Abstr-Int-B. 48, 2331 (1987)). The ideas of the actual conception were to create 2,7-diaminomitosene analogues which have the general structure: ##STR2## and are:
A) are prodrugs that release the cytotoxic 2,7-diaminomitosene, and/or
B) target release of the prodrug by glutathione cleavage of a disulfide bond or aminosulfenyl bond, or
C) target release of the prodrug through hydrolysis of an amide, ester or thiolester, or
D) take advantage of selective uptake of the mitosene analogue or prodrug through a polyamine, peptide, oligosaccharide or nucleotide transport system, or
E) have a functional group that enhances the binding of the agent to DNA such as an oligonuclotide, polypeptide, oligosaccharide or polyamine, or
F) have a functional group such as ethanethiol which could produce an additional toxic species (ethylene sulfide) upon prodrug activation by glutathione.
Since mechanisms of action are difficult to prove, utility of these compounds is based on their own empirical antitumor, antimicrobial and/or antiviral activity and not on whether or not the agents act by these particular mechanisms.
Advantages of the Present Invention
One advantage of these mitosenes versus mitomycin analogues is reduced general toxicity. Agents currently used to treat cancer like mitomycin C can be limited by their serious toxic side effects. Compounds which deliver 2,7-diaminomitosene without producing the quinone methide (see scheme below)--a potent alkylating species which results from reductive activation of mitomycin C--are expected to be less toxic. Attack by the quinone methide on various biological macromolecules within a cell (e.g. Nu1=an enzyme) can be toxic. Delivering 2,7-diaminomitosene without the requirement of going through the quinone methide intermediate should reduce prodrug toxicity. ##STR3##
Another potential advantage of the new mitosenes is reduced cell resistance. Current cancer drugs like mitomycin C can be limited by resistance. Drug resistance can occur when high levels of reduced glutathione are present. A proposed mechanism for resistance is nucleophilic trapping of the quinone methide agent (Nu1=glutathione) before 2,7-diaminomitosene and/or crosslinks can form. Properly selecting analogues that would release 2,7-diaminomitosene in the presence of high glutathione levels would avoid the mechanism for mitomycin resistance and actually take advantage of this property of resistant cells for targeted delivery of the agent. ##STR4##
Shown above is the potential to form two toxins which could be employed to adjust toxicity.
Comparison of Present Invention to Mitomvcin Analogues ##STR5##
A clear distinction of the present invention from mitomycin analogues is the presence of a double bond in the 9-9a position for the mitosene. Mitomycin analogues do not possess this double bond and are commonly known in the literature as mitosanes. An even more important distinction is a methylene group at C-1 of the 2,7-diaminomitosene analogues in contrast to an aziridine ring in the mitomycin analogues. Since the mitosene has a methylene, it does not have a suitable leaving group to generate the quinone methide. This inability to form the quinone methide is what gives the mitosene analogues their advantages of reduced toxicity and reduced resistance.
Certain compounds of the present invention contain the general moiety R.dbd.CH.sub.2 CH.sub.2 SSR' (ethyldisulfide groups) which the prior art teaches to attach to an oxygen or nitrogen in the C7 position of the mitosane structure (e.g. U.S. Pat. Nos. 4,866,180 and 5,103,018). In the present invention, the ethyldisulfide groups are attached to the N2 position instead of the N7 position and the resulting composition of matter is a mitosene structure instead of a mitosane structure. The mitosene structure will not form DNA crosslinks and hence is proposed to work by a unique mechanism from the mitosane which is not dependent on the R group.
Comparison of Present Invention to Mitosenes in Prior Art
Since 2,7-diaminomitosene, N-2 R.dbd.H, is disclosed in the open literature, it is not a patentable entity (M. Tomasz & R. Lipman, Biochemistry 20, 5056 (1981)). It (2,7-diaminomitosene) has also been shown to possess antimicrobial activity albeit less toxic than mitomycin C under the conditions it was tested (B. Iynegar, R. Dorr, N. Shipp & W. Remers, J. Med. Chem. 33, 253 (1990)). This result, however, could have been influenced by the positively charged amine on 2,7-diaminomitosene which would retard its bioavailability via decreased solubility across a hydrophobic membrane. Attachment of appropriate R groups described in the summary of the invention could increase hydrophobicity by masking the positively charged N-2 amine or facilitate uptake through a cellular transport system and hence increase bioavailability.
Other known 2,7-diaminomitosene derivatives of the general structure are the N-2 R.dbd.COCH.sub.3 (D. M. Peterson and J. Fisher, Biochemistry 25, 4077 (1986); M. Tomasz & R. Lipman, Biochemistry 20, 5056 (1981)) and N-2 R.dbd.CH.sub.3, SO.sub.2 CH.sub.3 or SO.sub.2 C.sub.6 H.sub.4 pCH.sub.3 (I. Han, D. J. Russell & H. Kohn, J. Org. Chem. 57, 1799 (1992)). These compounds (R.dbd.COCH.sub.3, CH.sub.3, SO.sub.2 CH.sub.3, and SO.sub.2 C.sub.6 H.sub.4 pCH.sub.3) were produced for chemical studies and are not implicated in their ability to act as antitumor agents. Since these structures are known, however, they are specifically excluded from the mitosene analogue descriptions below.
The general structure is also distinguished from the mitosene analogues which do not possess an amino group at N-2, and/or have an oxygen attached to the analogous C-1 position (M. Maliepaard, et. al., Anti-Cancer Drug Design, 7, 415-425 (1992) and U.S. Pat. No. 3,429,894 "Acetylated Mitosenes"). Moreover, these structures do not have the essential embodiment of a methylene group at C-1 which prevents the formation of a quinone methide. ##STR6##
|
2-Aminoanilinium phosphite.
The solid-state structure of the title compound, alternatively called 2-aminoanilinium hydrogen phosphonate, C(6)H(9)N(2)(+).H(2)PO(3)(-), shows the monoprotonated diamine molecule to be multiply hydrogen bonded to HPO(3)H(-) anions. There is no inter-phosphite hydrogen bonding, contrary to previous solid-state observations of the species.
|
Women’s March 2018 (Signs, Celebs, Solidarity)2018 Women's March Los AngelesProtester not a fan of President Trump's description of countries like Haiti.(credit: Amanda Edwards/Getty Images for The Women's March Los Angeles)
|
Entry Level Ruby Developer Guide 2016 – How to Start a Rails Career from Zero - wyclif
https://medium.com/@louisror/entry-level-ruby-developer-guide-2016-how-to-start-a-rails-career-from-zero-1e5d1d6600ca#.eie3p8e2l
======
im_down_w_otp
I'm a little saddened that the first line wasn't, "For best results travel
back in time to 2010." :-(
|
The grass is always greener — even if you have one of the best and most beautiful gardens on the block. Jennifer Aniston's hair, which was almost as famous as the actress herself in the 1990s, is the envy of women everywhere and has inspired countless copycat cuts over the years. But as the We're the Millers star reveals in a new interview with Women's Wear Daily, even she has bad hair days.
Last October, the 44-year-old Friends alum bought into hair-care company Living Proof, in part because of her own styling woes. "I have wavy, frizzy hair," she admits to WWD, noting that the brand's products have helped tame her tresses.
Aniston's hair complaints may come as a bit of a surprise, but as she learned when Living Proof executives took to the streets to poll women about their hair, people are their own worst critics. "I was looking at these girls who were not loving their hair, and I'm thinking, 'You have beautiful hair!'" she tells WWD.
"It's always funny, our perspective of ourselves and how incorrect it usually is," she continues. "We always seem to want something we don't have. And it's a shame, because there's so much beauty to be appreciated in the world. We spend so much time not loving what we've been given and trying to make it look different."
Or, rather, trying to make it look the same as someone else's, as was the case when women all over the world imitated Aniston's infamous "Rachel" cut in 1994. Incidentally, the star's stylist and longtime pal Chris McMillan was apparently stoned when he created the layered look. "I'm 14 years sober, so I feel safe enough to say that," he tells WWD.
Aniston, too — engaged to actor Justin Theroux since last year — has come a long way since those days. But there's still a lot she wants to accomplish.
"The thing I want to do next is direct," she says. "I want to direct a full-length feature within the next five years. I usually never put times on anything, but the next five years would be great. Right now, I'm luckily still working as an actor, and I love it."
|
St. Clair Shores parish removes deacon amid probe
A deacon of a Catholic church in St. Clair Shores is under investigation for allegedly misusing parish funds, according to the church.
Mike Barthel, deacon and business manager of St. Joan of Arc Parish, is under investigation by the Macomb County Sheriff's Office for possible misuse of funds, officials said in a letter sent to the parish community Saturday.
"It is with sadness that I must share some news with you regarding our parish community," Monsignor G. Michael Bugarin wrote. "Mike Barthel, our deacon for the past ten years and business manager since 2016, is under investigation by the Macomb County Sheriff's Office for possible misuse of parish funds."
Bugarin wrote Barthel is no longer employed by the parish.
"Because of this development, he will no longer serve as the deacon at our parish and his ability to present himself as a deacon has been restricted by the Archdiocese of Detroit," Bugarin wrote.
Barthel, a father of three, was ordained in 2008. He attended Wayne State University, Macomb Community College and Sacred Heart Major Seminary, according to the church website. He joined the church shortly after he was ordained and became the business manager in 2016.
Neither the Macomb County Sheriff's Office nor the church have disclosed what occurred or how much money was involved.
"Please join me in praying for all those involved, including Deacon Mike, each other, and our entire parish community," Bugarin wrote.
[email protected]
Twitter: @SarahRahal_
|
Here are some of the results on recent Soysoap trials on leafy vegetables performed in Andhra Pradesh, India.
The leafy vegetable is called green amaranth or slender amaranth or tropical green amaranth. Its scientific name is Amaranthus viridis. Email: For Information!
Image 1 shows the field in which the trails were carried out. The left side segment is with out plant nutrient,
middle segment is two times sprayed and the right side segment is one time sprayed.
Image 2 (a) taken in a segment without plant nutrient
Image 2 (b) taken in a segment without plant nutrient
Image 2 (c) taken in a segment without plant nutrient
Image 3 (a) taken in a segment with two times plant nutrient spraying
Image 3 (b) taken in a segment with two times plant nutrient spraying
Image 3 (c) taken in a segment with two times plant nutrient spraying
Image 4 (a) taken in a segment with one time plant nutrient spraying
Image 4 (b) taken in a segment with one time plant nutrient spraying
Image 4 (c) taken in a segment with one time plant nutrient spraying
Image 5 shows the bunch of 50 plants randomly picked at different area in each segments
(The left one is without plant nutrient, middle one is once applied, and the right one is twice applied).
|
Opposing the proposed demolition of the defunct Union Carbide Plant in Bhopal, organisations representing victims of the Bhopal gas tragedy have dubbed it as an attempt to “weaken” the criminal case pending in court.
“Tank no. 610 and the existing structure at the factory site is evidence against the company. How can they demolish it ,” Gas Peedit Sangharsh Sahyog Samiti convenor Sadhna Karnik Karnik asked.
“It is an attempt to weaken the criminal case pending in the sessions court as the defunct plant is an important evidence in the case against Union Carbide,” she said.
Ms. Karnik was reacting to the remarks of Union Environment Minister Jairam Ramesh on the issue.
“Though the State government and NGOs wants to preserve a part from where the gas leaked as a monument, the Centre and the Group of Ministers (GoMs) on Bhopal Gas Tragedy want to raze the building of the Union Carbide Factory due to mercury contamination,” Mr. Ramesh had said.
However, the Centre has not taken a final call in the matter, he had said, adding that the decision will be taken in July-August after the State government and NGOs put forward their points.
Ms. Karnik said, “There are many ways for making it free from contamination and if the very structure was removed then creating a permanent memorial will have no meaning“.
The move will be opposed whenever a meeting in this regard is held, she added.
Gas Peedit Mahila Udyog Sangthan convenor Abdul Jabbar said, “No doubt the structure existing at the defunct plant has weakened but part of the plant made of cast iron can easily be preserved. If they raze the structure then how can a memorial be created at the site.”
Even at the Nazi camps and at Hiroshima-Nagasaki in Japan, where nuclear bombs were dropped, remains of the structure were preserved so that people remain aware of the cost humanity paid for that act, he said.
When asked about the mercury contamination existing in the plant, Mr. Jabbar said it cannot be doubted but there are ways to detoxify it so that it can be preserved.
Mr. Jabbar did not rule out that it may be a ploy on the part of the MNCs to completely erase the memories of the world’s worst industrial disaster.
The infamous gas tragedy hit Bhopal on the intervening nights of December 2-3, 1984, killed over 15,000 people and maimed lakhs besides leaving several others scarred for life.
|
912 and 27954.
4249008
Calculate the lowest common multiple of 5818624 and 14707.
64004864
Calculate the least common multiple of 204 and 3126660.
53153220
Calculate the least common multiple of 938 and 304984.
2134888
Calculate the lowest common multiple of 964496 and 338.
12538448
What is the lowest common multiple of 14496 and 8289296?
49735776
Find the common denominator of -101/24 and 20/40993269.
327946152
Calculate the smallest common multiple of 16800 and 27751500.
222012000
What is the smallest common multiple of 1555015 and 4382315?
48205465
Calculate the least common multiple of 112 and 978768.
978768
Find the common denominator of -81/176852 and 169/204060.
2652780
What is the common denominator of 15/2629 and 93/4517578?
49693358
What is the common denominator of 5/1149714 and 71/4042?
49437702
Calculate the common denominator of -59/1739523 and 40/3.
1739523
Calculate the lowest common multiple of 10325 and 693014.
17325350
Find the common denominator of -97/6153900 and -87/51282500.
153847500
Calculate the common denominator of 37/357432 and -143/14310.
16084440
Calculate the least common multiple of 60 and 14498550.
28997100
What is the lowest common multiple of 7 and 38611034?
38611034
Calculate the common denominator of -6/1403213 and 48/413947835.
413947835
Calculate the smallest common multiple of 412776 and 36678096.
256746672
What is the lowest common multiple of 304696 and 3800?
144730600
Find the common denominator of 21/317563279 and -45/57738778.
635126558
What is the common denominator of 109/497640 and 149/230724?
25379640
Calculate the least common multiple of 90487 and 2214.
4886298
Calculate the common denominator of -41/4303 and 46/30043.
9944233
Calculate the smallest common multiple of 2906840 and 5365.
3119039320
What is the common denominator of 8/93 and 94/52815?
1637265
Calculate the common denominator of -111/220 and 64/4550755.
18203020
Find the common denominator of -31/2073792 and 73/392.
14516544
Find the common denominator of -28/1331 and -5/3262281.
3262281
Calculate the least common multiple of 35481788 and 21915222.
745117548
What is the common denominator of -43/1716718 and -21/62?
1716718
What is the common denominator of -137/23616 and -71/104427?
6683328
What is the common denominator of -127/40610328 and 15/6368?
162441312
What is the common denominator of -69/2078920 and 91/33262720?
33262720
Calculate the common denominator of 137/209856 and 11/3287744.
9863232
Calculate the lowest common multiple of 2366 and 74919.
13635258
Calculate the common denominator of 113/660576 and -51/9830.
3302880
What is the common denominator of 46/17794567 and -53/13118?
35589134
Calculate the lowest common multiple of 34180 and 12655145.
50620580
Find the common denominator of -39/1268950 and -58/34045.
13958450
Calculate the least common multiple of 121 and 6113657.
67250227
What is the least common multiple of 6 and 785550?
785550
What is the least common multiple of 711432 and 5688?
56203128
Calculate the common denominator of 131/7992 and -11/982017.
7856136
Calculate the common denominator of 109/121884 and -44/721147.
8653764
What is the smallest common multiple of 9724 and 8979916?
1984561436
What is the smallest common multiple of 14 and 8530228?
8530228
What is the lowest common multiple of 241998 and 19239?
29281758
Find the common denominator of 137/3123462 and -19/1193518.
146802714
What is the least common multiple of 8 and 460258?
1841032
What is the lowest common multiple of 4320950 and 38840?
17283800
What is the common denominator of 83/360 and 199/10863720?
10863720
What is the smallest common multiple of 25616 and 8924?
57149296
What is the smallest common multiple of 34655 and 59575?
412914325
What is the least common multiple of 439815 and 263889?
1319445
What is the common denominator of 17/598455 and -113/12012?
16756740
Find the common denominator of -6/1001 and -2/2668393.
29352323
Calculate the common denominator of -88/605397 and 41/32422.
35113026
Calculate the common denominator of 21/20 and -41/6777768.
33888840
Calculate the smallest common multiple of 44 and 2211016.
24321176
Calculate the common denominator of -79/8 and 181/12754260.
25508520
Find the common denominator of -103/5850 and -163/5762250.
5762250
Calculate the smallest common multiple of 2638146 and 19320.
52762920
What is the least common multiple of 880 and 195940?
8621360
What is the least common multiple of 3990 and 6069246?
212423610
Find the common denominator of -53/697245 and 83/138460.
19522860
What is the least common multiple of 84795 and 1950285?
1950285
What is the lowest common multiple of 5746464 and 159624?
5746464
What is the common denominator of 61/1256580 and -173/6804?
79164540
Calculate the lowest common multiple of 1455685 and 4851.
91708155
What is the lowest common multiple of 61281 and 9?
61281
What is the least common multiple of 64 and 285722800?
1142891200
Calculate the lowest common multiple of 13748405 and 999884.
54993620
Find the common denominator of 5/6 and 20/27585571.
165513426
What is the least common multiple of 952758 and 460887?
113378202
Calculate the common denominator of -121/3130818 and -105/754.
1180318386
What is the least common multiple of 110391 and 7006?
24948366
What is the common denominator of -97/125186296 and -10/172131157?
1377049256
Find the common denominator of -51/1368730 and -241/16246230.
373663290
What is the least common multiple of 40 and 1674008?
8370040
Calculate the lowest common multiple of 375053480 and 12.
1125160440
Calculate the lowest common multiple of 340505 and 661380.
298282380
What is the common denominator of -7/271660 and 12/3796015?
713650820
Calculate the common denominator of 115/50498 and -149/10041888.
70293216
Calculate the common denominator of 13/3 and 26/69440079.
69440079
What is the common denominator of 7/7072878 and -115/16503382?
49510146
Calculate the common denominator of -55/8 and -97/60693008.
60693008
Find the common denominator of 133/125005728 and -59/16.
125005728
Find the common denominator of -4/723855 and -7/1284.
2895420
Find the common denominator of -70/473817 and -19/26352.
4162008528
Find the common denominator of 15/4108 and -61/577174.
1154348
What is the common denominator of 113/30221710 and 22/3022171?
30221710
Calculate the common denominator of 61/152 and 59/49974784.
949520896
Calculate the least common multiple of 166212 and 35766.
330263244
Calculate the smallest common multiple of 501566 and 212201.
5517226
What is the smallest common multiple of 6 and 3201984?
3201984
Calculate the common denominator of 34/564663 and -81/142.
1129326
Calculate the lowest common multiple of 118948720 and 63800.
594743600
Find the common denominator of -25/24433002 and 77/36.
48866004
What is the lowest common multiple of 3256 and 20390216?
754437992
Calculate the smallest common multiple of 182 and 397642.
5169346
Calculate the common denominator of 53/8313544 and -77/544.
33254176
Calculate the least common multiple of 2618308 and 924.
7854924
Calculate the least common multiple of 2975 and 223650.
3802050
What is the smallest common multiple of 41382 and 24453?
537966
Calculate the smallest common multiple of 14508 and 13572.
420732
Calculate the common denominator of 53/15006838 and -3/392.
60027352
Calculate the smallest common multiple of 130536 and 168498.
33025608
Find the common denominator of 77/161067 and 1/60780.
3221340
What is the lowest common multiple of 2540655 and 72720?
40650480
What is the common denominator of 17/1350 and -83/9898250?
267252750
Calculate the common denominator of 64/3581493 and 75/900266.
164748678
Calculate the smallest common multiple of 11876 and 1051026.
2102052
Calculate the common denominator of -62/2890615 and 113/9249968.
46249840
Calculate the common denominator of -69/19060825 and -71/2800.
304973200
Find the common denominator of -41/537608 and -65/632128.
2498801984
What is the lowest common multiple of 31132752 and 10?
155663760
Find the common denominator of 2/2309 and -103/748.
1727132
What is the smallest common multiple of 1989220 and 14615?
73601140
Find the common denominator of -57/519476 and 87/18544.
39480176
What is the common denominator of -22/
|
The two major plant plasma membrane H+-ATPases display different regulatory properties.
The major plant plasma membrane H(+)-ATPases fall into two gene categories, subfamilies I and II. However, in many plant tissues, expression of the two subfamilies overlaps, thus precluding individual characterization. Yeast expression of PMA2 and PMA4, representatives of the two plasma membrane H(+)-ATPase subfamilies in Nicotiana plumbaginifolia, has previously shown that (i) the isoforms have distinct enzymatic properties and that (ii) PMA2 is regulated by phosphorylation of its penultimate residue (Thr) and binds regulatory 14-3-3 proteins, resulting in the displacement of the autoinhibitory C-terminal domain. To obtain insights into regulatory differences between the two subfamilies, we have constructed various chimeric proteins in which the 110-residue C-terminal-encoding region of PMA2 was progressively substituted by the corresponding sequence from PMA4. The PMA2 autoinhibitory domain was localized to a region between residues 851 and 915 and could not be substituted by the corresponding region of PMA4. In contrast to PMA2, PMA4 was poorly phosphorylated at its penultimate residue (Thr) and bound 14-3-3 proteins weakly. The only sequence difference around the phosphorylation site is located two residues upstream of the phosphorylated Thr. It is Ser in PMA2 (as in most members of subfamily I) and His in PMA4 (as in most members of subfamily II). Substitution of His by Ser in PMA4 resulted in an enzyme showing increased phosphorylation status, 14-13-3 binding, and ATPase activity, as well as improved yeast growth. The reverse substitution of Ser by His in PMA2 resulted in the failure of this enzyme to complement the absence of yeast H(+)-ATPases. These results show that the two plant H(+)-ATPase subfamilies differ functionally in their regulatory properties.
|
package com.tencent.mm.plugin.emoji.a.a;
import com.tencent.matrix.trace.core.AppMethodBeat;
import com.tencent.mm.model.r;
import com.tencent.mm.plugin.emoji.model.e;
import com.tencent.mm.plugin.emoji.model.f;
import com.tencent.mm.plugin.emoji.model.j;
import com.tencent.mm.protocal.protobuf.EmotionSummary;
import com.tencent.mm.storage.ar;
import java.util.ArrayList;
import java.util.HashMap;
import java.util.Iterator;
import java.util.List;
public class c implements Cloneable, Iterable<f> {
private HashMap<String, ar> kSW;
protected HashMap<String, ar> kSX;
public boolean kSY;
protected ArrayList<f> mItemList;
class a implements Iterator<f> {
private int mIndex;
private a() {
this.mIndex = 0;
}
/* synthetic */ a(c cVar, byte b) {
this();
}
public final boolean hasNext() {
AppMethodBeat.i(52776);
if (this.mIndex < c.this.size()) {
AppMethodBeat.o(52776);
return true;
}
AppMethodBeat.o(52776);
return false;
}
public final void remove() {
}
public final /* synthetic */ Object next() {
AppMethodBeat.i(52777);
c cVar = c.this;
int i = this.mIndex;
this.mIndex = i + 1;
f ub = cVar.ub(i);
AppMethodBeat.o(52777);
return ub;
}
}
public /* synthetic */ Object clone() {
AppMethodBeat.i(52794);
c bjC = bjC();
AppMethodBeat.o(52794);
return bjC;
}
public void clear() {
AppMethodBeat.i(52778);
if (this.mItemList != null) {
this.mItemList.clear();
this.mItemList = null;
}
if (this.kSW != null) {
this.kSW.clear();
this.kSW = null;
}
if (this.kSX != null) {
this.kSX.clear();
this.kSX = null;
}
AppMethodBeat.o(52778);
}
public c(f fVar) {
List list;
if (fVar == null) {
list = null;
} else {
list = fVar.kVq;
}
this(list);
AppMethodBeat.i(52779);
AppMethodBeat.o(52779);
}
public c() {
AppMethodBeat.i(52780);
this.kSW = new HashMap();
this.kSX = new HashMap();
this.kSY = r.YL();
AppMethodBeat.o(52780);
}
public c(List<f> list) {
this();
AppMethodBeat.i(52781);
if (list == null) {
AppMethodBeat.o(52781);
return;
}
this.mItemList = new ArrayList();
this.mItemList.addAll(list);
AppMethodBeat.o(52781);
}
public final int size() {
AppMethodBeat.i(52782);
if (this.mItemList == null) {
AppMethodBeat.o(52782);
return 0;
}
int size = this.mItemList.size();
AppMethodBeat.o(52782);
return size;
}
public final f ub(int i) {
AppMethodBeat.i(52783);
if (this.mItemList == null || this.mItemList.size() <= i || i < 0) {
AppMethodBeat.o(52783);
return null;
} else if (this.mItemList == null) {
AppMethodBeat.o(52783);
return null;
} else {
f fVar = (f) this.mItemList.get(i);
AppMethodBeat.o(52783);
return fVar;
}
}
public final f IT(String str) {
AppMethodBeat.i(52784);
if (this.mItemList != null) {
Iterator it = this.mItemList.iterator();
while (it.hasNext()) {
f fVar = (f) it.next();
EmotionSummary emotionSummary = fVar.kTb;
if (emotionSummary != null && emotionSummary.ProductID != null && emotionSummary.ProductID.equals(str)) {
AppMethodBeat.o(52784);
return fVar;
}
}
}
AppMethodBeat.o(52784);
return null;
}
public final c bjC() {
c cVar;
AppMethodBeat.i(52785);
try {
cVar = (c) super.clone();
try {
if (this.mItemList != null) {
cVar.mItemList = (ArrayList) this.mItemList.clone();
}
} catch (CloneNotSupportedException e) {
}
} catch (CloneNotSupportedException e2) {
cVar = null;
}
AppMethodBeat.o(52785);
return cVar;
}
public void notifyDataSetChanged() {
AppMethodBeat.i(52786);
if (this.mItemList == null) {
AppMethodBeat.o(52786);
return;
}
this.kSX = j.getEmojiStorageMgr().xYo.duD();
Iterator it = this.mItemList.iterator();
while (it.hasNext()) {
f fVar = (f) it.next();
EmotionSummary emotionSummary = fVar.kTb;
if (emotionSummary != null) {
if (com.tencent.mm.plugin.emoji.h.a.g(emotionSummary)) {
fVar.setStatus(com.tencent.mm.plugin.emoji.h.a.blE() ? 7 : 3);
} else {
String str = emotionSummary.ProductID;
fVar.a(this.kSY, IX(str), IV(str));
}
}
}
bjD();
AppMethodBeat.o(52786);
}
public final void IU(String str) {
AppMethodBeat.i(52787);
f IT = IT(str);
if (IT == null) {
AppMethodBeat.o(52787);
return;
}
IT.setStatus(-1);
IT.a(this.kSY, IX(str), IV(str));
AppMethodBeat.o(52787);
}
public final boolean IV(String str) {
AppMethodBeat.i(52788);
if (this.kSX == null) {
AppMethodBeat.o(52788);
return false;
}
boolean containsKey = this.kSX.containsKey(str);
AppMethodBeat.o(52788);
return containsKey;
}
public final ar IW(String str) {
AppMethodBeat.i(52789);
ar IX = IX(str);
if (IX == null) {
IX = new ar(str);
this.kSW.put(str, IX);
}
AppMethodBeat.o(52789);
return IX;
}
public final ar IX(String str) {
AppMethodBeat.i(52790);
ar arVar = (ar) this.kSW.get(str);
AppMethodBeat.o(52790);
return arVar;
}
public Iterator<f> iterator() {
AppMethodBeat.i(52791);
a aVar = new a(this, (byte) 0);
AppMethodBeat.o(52791);
return aVar;
}
public final void bY(String str, int i) {
AppMethodBeat.i(52792);
ar arVar = (ar) this.kSW.get(str);
if (arVar == null) {
AppMethodBeat.o(52792);
return;
}
arVar.Mo(i);
AppMethodBeat.o(52792);
}
public void bjD() {
AppMethodBeat.i(52793);
if (this.mItemList == null) {
AppMethodBeat.o(52793);
} else if (j.bkn().kVo == null) {
AppMethodBeat.o(52793);
} else {
Iterator it = this.mItemList.iterator();
while (it.hasNext()) {
f fVar = (f) it.next();
EmotionSummary emotionSummary = fVar.kTb;
if (emotionSummary != null) {
int i;
e bkn = j.bkn();
Integer num = (Integer) bkn.kVo.get(emotionSummary.ProductID);
if (num == null) {
i = -1;
} else {
i = num.intValue();
}
if (i >= 0) {
fVar.setStatus(6);
fVar.EV = i;
}
if (i < 0 && fVar.mStatus == 6) {
fVar.setStatus(3);
}
}
}
AppMethodBeat.o(52793);
}
}
}
|
---
abstract: 'We prove that in a regular category all reflexive and transitive relations are symmetric if and only if every internal category is an internal groupoid. In particular, these conditions hold when the category is $n$-permutable for some $n$.'
address:
- 'Departamento de Matemática, Escola Superior de Tecnologia e Gestão, Centro para o Desenvolvimento Rápido e Sustentado do Produto, Instituto Politécnico de Leiria, Leiria, Portugal'
- 'CMUC, Universidade de Coimbra, 3001–454 Coimbra, Portugal'
- 'Departamento de Matemática, Faculdade de Ciências e Tecnologia, Universidade do Algarve, Campus de Gambelas, 8005–139 Faro, Portugal'
- 'Institut de recherche en mathématique et physique, Université catholique de Louvain, chemin du cyclotron 2 bte L7.01.02, B–1348 Louvain-la-Neuve, Belgium'
author:
- 'Nelson Martins-Ferreira'
- Diana Rodelo
- Tim Van der Linden
title: 'An observation on $n$-permutability'
---
[^1]
Let ${\ensuremath{\mathcal{C}}}$ be a regular category. It is well known that any internal preorder, being a reflexive and transitive relation $(R,r_{1},r_{2})$ on an object $X$ of ${\ensuremath{\mathcal{C}}}$, may be considered as an internal category in ${\ensuremath{\mathcal{C}}}$. In fact, a preorder is the same thing as a *thin* category, an internal category of which the domain and codomain morphisms $r_{1}$, $r_{2}\colon {R\to X}$ are jointly monic. This internal category will be a groupoid precisely when the given reflexive and transitive relation $R$ is symmetric, so that *if in ${\ensuremath{\mathcal{C}}}$ every internal category is an internal groupoid, then all of its internal reflexive and transitive relations are equivalence relations*.
The converse implication is interesting due to its close relation with the following question: what conditions does a regular category need to satisfy for all internal categories in it to be internal groupoids? One of the main results of [@Carboni-Pedicchio-Pirovano] gives a sufficient condition: the Mal’tsev property, that is, $2$-permutability $RS=SR$ of internal equivalence relations $R$, $S$ on the same object. But when ${\ensuremath{\mathcal{C}}}$ is a variety, already the strictly weaker $n$-permutability condition ($RSRS\ldots=SRSR\ldots$ with $n$ factors $R$ or $S$ on each side) is sufficient [@Rodelo:Internal-categories]. Furthermore—here we follow a remark in [@MFVdL2]—a variety is $n$-permutable if and only if [@CR] all of its internal reflexive and transitive relations are equivalence relations (= congruences). Altogether:
\[1\] If ${\ensuremath{\mathcal{C}}}$ is a variety of universal algebras, then the following conditions are equivalent:
1. all preorders in ${\ensuremath{\mathcal{C}}}$ are congruences;
2. all internal categories in ${\ensuremath{\mathcal{C}}}$ are internal groupoids;
3. ${\ensuremath{\mathcal{C}}}$ is $n$-permutable for some $n\geq 2$.
This result is no longer true for regular categories. The number $n$ in the third condition is obtained through a construction on a free algebra, and it cannot be replaced by a purely categorical argument, as shows the following counterexample.
\[Example on permutability algebras\] Consider the product category $${\ensuremath{\mathsf{Perm}}}=\prod_{n\geq 2}\bigl({\ensuremath{\text{$n$-\textsf{Perm}}}}\bigr)={\ensuremath{\text{$2$-\textsf{Perm}}}}\times {\ensuremath{\text{$3$-\textsf{Perm}}}}\times \cdots\times {\ensuremath{\text{$n$-\textsf{Perm}}}}\times \cdots$$ where, for $n\geq 2$, we let ${\ensuremath{\text{$n$-\textsf{Perm}}}}$ be the ($n$-permutable) variety of [$n$-permutability algebras]{} with operations $\theta_{1}$, …, $\theta_{n-1}$ for which the identities $$\begin{cases}
\theta_1(s,t,t)=s,\\
\theta_{i}(s,s,t) = \theta_{i+1}(s,t,t), & \text{for $i\in\{1, \dots, n-2\}$,}\\
\theta_{n-1}(s,s,t)=t
\end{cases}$$ hold.
It is easy to see that ${\ensuremath{\mathsf{Perm}}}$ is a regular category. It is also clear that in ${\ensuremath{\mathsf{Perm}}}$, all preorders are equivalence relations: each of its components lies in some variety ${\ensuremath{\text{$n$-\textsf{Perm}}}}$, where it will be a congruence. On the other hand, there is no $n\geq 2$ for which the category ${\ensuremath{\mathsf{Perm}}}$ is $n$-permutable, since otherwise ${\ensuremath{\text{$(n+1)$-\textsf{Perm}}}}$ would be an $n$-permutable variety. Indeed, for any $n$ there are examples of $(n+1)$-permutable varieties which are not $n$-permutable [@Graetzer; @Mitschke; @Schmidt; @Hagemann-Mitschke], and by forgetting structure these counterexamples can be made to work here too.
On the other hand, the equivalence between the upper two conditions in the proposition makes sense in general and, given any $n$-permutable category, we may ask whether they hold or not. As it turns out, the situation is as good as it could possibly be. The following characterisation of $n$-permutability due to Hagemann [@Hagemann; @Hagemann-Mitschke] was recently extended from varieties to regular categories [@JRVdL1].
\[TheB\] For a regular category ${\ensuremath{\mathcal{C}}}$, and a natural number ${n\geqslant 2}$, the following conditions are equivalent:
1. ${\ensuremath{\mathcal{C}}}$ has $n$-permutable congruences;
2. $R^\circ\leqslant R^{n-1}$ for any internal reflexive relation $R$ in ${\ensuremath{\mathcal{C}}}$;
3. $R^n\leqslant R^{n-1}$ for any internal reflexive relation $R$ in ${\ensuremath{\mathcal{C}}}$.
This may now be used to obtain our main result.
\[Main theorem\] If ${\ensuremath{\mathcal{C}}}$ is a regular category, then the following conditions are equivalent:
1. all reflexive and transitive relations in ${\ensuremath{\mathcal{C}}}$ are equivalence relations;
2. all internal categories in ${\ensuremath{\mathcal{C}}}$ are internal groupoids.
Furthermore, these conditions hold if ${\ensuremath{\mathcal{C}}}$ is $n$-permutable for some $n\geq 2$.
We already recalled that the second condition is stronger than the first. For it suffices to observe that the argument given by Carboni, Pedicchio and Pirovano in the Mal’tsev context [@Carboni-Pedicchio-Pirovano Theorem 2.2] may be adapted to hold in regular categories. Their proof uses difunctionality of internal relations where we can use image factorisations.
Consider an internal category $$\xymatrix{M*M \ar[r]^-{m} & M \ar@<1ex>[r]^-{d} \ar@<-1ex>[r]_-{c} & O \ar[l]|-{i}}$$ where $M*M$, the *object of composable pairs* $\{\langle\beta,\gamma\rangle\mid c\beta=d\gamma\}$, denotes the pullback of $c$ and $d$, while the morphism $m$ is the composition. The image of the span $$\xymatrix{& M*M \ar[ld]_-{\pi_1} \ar[rd]^-{m}\\
M && M}$$ is a relation on $M$ which we write $S$. Using generalised elements as in [@Carboni-Kelly-Pedicchio], it makes sense to say as on page 103 of [@Carboni-Pedicchio-Pirovano] that a couple of arrows $\langle\beta,\alpha\rangle\colon {X\to M\times M}$ is in $S$ if and only if there exists an arrow $\gamma$ in $M$ for which $\gamma{\raisebox{0.2mm}{\ensuremath{\scriptstyle{\circ}}}}\beta=\alpha$. $$\vcenter{\xymatrix@1@R=2.4495em@C=1.4142em{& {\cdot} \ar@{->}[ld]_-{\beta}\\
{\cdot} && {\cdot} \ar@{<-}[lu]_-{\alpha} \ar@{<--}[ll]^-{\gamma}}}$$ More explicitly, there should exist a morphism $\gamma\colon Y\to M$ and a regular epimorphism $p\colon {Y\to X}$ such that ${m\langle \beta p,\gamma\rangle=\alpha p}$. In fact, as we shall see below, when $m$ satisfies the *left cancellation property*, we may choose $p=1_{X}$.
The relation $S$ is not just reflexive as mentioned in [@Carboni-Pedicchio-Pirovano], but it is also transitive. Hence condition (i) tells us that $S$ is an equivalence relation on $M$. Suppose indeed that $\alpha$, $\beta$, $\delta\colon {X\to M}$ are such that $\langle\beta,\alpha\rangle$ and $\langle\delta,\beta\rangle$ are in $S$. Then we have $\gamma$ and $p$ as above, and also a morphism $\epsilon\colon Y'\to M$ and a regular epimorphism $p'\colon Y'\to X$ with ${m\langle \delta p',\epsilon\rangle=\beta p'}$. Taking the pullback $$\xymatrix{Z \ar[r]^-{q} \ar[d]_-{q'} \pullback & Y \ar[d]^-{p} \\
Y' \ar[r]_-{p'} & X}$$ of $p$ and $p'$ and writing $\mu=m\langle \epsilon q',\gamma q\rangle$ we may calculate $$\begin{aligned}
m\langle \delta p'q',\mu\rangle = m\langle \delta p'q',m\langle \epsilon q',\gamma q\rangle\rangle
&= m\langle m\langle\delta p',\epsilon\rangle q',\gamma q\rangle\\
&= m\langle \beta p' q',\gamma q\rangle
= m\langle \beta p,\gamma\rangle q
= \alpha p q = \alpha p' q'\end{aligned}$$ to see that $\langle\delta,\alpha\rangle$ is in $S$. It follows that $S$ is transitive.
Consider the composites $id$ and $ic\colon M\to M$. Given any $\alpha\colon {X\to M}$, the pair $\langle id\alpha,\alpha\rangle$ is in $S$. The symmetry of $S$ gives us $\langle \alpha, id\alpha\rangle$ in $S$, which yields a generalised element ${}^{\bullet}\alpha$ of $M$ such that ${}^{\bullet}\alpha{\raisebox{0.2mm}{\ensuremath{\scriptstyle{\circ}}}}\alpha=id\alpha$ as above. Via an analogous argument we obtain a generalised element $\alpha^{\bullet}$ of $M$ satisfying $\alpha{\raisebox{0.2mm}{\ensuremath{\scriptstyle{\circ}}}}\alpha^{\bullet}=ic\alpha$. More precisely, ${}^{\bullet}\alpha\colon{Y\to X}$ and $m\langle \alpha p,{}^{\bullet}\alpha\rangle=id\alpha p$ for some regular epimorphism $p\colon {Y\to X}$, while $\alpha^{\bullet}\colon {Y'\to X}$ and $m\langle \alpha^{\bullet},\alpha p'\rangle=ic\alpha p'$ for some regular epimorphism $p'\colon {Y'\to X}$. Taking again the above pullback of $p$ and $p'$, $$\begin{aligned}
{}^{\bullet}\alpha q=m\langle ic\alpha p'q', {}^{\bullet}\alpha q\rangle &=m\langle m \langle \alpha^{\bullet}q',\alpha p'q'\rangle, {}^{\bullet}\alpha q\rangle\\
&=m\langle \alpha^{\bullet}q', m \langle \alpha p'q', {}^{\bullet}\alpha q\rangle\rangle
=m\langle \alpha^{\bullet}q', id\alpha p'q'\rangle
=\alpha^{\bullet}q'\end{aligned}$$ so $\overline\alpha\coloneq {}^{\bullet}\alpha q=\alpha^{\bullet}q'\colon {Z\to M}$, together with the regular epimorphism $pq\colon {Z\to X}$, is a two-sided inverse for $\alpha$.
We can use this to show that the composition satisfies the [left cancellation property]{}: $\gamma{\raisebox{0.2mm}{\ensuremath{\scriptstyle{\circ}}}}\beta=\gamma{\raisebox{0.2mm}{\ensuremath{\scriptstyle{\circ}}}}\delta$ implies $\beta=\delta$. Given $\beta$, $\gamma$, $\delta\colon {X\to M}$ such that $c\beta=c\delta=d\gamma$, consider $\overline\gamma\colon Y\to M$ and the corresponding regular epimorphism $p\colon {Y\to X}$. The equality $m\langle\beta,\gamma\rangle=m\langle\delta,\gamma\rangle$ then implies $$\begin{aligned}
\beta p &= m\langle \beta p,id\gamma p\rangle
=m\langle \beta p,m\langle\gamma p, \overline\gamma\rangle\rangle
=m\langle m\langle\beta,\gamma\rangle p, \overline\gamma\rangle\\
&=m\langle m\langle\delta,\gamma\rangle p, \overline\gamma\rangle
=m\langle \delta p,m\langle\gamma p, \overline\gamma\rangle\rangle
=m\langle \delta p,id\gamma p\rangle
=\delta p,\end{aligned}$$ so $\beta=\delta$ as claimed.
The left cancellation property now allows us to lift the inverse $\overline\alpha\colon {Y\to M}$ of $\alpha\colon{X\to M}$ over the enlargement of domain $p\colon Y\to X$ which comes with it to a morphism $\alpha^{-1}\colon {X\to M}$. To see this, consider the kernel relation $(R,\pi_{1},\pi_{2})$ of $p$ $$\xymatrix{R \ar@<.5ex>[r]^-{\pi_{1}} \ar@<-.5ex>[r]_-{\pi_{2}} & Y \ar[r]^-{p} \ar[rd]_-{\overline\alpha} & X \ar@{.>}[d]^-{\alpha^{-1}} \\
&& M}$$ and note that $$m\langle \overline\alpha\pi_{1}, \alpha p\pi_{1}\rangle = ic\alpha p\pi_{1}
\qquad\text{and}\qquad
m\langle \overline\alpha\pi_{2}, \alpha p\pi_{2}\rangle = ic\alpha p\pi_{2}.$$ Since $p\pi_{1}=p\pi_{2}$ by definition, left cancellation gives $\overline\alpha\pi_{1}=\overline\alpha\pi_{2}$, so that the morphism $\overline\alpha\colon {Y\to M}$ does indeed lift over $p$.
We now let $\alpha\colon {X\to M}$ be $1_{M}\colon {M\to M}$. The inverse $s=\alpha^{-1}=1_{M}^{-1}\colon {M\to M}$ is then a genuine inversion making the given internal category into a groupoid. This finishes the proof of .
For the final statement, suppose that $R$ is a reflexive and transitive relation. Then $R^{\circ}\leq R^{n-1}$ by Hagemann’s Theorem while $R^{n-1}\leq R$ by transitivity of $R$.
In stark contrast with the above result, recall that a regular category is Mal’tsev if and only if every reflexive relation in it is an equivalence relation, while on the other hand, the so-called [Lawvere condition]{} “all internal reflexive graphs are internal groupoids” means that the category is *naturally Mal’tsev* [@Carboni-Affine-Spaces; @Johnstone:Maltsev].
We have just analysed the equivalence (A) in the picture $$\resizebox{\textwidth}{!}
{\xymatrix@=2em{ & \fbox{\begin{tabular}{ccc}internal & & internal \vspace{-5pt}\\ & = \vspace{-5pt}\\ groupoids & & categories\end{tabular}} \ar@{<=>}[ddl]_-{\txt{(A)}} \ar@{=>}[ddr]^-{\txt{(B)}} \\\\
\fbox{\begin{tabular}{ccc}internal & & internal \\ reflexive \& transitive & = & equivalence \\ relations & & relations\end{tabular}} && \fbox{\begin{tabular}{ccc}internal & & internal \vspace{-5pt}\\ & = \vspace{-5pt}\\ monoids & & groups\end{tabular}}}}$$ and its relation with $n$-permutability. It is also clear that in any regular category which satisfies the equivalent conditions of Theorem \[Main theorem\], all internal monoids are groups. One could now ask whether the implication (B) is also an equivalence and what is the role of $n$-permutability here.
By Theorem 1.4.5 in [@Borceux-Bourn], in a unital category, any internal monoid is commutative. Thus we can already conclude two things:
1. on the one hand, in a strongly unital category, any internal monoid is an abelian group [@Borceux-Bourn Theorem 1.9.5];
2. on the other hand, if ${\ensuremath{\mathcal{C}}}$ is regular and unital and the equivalent conditions of Theorem \[Main theorem\] hold, then in ${\ensuremath{\mathcal{C}}}$ all internal monoids are abelian groups.
So, any pointed Mal’tsev category, being strongly unital [@Borceux-Bourn Theorem 2.2.9], is such that every internal monoid in it is an internal abelian group. The same property holds for pointed Goursat (= $3$-permutable) categories [@Bourn-Gran-Modularity Corollary 3.4], even though these categories need not be (strongly) unital, as shows the following counterexample.
We consider the variety ${\ensuremath{\mathcal{V}}}$ of [implication algebras]{}, which are $(I,\cdot)$ that satisfy $$\left\{\begin{aligned}
&(x y) x=x\\
&(x y) y=(y x) x \\
&x (y z)=y (x z)
\end{aligned}\right.$$ where we write $x\cdot y=xy$. It is shown in [@Mitschke; @Hagemann-Mitschke] that ${\ensuremath{\mathcal{V}}}$ is $3$-permutable. In particular, ${\ensuremath{\mathcal{V}}}$ satisfies the equivalent conditions of Theorem \[Main theorem\]. In order to prove that ${\ensuremath{\mathcal{V}}}$ is not unital, we construct a punctual span $$\xymatrix{X \ar@<-.5ex>[r]_-{s} & Z \ar@<-.5ex>[l]_-{f} \ar@<.5ex>[r]^-{g} & Y \ar@<.5ex>[l]^-{t}}$$ as in [@Borceux-Bourn Theorem 1.2.12] and such that the factorisation $\langle f,g\rangle\colon Z\to X\times Y$ is not a regular epimorphism. Put $X=\{1,2\}$, $Y=\{1,3\}$ and $Z=\{1,2,3\}$ with respective multiplication tables $$\begin{array}{c|cc}
\cdot & 1 & 2 \\ \hline
1 & 1 & 2 \\
2 & 1 & 1
\end{array},
\qquad
\begin{array}{c|cc}
\cdot & 1 & 3 \\ \hline
1 & 1 & 3 \\
3 & 1 & 1
\end{array}
\qquad\text{and}\qquad
\begin{array}{c|ccc}
\cdot & 1 & 2 & 3 \\ \hline
1 & 1 & 2 & 3 \\
2 & 1 & 1 & 3 \\
3 & 1 & 2 & 1
\end{array},$$ take $s$ and $t$ to be the canonical inclusions and $f\colon{Z\to X}$ and $g\colon{Z \to Y}$ defined respectively by $$f(1)=f(3)=1,\quad f(2)=2$$ and $$g(1)=g(2)=1,\quad g(3)=3.$$ Then $\langle f,g\rangle$ is not a surjection, because $Z$ has three elements while $X\times Y$ has four.
Internal monoids in $n$-permutable varieties are always abelian groups. The proof uses arguments which are similar to the ones given in Proposition 5.3 of [@Rodelo:Internal-categories]. The technique used in [@JRVdL1] for transforming a varietal proof into a categorical one does not work in this specific situation, because the varietal proof uses nested operations.
Even in the context of varieties, implication (B) is generally not an equivalence. In fact, in [@Barbour-Raftery] there are examples of subtractive varieties [@Ursini3] which are not $n$-permutable for any $n$. On the other hand, it is well known and easy to prove that in any subtractive variety, all internal monoids are abelian groups.
Let indeed ${\ensuremath{\mathcal{W}}}$ be a subtractive variety, so that it is pointed and admits a binary term $s$ satisfying $s(x,x)=0$ and $s(x,0)=0$. Let $(M,+)$ be a monoid in ${\ensuremath{\mathcal{W}}}$. Then for any $x\in M$, the inverse of $x$ is $x^{\bullet}=s(0,x)$, so that $(M,+)$ is an internal group. It is also abelian: $$\begin{gathered}
x+ y=s(x+y,0)=s(x+y,x+x^{\bullet})=s(x,x)+s(y,x^{\bullet})\\
= s(y,x^{\bullet})+s(x,x) = s(y+x,x^{\bullet}+x)=s(y+x,0)=y+x.\end{gathered}$$ Note that the addition of $M$ is uniquely determined by $x+y=s(x,s(0,y))$.
We finish by giving a simple alternative counterexample.
We let ${\ensuremath{\mathcal{W}}}$ be the free subtractive variety. Its objects—triples $(X,s,0)$ which satisfy $s(x,x)=0$ and $s(x,0)=x$ for all $x\in X$—are called [subtraction algebras]{}. Consider the set $A=\{0,a,b\}$ equipped with the operation $s$ defined by the table $$\begin{array}{c|ccc}
s & 0 & a & b \\ \hline
0 & 0 & 0 & 0 \\
a & a & 0 & 0 \\
b & b & 0 & 0
\end{array}$$ The internal relation $R=\{(0,0), (a,a), (b,b), (a,b)\}$ on the subtraction algebra $A$ is reflexive and transitive, but not symmetric. Hence (B) is not an equivalence.
Acknowledgement {#acknowledgement .unnumbered}
---------------
We are grateful to the referee for his helpful comments and suggestions.
[10]{}
G. D. Barbour and J. G. Raftery, *Ideal determined varieties have unbounded degrees of permutability*, Quaest. Math. **20** (1997), 563–568.
F. Borceux and D. Bourn, *Mal’cev, protomodular, homological and semi-abelian categories*, Math. Appl., vol. 566, Kluwer Acad. Publ., 2004.
D. Bourn and M. Gran, *Categorical aspects of modularity*, [G]{}alois Theory, [H]{}opf Algebras, and Semiabelian Categories (G. Janelidze, B. Pareigis, and W. Tholen, eds.), Fields Inst. Commun., vol. 43, Amer. Math. Soc., 2004.
A. Carboni, *Categories of affine spaces*, J. Pure Appl. Algebra **61** (1989), 243–250.
A. Carboni, G. M. Kelly, and M. C. Pedicchio, *Some remarks on [M]{}altsev and [G]{}oursat categories*, Appl. Categ. Structures **1** (1993), 385–421.
A. Carboni, M. C. Pedicchio, and N. Pirovano, *Internal graphs and internal groupoids in [M]{}al’cev categories*, Proceedings of Conf. Category Theory 1991, Montreal, Am. Math. Soc. for the Canad. Math. Soc., Providence, 1992, pp. 97–109.
I. Chajda and J. Rachnek, *Relational characterizations of permutable and [$n$]{}-permutable varieties*, Czechoslovak Math. J. **33** (1983), 505–508.
G. Gr[ä]{}tzer, *Two [M]{}al’cev type theorems in universal algebra*, J. Combin. Theory **8** (1970), no. 3, 334–342.
J. Hagemann, *Grundlagen der allgemeinen topologischen [A]{}lgebra*, unpublished.
J. Hagemann and A. Mitschke, *On [$n$]{}-permutable congruences*, Algebra Universalis **3** (1973), 8–12.
Z. Janelidze, D. Rodelo, and T. Van der Linden, *Hagemann’s theorem for regular categories*, J. Homotopy Relat. Struct., accepted for publication, 2013.
P. T. Johnstone, *Affine categories and naturally [M]{}al’cev categories*, J. Pure Appl. Algebra **61** (1989), 251–256.
N. Martins-Ferreira and T. Van der Linden, *Categories vs. groupoids via generalised [M]{}al’tsev properties*, preprint `arXiv:1206.2745v1`, 2012.
A. Mitschke, *Implication algebras are 3-permutable and 3-distributive*, Algebra Universalis **1** (1971), 182–186.
D. Rodelo, *Internal structures in [$n$]{}-permutable varieties*, J. Pure Appl. Algebra **216** (2012), no. 8–9, 1879–1886.
E. T. Schmidt, *On [$n$]{}-permutable equational classes*, Acta Sci. Math. (Szeged) **33** (1972), 29–39.
A. Ursini, *On subtractive varieties [I]{}*, Algebra Universalis **31** (1994), 204–222.
[^1]: The first author was supported by IPLeiria/ESTG-CDRSP and Fundação para a Ciência e a Tecnologia (under grant number SFRH/BPD/4321/2008). The second author’s research was supported by CMUC, funded by the European Regional Development Fund through the program COMPETE and by the Portuguese Government through the FCT-Fundaç\~ ao para a Ciência e a Tecnologia under the project PEst-C/MAT/UI0324/2011. The third author works as *chargé de recherches* for Fonds de la Recherche Scientifique–FNRS and would like to thank CMUC for its kind hospitality during his stay in Coimbra. All three were supported by the FCT Grant PTDC/MAT/120222/2010 through the European program COMPETE/FEDER
|
.. SPDX-License-Identifier: GPL-2.0+
Migration Schedule
==================
U-Boot has been migrating to a new driver model since its introduction in
2014. This file describes the schedule for deprecation of pre-driver-model
features.
CONFIG_DM
---------
* Status: In progress
* Deadline: 2020.01
Starting with the 2010.01 release CONFIG_DM will be enabled for all boards.
This does not concern CONFIG_DM_SPL and CONFIG_DM_TPL. The conversion date for
these configuration items still needs to be defined.
CONFIG_DM_MMC
-------------
* Status: In progress
* Deadline: 2019.04
The subsystem itself has been converted and maintainers should submit patches
switching over to using CONFIG_DM_MMC and other base driver model options in
time for inclusion in the 2019.04 rerelease.
CONFIG_DM_USB
-------------
* Status: In progress
* Deadline: 2019.07
The subsystem itself has been converted along with many of the host controller
and maintainers should submit patches switching over to using CONFIG_DM_USB and
other base driver model options in time for inclusion in the 2019.07 rerelease.
CONFIG_SATA
-----------
* Status: In progress
* Deadline: 2019.07
The subsystem itself has been converted along with many of the host controller
and maintainers should submit patches switching over to using CONFIG_AHCI and
other base driver model options in time for inclusion in the 2019.07 rerelease.
CONFIG_BLK
----------
* Status: In progress
* Deadline: 2019.07
In concert with maintainers migrating their block device usage to the
appropriate DM driver, CONFIG_BLK needs to be set as well. The final deadline
here coincides with the final deadline for migration of the various block
subsystems. At this point we will be able to audit and correct the logic in
Kconfig around using CONFIG_PARTITIONS and CONFIG_HAVE_BLOCK_DEVICE and make
use of CONFIG_BLK / CONFIG_SPL_BLK as needed.
CONFIG_DM_SPI / CONFIG_DM_SPI_FLASH
-----------------------------------
Board Maintainers should submit the patches for enabling DM_SPI and DM_SPI_FLASH
to move the migration with in the deadline.
No dm conversion yet::
drivers/spi/fsl_espi.c
drivers/spi/lpc32xx_ssp.c
drivers/spi/sh_spi.c
drivers/spi/soft_spi_legacy.c
* Status: In progress
* Deadline: 2019.04
Partially converted::
drivers/spi/davinci_spi.c
drivers/spi/fsl_dspi.c
drivers/spi/kirkwood_spi.c
drivers/spi/mxc_spi.c
drivers/spi/mxs_spi.c
drivers/spi/omap3_spi.c
drivers/spi/sh_qspi.c
* Status: In progress
* Deadline: 2019.07
CONFIG_DM_PCI
-------------
Deadline: 2019.07
The PCI subsystem has supported driver model since mid 2015. Maintainers should
submit patches switching over to using CONFIG_DM_PCI and other base driver
model options in time for inclusion in the 2019.07 release.
CONFIG_DM_VIDEO
---------------
Deadline: 2019.07
The video subsystem has supported driver model since early 2016. Maintainers
should submit patches switching over to using CONFIG_DM_VIDEO and other base
driver model options in time for inclusion in the 2019.07 release.
CONFIG_DM_ETH
-------------
Deadline: 2020.07
The network subsystem has supported the driver model since early 2015.
Maintainers should submit patches switching over to using CONFIG_DM_ETH and
other base driver model options in time for inclusion in the 2020.07 release.
|
Chronic myeloid leukemia (CML) is a myeloproliferative disorder characterized by the disease-defining translocation between chromosomes 9 and 22 resulting in the Bcr-Abl tyrosine kinase fusion protein, termed the Philadelphia (Ph+) chromosome \[t(9;22)(q34;q11)\] (Boschelli, Arndt, & Gambacorti-Passerini, 2010). The introduction of targeted therapy with imatinib mesylate (Gleevec), a tyrosine kinase inhibitor (TKI) effective against Bcr-Abl, significantly improved outcomes for patients with CML.
In the IRIS (International Randomized Study of Interferon and STI-571) trial, imatinib showed significantly higher rates of hematologic and complete cytogenetic response (CCyR), lower risk of progression to advanced disease states (accelerated phase \[AP\] and blast phase \[BP\]), and increased progression-free survival (PFS) when compared with interferon-alfa plus cytarabine, the previous standard of care (see Table 1; O'Brien et al., 2003). An 8-year follow- up of the IRIS trial reported a CCyR rate of 83% and an estimated overall survival (OS) rate of 93%. Despite these positive results, 17% of patients treated with imatinib did not achieve a CCyR, approximately 15% of patients who achieved a CCyR eventually lost their response, and an additional 4% to 8% of patients were intolerant to imatinib (Deininger et al., 2009).
Since its approval in 2001, imatinib has been the standard treatment for patients with chronic-phase (CP-CML) disease; however, clinical trial data have demonstrated both imatinib resistance and intolerance due to toxicities. The incidence of resistance to imatinib in untreated CP-CML is approximately 4% per year, yet it was found to be much higher in patients in AP (40%) and BP (90%; Santos et al., 2011).
To address these issues, second-generation inhibitors of Bcr-Abl---dasatinib (Sprycel) and nilotinib (Tasigna)---have been developed. Both of these second-generation TKIs are more potent than imatinib in vitro and have demonstrated efficacy in patients with resistance or intolerance to imatinib (Kantarjian et al., 2011). Unfortunately, resistance to second- generation TKIs can also arise from Bcr-Abl amplification, low bioavailability of active drug, and point mutations within the protein sequence. Alternative treatment options may offer benefit to those patients with intolerance and/or resistance to previous treatment with imatinib, dasatinib, or nilotinib.
Bosutinib (Bosulif) is a new second-generation TKI targeting the Bcr-Abl protein (Puttini et al., 2006). On September 4, 2012, the US Food and Drug Administration (FDA) approved bosutinib for the treatment of CP, AP, or BP Ph+ CML in adults with resistance or intolerance to prior therapy (FDA, 2012).
Molecular Target Src/Abl
========================
Bosutinib, previously known as SKI-606, is an orally active, dual inhibitor of the Src and Abl tyrosine kinases, both of which are thought to be involved in the development of malignancies (Puttini et al., 2006). Src is a protein kinase that modulates intracellular signal transduction pathways involved in the control of cell growth, differentiation, and migration. Studies have shown that Bcr-Abl domains interact and activate the Lyn and Hck Src kinases through phosphorylation and direct binding. This dual inhibition may be useful in overcoming the onset of some types of resistance that frequently appear in the advanced phases of CML. Due to sequence homologies and structural similarities among the Src and Abl binding domains, ATP inhibitors targeting the inactive conformation of Src are also potent Abl inhibitors (Hu et al., 2004).
Unlike imatinib and dasatinib, bosutinib does not significantly inhibit KIT or PDGFR, two targets that may be associated with toxicities such as increased myelosuppression and pleural effusion, respectively. Through its dual inhibition, bosutinib is a more potent inhibitor of the Bcr-Abl tyrosine kinase than imatinib in untreated CML patients (Remsing Rix et al., 2009).
Bosutinib Trial Results
=======================
Data from a phase I/II study demonstrated efficacy and acceptable tolerability in 118 patients with CP-CML who had resistance or intolerance to prior TKI therapy (imatinib, dasatinib, and/or nilotinib). After a 28.5-month follow-up, major cytogenetic response (MCyR; see Table 1) and CCyR were attained in 32% and 24% of patients, respectively. The estimated 2-year PFS was 73%, and the estimated OS was 83%. Hematologic and cytogenetic responses to bosutinib were observed in patients with mutations within the Bcr-Abl kinase domain except for the T315I mutation. During follow-up, five (4%) patients experienced a confirmed transformation to AP, and no transformations to BP occurred (Khoury et al., 2012).
{#T1}
In the phase III BELA (Bosutinib Efficacy and Safety in Newly Diagnosed Chronic Myeloid Leukemia) trial comparing bosutinib with imatinib in the first-line setting, bosutinib did not achieve the primary efficacy endpoint of improved CCyR at 12 months. The CCyR rate at 12 months was not different for bosutinib (70%; 95% confidence interval \[CI\] = 64%--76%) vs. imatinib (68%; 95% CI = 62%--74%; two-sided*p* = .601; Cortes et al., 2012). In addition, bosutinib was associated with a higher rate of discontinuation due to adverse effects compared with imatinib (19% vs. 6%;*p* = .601). However, bosutinib demonstrated superiority in several secondary endpoints when compared with imatinib.
The major molecular response (MMR) rate at 12 months was higher for bosutinib (41%; 95% CI = 35%--47%) vs. imatinib (27%; 95% CI = 22%--33%; *p* \< .001). The times to CCyR and MMR were faster with bosutinib (*p* \< .001), which may provide a more rapid debulking of tumor burden compared with imatinib (Cortes et al., 2012). A previous study with imatinib in newly diagnosed CML showed a correlation with MMR at 12 months, including better PFS (99% vs. 94% with no MMR;*p* = .0023) and improved OS (99% vs. 93% with no MMR;*p* = .0011) at 3 years (Hehlmann et al., 2011). Further follow-up is currently ongoing to determine whether the faster times to CCyR and MMR with bosutinib will correlate with long-term duration of response and improvement in outcomes (PFS or OS).
Bosutinib offers an additional treatment option for patients with Bcr-Abl mutations. In murine myeloid cell lines, bosutinib demonstrated inhibition against 16 of 18 imatinib-resistant forms of Bcr-Abl. Specifically, bosutinib did not inhibit T315I and V299L mutations (Pfizer, 2012). Further, bosutinib has demonstrated clinical response in patients resistant or intolerant to dasatinib or nilotinib therapy. Patients with mutations linked to resistance with dasatinib (F317L) and nilotinib (Y253H and F359C/I/V) were among those who responded to bosutinib (Khoury et al., 2012).
Dosing and Administration
=========================
The recommended dose of bosutinib is 500 mg given orally once daily with food. Advanced practitioners should advise patients to take bosutinib with a high-fat meal, as it will improve absorption and tolerability (Abbas et al., 2011). Treatment is continued until the occurrence of intolerance or progression of disease. For patients without grade 3 or greater adverse reactions who do not have a complete hematologic response by week 8 or CCyR by week 12, advanced practitioners should consider a dose increase to 600 mg daily. An initial dose reduction to 200 mg given orally once daily is recommended for patients with baseline mild, moderate, or severe hepatic impairment (see Table 2). No renal dose adjustment is necessary based on pharmacokinetic studies in subjects with creatinine clearance ranging from 25 to 120 mL/min (Pfizer, 2012).
{#T2}
Specific dose adjustments for bosutinib toxicities such as elevated liver transaminase levels, diarrhea, neutropenia, and thrombocytopenia are included in Table 2 (Pfizer, 2012). For other clinically significant toxicities, bosutinib should be held until the toxicity resolves and subsequently restarted at 400 mg orally daily. Reescalation to 500 mg orally daily may be considered if clinically appropriate (Pfizer, 2012). In the BELA trial, a patient who required a dose reduction due to nonhematologic toxicity could be considered for reescalation if he or she tolerated the reduced dose for at least 1 month with no toxicity (Cortes et al., 2012).
Bosutinib is primarily metabolized by CYP3A4 to inactive metabolites. Renal clearance is negligible (only 3% of a radiolabeled dose was recovered in the urine of healthy volunteers). Strong/moderate CYP3A4 inhibitors, strong/moderate CYP3A4 inducers, and P-glycoprotein (P-gp) inhibitors should be avoided (see Table 3). In vitro and in vivo studies suggest bosutinib absorption is pH-dependent. In one study, use of a proton pump inhibitor (PPI) decreased maximum concentration (Cmax) by 46% and the area under the curve (AUC) by 26%. If acid reduction is necessary, the advanced practitioner should consider replacing the PPI with a short-acting antacid or H2 receptor antagonist and separating administration of any antacid products from bosutinib administration by at least 2 hours (Pfizer, 2012).
{#T3}
Adverse Events
==============
Frequent adverse effects of any grade reported in the phase I/II study (safety population, n = 546) included diarrhea (82%), nausea (46%), thrombocytopenia (41%), vomiting (39%), abdominal pain (37%), rash (35%), anemia (27%), pyrexia (26%), and fatigue (24%). Median time to onset of diarrhea was 2 days, median duration per event was 1 day, and median number of episodes among those who experienced diarrhea was 3. Grade 3/4 myelosuppression occurred more frequently in patients in AP or BP compared with those with CP-CML (thrombocytopenia 57% vs. 25%, neutropenia 37% vs. 18%, and anemia 35% vs. 13%, for AP/BP vs. CP-CML, respectively). Based on reports of hepatic toxicity in clinical trials, advanced practitioners should conduct hepatic enzyme tests monthly for the first 3 months of bosutinib therapy (Pfizer, 2012).
The toxicity profile of bosutinib differs from that of other TKIs. Specifically, in the BELA study, bosutinib was associated with a higher incidence of diarrhea, vomiting, and abdominal pain than imatinib but a lower incidence of edema, bone pain, and muscle spasms (Cortes et al., 2012).
Conclusion
==========
Although the past 2 decades have seen significant improvement in the outcomes for patients with CML due to the advent of targeted therapy against Bcr-Abl, there is still a need for further treatment options for those patients who have progressed to more advanced phases of disease as a result of drug resistance. To date, a recommendation does not exist for a treatment algorithm when choosing a second- or third-line TKI. Advanced practitioners must consider both mutation profile and tolerability when choosing an agent.
Bosutinib is a recently approved TKI indicated for the treatment of adult patients with Ph+ CML who are resistant or intolerant to prior therapy. This agent has activity against many mutations resistant to other TKIs but has poor activity against the T315I and V299L mutations (Redaelli et al., 2009; Pfizer, 2012). Bosutinib has activity against Src and Abl kinases and is more potent than imatinib. It was associated with a toxicity profile distinct from imatinib with greater rates of diarrhea, vomiting, and aminotransferase elevations. Long-term follow-up data are needed to determine duration of response, transformation rate to AP/BP-CML, and OS.
The author has no conflicts of interest to disclose.
[^1]: Correspondence to: Alison Steinbach, PharmD, Allegheny General Hospital, 320 East North Avenue, Pittsburgh, PA 15212. E-mail: asteinba\@wpahs.org
|
Q:
Sharepoint Online (2013) Column Formatting Not Working
I have been testing the code located here...
Github Repo ->
...by creating a new field in my sharepoint list called "Test" and assigning either one of the original values (Done, In progress, In review, Has issues, Blocked) to each line item in the field. But copying over the code into the JSON input box does not work.
So I tried changing the "@currentField" to "@Test" or "Test" or "[$Test]" or "$Test" and none of those worked either.
Can someone help me get this working?
Thank you!
A:
I struggled with this, also. I finally got it to work after I did the following:
Changed List Settings -> Advanced settings -> List experience to
'New experience'... I don't know if it works in 'Default experience set by my
administrator' or 'Classic experience'.
Created a new List View... the column customizations didn't
show up in the default 'All Items' view.
|
UPCOMING EVENTS
Anyone smart enough to build a tube that transports people 600 miles per hour to go from San Francisco to Los Angeles in only 30 minutes should step up because creator Elon Musk says he’s too busy to actually build it.
“I think I shot myself in the foot by ever mentioning the Hyperloop. I’m too strung out,” he said during electric car manufacturer Tesla’s quarterly earnings call today, as noted by Business Insider.
Musk plans on making that reveal on August 12 but is counting on folks in the community to pick up where he leaves off. The 21st century inventor is likely already too busy with Tesla, which today announced net income of $26.3 million, sending its stock soaring 13 percent. He also has another startup, Space-X.
He might jump in and help build the hyperloop if no one winds up getting creative, but he hopes to simply turn the tech over. And, we’ve already seen one man who might be able to take that job. His name is John Gardi and he has already sketched out how he believes the Hyperloop may actually work.
But, big ideas need input. That means this is your opportunity, world, to be the next person to revolutionize an entire industry — and an important one at that.
|
The Berejiklian government has suspended rules on how much water it can pump from the Shoalhaven River to Sydney after the city's storage levels posted their second-lowest winter runoff levels.
Sydney's Metropolitan Water Plan stipulates curbs on Shoalhaven transfers should be dropped only when city dams sink to 30 per cent full. Water Minister Melinda Pavey removed the limits even though the reservoirs sit just below the half-full mark.
The rapid drop in Sydney's dam levels has prompted the government to remove restrictions on what it can pump from the Shoalhaven River. Credit:Louise Kennerley
Independent MP Justin Field said the change meant there was now no regulated limit to transfers from the Shoalhaven, a river that flows through Nowra, among other towns.
“It’s clear that politicians in Sydney would rather transfer more water from the Shoalhaven than tighten water restrictions on the city," Mr Field said. "Sydney has a poor track record of water efficiency and recycling and the Shoalhaven is paying for poor water management.
|
How Car Loans Work
I’m graduating soon, and I’m going to be on my own financially. One of the things I’m sure I’ll have to do pretty soon is buy a car, as I’ll be moving off campus and won’t necessarily have easy access to my new workplace. But I’m not sure I understand how car loans work. What determines the rates on those–it’s my credit, right? But how is my credit calculated? And should I even take out a car loan at all, or is taking on debt to buy a vehicle a bad idea? Experts, please help!
Personal finance can seem complicated at times, but making the right decision is often easier than it may appear. Loans–including car loans–are good examples of things that often seem more complicated than they actually are.
As with any other type of loan, the idea behind a car loan is that you are borrowing money that you will have to pay back with interest. The interest is what makes it worthwhile for the lender to let you have their cash for a while. But a car loan also has another dimension to it. You probably know that if you don’t pay your car loan off, the lender can repossess your vehicle. That’s actually a good thing for responsible borrowers, because it makes car loans something we call a “secured loan.” Secured loans have “collateral”–the car, in this case–that lenders can take if the borrower defaults. That lowers the risk for the lender, which translates to lower interest rates!
You could still get an auto loan with bad credit through some lenders and dealers, say the consumer finance experts at Apply & Buy. A low credit score, or a lack of credit, isn’t always a barrier to getting a loan.
But should you get a loan at all? You’ll find advice from all kinds of perspectives, but most experts agree that it’s not a bad idea to take out a car loan, provided that you are sensible about your budget. Not all loans are healthy–payday loans, for instance, are dangerous–but car loans are usually not predatory. There are pros and cons to car loans, but if your payments are affordable and your loan allows you to get a car that you need at the beginning of your career, it’s alright to take on a conservative amount of debt.
Just remember to follow the laws of the road and drive safely as getting into an accident can cause your insurance premiums to rise and be a detriment to your finances. If you do find yourself in a serious accident, be sure to seek out the help of a motor vehicle accident attorney as you may be able to mitigate some of the costs and even have the other party held responsible for repairs if it can be proven that the accident was not your fault.
|
If this is your first visit, be sure to
check out the FAQ by clicking the
link above. You may have to register
before you can post: click the register link above to proceed. To start viewing messages,
select the forum that you want to visit from the selection below.
Hybrid View
Linux 2.6.23-rc2 Kernel Performance
Phoronix: Linux 2.6.23-rc2 Kernel Performance
While the Linux 2.6.23 kernel is only weeks into development, it's already generated quite a bit of attention. From the merging of the Completely Fair Scheduler (CFS) to the -rc2 kernel being "the new -rc1", the Linux 2.6.23 kernel is certainly in store for being an ornate release. Adding to this attention has been a stable user-space driver API and virtualization improvements (KVM, Xen, and LGuest). With all of this activity surrounding the Linux 2.6.23 kernel we've decided to conduct a handful of benchmarks comparing the Linux 2.6.20, 2.6.21, 2.6.22, and 2.6.23 kernel releases so far.
I must say that the CFS sched really makes a world of difference. I have been using cfs sched patches with 2.6.22 for quite some time, and recently to debug and resolve some acpi woes,I had reverted temporarily to vanilla. And surprise surprise . I was amazed that how I even managed to use kernels prior to 2.6.22. I must say that the old scheduler (O(1)?) stutters noticeably when it comes to multiple tasks. The new scheduler balances really well when under heavy load - I did run a compiling process and run an audio application and play quake3 simultaneously with absolutely no audio or in-game stutters whatsoever. With old sched, I used to get audio stutters even when opening a new tab while browsing with firefox .
I suggest running some benchmarks parallely. Try running a heavy process, say a long lame encoding or bzip2 compression and try benchmarking something like doom3 or quake4 simultaneously. I have a feel one might see something interesting.
Apart from the scheduler changes, I don't think there have been significant performance improvements over the past few kernel releases. Also I must say that the no_hz (dyn_ticks) and hrtimers have improvised the performance too. Aside, thanks to the powertop application, which gives some nice suggestions to reduce the frequency of unnecessary cpu wake ups and I did notice the associated change in the performance too . Nope, its not just placebo effect .
And of course, we have seen a_lot many features added to the kernel since 2.6.20. Another thing I can't miss out on commenting - stability. Stability has been really improving, at least on the hardware I use. Especially 2.6.19 and 2.6.20 were almost unusable for me. But 2.6.22 with cfs sched patches has been running like a dream for me. I know different people may have different experiences, but at least I am one happy soul right now .
Well, the benchmarks done by phoronix were good for showing what the CFS schedular does in regards to a non-loaded system, but ideally, as above, what would have been better would have been output performance tests on a system running multiple cpu-hog processes.
Also, I registered just to post about this, and say that Phoronix is great. Happy to have it in my "browse all the time" bookmarks.
The benchmarking in this article missed the point of the new scheduler so much I wanted to cry but all I could do was laugh.
What would really be interesting and usefully is 2.6.22-ck1 vs 2.6.23-X with CFS. Everyone knows both CFS and SD are better than the old stock. Even tho CFS has been chosen over SD, there is still much to be gained by comparing them. Specifically in context of gaming workloads.
The point of these benchmarks were to simply compare the performance of the Linux 2.6.23-rc2 kernel against some of the recent kernel releases in some benchmarks commonly used by Phoronix.
The article isn't intended to be just a CFS comparison (hence it's called "Linux 2.6.23-rc2 Kernel Performance" not "CFS Scheduler Performance" or "Linux Scheduler Comparison"). CFS is just one of the additions to the Linux 2.6.23 kernel and we will have an article looking just at the scheduler in the future.
I read the recent interview with Con Kolivas about why he left kernel development, but I didn't see any mention of CFS. I'm surprised by this since it seemed the whole reason for his departure related to the kernel scheduler. Maybe I just missed where the CFS name popped up in his interview.
I think Con Kolivas left for the wrong reasons, but it is a decision that he had to make for himself under the circumstances. I also make no claim to understand CFS and how it relates to the older schedulers. I wonder though how the inclusion of this new scheduler relates to Con Kolivas and his reasons for leaving... anyone have anything on this?
Indeed, I agree that it wasn't supposed to be a scheduler comparison and just about performance in single demanding applications. Aside, I believe its pretty difficult to compare schedulers as such. But then again, many people after reading the article may be tempted to conclude that there is not really much incentive to upgrade the kernel (and rightly so ), but I believe there is actually quite a marked difference (with the new schedulers of course ;-). I am sure in the real world one will find quite a few subtle but exciting improvements with the new kernels - many a things are not show stoppers, but definitely nagging sometimes (especially stuttering audio, or a drop in game fps ;-).
An off topic comment. This about dual core processors, smp and such. When I bought the computer (notebook with 1.6ghz centrino duo), I knew pretty much that I would be way better off with a single 3.2ghz or even a 2.8 or 2.6 ghz cpu, but I was excited at the breadth of things. Over the time, I have indeed been made to regret that (especially when I run some of my brute force computational programs). I somehow always managed to console myself with the thought that two is better than one. Few days back, for resolving my acpi issues, I had disabled my smp and to my surprise, I found that there is no performance change whatsoever, at least upto 2 or 3 moderately heavy tasks! There was absolutely no change in benchmarks (I atleast expected 1% ). Of course I could see the struggle when I started multiple heavy tasks and I could see it barely pulling inside games. But then again, when do I ever do such a harsh thing. Left me somewhat disappointed at my dual core decision ;-).
|
Sergio Romo captures Giants' championship spirit of oddball underdogs
DETROIT – Victory at last came from the right hand of the most eccentric of the San Francisco Giants. Sergio Romo threw one last fastball to Miguel Cabrera and then he jumped and flailed his arms and made all the strange arm twists and jerks that have been the image of these Giants postseason victories. He danced on the mound. He jumped in teammates' arms. He ran around.
None of it seemed to make much sense Sunday night.
Then again what does make sense with the team that has handled each stumble with a shrug and a laugh? When Melky Cabrera, the league's leading hitter, was suspended after testing positive for performance-enhancing drugs, Gregor Blanco helped take the Giants to the playoffs and made several key plays in the World Series. When the pitching staff seemed to fall apart in the first-round series against Cincinnati, they found a way to survive three games on the road and make it to face the St. Louis Cardinals, who they beat by winning three straight.
View gallery
.
Sergio Romo reacts after striking out the Tigers' Miguel Cabrera to win the World Series. (AP)
So, no, they never much worried about who would be the team's closer when Brian Wilson needed surgery. They first used Santiago Casilla until a blister developed on his hand. Then they turned to Romo late in the year. And everything seemed to take off after that.
But there also might not be a better symbol for how the Giants won this World Series. There is probably a little of Romo in all of them. He isn't tall. He doesn't throw hard. For the longest time he was considered to be a relief pitcher who could pitch only to right-handed hitters. He didn't have a fast enough fastball or a mean enough slider to get lefties out.
And yet like Wilson, Romo seems a little crazy. His eccentricities, a long beard and scraggly arms, fit well in a clubhouse that never seems to take itself too seriously.
"He's a little different, but I think that's a lot of the guys in here," San Francisco catcher Eli Whiteside said as he pulled down the plastic that covered his locker.
Most teams are serious. Most teams dress stoically (professionally they call it) in sterile clubhouses. Most teams don't have players who grow strange beards like Romo or Wilson or right fielder Hunter Pence. Most teams don't have the awkward mohawks that many Giants players have. Most teams don't have pitchers with painted fingernails like Wilson does. Whatever goes in San Francisco's clubhouse, it's not like the rest of baseball.
Tim Flannery considered this thought as he stood in the hallway outside a clubhouse that reeked of champagne. It was an hour after the series had ended and you could still hear the pops of bottles inside. The Giants third base coach and a longtime confidant of manager Bruce Bochy remembers when teams used to be built with players that lasted. The core of his 1984 Padres, who lost the World Series here to Detroit, appeared to him to stay together for much of the decade. Lots of teams did. It was easy to build cohesion then. Teams didn't need to find ways to bond.
View gallery
.
Sergio Romo kisses Marco Scutaro as they are sprayed with celebratory champagne. (AP)
It's all so different now, he said. Players come and go. They want big money. They need statistics for arbitration. They worry about free agency. They seem more like independent contractors than teammates.
So when they get a team like this one, a peculiar one where many of the players have some kind of unusual thing about them, it brings them together. Flannery saw it in 2010 when several of the same players won the World Series. They came together because they weren't like the other teams. They came together because they were goofy.
"I looked around at them today," Flannery said. "The pressure should be on them, but they were the same."
Romo is a complicated figure, sometimes friendly and sometimes surly. After the celebration on the field, he stayed away from much of the postgame party that raged in the clubhouse. For a time he was in a weight room with what appeared to be family members. He sat in his locker behind the plastic with them in an attempt to get away from the spraying champagne, lurking reporters and people taking pictures. He never did want to talk about what it was like to be on the mound of the World Series.
Maybe it was something he hoped to keep private.
He learned to get better against left-handed hitters. He learned to throw a biting sinker that might be the last thing he needed to become a closer. Whiteside, who caught many of those practice sessions, noticed that the next-to-last out Romo got on Sunday was against Don Kelly, a left-handed hitter.
Somehow to him it seemed to say something about the pitcher and about all of them. It's a team that is a little different, a little weird and that seems to make everything work.
|
1. Field of the Invention
The invention relates to a method of casting near-net-shape, rectangular strands from metal and a subsequent processing thereof into metal strips according to a DSC-method (direct strip casting) in a horizontal strip casting installation, wherein the metal melt is cast with a melt feeder on a horizontally circulating metal conveyor belt with a cooled bottom, and a liquid cast product is solidified to a pre-strip on the metal conveyor belt during displacement thereof and which after leaving the metal conveyor belt is fed, mechanically tensioned, to a driver by, e.g., smooth/pinch rollers. An installation with smooth/pinch rollers is not absolutely necessary, the installation can be realized without these rollers.
2. Description of the Prior Art
Because of uneven heat dissipation during solidification process of a strip, cast according to DSC-method under inert gas atmosphere without use of a casting compound, due to the upper surface of the strip being cooled only by convection with the ambient atmosphere and by heat radiation, while the bottom is in a direct contact with a cooled metal conveyor belt, the strip deforms already during solidification, firstly, upward and then downward.
At the start of cooling, the bottom of the material layer of the strip contracts mostly due to a very large temperature gradient. The entire strip bends upwardly in the middle, which results in very high stresses in the upper layer. Because these stresses are greater than the flow stress, they are reduced during the course of solidification again by subsequent elongation (flow), whereby opposite bending of the strip middle downwardly takes place. As a result, the low layer remains elongated, and the upper one shortened.
When the strip, which is usually not guided on its upper surface, leaves the metal conveyor belt with which it is displaced, the temperature of the strip over the strip thickness equalizes due to the reduced cooling of the strip bottom, the thermal tension also equalizes. The upper shortened and the lower elongated strip regions are subjected only to the backward bending, whereby the strip arches upwardly. The produced, as a result, stresses are below or close to the yield point, so that no or a very small backward formation of the arch resulting from the flow process, can be observed. The curve upward remains and results in arching of the strip narrow sides and also in a strip head like a ski.
During a further displacement, the degree of freedom of these arches in a longitudinal direction is reduced due to the gravity force of the strip horizontally displaceable on the adjoined roller table and/or by one or more pinch or smooth rollers which follow the metal conveyor belt, and firstly the strip tip and then the entire strip is mechanically tensioned and is forced to plane-parallel displacement downwardly.
This reduction of the degree of freedom leads to a need to reduce the stresses in the strip in the non-tensioned region, and that is why the strip narrow sides arch upwardly immediately after the strip leaves the metal conveyor belt. This behavior extends backwardly up to the region of the metal conveyor belt, so that the solidified strip has no contact anymore with the metal conveyor belt, and, thus, with the cooling medium and, as a result, has a non-homogenous temperature distribution over width of the strip that has a gutter profile.
In order to deal with this problem and to prevent the backward displacement of the pre-strip profile in the casting region and to insure passing into the upstream located machine, WO 2006/066552A1 suggests to arrange a guide element at the end of a primary cooling zone and in front of a conventional secondary cooling zone. As a rule, the guide element consists of several rollers arranged above and below the pre-strip in top-to-top or in offset-to-each other condition.
With a particular arrangement of rollers, the pre-strip is displaced in a plane located above a casting line in order to absorb the elongation of the bottom of the pre-strip by the carried-out upward movement. A roller arrangement, with which the pre-strip passes through the rollers as a wave, is also possible, however, it has not been used up to now.
The drawback of the method disclosed in WO 2006/066552 A1 consists in that the guide element that follows the metal conveyor belt can only partially influence the thermal processes on the metal conveyor belt.
Proceeding from this known state-of-the art, it is an object of the invention to provide a method with which in a simple manner, a maximum contact of the cast product with the metal conveyor belt and, thereby, optimization and equalization of heat transfer from the cast product to the metal conveyor belt over the entire casting width can be insured.
|
Q:
Transformation of matrices in 3 dimensions
The transformation T is represented by the matrix
$$
\begin{pmatrix}
2 & -1 & 3 \\
-1 & 4 & -2 \\
3 & 2 & 4 \\
\end{pmatrix}
$$
The plane has equation $2x-y+3z=-6$
Show that the image of the plane under T is a line and find Cartesian equations of this line.
Let $x=s$ and $z=t$, then $y=6+2s+3t$
I know that the general point on the plane is:
$$
\begin{pmatrix}
s \\
6+2s+3t \\
t \\
\end{pmatrix}
$$
Under transformation T, it becomes:
$$
\begin{pmatrix}
-6 \\
24+7s+10t \\
12+7s+10t \\
\end{pmatrix}
$$
$x=-6$, $y=z+12$
But I am not sure how to show that it is a line.
A:
From here, note that $s$ and $t$ do the same thing. $7s+10t=k$ neatly replaces all instances of $s$ and $t$ with $k$ (you get $(-6, 24+k, 12+k)$) so there is only one true degree of freedom, so it's a line.
|
---
abstract: 'Viscoelastic stress growth at oscillating extensional points is calculated in the Stokes-Oldroyd-B model of a viscoelastic fluid. The analysis identifies a Deborah number dependent Weissenberg number transition below which the stress is linear in ${\textrm{Wi}},$ and above which the stress grows exponentially in ${\textrm{Wi}}.$ For the case of given flow independent of the stress, the polymer stress is computed analytically at an oscillating extensional stagnation point. Fully coupled simulations in a oscillating 4-roll mill geometry are compared with the theoretical calculation of stress in the decoupled case, and similar stress behavior is observed. The flow around tips of a time-reversible flexing filament in a viscoelastic fluid is shown to exhibit an oscillating extension along particle trajectories, and the stress response exhibits similar transitions. However in the high amplitude, high ${\textrm{De}}$ regime the stress feedback on the flow leads to non time-reversible particle trajectories that experience asymmetric stretching and compression, and the stress grows more significantly in this regime. These results help explain past observations of large stress concentration for large amplitude swimmers and non-monotonic dependence on ${\textrm{De}}$ of swimming speeds.'
address: 'Department of Mathematics, University of California, Davis, CA 95616'
author:
- Becca Thomases
- 'Robert D. Guy'
title: 'Polymer stress growth in viscoelastic fluids in oscillating extensional flows with applications to micro-organism locomotion'
---
Introduction
============
Simulations of swimming in viscoelastic fluids involving large amplitude gaits [@teran2010viscoelastic; @thomases2017role; @spagnolie2013locomotion] show substantially different swimming speeds than those found in low amplitude simulations and asymptotic analyses [@fu2007theory; @fu2008beating; @LAUGA:2007; @fu2009swimming; @riley2014enhanced; @elfring2016effect]. Concentration of polymer elastic stress at the tips of slender objects has been seen in numerical simulations of flagellated swimmers in viscoelastic fluids [@teran2010viscoelastic; @thomases2014mechanisms; @thomases2017role; @li2017flagellar], and it is thought that the presence of these large stresses is related to the observed differences in behavior at low and high amplitude. We recently explained the origin of the stress concentration at the tips of steady, translating cylinders [@li2019orientation]. The tips of swimmers, however, experience unsteady oscillating motion. This paper analyzes oscillatory extensional flows, which are similar to the flows around bending objects, and it identifies parameter regimes which lead to the presence of large concentrated stresses.
In Fig. \[fig:TWALR\] we present results similar to those from [@thomases2014mechanisms; @thomases2017role] which compare low and high amplitude undulatory swimmers in a 2D Stokes-Oldroyd-B fluid. In Fig. \[fig:TWALR\] (a)-(b) we show the scaled strain energy density (trace of the stress) for both low and high ${\textrm{De}}$ and amplitude. Large stress accumulation at the tail only occurs in the high ${\textrm{De}},$ high amplitude case. In Fig. \[fig:TWALR\](c)-(d) we plot the maximum strain energy density and normalized swimming speed as a function of ${\textrm{De}}.$ In both the stress response and normalized swimming speed, the high amplitude behavior is very different from the low amplitude behavior at high ${\textrm{De}}.$ At low ${\textrm{De}},$ low and high amplitude motion results in similar normalized swimming speed, but significant slow downs are seen for the high amplitude swimmers where the stress is also very high.
![(a,b) Snapshots of the stress distributions around swimmers with (a) low and (b) high amplitude gaits at both low and high Deborah numbers (${\textrm{De}}$). The swimmer gait is prescribed with a curvature $\kappa(s,t)=\left(A_t(1-s)+A_hs\right)\sin(2\pi t+\pi s),$ where $(A_t,A_h)$ are the tail and head curvature amplitudes, and $(A_t,A_h)=(5,2)$ for the large amplitude case and $(1,2/5)$ for low amplitude. The color field shows polymer strain energy density scaled by $2\mu_pA_t.$ A similar scaling will be used for the flexors in Sec. \[flexor:sec\]. (c) Scaled strain energy density in a neighborhood near the tail as a function of ${\textrm{De}}.$ (d) non-Newtonian swimming speed normalized by swimming speed in a Newtonian fluid.[]{data-label="fig:TWALR"}](TWALR_xfig.eps){width="85.00000%"}
Translating cylinders in a viscoelastic fluid exhibit a Weissenberg number transition from low to high stress concentration at the cylinder tips [@li2019orientation]. The Weissenberg number is the polymer relaxation time scaled by the flow strain rate. This transition is similar to the coil-stretch transition found for viscoelastic fluids at steady extensional points. Undulatory swimmers are oscillating as well as translating, and the Deborah number, the polymer relaxation time scaled by the flow time-scale, is typically reported as the relevant non-dimensional relaxation time in this case. Here we show that the fluid near tips of oscillating filaments in 2D experience oscillating extension along particle trajectories, and both Deborah number and Weissenberg number are important. Our results extend known transitions in ${\textrm{Wi}}$ at steady extensional stagnation points to oscillating extensional points, and the ${\textrm{Wi}}$ transition becomes ${\textrm{De}}$ dependent in this case. The need to report both ${\textrm{De}}$ and ${\textrm{Wi}}$ has been well appreciated in the engineering community, see [@dealy2010weissenberg; @poole2012deborah] for nice discussions of these two parameters, but it has not been noted before in the context of micro-organism locomotion in viscoelastic fluids.
In this paper we analyze the stress response at a fixed oscillatory extensional stagnation point with no stress feedback on the flow. We compare these analytical results with different numerical simulations in which the stress and flow are coupled. We examine flow-stress coupling in oscillating extension by forcing the flow with a 4-roll mill background force that is oscillatory in time. Next, we look at the flow around flexing filaments with a time-reversible oscillation of a circular arc of a given amplitude. The flow around these so-called *flexors* is similar to the flow around undulatory swimmers and provides a connection between the analysis of stress response at oscillatory extensional stagnation points and recent numerical studies on stress accumulation at tips of flagellated and undulatory swimmers [@teran2010viscoelastic; @thomases2014mechanisms; @salazar2016numerical; @thomases2017flexible; @li2017flagellar].
Model Equations
===============
We use the Oldroyd-B model of a viscoelastic fluid in the zero-Reynolds number limit. The Oldroyd-B model is the simplest model of a viscoelastic fluid which captures elastic effects such as storage of memory from past deformation on a characteristic time-scale $\lambda.$ We study zero-Reynolds number because this work is motivated by micro-organism locomotion. The model equations for velocity ${\textbf{u}},$ pressure $p,$ and polymer stress tensor ${\boldsymbol{\tau}}$ are $$\begin{gathered}
\label{stokes}-\nabla p+\mu_s\Delta{\textbf{u}}+\nabla\cdot{\boldsymbol{\tau}}+ {\mathbf{f}}= 0\\
\label{ic}\nabla\cdot{\textbf{u}}=0\\
\label{ucderiv}{\boldsymbol{\tau}}+\lambda\stackrel{\nabla}{\boldsymbol{\tau}}=2\mu_p{\dot{\boldsymbol{\gamma}}},\end{gathered}$$ where $\stackrel{\nabla}{\boldsymbol{\tau}},$ denotes the upper convected derivative, and is defined by $$\label{ucderivdef}
\stackrel{\nabla}{\boldsymbol{\tau}}={\partial}_t{\boldsymbol{\tau}}+{\textbf{u}}\cdot\nabla{\boldsymbol{\tau}}-\left(\nabla{\textbf{u}}{\boldsymbol{\tau}}+{\boldsymbol{\tau}}\nabla{\textbf{u}}^T\right).$$ The solvent and polymer viscosities are $\mu_s,$ and $\mu_p$, respectively, and ${\dot{\boldsymbol{\gamma}}}=\left(\nabla{\textbf{u}}+\nabla{\textbf{u}}^T\right)/2$ is the rate of strain tensor. The function ${\mathbf{f}}$ is the external forcing that drives the system, and will be given explicitly for the different examples in Sec. \[sec\_4roll\] for the 4-roll mill geometry and in Sec. \[flexor:sec\] for the flexor simulations.
Stress response to oscillating extension with no coupling {#sec_theory}
=========================================================
It is well known that in the Oldroyd-B model of a viscoelastic fluid, the stress shows unbounded exponential growth at extensional points when stretching outpaces relaxation. The rapid stretching originates from the nonlinearity in the upper-convected derivative, Eq. . This derivative is the frame-invariant material derivative of a tensor, or derivative of a tensor along a particle path, making it essential in continuum models of viscoelastic fluids. Other similar models such as Giesekus, FENE-P, and PTT also lead to large concentrated stresses in these regions of strong extension [@guy2015computational]. We use the Oldroyd-B model here because it is the simplest model that contains these nonlinear features and is amenable to analysis.
We begin by repeating the well known calculation for stress divergence in the Oldroyd-B model for a fixed velocity, in order to frame the following sections. Consider a linear extensional flow ${\textbf{u}}=\alpha(x,-y)$ for $\alpha>0$. At the origin, the diagonal components of the stress satisfy $$\begin{aligned}
\label{tau11ode1} \lambda{\boldsymbol{\tau}}_{11}' & = \phantom{-}2\alpha\mu_p -(1-2\lambda\alpha){\boldsymbol{\tau}}_{11} \\
\label{tau22ode1} \lambda{\boldsymbol{\tau}}_{22}' & = -2\alpha\mu_p -(1+2\lambda\alpha){\boldsymbol{\tau}}_{22}.\end{aligned}$$ For $2\lambda\alpha <1$, the stress approaches a bounded steady state, and for $2\lambda\alpha>1$, ${\boldsymbol{\tau}}_{11}$ grows exponentially in time without bound. For this flow, the Weissenberg number is ${\textrm{Wi}}=2\alpha\lambda$, and the unbounded stress growth occurs for ${\textrm{Wi}}>1.$
We extended this classical result to the situation in which the strength of extension is oscillating in time with mean zero and period $T$. Specifically, we assume a velocity field (independent of the stress) of the form $$\label{oscext1}
{\textbf{u}}= \alpha h(t/T)(x,-y),$$ where $h(t)$ is a periodic function with period $1$, mean zero, and maximum 1. At the origin, the diagonal components of the stress satisfy the following ODE’s: $$\begin{aligned}
\label{tau11ode} \lambda\left({\boldsymbol{\tau}}_{11}'-2\alpha h(t/T){\boldsymbol{\tau}}_{11}\right)+{\boldsymbol{\tau}}_{11}&=\phantom{-}2\alpha \mu_p h(t/T) \\
\label{tau22ode} \lambda\left({\boldsymbol{\tau}}_{22}'+2\alpha h(t/T){\boldsymbol{\tau}}_{22}\right)+{\boldsymbol{\tau}}_{22}&=-2\alpha\mu_p h(t/T). \end{aligned}$$ We nondimensionalize these equations by scaling stress by $2\mu_p
\alpha$ and scaling time by the period $T$. We denote the dimensionless stress by ${\boldsymbol{\sigma}}= {\boldsymbol{\tau}}/2\mu_p \alpha$. The dimensionless equations are $$\begin{aligned}
\label{sig11ode} {\textrm{De}}\;{\boldsymbol{\sigma}}_{11}'+(1-h(t){\textrm{Wi}})\;{\boldsymbol{\sigma}}_{11}&=\phantom{-}h(t) \\
\label{sig22ode} {\textrm{De}}\;{\boldsymbol{\sigma}}_{22}'+(1+h(t){\textrm{Wi}})\;{\boldsymbol{\sigma}}_{22}&=-h(t), \end{aligned}$$ where, as before, the Weissenberg number is ${\textrm{Wi}}= 2\alpha\lambda,$ and the Deborah number is ${\textrm{De}}=\lambda/T$.
To gain insight from an analytic solution to these equations, we choose the function $h$ to be the square wave $$h(t) = \begin{cases}
\phantom{-}1 & \text{for } \text{mod}(t,1) \leq 1/2 \\
-1 & \text{for } \text{mod}(t,1) > 1/2
\end{cases}.$$ With this choice for $h$, we find the periodic solution and compute the maximum in time of the trace of the stress (strain energy density) as $$\label{sig_theory}
\max {{\rm tr}\;}{\boldsymbol{\sigma}}=
\frac{ 2\sinh\left(\frac{{\textrm{Wi}}}{2{\textrm{De}}}\right)
-2{\textrm{Wi}}\sinh\left(\frac{1}{2{\textrm{De}}}\right)}
{({\textrm{Wi}}^2-1)\sinh\left(\frac{1}{2{\textrm{De}}}\right)}.$$ Unlike the case of steady extensional flow, the solution remains bounded in time, and it approaches a periodic solution for all ${\textrm{Wi}}$.
Figure \[fig:LAOE\_sqwv\](a) shows how the stress depends on ${\textrm{Wi}}$ for different fixed ${\textrm{De}}$. This plot shows two different regimes for how the stress depends on ${\textrm{Wi}}$, and there is a Deborah number dependent transition between the two regimes. To understand the behavior in the two regimes, we expand the max trace of the stress in the limits of large and small ${\textrm{Wi}}$. For small ${\textrm{Wi}}$, the max trace stress scales linearly with ${\textrm{Wi}}$: $$\max {{\rm tr}\;}{\boldsymbol{\sigma}}\sim \left(\frac{2{\textrm{De}}\sinh\left(\frac{1}{2{\textrm{De}}}\right)-1}{{\textrm{De}}\sinh\left(\frac{1}{2{\textrm{De}}}\right)}\right){\textrm{Wi}}, \quad
\textrm{for } {\textrm{Wi}}<<1.$$ For large ${\textrm{Wi}}$, the max trace of the stress to leading order is $$\max{{\rm tr}\;}{\boldsymbol{\sigma}}\sim \left(\frac{1}{\sinh\left(\frac{1}{2{\textrm{De}}}\right)}\right) \frac{\exp\left(\frac{{\textrm{Wi}}}{2{\textrm{De}}}\right)}{{\textrm{Wi}}^2},
\quad \textrm{for } {\textrm{Wi}}>>1.$$ This expansion is generated by assuming not only that ${\textrm{Wi}}$ is large, but also that ${\textrm{Wi}}$ is large compared to ${\textrm{De}}$. Thus the transition from the low Weissenberg number regime to the high Weissenberg number regime depends on the Deborah number. In Figure \[fig:LAOE\_sqwv\](a) we include plots of the asymptotic expressions for the stress for both high and low ${\textrm{Wi}}$ for ${\textrm{De}}=0.5$. The transition for the linear behavior to the exponential behavior appears to occur somewhere between ${\textrm{Wi}}=2$ and ${\textrm{Wi}}=4.$
For fixed ${\textrm{Wi}}$, the stress is a decreasing function of ${\textrm{De}}$. For high ${\textrm{De}}$, the duration of stretch is small, and the stresses do not get very large before the flow changes to compression. Small ${\textrm{De}}$ corresponds to long period oscillations which leads to large stress development over each half period from being stretched in the same direction. The case of ${\textrm{De}}=0$ corresponds to the steady extension case.
With this nondimensionalization both ${\textrm{Wi}}$ and ${\textrm{De}}$ scale with the relaxation time. In studies of locomotion, it is useful consider how the speed depends on ${\textrm{De}}$ for a given gait. Similarly, in Section \[flexor:sec\], we consider how the stress depends on relaxation time as an object changes shape with a fixed amplitude. For such problems, it is useful to consider how the stress depends on the nondimensional stretch rate $\mathcal{A}=\alpha T={\textrm{Wi}}/(2{\textrm{De}})$ in place of ${\textrm{Wi}}$. This other parameter captures the amplitude of the stretching independent of the relaxation time, and the relaxation time only appears in ${\textrm{De}}$. For this nondimensionalization ${\textrm{De}}=0$ corresponds to Newtonian flow.
In Fig. \[fig:LAOE\_sqwv\](b) we plot the max of the trace of the stress a function of ${\textrm{De}}$ for a range of stretch rates $\mathcal{A}
=1,2,4$. As ${\textrm{De}}$ goes to either $0$ or $\infty$, the stress goes to zero, and as a result the stress is a nonmonotonic function of ${\textrm{De}}$. The ${\textrm{De}}$ where the peak stress occurs is fairly insensitive to the stretch rate.
![(a) Analytical solution of $\max({{\rm tr}\;}{\boldsymbol{\sigma}})$ as a function of ${\textrm{Wi}}$ for ${\textrm{De}}= 0.5,1,2,3$ at oscillatory extensional stagnation points with no stress feedback in the Stokes-Oldroyd-B model. Linear and exponential asymptotic approximations are included to highlight transition. ${\textrm{Wi}}$ transition depends on ${\textrm{De}}.$ (b) Analytical solution of $\max({{\rm tr}\;}{\boldsymbol{\sigma}})$ as a function of ${\textrm{De}}$ for non-dimensional stretch rate $\mathcal{A}=1,2,4.$ []{data-label="fig:LAOE_sqwv"}](LAOE_sqwv.eps){width="95.00000%"}
Stress response to oscillating extension with coupling {#sec_4roll}
======================================================
The analysis from the previous section considered the flow fixed independent of the stress. Here we examine an oscillating extensional flow in which the stress and velocity are coupled. We drive the system by prescribing a 4-roll mill type background body force and solve for the resulting velocity and stress numerically and compare the results with those from the previous section.
We adapt the model problem from [@thomases2007emergence; @guy2015computational] in which the stress at steady extensional points was examined numerically. Specifically, we solve the Stokes-Oldroyd-B equations, Eqs. - on the two-dimensional periodic domain $[-\pi,\pi]^{2}$ with a driving background body force $$\label{4roll_F}
{\mathbf{f}}= 2\alpha\sin\left(2\pi t/T\right)
\left(\begin{array}{l}
-\sin x \cos y \\
\phantom{-}\cos x \sin y
\end{array}\right).$$ Note in the stokes limit ($\lambda=0$) this body force drives the flow ${\textbf{u}}=-{\mathbf{f}}/2$. At the origin the linearized flow is identical to the flow defined in equation from the decoupled problem with $h(t) =
\sin\left(2\pi t \right)$.
The system is solved with a pseudo-spectral method for spatial derivatives and a 2nd order implicit-explicit time integrator; small stress diffusion is added to control stress gradients. See \[A\] for details on the numerical method and discertization parameters.
As before, the Deborah number is ${\textrm{De}}=\lambda T$. The Weissenberg number is computed as ${\textrm{Wi}}=\lambda{\dot{\gamma}}$ where ${\dot{\gamma}}=\max_{t}\sqrt{2{\dot{\boldsymbol{\gamma}}}:2{\dot{\boldsymbol{\gamma}}}/2}$ for ${\dot{\boldsymbol{\gamma}}}$ measured at the origin once the solution has equilibrated to the periodic solution. For a Newtonian fluid ${\dot{\gamma}}=2\alpha,$ but we find that even for viscoelastic fluids in the highly nonlinear regime of large stresses ${\dot{\gamma}}\approx2\alpha$. Hence for this problem one can use ${\textrm{Wi}}=
2\alpha\lambda$ and nondimensionalize the polymer stress by ${\boldsymbol{\sigma}}={\boldsymbol{\tau}}/(2\mu_p\alpha)$, which is equivalent to what was done in the previous section.
In Fig. \[fig:4roll\_OE\] we show ${{\rm tr}\;}{\boldsymbol{\sigma}}$ near the origin (on part of the simulation domain: $[-\pi/2,\pi/2]^2$) for 8 different times over one period for ${\textrm{Wi}}=12$ and ${\textrm{De}}= 1/2$ after the solution has reached the periodic solution. These plots show the large stresses switching orientation over the course of a period due to the alternating directions of stretching. At the beginning of the period (t=0) the stress is oriented in the horizontal direction, but at this time, the flow begins stretching in the vertical direction and compressing in the horizontal direction. Over the next half period, the stress becomes increasingly oriented in the vertical direction. Over the second half of the period, the flow stretches in the horizontal direction and compresses in the vertical direction.
![Velocity field overlayed on colorfield displaying polymer strain energy density over one period for oscillating extension near the origin on the domain $[-\pi/2,\pi/2]^2$ for the fully coupled 4-roll mill simulations, at ${\textrm{De}}=0.5,$ ${\textrm{Wi}}= 12.$[]{data-label="fig:4roll_OE"}](4roll_oe_xfig.eps){width="95.00000%"}
To compare the results of the fully coupled simulations with the theory presented in Sec. \[sec\_theory\] we numerically solve the ODE’s in Eqs. - with temporal oscillation $h(t)=\sin(2\pi t).$ This is the analog of the coupled 4-roll mill at the origin, but in the decoupled limit, i.e. where the stress does not affect the velocity. In Fig. \[fig:LAOE\_4roll\] we examine plots of $\max{{\rm tr}\;}{\boldsymbol{\sigma}}$ as a function of dimensionless parameters in both the coupled case as well as in the decoupled case. The behavior of the stress with sinusoidal temporal oscillation is is qualitatively the same as that of the square-wave oscillation. As before, the stress as a function of ${\textrm{Wi}}$ shows two regimes: a low ${\textrm{Wi}}$ regime in which the stress is a linear function of ${\textrm{Wi}}$, and a high ${\textrm{Wi}}$ regime in which the stress dependence on ${\textrm{Wi}}$ is exponential. The ${\textrm{Wi}}$ at the transition between these two regime again depends on ${\textrm{De}}$. The agreement between the decoupled and coupled cases is quite good, but in the most challenging regime, i.e. high ${\textrm{Wi}},$ low ${\textrm{De}}$ there is disagreement. In this problem we find that the non-linear coupling has the effect of reducing the stress rather than enhancing it. This is consistent with what was found in [@thomases2007emergence] where the nonlinearities modified the flow and also reduce the stress.
![ Max polymer strain energy density at the origin in the decoupled ODE (line) and the 4-roll mill coupled simulations (markers) as a function of ${\textrm{Wi}}$ for fixed ${\textrm{De}}$ (a), and as a function of ${\textrm{De}}$ for fixed $\mathcal{A}$ in (b).[]{data-label="fig:LAOE_4roll"}](LAOE_4roll.eps){width="95.00000%"}
Flows around flexing objects {#flexor:sec}
============================
In order to study the flows around the tips of undulatory swimmers we consider filaments of length $L=1$ oscillating through circular arcs with peak curvature $A$. Specifically, the curvature is $$\label{flex_curv}
\kappa(s,t)=A\sin\left(\frac{2\pi}{T} t\right).$$ For $A=\pi$ the fully bent shape is a semi-circle. We consider low amplitude $A\approx 1$ and high amplitude $A\approx 4$; see Fig. \[fig:fl\_shapes\]. By symmetry, this motion does not result in any horizontal translation of the body. We refer to these non-translating “swimmers" as [*flexors*]{}. We previously used these objects to study the effect of viscoelasticity on soft swimmers in [@thomases2017role]. In what follows we solve Eqs. -, and the external force density, ${\mathbf{f}}$ is used to enforce the prescribed shape of the swimmer. The method is similar to [@li2017flagellar] where the shape is given and the system is solved under the constraint that it is force and torque free. Thus the flexor has a fixed shape, but it is free to move in the fluid. Details of the numerical method are given in \[B\]. This method is different from previous swimmer simulations [@teran2010viscoelastic; @thomases2014mechanisms; @salazar2016numerical; @thomases2017role] which enforced a prescribed shape approximately using forces that penalized deviations from a target curvature.
In the flexor model the Deborah number is defined as ${\textrm{De}}=\lambda/T,$ where $T$ is the period of motion of the flexor. Defining a Weissenberg number is more complicated than in the 4-roll mill. Because the strain rate varies significantly at different places in the flow, it is not clear how to define a characteristic ${\dot{\gamma}}.$ In Fig. \[fig:maxSR\_flex\] (d) we show the maximum in time of ${\dot{\gamma}}$ over a region around the tip which corresponds to where the large stresses concentration. We observe that ${\dot{\gamma}}\propto A$ with constant of proportionality $\approx 2$. Thus we define ${\textrm{Wi}}=2\lambda
A$ and scale the polymer stress as ${\boldsymbol{\sigma}}={\boldsymbol{\tau}}/(2\mu_pA)$.
![Prescribed shapes for low and high amplitude flexors.[]{data-label="fig:fl_shapes"}](FL_shapes_xfig.eps){width="\textwidth"}
In Fig. \[fig:fl\_sig\] (a) we plot the strain energy density ${{\rm tr}\;}{\boldsymbol{\sigma}}$ for low amplitude ($A=0.5$) and high amplitude ($A=5)$ flexors during the downstroke of the motion for ${\textrm{De}}=1.$ All results are shown after the flow has equilibrated to a periodic state at $t\approx 10\lambda.$ We note that the stress is localized at the tips of the flexors during the motion. It has a much larger scale for the large amplitude case. The spatial distribution of stress is much more symmetric about the flexor for the low amplitude case than in the high amplitude case. The low amplitude case corresponds to ${\textrm{Wi}}=1$ and the high amplitude case corresponds to ${\textrm{Wi}}=10.$ According to Fig. \[fig:LAOE\_4roll\](a), ${\textrm{Wi}}=1,\;{\textrm{De}}=1$ is well in the linear regime, but ${\textrm{Wi}}=10,{\textrm{De}}=1$ is in the transition region between linear to exponential.
![(a) Polymer strain energy density around flexors at ${\textrm{Wi}}=1$ and ${\textrm{Wi}}=10$ with ${\textrm{De}}=1,$ corresponding to low ($A=0.5$) and high ($A=5.0$) amplitude flexors at different times during a period. (b) Maximum stretch rate $\nu$ for low and high amplitude flexors.[]{data-label="fig:fl_sig"}](fl_sig_nu_xfig.eps){width="95.00000%"}
To understand why the stress concentrates preferentially near the tips of the flexors we examine the flow near the tips. In [@li2019orientation] we showed that stretching near the tips of translating cylinders led to large concentrated stresses beyond a critical ${\textrm{Wi}}$. To identify the critical ${\textrm{Wi}}$, we identified a quantity called the maximum stretch rate as the maximum real part of the eigenvalues of the operator ${\mathcal{S}}[{\textbf{u}}]{\mathbf{C}}\equiv\left[\nabla{\textbf{u}}{\mathbf{C}}+{\mathbf{C}}\nabla{\textbf{u}}^T\right].$ The term ${\mathcal{S}}[{\textbf{u}}]{\boldsymbol{\tau}}$ arises in the upper-convected Maxwell equation, Eq. , and the eigenvalues of ${\mathcal{S}}[{\textbf{u}}]$ define the define the growth (or decay) rates of stress due to stretching (or compression) along particle paths. The solution to the eigenvalue problem ${\mathcal{S}}[{\textbf{u}}]{\mathbf{C}}=\nu{\mathbf{C}}$ is ${\mathbf{C}}={\mathbf{v}}_i{\mathbf{v}}_j^T,$ $\nu_{ij}=\mu_i+\mu_j,$ where $\mu_i$ is an eigenvalue of $\nabla{\textbf{u}}$ with corresponding eigenvector ${\mathbf{v}}_i.$ We define the maximum stretch rate $\nu$ at a point defined by $$\label{stretchrate}
\nu = 2\max(\textrm{Re}(\Lambda(\nabla{\textbf{u}}))),$$ where $\Lambda(A)$ is the set of eigenvalues of the matrix $A.$ The max stretch rate is related to the shear rate ${\dot{\gamma}}$, but it quantifies specifically the rate of local extension where the nonlinearities in the stress evolution equation are significant. In Fig. \[fig:fl\_sig\] (b) we plot the max stretch rate for low and high amplitude motion when the flexor is in the middle of the downstroke. It is clear that the highly extensional regions of the flow are at the tips for low and high amplitude flexors.
We examine the flow near the tips by following particle paths in the Newtonian flow. In Fig. \[fig:maxSR\_flex\] (a)-(b) we highlight a portion of the particle path near the tip for low and high amplitude flexors. To measure the strain rate near the tip we first take the average ${\dot{\gamma}}$ over a set of trajectories which begin at $t=0$ in a square just above the tip of the flexor of width $\approx .05L.$ In Fig. \[fig:maxSR\_flex\] (c) we plot this average ${\dot{\gamma}}(t)/A$ over one period. In this region the strain rate is oscillating periodically between $\pm 2A,$ i.e. ${\dot{\gamma}}\sim 2A\sin(t/T).$ The temporal maximum of ${\dot{\gamma}}$ averaged in the neighborhood near the tip is plotted in Fig. \[fig:maxSR\_flex\] (d) over a range of amplitudes. A linear fit to the data gives a slope of $1.98.$
![Flexor motion and particle path for point near tip for $A=1$ (a) and $A=4$ (b) flexors in a Newtonian fluid. (c) Rate of strain (averaged near tip of flexor) over a period scaled by $A$ for $A=1,4$ in a Newtonian fluid. (d) Maximum shear rate averaged over a region near the tip is proportional to the amplitude with proportionally constant approximately 2. []{data-label="fig:maxSR_flex"}](flex_vgu_xfig.eps){width="85.00000%"}
To examine the direction of stretching, in Fig. \[fig:fl\_flower\] we plot the eigenvectors with positive eigenvalue of the strain rate tensor, ${\dot{\boldsymbol{\gamma}}}$, scaled by the eigenvalue over a period on a particle trajectory that begins slightly above the flexor. In these plots the dots are equally spaced in time and hence indicate speed of motion. The red dots correspond to the down stroke and the blue are the upstroke. The three additional highlighted times in each portion of the motion correspond to eighths of a period, with $t=1/4, 3/4$ when the flow is at rest. It is notable that the direction of stretching on the downstroke is perpendicular to the direction of motion on the upstroke, which is indicative of an oscillating extensional flow. Unlike the problems analyzed in the previous sections, there is some rotation of the stretching direction. Also note that the high amplitude case has a more complicated path as well as a longer path relative to the amplitude. Although the trajectories change for different initial position these are representative of a region of points in the fluid above (or below) the flexor near the tip. Thus we conclude that near the tip the fluid particles are experiencing an oscillating extension in this region along with some rotation.
![Amplitude and direction of principle stretch given by eigenvectors and eigenvalues of ${\dot{\boldsymbol{\gamma}}}$ in a Newtonian fluid over a period along a particle path near the tip for low and high amplitude flexors.[]{data-label="fig:fl_flower"}](flower_xfig.eps){width="\textwidth"}
To compare the results of stress response for flexors with the analytic solution and 4-roll simulations we quantify the polymer stress around the flexor tip. We define $\max{{\rm tr}\;}{\boldsymbol{\sigma}}$ by averaging over trajectories, similar to how we defined ${\dot{\gamma}}$ in Fig. \[fig:maxSR\_flex\] (d). For ${\boldsymbol{\sigma}}$ we choose the location of the patch of fluid over which the average is taken to be centered on the the spatio-temporal maximum of ${\boldsymbol{\sigma}},$ and we use a patch size $0.1L.$ With the region specified, we define $\max{{\rm tr}\;}{\boldsymbol{\sigma}}$ as the spatial average of the maximum in time of ${{\rm tr}\;}{\boldsymbol{\sigma}}$ on this region.
We plot $\max{{\rm tr}\;}{\boldsymbol{\sigma}}$ for a range of ${\textrm{De}}$ and ${\textrm{Wi}}$ in Fig. \[fig:LAOE\_fl\]. In order to compare with the theory from Sec. \[sec\_4roll\] we also plot the theoretical predictions for the stress at the oscillating extensional point on Fig. \[fig:LAOE\_fl\]. The solid lines come from the theory for the decoupled oscillating extensional flow with sinusoidal temporal forcing, and the markers are results of simulations of flexors.
![Polymer strain energy density for flexors (markers) and decoupled theory with sinusoidal forcing (lines). (a) Stress dependence on ${\textrm{Wi}}$ for a range of ${\textrm{De}}$ (b) Stress dependence on ${\textrm{De}}$ for a range of $\mathcal{A},$ the non-dimensional “gait".[]{data-label="fig:LAOE_fl"}](LAOE_fl.eps){width="95.00000%"}
The stress as a function of ${\textrm{Wi}}$ from Fig. \[fig:LAOE\_fl\] again shows linear behavior at low ${\textrm{Wi}}$ and exponential at high ${\textrm{Wi}}$ for the flexor. At low ${\textrm{Wi}}$ and low ${\textrm{De}}$ the stress is similar to the decoupled theory, but generally the stress response is much larger for the flexor simulations than from the theory. Note that while the stress response is much stronger for the flexors than the theory predicts, the theory is still able to capture the location of the transition fairly well; the large stress growth appears near the bend in the theory curve.
The deviation from the decoupled theory (and 4-roll mill simulations) is more pronounced when examining the stress as a function of ${\textrm{De}},$ for a range of $\mathcal{A}={\textrm{Wi}}/(2{\textrm{De}})$, which, as before, is the nondimensional stretch rate and is proportional to the amplitude. As shown in Fig. \[fig:LAOE\_fl\] (b), for low amplitude there is qualitatively similar stress dependence on ${\textrm{De}}$ for different $\mathcal{A}$. However, for the high ${\textrm{De}}$ regime the stress is much larger than in the theory or in the four-roll simulations. Notably, for the highest amplitude, the stress is increasing as a function of ${\textrm{De}}$, which is a fundamentally different behavior than in the other problems.
![Particle trajectories over one period for flexors at low and high amplitude. Particles start at green diamond and end at black square. Color indicates when the flexor is in the upstroke (red) or downstroke (blue). Grey line is flexor initial position. []{data-label="fig:loops"}](loop_xfig.eps){width="95.00000%"}
To demonstrate why the high amplitude/high ${\textrm{De}}$ flexors exhibit such different stress response than the theory, in Fig. \[fig:loops\] we plot the trajectories of points near the tips of the flexors for low and high amplitudes at a range of ${\textrm{De}}$. The ${\textrm{Wi}}$ range here is ${\textrm{Wi}}=0,1,4,8$ for low amplitude and ${\textrm{Wi}}=0, 4,16, 32$ for high amplitude. In the large amplitude case, the feedback on the flow from the viscoelastic stresses changes particles paths to make non time-reversible trajectories. The results is that the fluid particles do not feel equal stretching/compression as they do when the path is time-reversible. These fluid particles no longer experience mean zero stretching, and the result is large stress accumulation. Thus the high ${\textrm{De}},$ high ${\textrm{Wi}}$ deviation from the theory is a result of nonlinear feedback, which is very different from the affect of such feedback in the four-roll mill simulations where the extensional point was fixed in space.
Conclusions
===========
We extend the well-known ${\textrm{Wi}}$ transitions in steady extension to oscillatory extension, and unlike steady extension we find that bounded solutions exist for all ${\textrm{Wi}},$ but there is a ${\textrm{De}}$ dependent ${\textrm{Wi}}$ transition beyond which the size of the stress grows exponentially in ${\textrm{Wi}}.$ In simulations of swimmers in the high amplitude, high ${\textrm{De}}$ case from Fig. \[fig:TWALR\](b) the swimmer is well in the nonlinear regime at ${\textrm{Wi}}=20$ and ${\textrm{De}}=2.$ Comparing the stress as a function of ${\textrm{De}}$ for swimmers and flexors from Fig. \[fig:TWALR\](c) and Fig. \[fig:LAOE\_fl\](d), respectively, shows a similar amplitude dependent response, which is different from the theory and simulations of stationary extensional points. Previous simulations [@teran2010viscoelastic; @thomases2017flexible] noted that swimming speed dependence on ${\textrm{De}}$ was different for high and low amplitude gaits. Here we explain these observations by identifying a ${\textrm{Wi}}$ transition which shows that high amplitude gaits operate in the regime of large stress growth.
Both the oscillatory extension stagnation point theory and the 4-roll mill simulations exhibited non-monotonicity in the stress response for a fixed “gait" ($\mathcal{A}={\textrm{Wi}}/(2{\textrm{De}})$). This non-monotonicity comes from the fact that in the limit as ${\textrm{De}}\rightarrow 0,$ the stress must go to zero, and as ${\textrm{De}}\rightarrow\infty$ oscillations are averaged out and the stress again goes to zero. For flexors we saw a similar non-monotonicity at low amplitude, but at the high amplitude we saw that particle paths were deformed and thus the stress growth and decay were no longer averaging out. In those cases we no longer saw decay to zero, but decay to a fixed value or growth. This non-monotonicity appears to be related to non-monotonic speed responses that have been observed in simulations before [@teran2010viscoelastic; @thomases2014mechanisms; @salazar2016numerical; @thomases2017flexible] without explanation.
For the flexors at high ${\textrm{De}},$ the stress growth and decay do not average out as they do in the four-roll mill because the systems are driven differently. In the 4-roll mill system, the steady extensional point is driven by a background force, and as the stress grows the velocity nearby changes in such a way that reduces the stress. By contrast, for the flexors, the motion is fixed, but the location of the extension is free to move, and as the extension moves fluid patches no longer feel an equal stretch-compress. In the 4-roll mill the nonlinear feedback actually weakens the stress where with the flexors the nonlinearities are amplified.
These results apply to planar motion, but 3D simulations of slender objects in viscoelastic fluids have also demonstrated large stress concentrating near tips [@li2017flagellar; @li2019orientation; @shaqfeh]. In [@shaqfeh] undulatory swimmers have been simulated in a 3D viscoelastic fluid and it was found that the swimming speed does not decay as rapidly with ${\textrm{De}}$ as was seen in 2D [@thomases2014mechanisms]. We believe there will still be a ${\textrm{Wi}}$ transition for undulatory motion in 3D, but the quantitative results on stress accumulation and the implications on swimming may depend on the spatial dimension.
Acknowledgement {#acknowledgement .unnumbered}
===============
The authors thank David Stein for helpful discussions on this work. R.D.G. and B.T. were supported in part by NSF Grant No. DMS-1664679.
Numerical Method: 4-roll mill {#A}
=============================
For the 4-roll mill simulations we solve Eqs. -, with forcing given by Eq. . The fluid domain is a 2D periodic box of length $2\pi.$ We use $\Delta x=2\pi/256\approx 0.024,$ for the fluid discretization, and fix the viscosity ratio $\mu_p/\mu_s=0.5.$ We use a pseudo-spectral method for spatial derivatives and evolve the conformation tensor ${\mathbf{C}},$ which is related to the polymer stress tensor through ${\boldsymbol{\tau}}=\mu_p/\lambda({\mathbf{C}}-{\textbf{I}}).$ The conformation tensor evolves according to $$\label{ucderiv_alt}
{\mathbf{C}}+\lambda\stackrel{\nabla}{\mathbf{C}}={\textbf{I}}+\eta\Delta{\mathbf{C}},$$ where polymer stress diffusion is added as numerical smoothing [@sureshkumar1995effect; @thomases2011analysis]. The diffusion coeffient used is $\eta=c\Delta x^2,$ so that as $\Delta x\rightarrow
0$ the model converges to the Oldroyd-B model. In these simulations $c=2$ and the artificial diffusion does not effect the qualitative results reported here.
We use the Crank-Nicholson-Adams-Bashforth second order implicit-explicit time integrator to evolve the conformation tensor, ${\mathbf{C}}.$ The time-step we choose depends on the amplitude $\alpha$ but ranges between $\Delta t=0.001$ and $\Delta t =0.0001$ chosen to maintain stability.
Numerical Method: Flexors {#B}
=========================
For the flexor simulations we solve the fluid-structure equations Eqs. -, where the forcing term ${\mathbf{f}}$ results from the prescribed motion of the flexor. We use a method similar to that from [@li2017numerical]. The shape, and hence velocity, of the flexor is prescribed in a fixed body frame. The position of the flexor in the lab frame is given by ${\mathbf{X}}(s,t) =
{\mathbf{X}}_{p}(s,t) + {\mathbf{X}}_{0}$, where $s$ is a Lagrangian on the body, ${\mathbf{X}}_{p}(s,t)$ is the prescribed shape in fixed a body fixed frame, and ${\mathbf{X}}_{0}$ is the translation of the origin in the body frame to the lab frame. The velocity of the body is ${\mathbf{U}}= {\mathbf{U}}_{p}+{\mathbf{U}}_{0}$, where ${\mathbf{U}}_{p}=\partial_{t}{\mathbf{X}}_{p}(s,t)$ is the prescribed velocity in the body frame, and $\partial_{t}{\mathbf{X}}_{0}={\mathbf{U}}_{0}$ is the unknown translational velocity.
The forces and translational velocity are determined implicitly by the constraints of the prescribed shape and no net force on the body. The immersed boundary method is used to interpolate the fluid velocity to the swimmer and to transfer forces on the flexor to the fluid.
In each time step of the simulation we alternately advance the conformation tensor ${\mathbf{C}}$ and the fluid/structure system. Given the current velocity field ${\textbf{u}}$ we evolve the conformation tensor according to Eq. and thus we have the current polymer stress ${\boldsymbol{\tau}}$. With the given stress and velocity of the structure we simultaneously solve to the fluid velocity, pressure and fluid forces on the structure which satisfy $$\begin{gathered}
-\nabla p+\Delta{\textbf{u}}+ \xi \nabla\cdot{\boldsymbol{\tau}}+\mathcal{S}{\mathbf{F}}=0\label{IBst},\\
\nabla\cdot{\textbf{u}}=0\label{IBdiv}\\
\mathcal{S}^*{\textbf{u}}={\mathbf{U}}_{p} +{\mathbf{U}}_{0} ,\label{IBBC}\\
\int_{\Gamma} {\mathbf{F}}ds=0.\label{IBFB}\end{gathered}$$ The operator $\mathcal{S}$ transfers forces on the flexor to fluid and is defined as $$\label{spread}
\mathcal{S}({\mathbf{F}})=\int_{\Gamma}{\mathbf{F}}(t,s)\delta_{\Delta x}({\textbf{x}}-{\mathbf{X}}(t,s))ds,$$ where $\delta_{\Delta x}$ is a regularized $\delta$-function. The discrete $\delta$ is the standard four-point function described in [@peskin2002immersed]. The operator $\mathcal{S}^*$ maps the velocity field on the Eulerian grid to the flexor body, and is defined as $$\label{interp}
\mathcal{S}^*({\textbf{u}})=\int_{\Omega}{\textbf{u}}(t,x)\delta_{\Delta x}({\textbf{x}}-{\mathbf{X}}(t,s))dx.$$ Equation determines that the structure moves with the local fluid velocity, i.e. there is no slip on the body surface, and Eq. enforces the no net force condition on the structure. These two constraints determine the unknown force, ${\mathbf{F}}$, and the unknown translational velocity, ${\mathbf{U}}_{0}$. To solve this system of equations we eliminate the fluid velocity and pressure and solve the smaller system for the body forces and translational velocity $$\begin{aligned}
\label{SC1}\mathcal{S}^*\mathcal{L}^{-1}\mathcal{S}{\mathbf{F}}+{\mathbf{U}}_{0} & = -{\mathbf{U}}_{p}-\mathcal{S}^*\mathcal{L}^{-1}\nabla\cdot{\boldsymbol{\tau}},\\
\label{SC2} \int_{\Gamma}{\mathbf{F}}\, ds & = 0.\end{aligned}$$ Here $\mathcal{L}$ is the Stokes operator that maps a fluid velocity to the applied forces. After solving for the force on the swimmer we update the body position in lab frame and the fluid velocity to complete the time step.
For the flexor simulations our fluid domain is a 2D periodic box of length $2L,$ where $L=1$ is the flexor size. We use $\Delta
x=1/128\approx 0.008,$ for the fluid discretization and discretize the flexor with $ds=0.75 dx.$ A Fourier discretization of the spatial operators is used. Equations - are solved using the conjugate gradient method, which is preconditioned using the method of regularized Stokeslets [@cortez2001method] to approximate the operator $\mathcal{S}^*\mathcal{L}^{-1}\mathcal{S}$.
We evolve the conformation tensor using a Crank-Nicholson-Adams-Bashforth scheme, with a diffusion coefficient $\eta=9\Delta x^2.$ The time-step we choose depends on the amplitude flexor but ranges between $\Delta t=0.001$ and $\Delta t =0.0001,$ chosen to maintain stability.
[10]{}
Jeremy P. Binagia, Christopher J. Guido, and Eric S. G. Shaqfeh. Three-dimensional simulations of undulatory and amoeboid swimmers in viscoelastic fluids. , 2019.
Ricardo Cortez. The method of regularized stokeslets. , 23(4):1204–1225, 2001.
JM Dealy. Weissenberg and [D]{}eborah numbers: Their definition and use. , 79(2):14–18, 2010.
Gwynn J Elfring and Gaurav Goyal. The effect of gait on swimming in viscoelastic fluids. , 234:8–14, 2016.
Henry C Fu, Thomas R Powers, and Charles W Wolgemuth. Theory of swimming filaments in viscoelastic media. , 99(25):258101, 2007.
Henry C Fu, Charles W Wolgemuth, and Thomas R Powers. Beating patterns of filaments in viscoelastic fluids. , 78(4):041913, 2008.
Henry C Fu, Charles W Wolgemuth, and Thomas R Powers. Swimming speeds of filaments in nonlinearly viscoelastic fluids. , 21(3):033102, 2009.
Robert D Guy and Becca Thomases. Computational challenges for simulating strongly elastic flows in biology. In [*Complex fluids in biological systems*]{}, pages 359–397. Springer, 2015.
Eric Lauga. . , 19(8):83104, 2007.
Chuanbin Li. . University of California, Davis, 2017.
Chuanbin Li, Boyang Qin, Arvind Gopinath, Paulo E Arratia, Becca Thomases, and Robert D Guy. Flagellar swimming in viscoelastic fluids: role of fluid elastic stress revealed by simulations based on experimental data. , 14(135):20170289, 2017.
Chuanbin Li, Becca Thomases, and Robert D Guy. Orientation dependent elastic stress concentration at tips of slender objects translating in viscoelastic fluids. , 4(3):031301, 2019.
Charles S Peskin. The immersed boundary method. , 11:479–517, 2002.
Robert Poole. The deborah and [W]{}eissenberg numbers. , 53:32–39, 06 2012.
Emily E Riley and Eric Lauga. Enhanced active swimming in viscoelastic fluids. , 108(3):34003, 2014.
Daniel Salazar, Alexandre M. Roma, and Hector D. Ceniceros. Numerical study of an inextensible, finite swimmer in stokesian viscoelastic flow. , 28(6):063101, 2016.
Saverio E Spagnolie, Bin Liu, and Thomas R Powers. Locomotion of helical bodies in viscoelastic fluids: enhanced swimming at large helical amplitudes. , 111(6):068101, 2013.
R Sureshkumar and Antony N Beris. Effect of artificial stress diffusivity on the stability of numerical calculations and the flow dynamics of time-dependent viscoelastic flows. , 60(1):53–80, 1995.
Joseph Teran, Lisa Fauci, and Michael Shelley. Viscoelastic fluid response can increase the speed and efficiency of a free swimmer. , 104(3):038101, 2010.
Becca Thomases. An analysis of the effect of stress diffusion on the dynamics of creeping viscoelastic flow. , 166(21):1221–1228, 2011.
Becca Thomases and Robert D Guy. Mechanisms of elastic enhancement and hindrance for finite-length undulatory swimmers in viscoelastic fluids. , 113(9):098102, 2014.
Becca Thomases and Robert D Guy. The role of body flexibility in stroke enhancements for finite-length undulatory swimmers in viscoelastic fluids. , 825:109–132, 2017.
Becca Thomases and Robert D Guy. The role of body flexibility in stroke enhancements for finite-length undulatory swimmers in viscoelastic fluids. , 2017. In Press.
Becca Thomases and Michael Shelley. Emergence of singular structures in [O]{}ldroyd-[B]{} fluids. , 19(10):103103, 2007.
|
An additional carbohydrate chain in the variant thyroxine-binding globulin-Gary (TBGAsn-96) impairs its secretion.
The T4-binding globulin-Gary (TBG-G) variant has severely impaired T4 binding, is unstable at 37 C, and presents an apparent anodal shift of all isoforms when submitted to isoelectric focusing. Inheritance of this abnormal TBG produces a profound decrease in the serum levels of native TBG with reciprocal changes in its denatured form, causing thyroid hormone concentrations to be as low as those found in complete TBG deficiency. The TBG-G gene possesses a single nucleotide substitution replacing the normal IIe96 (ATC) with Asn (AAC), thus creating a new site for N-linked glycosylation. In order to determine whether TBG-G contains an additional carbohydrate chain as indirectly suggested by the isoelectric focusing results, cDNAs containing the normal TBG (TBG-N), and TBG-G were inserted in the appropriate vectors to allow their expression in mammalian cells (COS-1) and in amphibian (Xenopus) oocytes. In both systems, expression of TBG-G yielded a larger molecule than TBG-N when analyzed by polyacrylamide gel electrophoresis under denaturing conditions. However, both were identical in size when synthesized in COS-1 cells in the presence of tunicamycin or when deglycosylated after their synthesis in Xenopus oocytes. Pulse chase experiments revealed impaired secretion and excessive overall intracellular degradation of TBG-G relative to TBG-N. As expected from studies on serum from affected subjects, in vitro expressed TBG-G had a 10-fold lower affinity for T4. These studies prove that the new site for potential glycosylation created by the point mutation in TBG-G is indeed glycosylated.(ABSTRACT TRUNCATED AT 250 WORDS)
|
Q:
How do I raise 30k to keep my best friend in college?
Today, my best friend texted me and said that he was going to drop out of college because he had been denied financial aid. He is very smart (1550+ SAT) and an incredible guy, but his parents have weird financials so that he is ineligible for need-based financial aid, even though he is broke without it. Our school doesn't offer merit-based aid. For him to stay in school next year, even with him working all summer, we need $30k, ten of which has to be paid by June. He is an international student, so lots of stuff is off the table, but he is also very popular. His girlfriend and I are willing to work like hell to help him pull this off.
Between people we know, we could probably raise $500 in the next week, but we have no idea where to go from there. Has anything like this worked before and how did they go about it?
A:
Might be a better investment to go to a different country and study. The US prices for education are incredibly overpriced (having taught at both European universities and an Ivy league university in the US, I can tell that the education is not much different).
It is also easier to get admitted to European universities - the difficult part is to actually complete the studies.
A:
He could speak with a financial aid counselor to make sure he understands all of his options, including whether there are any policies/petitions that could take into account his parents' "weird financials". Is his situation really so rare that no one has heard of it? Or can he learn about what the possible outcomes have been in similar cases?
While his school doesn't offer merit-based aid, he could apply for external merit scholarships. The school should have an office to advise on this.
He could apply for student loans.
He could try crowdfunding such as GoFundMe, especially if his story would be compelling to the public.
Rather than dropping out, he could take a leave of absence to have time to raise the money (e.g., by working) and resume his studies later.
A:
Given his circumstances I would go to a community college for significantly cheaper, and accumulate as many transferable credits as possible. While at the same time working and saving up as much money as possible. After one or two years, transfer to the college of your choice and continue working to pay off tuition. Many if not all colleges offer some kind of deferred payment plan so the money made working during the year should be enough to pay for college.
I don't believe being an international student affects community college tuition, but he should check this for the specific college he chooses.
|
Comments
Pretty Little Liars Review: “Under The Gun” (Season 4, Episode 6)
Pretty Little Liarshas had some high stakes before, but tonight even ‘A’ has out done herself. Hannah (Ashley Benson) is on house arrest after being arrested with the gun that was used to kill Detective Wilden (Bryce Johnson), and when Emily (Shay Mitchell) tried to help, she wound up looking just as guilty.
The Liars may have truth on their sides this time, but truth is in the eye of the beholder and ‘A’ is doing a pretty good job of skewing the facts. The ballistics results confirmed that Hannah’s dad’s gun was the weapon used to kill Wilden, and her mom’s fingerprints were on the bullets. That doesn’t mean she was the one that pulled the trigger, but it doesn’t look good either. What will Hannah’s life look like with her mom locked up? And, how far would she go to clear her name?
Watching there be actual consequences for things in this episode of Pretty Little Liars was kind of refreshing, I have to admit. Hannah had a gun and was attempting to bury it on a college campus. Yes, this is a television show, but somewhere along the lines there has to be something resembling reality. The threat of jail time for one of the Liars is a pretty big step in terms of realism. Of course, it was all set up by ‘A,’ who more than likely planted the gun in the house knowing that nosy Hannah would stumble across it, and then called in the cavalry.
‘A’ has become somewhat of an enigma these days. At least when Mona (Janel Parrish) was running the show, you sorta knew what to expect. It never seemed like she was going to actually hurt the Liars, more like she was teaching them a lesson. She even backed them up a few times, because of course, she was the only one allowed to mess with them. Incriminating them in a criminal case is taking it up more than a few notches, ‘A’ seems genuinely pissed off.
And, she’s not the only one. Aria found herself the butt of a cruel lie when she rejected the advances of a sophomore. He returned the favor by telling the entire Lacrosse team that they had hooked up. Aria’s brother didn’t help the situation by sharing her connection with Mr. Fitz (Ian Harding) to all his friends, only adding fuel to the fire. He did redeem himself a little by smashing up the guy’s car later on, but he probably shouldn’t have done it wearing his lacrosse hoodie. It was a sweet gesture though, even if it was on the super illegal side. It’s nice to see that they are repairing their relationship and I’d like to see him more involved in the plot. It can’t hurt to have a family member on the Liars’ side.
|
Synopsis
Storyline:
Germany 1944: 15-year old Leyna (Amandla Stenberg), daughter of a white German mother and a black father, lives in fear due to the color of her skin. When she meets Lutz (George MacKay), the son of a prominent SS officer and a member of the Hitler Youth – mandatory for all Aryan boys since 1936 – the two fall helplessly in love, putting both their lives at risk. An original coming of age story through the eyes of a bi-racial teen as she witnesses the persecution of Jews and those deemed ‘non-pure’.
Written by
https://teaser-trailer.com
User Reviews: Someone suggested that all the low ratings from the professional critics and viewers here are the result of some kind of bias.
Seriously recoiling and critiquing lousy film making, so bad that the message is — "I love Romeo the Nazi" — is an expression of bias?
I think virtually all of us panning this film *want* to give it a high rating for the story it is attempting to tell. But the clichés, terrible scripting, absolutely abysmal acting do not do credit to the story of attitudes toward biracial children in Nazi Germany (or virtually anywhere in the world where they were mostly seen as genetic and social threats).
The bravery and resilience of the young woman simply do not come through at all. It was an opportunity to present her as superior in every way and instead the writers decided to overlay a sanguine and utterly not credible "Romeo and Juliet" nonsense over the story, obliterating the meaning and actual genuine drama.
We get no explanation, none at all as to why this brave young biracial girl would fall in love with a Nazi who shows no real trepidation at being part of the machinery that will kill Jews, a lot of other people, and destroy Europe.
FYI the young actress, Amandla Stenberg, is actually a good actress. Abby Cornish once again proves she has lucked into a couple of roles, but in general she is at best a mediocre to poor actress.
|
More than 14 million Americans are looking for work. Meanwhile, federal spending continues at an unprecedented pace, with an average of $4 billion added to our country’s debt every day.
We need to encourage economic growth and investment. Instead, leaders on the other side of the aisle are pushing more reckless policies, red tape, and taxes to pay for their irresponsible spending spree – leaving job creators frozen by uncertainty and fear, and risking our future prosperity.
At a recent roundtable in Minnesota, a small business owner told me, “The government is out of control. It’s too big, and I don’t like it.”
Well, I don’t like it either, and it’s costing our country jobs.
It’s time for Washington to do what’s right. We need to make the tough choices necessary to get our nation’s fiscal house in order. No one said it would be easy, but it is certainly necessary.
The legislation before us today will end unsustainable spending and put this nation back on a fiscally responsible path. I strongly urge my colleagues to join me in supporting it.
|
The long-term goal is to gain a better understanding of the biological roles of gamma (immune) interferon (IFN-gamma) and of a functionally related class of cytotoxic proteins, termed "cytotoxins". Cytotoxins include lymphotoxin (LT), monocyte/macrophage-derived cytotoxin(s) (MCT) and tumor necrosis factor. Our broad working hypothesis is that IFN-gamma and cytotoxins mutually amplify their actions and that this synergism is important in inhibiting tumor cell growth and in limiting the spread of viruses and other intracellular infectious agents. The first specific aim is to gain a better understanding of the nature, multitude and mutual relationships of the various cytotoxin proteins produced by human lymphocytes and monocytes/macrophages. To answer these questions we shall perfect the methods of production of lymphocyte-derived LT and monocyte/macrophage-derived MCT from human cells, complete the purification of these proteins and produce specific polyclonal and monoclonal antibodies against them. The second specific aim is to elucidate the mechanism by which IFN-gamma produces enhanced monocyte cytotoxicity for tumor cells and to determine the possible role of cytotoxins in this process. This part of the project is based mainly on the recently established fact that IFN-gamma is uniquely active as a modulator of monocyte/macrophage functions, including activation of monocytes for tumor cell cytotoxicity. The third specific aim is to advance our understanding of the mechanisms of action of LT and MCT and of their synergism with IFN-gamma. The study of these questions will rely mainly on the analysis of the role of cellular receptors for cytotoxins and IFN-gamma and of the fate of cytotoxins and IFN-gamma after their binding to target cells. The proposed studies are likely to provide biologically relevant and medically significant information on host defenses in malignancies and virus infections.
|
[Obstructive azoospermia. Instrumental diagnosis: echography and endoscopy].
Obstructive disorders of seminal tract are mainly distinguished in Proximal and Distal Obstructive Syndrome, following typical seminal pattern. Fine localization of obstruction is very important for prognostic and therapeutic evaluation. In Proximal Obstruction the role of echography and endoscopy is today poorly defined and usefull. In Distal Obstruction a preeminent role is recognised to transrectal ultrasound and its mini-invasive applications: biopsy, evacuative puncture, direct contrastography of obstructed seminal way. At this regard is reported a case of dysmorphic congenital obstruction documented with transrectal ultrasound and contrastography. Diagnostic endoscopic indications mainly refer to therapeutic procedures.
|
The Ghost Shorts
Everything gym shorts should be. With an 8" inseam tailored to show off your quads, these incredibly lightweight shorts stay out of the way during your toughest workouts, and keep looking great even after you're done.
|
In important aspect of semiconductor structures, such as integrated circuits, is the ability to interconnect various components both on the same layer and in different layers of the integrated circuit. As integrated circuits and other semiconductor structures get smaller, the size of the relevant interconnects also decreases. Conventional interconnect deposition techniques include damascene processes of patterning the interconnect within another structure, such as a dielectric. The damascene process has been used for hundreds of years to produce jewelry and various other ornamental objects. However, with the continued reduction of integrated circuit size it becomes more difficult to utilize conventional techniques for forming interconnects and vertical interconnect accesses (“vias”), especially when high-aspect ratio structures are involved. This significantly limits the ability to continue using conventional interconnect deposition techniques.
|
LLC resonant converters are widely employed in switching power supply due to the use of soft-switch technique, high efficiency and other advantages.
FIG. 1 illustrates a prior art half-bridge LLC resonant converter 50A. As shown in FIG. 1, the resonant converter 50A comprises a square-wave generator 501, a resonant network 502, an isolated transformer T, a rectifier network and a load. The square-wave generator 501 is illustrated to have a half-bridge topology comprising a high-side switch M1 and a low-side switch M2 connected in series between a positive terminal and a negative terminal of a DC power supply VIN. Herein, the high-side switch M1 is controlled by a high-side control signal VG1, and the low-side switch M2 is controlled by a low-side control signal VG2 which has the same duty cycle as the high-side control signal VG1. Ideally, this duty cycle is 0.5. The square-wave generator 501 converts the DC power supply VIN to a square-wave signal VSW by controlling the high-side switch M1 and the low-side switch M2 to switch on and off in a complementary manner.
The resonant network 502 is illustrated as a LLC resonant network having a resonant inductor Lr, a resonant inductor Lm and a resonant capacitor Cr, wherein the resonant inductor Lm is connected in parallel with a primary winding of the isolated transformer T. Generally, the resonant inductor Lm is a field winding of the isolated transformer T. The resonant network 502 converts the square-wave signal VSW to an AC (Alternating Current) voltage signal.
The rectifier network is coupled between a secondary winding of the isolated transformer T and a load. The rectifier network converts the AC voltage signal to an output voltage signal VOUT.
The half-bridge LLC resonant converter 50A further includes a control circuit comprising a voltage sensing circuit, a current sensing circuit, a mode determining circuit and a frequency controller. The voltage sensing circuit senses the output voltage VOUT to generate a feedback signal VFB which is indicative of the output voltage signal VOUT. The current sensing circuit senses current Ir flowing through the resonant inductor Lr to generate a current sense signal VCS. Usually, the current sense signal VCS is a voltage signal which is indicative of the current Ir. The mode determining circuit receives the current sense signal VCS and generates a mode signal MC which is used to determine whether the half-bridge LLC resonant converter 50A operates at an inductive mode or a capacitive mode. The frequency controller receives the feedback signal VFB and the mode signal MC to generate the high-side control signal VG1 and the low-side control signal VG2 based on the feedback signal VFB and the mode signal MC.
The LLC resonant converter 50A regulates the output voltage VOUT by changing its switching frequency, i.e., changing the switching frequency of the high-side switch M1 and the switching frequency of the low-side switch M2, wherein the switching frequency of the high-side switch M1 is the same as the switching frequency of the low-side switch M2.
As can be appreciated, the LLC resonant converter 50A is able to operate in the capacitive mode or the inductive mode depending on its switching frequency. Generally, in order to realize a function of Zero Voltage Switching (ZVS), the LLC resonant converter 50A should be controlled to operate in the inductive mode. If the LLC resonant converter 50A enters into the capacitive mode, it cannot realize the function of ZVS, which can cause the high-side switch M1 and the low-side switch M2 to be damaged.
Thus, it is desired to have a capacitive protection for the high-side control switch M1 and the low-side switch M2 when the resonant converter enters into the capacitive mode.
|
Improve Your Anxiety
Anxiety is something that can be crippling for some people, but even in less severe cases, it affects your life to some degree. Knowing what you can do to improve using methods that you can start right now will help to get your anxiety under control and give you some peace of mind. None of these methods promise to cure anxiety, but they can help to keep your anxiety levels reduced so that you are able to get through your days with fewer anxiety-related problems and interruptions.
Make Eating a Healthy Diet a Priority
What you eat has a lot to do with how you feel. When you are tired and not feeling well, you are naturally more prone to experiencing anxiety. Make sure that your diet is varied and that you are concentrating on eating mostly healthy foods. Approximately 90 percent of your diet should consist of the following:
Lean proteins
Fruits
Vegetables
Low-fat dairy products
Whole grains
While you can have a treat or two per week, you do not want to exceed this amount. Keep your sugars and unhealthy fats to a minimum. Talk to your doctor to determine how many calories you personally need per day to be healthy.
Sleep for an Average of Seven to Nine Hours Per Night
Sleep is one of the most important factors in keeping your anxiety under control because you are more likely to experience problems with your anxiety when you are exhausted. When you are getting adequate sleep, you are stronger emotionally and this can help you to keep your anxiety in check as well as reduce the intensity of the attacks when they do occur. Make it a point to create a sleep schedule that you can use seven days a week to ensure adequate rest.
Use a Variety of Relaxation Techniques Daily
Relaxation techniques are commonly used among people who suffer from anxiety because they work to keep you calm and focused. When you are calm, your anxiety is not as likely to get out of control and cause you to experience problems. The following relaxation techniques are things you can learn easily and start putting into practice today:
Self massage
Deep breathing
Gentle stretching
Meditation
Yoga
Pick one of these to start with and dedicate 15 minutes per day to using it. You can increase your time as you go along, as well as add additional relaxation techniques. Remember to go slow because you do not want to get overwhelmed with trying to make too many changes at once. Making one small change at a time that will benefit you will help you to get a handle on your anxiety.
Take an Hour Each Day for Physical Activity
Physical activity is one of the easiest ways to get your anxiety under control. When you are starting to feel anxious, get up and start moving around to help calm yourself down. Even something as simple as taking a walk can be beneficial to this process. You can also do things like gentle stretching or even something like house cleaning. The key is to do something physical that works to take your mind off of your anxiety. You also want to exercise on a daily basis, but you do not have to do it all at once. Just make sure your time adds up to one hour.
Make Sure to Laugh Every Day to Ease Your Mind
Your often hear that the best medicine is laughter and there is a good reason for this. When you laugh, you are releasing certain brain chemicals that are known for calming you and making you feel better and more positive. Read a funny comic, talk to a funny friends, read some jokes online or watch a funny television show or movie. Just find something that is going to make you laugh and enjoy it each day. If time is short, pick something that you can quickly see and get a laugh out of.Start using these methods today and you will soon start to see your anxiety alleviating. It is important that you continue to use any medical treatments that you are currently prescribed and keep in close contact with your doctor. These serve as supplements to your current regimen so that you can gain some additional control over your symptoms. It is important to never abruptly stop any treatments that you are already using because this could actually cause your anxiety to get worse.
Train with a Zen Master.(Real)Click to meet a Zen Master.This is 100% real, and I am not asking you to click so that I may show you an 'Ad' or 'Clickbait'. I want to introduce you to a Zen Master, in person.
To find a solution to your problems - This is what most people are looking to accomplish. However, this may be very challenging, because you have not yet developed the psychological practices that are necessary in order to sustain executive attention, regulate your psychological and emotional states, and achieve deep states of relaxation and peak-states of energy, on command. Therefore, we highly recommend that you learn more about Mindfulness and Meditation and Neuro-Training. You can get access to this program through completing the contact information below.
|
FreeBSD on the Lenovo Thinkpad - dddddaviddddd
https://www.davidschlachter.com/misc/t480-freebsd
======
floatboth
Please stop cargo culting all the loader tunables and sysctls you've seen :)
You need approximately zero i915 related ones because they're enabled by
default just like on Linux. You especially don't need both drm.i915 and
compat.linuxkpi copies. (The former is for older drivers, the latter is for
new ones)
Also moused is not a great way to use a touchpad. At least on 12-stable (idk
if it made it into a 12.x-release) EVDEV_SUPPORT is enabled out of the box, so
you can just set kern.evdev.rcpt_mask=12 and get proper evdev events,
separately for the trackpoint and touchpad, with full gesture support on the
touchpad.
And since you like i3, might want to try Sway – HiDPI is much better supported
on Wayland ;)
~~~
peterwwillis
This is why I won't use open source for a desktop anymore. It's so convoluted
and changes so often that I have to constantly keep track of multiple kernel
and userland systems in order to know what tweaks I _don 't_ need to make.
"Don't use the faffle-fille.123456 tweak, that's for the 2016 driver; the 2019
driver inherits the booble-babble hack from the nzudzu core. Also, the
611-double-decker-dev release added FOO_MANCHU support so you just need the
abcdefghijk=999 argument to set up all the things you would expect to work by
default."
I just want to pay someone to make my computer work the way it's designed to.
~~~
m712
If you are hinting to proprietary systems in your last sentence, you can go
ahead and pay someone to lock you into their ecosystem. This is how Free
Software works and I wouldn't have it any other way. People work on their own
and bring it together into one whole system, and that can cause
incompatibilities. However lock-step design is also one of the key ways to
destroy innovation. If you lack the desire to learn how to configure your
system, then you will probably not want to use a Free system. That's just how
it is.
~~~
zbentley
I hope this doesn't sound rude, but that is exactly why desktop Linux and
friends are a piss-poor experience compared to their proprietary counterparts.
There is a negative feedback look here. With enough of that kind of
"customization freaks only, casuals need not apply, enjoy your non-innovative
proprietary shitware" talk, user bases stay small and niche, people get
alienated, and don't contribute to or use free OSes.
It's perfectly reasonable to want to trade customizability for usability.
Chasing people who think that away from free software helps nobody.
~~~
floatboth
There's plenty of free polished out-of-the-box experiences, from
Ubuntu/Mint/elementary/whatever to _hardware_ from Purism and system76.
There's definitely some "customization freaks only" assholes on the internet
too, but…
very very often, it seems like some people perceive _that_ when a non-out-of-
the-box OS just _exists_ and people like using it just _personally for
themselves_.
~~~
zbentley
There is definitely progress here since the early '00s. However, there's a
very long way to go until even the most polished home-user Linux distros
approach the level of usability (and supportability, even more critical) of
proprietary OSes for non-power-users.
And I wasn't trying to paint everyone who wants to tinker with the same
"gatekeeping" brush, sorry if I came off that way. GP equated proprietary
software with "pay[ing] someone to lock you into their ecosystem" and
"destroy[ing] innovation", and ended with
> If you lack the desire to learn how to configure your system, then you will
> probably not want to use a Free system. That's just how it is.
That's the sentiment I had trouble with. Not the existence of knobs (which
should continue existing! Just with better tuning experience for casual users,
and saner defaults).
------
gen3
Would this be considered the standard amount of things someone would need to
work out to get a bsd laptop up and useable?(or are there more preconfigured
images?) Are Thinkpads best for support?
~~~
lars_francke
As someone who's just (last week) started to get Arch Linux up and running on
a T490 I would assume that: Yes, this is _at least_ the amount of things you
need to do but if my experience is any indication this is only like 10% of it.
Most of the things in Thinkpads work but not all (notably the latest WWAN LTE
Modems don't have support).
I could write up my experience if there's interest.
~~~
faizshah
I just set up a new laptop with fedora because I figured Arch would be too
much effort. Is it really that easy to get running? I figured with arch when
you run into an issue it must be much harder to fix than fedora or ubuntu. I
just want to open up an ide, terminal, and a browser but arch seems to be a
whole hobby in itself.
~~~
jplayer01
If you like to tinker for hours, Arch. Otherwise Manjaro, which works out of
the box and still gives you the benefits of Arch.
~~~
eptcyka
Manjaro is strictly worse when it comes to the quality of software.
I wouldn't agree that installing Arch is that big of a hassle - yes, you don't
a nice menu based installer, but really, after setting up all of your
partitions, installing the root filesystem, adding a user, and installing some
packages, and installing hte bootloader, what else is there to do? To be fair,
the install process has become easier over the years, as things like timezones
and locales are becoming easier to configure due to systemd. But I must
concede, if you've never partitioned a drive manually, or added a user, you'll
want to take your time. And I always read the wiki's install instructions
anyway. And whilst this does mean that there's a bit more complexity
associated with setting up Arch, if you're using installing a non-standard OS
on your hardware, the knowledge you gain will by doing so will almost always
turn out to be useful in some way. As far as tinkering with it, I've never had
to explicitly tinker with exotic configs to get my hardware to work as good or
better than it would on Ubuntu, and to get my exotic config requirements to
work is far easier on Arch than it is on Debian, Ubuntu or Fedora. Manjaro is
so broken that I can't even boot the gnome installer on a VM. Besides, it's
far easier to manage my machine if there's no auto-updater grabbing a lock on
my package manager on for the first 15 minutes of a boot, every boot (looking
at you Fedora), or having an update process that may leave you with a severely
outdated kernel even though you jumped through the hoops to get a recent
kernel (Looking at you Ubuntu 16.04 LTS).
~~~
jplayer01
> Manjaro is strictly worse when it comes to the quality of software.
I haven't made this experience with Manjaro on several systems.
Setting up Arch isn't just about partitioning and adding a user. That's
trivial stuff that I'm simply not talking about. Though somehow Arch's
documentation has become significantly worse for complete newbies ever since
they got rid of the new user's guide and you end up having to read a bunch of
utterly irrelevant stuff in order to find the magic incantation that actually
works (and no, it doesn't actually explain anywhere why it works the way it
does).
I've had to do tons of messing around with settings just to get Arch working
properly on different systems. I had problems with resume working properly on
my Thinkpad for forever, and less decently supported systems had more issues.
I'm just not that kind of user anymore and I don't want to be my own tech
support. I have enough to juggle in userland pertaining to my actual job that
I simply do. not. want. anything going wrong that I'll have to dig into some
obscure config file somewhere to fix.
Manjaro gives me most of the benefits of Arch without having to waste my time
with setting up an Arch system just perfectly so it simply works. I have
access to the AUR and I have reasonably up-to-date packages (and I do run
unstable on my laptop, which usually works fine).
Some people just want to use Linux, not _live and breath_ Linux, and this
constant resistance against users who don't want to wade knee-deep in config
bullshit is completely infuriating.
You run Arch. Successfully. Congratulations. You're better than everybody
else.
~~~
eptcyka
I never tried to imply that running one distribution implies any kind of
supremacy, so I do apologize if I came across like that. My opinion that
Manjaro provides bad software stems from two things - my short experiences
trying to set it up to test userland things that did not work correctly on
Manjaro and a significant amount of bug reports coming in from Manjaro when
compared to other distros. But this being Linux, it's feasible that you've had
a much better experience with Manjaro, and since I don't have any good
statistical data about the bug reports I am aware of, I'll concede that is is
just a fluke. However, the packages do seem to lag behind by quite a bit. I'll
have to disagree that the current installation wiki is worse than the
beginner's guide - it might containt irrelevant things, but that is only
because there isn't one correct way to install Arch, and most of the
duplication stems from different filesystem setups and different bootloaders.
It's not meant to be read as prose, but the original beginners guide wasn't
either, since it too had a lot of duplication of steps to deal with the
multiplicity of installation options.
------
gchokov
Things like these are still the reason I am not switching away from Mac OS
~~~
kbumsik
Congrats, now you literally can't switch away from macOS! Thanks for the new
T2 chip you can't use native Linux/BSD (anything other than Windows and
macOS.)
UEFI is fine booting a third party OS when SecureBoot is disabled BUT the T2
chip blocks accessing the internal storage from those OSs [1][2]
[1]
[https://www.reddit.com/r/linux/comments/a4thsc/the_actual_fu...](https://www.reddit.com/r/linux/comments/a4thsc/the_actual_full_story_about_apples_t2_chip_from/?utm_source=share&utm_medium=ios_app)
[2]
[https://twitter.com/LinusTech/status/1067232394934083584](https://twitter.com/LinusTech/status/1067232394934083584)
~~~
dchest
T2 chip doesn't block access, Linux just didn't have a suitable driver ("It's
not NVMe compliant, hence it won't work with the in-kernel NVMe driver"
[https://bugzilla.kernel.org/show_bug.cgi?id=202567](https://bugzilla.kernel.org/show_bug.cgi?id=202567)).
There's a kernel patch to make it work:
[https://github.com/Dunedan/mbp-2016-linux/issues/71#issuecom...](https://github.com/Dunedan/mbp-2016-linux/issues/71#issuecomment-507325112)
------
JeremyMorgan
I am trying to think of valid reasons why someone would use FreeBSD in this
day and age as a desktop. I'm not being snarky, I'm genuinely curious.
I used FreeBSD a TON from around 1998-2004 or so. I did it because I could
configure an environment to develop in that ran fast on the hardware.
At some point the type of development I do (Web) really took off on Linux and
OSX so I drifted that way.
I'm going to spin up a VM of FreeBSD just to check it out, but why are folks
using it as a Desktop these days?
~~~
asveikau
I think the reason to use it over desktop Linux is pretty similar to the time
range you talk about. It has a different feel and some people are more
comfortable with the *BSD way.
The difference in personality has widened a bit as Linux comes up with things
like systemd. If you just want a light Unix workstation that isn't trying to
imitate Windows or Mac, the BSDs will get in your way less. That or a very
conservative Linux distro.
~~~
JeremyMorgan
I'm an Arch user right now, for the last 8 or 9 years. I've gotten very
comfortable in that ecosystem. I don't imagine things would be much different
doing what I do now in BSD I would just need a good reason to switch. In the
past, much of it was based on performance and being able to script everything,
which I still get with Arch.
~~~
asveikau
In my limited use of arch it does seem to be one of the distros that someone
with *BSD type aesthetics wouldn't mind.
------
gaspoweredcat
may have a crack at this, ive been meaning to look into desktop freeBSD for a
while and i suspect these tweaks should be similar for the X1C6
------
philliphaydon
So I could put this on my X1 Extreme? I wonder if it would improve battery
life.
~~~
LeonM
Only if you are willing to invest lots of time to get it somewhat usable, and
if you don't use too many peripherals.
I can't even get Ubuntu to run properly on my X1E, the 4K display completely
breaks grub and the dual GPU situation causes loads of problems when
connecting an external display though thunderbolt. Battery life is worse
compared to Windows (3h vs 5h).
~~~
mbi
FWIW, I installed Ubuntu 19.04 on my X1E-4k using this [0] guide and it has
been working flawlessly (with an external display via thunderbolt).
The battery life _is_ much worse than on Windows, can't deny that.
0: [https://bauklimatik-
dresden.de/privat/nicolai/index.html?htt...](https://bauklimatik-
dresden.de/privat/nicolai/index.html?https&&&bauklimatik-
dresden.de/privat/nicolai/html/en/lenovo_x1_extreme_ubuntu1804.html)
~~~
LeonM
Thanks for the link, looks like there are some good tips on there! I'll try it
out tonight.
One of the problems I've ran into is that my external 4k monitor (40") runs at
100% scaling and my laptop 4k monitor at 200%, which causes all sorts of
rendering bugs. After some searching I found that this has nothing to do with
the X1E or Ubuntu for that matter. It's a X11/Wayland issue that just isn't
properly implemented yet.
Edit: it looks like this guide also instructs to switch to 'discrete graphics'
in the BIOS. This is a hack and not what you want. This causes the nVidia
graphics chip to be always on (instead of letting the OS choose). This causes
terrible battery life. Don't do that.
------
pcr910303
The comments about using macOS instead of Linux or {Free,Open}BSD are getting
downvoted in somewhat obscure reasons.
It's not that Linux isn't usable with minimal tweaking, I'm pretty sure macOS
users also do a fair amount of tweaking (with, e.g. mapping keys with
Karabiner (swapping Control & Caps Lock doesn't need third-party apps BTW),
making the TouchBar useful again with HapticKey, etc...).
The problem is that Linux doesn't get fundamental things (in a user-
perspective) right. It's a few months ago, so I'm not sure if the bug still
remains, but the latest version of Ubuntu still has HiDPI problems (at least
in VMware Fusion - and VMs are pretty standard to test OSes, right?) related
to mouse pointer size, sleep doesn't work without configuring with systemd for
a few hours about one-third of all of my Linux laptops, WPA2 Enterprise Wi-Fi
connecting is an hassle, configuring input-systems for CJK languages require
making a systemd service manually(!), installing packages are needed to use
exFAT USB (I've heard that the Linux Kernel has now gained exFAT support by
Microsoft, but it's still months later for the user), adding apt repository
hangs when done with aptitude so the user has to touch /etc/, and the list
goes on...
Are these issues really 'configurable' issues? They aren't, but everyone kinda
says, 'Fiddle with {systemd and you will get manageable {battery life,Wi-Fi
connection,HiDPI support, etc...}' And that's the reason why people just use
macOS instead.
~~~
Carpetsmoker
I don't go around macOS stories with "macOS sucks, this is why I use Linux".
It's off-topic noise at best, and just pointless caring about what systems
other people run at worst.
So yeah, -1 from me to all of those posts, and also the Arch Linux one (I'm
typing this from an Arch machine). I don't think the reasons are that obscure:
it's off-topic and doesn't contribute. Your post at least has some depth to
it, but on the other hand, it's the same discussion ... every time.
~~~
peterwwillis
If someone posted a story called "Driving on Water", and it was all about how
you could modify your car to get it to drive on a lake... sure, it's
interesting... but it would certainly be worth pointing out that boats exist,
and that boats are perhaps much easier at doing what you're trying to do,
which is transportation on water. Maybe there's some reason the original
posters aren't using boats, and they can share that information. We don't know
until we start communicating about it.
~~~
Carpetsmoker
Everyone here is already familiar with all the major operating systems,
including macOS. There is no value in rehashing this debate all over again
here – which isn't even what most comments are doing, they're just digs at
FreeBSD/Linux.
~~~
peterwwillis
I don't think we're trying to debate as much as point out problems unique to
some OSes, and how we wish it were different. I would very much like to use
Linux as a desktop, if setting it up weren't a garbage fire. It doesn't have
to be this way.
------
gfiorav
It's such a risk you take by getting a WQHD screen on Linux. I've had trouble
to get things to scale, setting for the workable (albeit far from perfect)
option to scale fonts. I wonder how well this setup works with different UIs,
system icons, etc.
~~~
dddddaviddddd
Lots of things are not quite right (e.g. save dialogs never seem to be sized
logically), most things are okay though. What I use most (terminal, browser)
are great.
------
PPAqualifier
Arch Linux is the only Linux. It's so easy to learn and use. Arch Linux is the
only operating system. It takes 20 minutes to learn arch if you know Linux and
Unix.
~~~
enriquto
arch feels to me like an over-engineered mess. For a truer unix experience I'd
rather suggest void or slack.
~~~
mruts
I used to run Slackware, and the user experience is pretty terrible compared
to Arch or OpenBSD. The absence of a package manager that tracks dependencies
is not a “truer” Unix experience. All the BSDs provide a more Unixy experience
than Linux and they all track dependencies.
If Slackware was updated more often, the system would work better. The dynamic
libs are always way out of date, and god help you if you want to install a
newer version.
~~~
enriquto
this depends on your point of view. For me, being able to install a package
even when some dependences are not met is a fundamental feature.
Regarding the versions, slackware-current is a very up-to-date rolling distro
(e.g. much more so than ubuntu).
~~~
mruts
I mean, you can install packages without deps with Arch as well. Also, why is
that important to you?
~~~
bildung
Same for Debian and its forks (dpkg --ignore-depends) and I'm pretty sure
rpm/yum has a similar option.
------
peterkelly
And this is why I still use a mac
~~~
whynotminot
Haha, right? I understand if someone genuinely enjoys configuration.
But gosh I just need my machine to get up and going so I can make some money
and then go back to living.
~~~
8draco8
FreeBSD is for people that like to thinker with OS. Same as Arch on Linux
side. I'm using Ubuntu for pretty much everything for over 10 years now and
everything is just easy and fast. My current installation of Ubuntu Mate has
been done 3.5 years ago as 16.04. Since then I went trough 4 distro upgrades,
16.04 > 16.10 > 17.04 > 17.10 > 18.04LTS and since in 18.04 they introduced
snaps I decided to stick to LTS releases with my apps like JetBrains apps
installed via snaps for latest updates. Somewhere in that update cycle I
upgraded my machine and just pulled SSD from old machine and plugged it in
into the new one and it just worked. The system is also being backed up into
Synology NAS so when in meantime I bought small laptop for travel I basically
"restored" my main PC into that laptop so I didn't have to manually setup
everything. It's pretty simple. Unfortunately it doesn't move applications
like TimeMachine does, only the settings so I had to install apps like
SublimeText myself but settings was already in there.
If your workflow can be moved outside of MacOS ecosystem then it's worth to
checkout Linux especially Ubuntu (and all it flavors) as an alternative.
~~~
whynotminot
I actually do use Ubuntu every day for development. I also use macOS every
day. They both get the job done relatively painlessly. I enjoy macOS more in
general, but I like using Ubuntu in a VM because I can snapshot and restore.
|
Bile duct variations in partial liver transplantations from living-related donors.
The aim of this paper was to present anatomic variations of bile ducts and their effect on the perioperative course of living-related donors in partial liver transplantations in children. Liver fragments for partial transplantation were harvested from 41 related donors. Segments II and III were harvested from 35 and segments II, III, and IV from 6 donors. During the procedure, cholangiography through cystic duct was performed revealing a normal anatomy of the bile ducts in 33 (80.5%) cases. The rest of the donors showed anatomic variations. There was only one case of complications related to the bile duct. The intraoperative diagnosis of anatomic variations allowed for safe partial liver harvesting.
|
Introduction {#s1}
============
Recent studies on the manifestation of developmental reading problems established an interesting behavioral similarity to a form of acquired dyslexia referred to as letter-by-letter (LBL) reading. As suggested by the term letter-by-letter reading, the critical manifestation is an abnormal effect of word length, that is, number of letters, on reading time. To illustrate, Cohen et al. [@pone.0012073-Cohen1], reported linear increases of reading time with increases in word length in acquired LBL readers, ranging up to 400 ms per each additional letter in words from 3 to 9 letters. Similar, although less dramatic, length related reading latency increases were reported for English, German, and Italian dyslexic children and adolescents [@pone.0012073-Spinelli1]--[@pone.0012073-Zoccolotti1]. An abnormal word-length effect of developmental dyslexia cases was not only observed for latencies of reading aloud responses but also for visual inspection time in eye movement studies [@pone.0012073-DeLuca1], [@pone.0012073-Hawelka1]. In terms of the prominent cognitive dual-route model of visual word processing (e.g., [@pone.0012073-Coltheart1]), both the loss of efficient (i.e., length-independent) visual word processing in acquired LBL reading and the difficulty to attain efficient word processing in developmental dyslexia may be traced to a dysfunction of the lexical reading route. The critical component of the lexical route is the orthographic word lexicon which contains representations of the letter sequence of frequently read words. Such orthographic word entries allow fast visual whole-word recognition, that is, parallel assimilation of letter strings and direct access to word phonology and meaning. Frequent absence of such orthographic word entries results in reliance on the slow sublexical reading route. This route achieves access to word phonology by serial sublexical orthographic-phonological recoding which obviously gives rise to the abnormal length effect on reading time for words. However, developmental dyslexia cases suffer not only from an abnormal length effect for words, but they also exhibit inefficient sublexical processing of the unfamiliar letter strings of pseudowords (e.g., [@pone.0012073-Wimmer1]), which may be attributed to frequent absence of larger sublexical multi-letter recognition units and adherence to serial grapheme-phoneme coding instead. Furthermore, even when dyslexic readers rely on lexical route processing of words, they still were found to exhibit a reading speed deficit [@pone.0012073-Hawelka1], [@pone.0012073-Barca1]--[@pone.0012073-DeLuca2].
In the field of acquired dyslexia, there is growing consensus that the loss of efficient word processing and the emergence of LBL reading is caused by lesions affecting the left ventral occipito-temporal (OT) cortex, specifically the Visual Word Form Area (VWFA), or connections to or from the VWFA [@pone.0012073-Cohen1], [@pone.0012073-Cohen2]--[@pone.0012073-Tsapkini1]. Similarly, one may hypothesize that the difficulty with fast fluent reading of developmental dyslexia cases may be caused by a congenital dysfunction of the OT cortex. However, this hypothesis is quite different from the dominant explanatory framework in the field of developmental dyslexia (e.g., [@pone.0012073-Snowling1]). Here, the main dyslexic difficulty is seen in the acquisition of the sublexical route, that is, in self-reliant phonological word decoding. This difficulty is seen as arising from a verbal-phonological deficit which affects the identification of phonemes in spoken words which, in turn, affects the mapping of graphemes onto phonemes which, in turn, affects the acquisition of self-reliant phonological word decoding which, in turn, affects orthographic learning. In correspondence with the phonological deficit explanation, reviews of imaging studies summarize the findings as speaking for a primary dysfunction of posterior language areas (i.e., posterior superior temporal gyrus/sulcus and adjacent parietal regions) and consider underactivation of left OT regions as secondary to the primary dysfunction of left temporo-parietal (TP) region [@pone.0012073-Dmonet1]--[@pone.0012073-Shaywitz1].
Evidence for the phonological deficit explanation and specifically for a profound dyslexic difficulty with the acquisition of self-reliant word decoding is largely based on English language which is an outlier with respect to grapheme-phoneme regularity [@pone.0012073-Share1]. In more typical alphabetic orthographies with transparent grapheme-phoneme correspondences, reading accuracy for short words and pseudowords approaches ceiling after a couple of months of instruction [@pone.0012073-Aro1], [@pone.0012073-Seymour1]. Even for dyslexic children, the mentioned reading fluency impairment typically occurs in the context of high reading accuracy (e.g., Dutch: [@pone.0012073-Yap1], Finnish: [@pone.0012073-Lyytinen1], Greek: [@pone.0012073-Porpodas1], Hebrew: [@pone.0012073-Share2], Italian: [@pone.0012073-Zoccolotti2], Norwegian: [@pone.0012073-Hagtvet1], Spanish: [@pone.0012073-Gonzlez1]). Direct German-English comparisons with similar words and pseudowords confirmed the difference in reading accuracy [@pone.0012073-Landerl1], [@pone.0012073-Ziegler2]. To illustrate, for low frequency words, Landerl et al. [@pone.0012073-Landerl1] found that accuracy was about 93% for German dyslexic children compared to only about 50% for their English peers. The ease of accurate phonological word reading in regular orthographies is of theoretical importance as it raises doubts that poor orthographic learning (i.e., reduced storage of letter strings for words or larger segments) is secondary to difficulty with accurate phonological reading. This then raises further doubts whether observed dysfunctions of the left OT regions in dyslexic readers are secondary to a primary dysfunction of left posterior language regions. The alternative possibility is that the fluency problem of dyslexic readers in regular orthographies -- similar to acquired cases of LBL reading -- may be caused by a primary dysfunction of left OT regions engaged by highly efficient lexical and sublexical route processes. There is already some support for this latter hypothesis from functional imaging studies with German-speaking dyslexic children and adults who suffer from the characteristic reading speed problem [@pone.0012073-Kronbichler1]--[@pone.0012073-Wimmer2].
The present fMRI study extended this line of research by focusing specifically on dyslexic abnormalities in the brain response to increased length (number of letters) of words and pseudowords. As mentioned above, dyslexic readers similar to LBL readers exhibited abnormal increases of reading time with increasing word length. For studying abnormal brain responses, we extended a recent imaging study with nonimpaired readers from our lab [@pone.0012073-Schurz1] by adding a dyslexic sample. This study manipulated item length with short items (words and pseudowords) consisting of 3--5 letters and long ones of 6--10 letters. With respect to the mentioned reviews of imaging studies, several findings of Schurz et al. [@pone.0012073-Schurz1] are important. Firstly, the processing of both words and pseudowords led to marked activation in left OT and left inferior frontal gyrus (IFG) regions, but not in left temporal regions. Secondly, the activation pattern in both the OT and the IFG regions corresponded to expectations from lexical processing of words and sublexical processing of pseudowords as there was no effect of length on the brain response to words, but a substantial effect in the response to pseudowords. Of main interest with respect to a primary or secondary dysfunction of left OT regions is the activation pattern shown by the present dyslexic sample. Let us first consider expectations from an only secondary dysfunction, that is, less engagement by lexical whole-word recognition and sublexical multi-letter recognition of otherwise fully functional left OT regions. From this hypothesis one would expect left OT activation to correspond to the behavioral response pattern shown by our dyslexic sample. Compared to the nonimpaired sample, our dyslexic readers exhibited generally prolonged response latencies and a stronger length effect on response latencies for both words and pseudowords. When fully functional left OT regions of dyslexic readers are engaged by slow serial letter string processing resulting in the mentioned latency pattern, one would expect increased activation and a stronger length effect on activation. This pattern is not expected from a primary dysfunction of left OT regions. From this hypothesis one would expect -- compared to controls -- generally reduced activation and, specifically, absence of a length effect on activation.
Results {#s2}
=======
Behavioral results {#s2a}
------------------
For interpretation of brain activation findings, dyslexic abnormalities in the effect of item length on response latencies for words and pseudowords are important. The words and pseudowords were presented together with pseudohomophones in a phonological lexical decision task (i.e., "Does xxx sound like a real word?"). This makes unlikely that the NO response to pseudowords could be based on orthographic familiarity checks because such a strategy would have resulted in NO responses to both pseudohomophones and pseudowords. This was not the case as percentages of YES responses to pseudohomophones were 84% and 76% for nonimpaired and dyslexic readers, respectively. In the preceding Schurz et al. [@pone.0012073-Schurz1] study, pseudohomophones were excluded from analysis because short pseudohomophones led to a higher number of erroneous NO responses than long ones and because there was no length effect on response times. The reason for the specific difficulty of short pseudohomophones may have been overly accurate pronunciations. For example, such a pronunciation in the case of "Prot" (instead of "Brot" -- bread) may have led to a NO response or to repeated processing before arriving at a YES response. In the case of long pseudohomophones such as "Broduktion" (instead of "Produktion" -- production) overly accurate pronunciation may have been less distracting.
The response latencies in [Table 1](#pone-0012073-t001){ref-type="table"} show that dyslexic readers exhibited generally prolonged response latencies and were more negatively affected by item length (short vs. long) as evident from a reliable main effect of group, *F*(1, 31) = 5.41, *p*\<.05, and a reliable length by group interaction, *F*(1, 31) = 26.74, *p*\<.001. The lexicality (words vs. pseudowords) by group interaction was of borderline significance, *F*(1, 31) = 3.25, *p* = .08. The three-way interaction was not reliable, *F*(1, 31) = 1.97, *p* = .17. Of specific interest is that the latency increase exhibited by dyslexic readers from short to long words of about 170 ms was more than tripled compared to the small increase of about 50 ms exhibited by the nonimpaired sample. The mean percentages of correct responses in [Table 1](#pone-0012073-t001){ref-type="table"} show that dyslexic readers had little difficulty with words (over 90% correct YES responses) but exhibited some difficulty to reject pseudowords. The difference was reliable for short pseudowords, *t*(31) = 2.39, *p*\<.05, and increased for long pseudowords as evident from a length by group interaction, *F*(1, 31) = 4.24, *p*\<.05.
10.1371/journal.pone.0012073.t001
###### Means and standard deviations of in-scanner performance.
{#pone-0012073-t001-1}
Nonimpaired readers Dyslexic readers
---------------------- --------------- --------------------- ------------------
Speed (ms)
Words short 848 (253) 971 (267)
long 894 (270) 1139 (336)
length effect 46 (41) 168 (88)
Pseudowords short 1080 (283) 1322 (348)
long 1219 (283) 1537 (341)
length effect 139 (66) 215 (88)
Accuracy (% correct)
Words short 94.89 (6.91) 93.53 (6.82)
long 96.22 (5.64) 90.47 (8.58)
length effect −1.33 (3.69) 3.07 (6.40)
Pseudowords short 90.72 (9.20) 80.80 (14.49)
long 87.94 (11.17) 73.20 (15.90)
length effect 2.78 (7.09) 7.60 (6.20)
Imaging results {#s2b}
---------------
In the first section we report whole-brain analyses with a focus on dyslexic activation abnormalities. In the following sections, regions of interest (ROIs) examined group differences (a) along the left ventral visual pathway including critical OT regions, (b) in left TP regions which were hypothesized to be dysfunctional in dyslexic readers, and (c) in left frontal language areas which were identified with dyslexic abnormalities in the whole-brain analyses.
### Whole-brain analyses {#s2b1}
The results of these analyses are illustrated in [Figure 1](#pone-0012073-g001){ref-type="fig"} and reported in detail in [Table 2](#pone-0012073-t002){ref-type="table"}. [Figure 1](#pone-0012073-g001){ref-type="fig"} shows that for words (short and long items combined vs. baseline) both groups exhibited highest activation levels in the occipital cortex with activations extending into occipito-parietal and occipito-temporal regions. There was activation in left frontal and parietal regions and in bilateral subcortical and cerebellar regions as well. A main result of the group comparisons is that dyslexic readers exhibited underactivation (red) of a small OT cluster with a maximum difference at (MNI-coordinates) x = −42, y = −46, z = −16. The only other region with underactivation was centered in the right inferior occipital gyrus. These underactivations stood in contrast to overactivation (green) in the left supplementary motor area (SMA), the left lingual gyrus, and the right cerebellum. The largest regions with overactivation were identified in subcortical structures (bilateral thalamus, bilateral caudate, left putamen, pallidum, and amygdala).
{#pone-0012073-g001}
10.1371/journal.pone.0012073.t002
###### Results of the whole-brain group comparisons.
{#pone-0012073-t002-2}
MNI-coordinates Volume
------------------------- ----------------- -------- ----- ------ ------
Words \> Baseline
Nonimpaired \> Dyslexic
R inferior occipital 22 −90 −6 100 4.84
36 −86 −6 20 2.91
L VWFA −42 −46 −16 23 3.44
Dyslexic \> Nonimpaired
L lingual −16 −80 8 22 3.99
L SMA −2 4 54 114 3.53
Subcortical structures
L thalamus −14 −20 12 1073 4.63
L putamen −16 0 10 748 4.48
R caudate 18 16 6 139 4.13
R cerebellum 30 −56 −30 60 3.76
Pseudowords \> Baseline
Nonimpaired \> Dyslexic
Posterior brain regions
R inferior occipital 22 −90 −4 334 5.68
36 −84 −6 227 3.92
L lingual −18 −92 −8 32 3.06
R middle occipital 24 −86 18 113 4.14
L cuneus −16 −92 16 97 4.03
L angular −34 −62 50 26 3.55
L supramarginal −44 −44 40 274 4.78
L VWFA −44 −48 −18 487 4.82
L middle temporal −46 −46 4 100 4.51
Frontal brain regions
L IFG opercular −52 14 14 904 5.25
R IFG opercular 36 4 28 52 4.00
L IFG triangular −48 28 −4 277 5.10
R insula 34 22 12 29 2.92
L medial frontal −2 24 44 22 3.38
Anterior cingulum 10 30 26 49 3.46
Dyslexic \> Nonimpaired
L precuneus −16 −66 40 47 3.61
Frontal brain regions
R SMA 16 2 56 370 4.57
L superior frontal −20 2 58 36 4.25
L precentral −58 −2 16 58 3.64
−48 −4 52 28 3.28
R middle frontal 32 44 34 37 3.34
Subcortical structures
R putamen 18 2 10 144 4.46
L caudate −18 14 12 89 4.42
R caudate 16 18 6 21 3.38
L thalamus −12 −6 −6 52 4.14
−8 −22 16 217 3.64
L hippocampus −38 −12 −24 21 3.59
L amygdala −28 −8 −10 20 3.33
L pallidum −20 −2 8 24 2.97
L cerebellum −28 −50 −32 156 4.11
R cerebellum 10 −58 −22 37 3.56
32 −54 −32 66 3.47
R brainstem 14 −18 −8 23 3.04
Pseudowords activated largely similar regions as words, but activation -- specifically in the left frontal cortex -- was much higher and more extended. Compared to words, a higher number and more extended regions were identified with dyslexic underactivation. Specifically, the right occipital underactivation was more extended, and the same was the case for the underactivation in the left OT region with an additional maximum in the posterior middle temporal gyrus (x = −46, y = −46, z = 4). Further large regions with underactivation were identified in left inferior parietal and in left inferior frontal regions. Regions with overactivation were found in the left precentral gyrus and in the right middle frontal gyrus. Large regions with overactivation were identified in bilateral aspects of the SMA, in subcortical regions (putamen, thalamus), and in cerebellar regions.
### Left occipito-temporal (OT) regions {#s2b2}
Given the focus on dyslexic abnormalities in the left OT cortex, we selected two ROIs in the OT sulcus corresponding to a middle (y = −56) and an anterior segment of the VWFA (y = −42) of Cohen et al. [@pone.0012073-Cohen3]. Furthermore, we included a ROI in the posterior fusiform gyrus (y = −70). [Figure 2](#pone-0012073-g002){ref-type="fig"} shows the location of the ROIs (5-mm-radius spheres) and the corresponding coordinates. These regions were identified by the preceding Schurz et al. [@pone.0012073-Schurz1] study as exhibiting maxima of reading related activation (i.e., comparing activation to all item types against baseline) in nonimpaired readers. These ROIs were used to extract percent signal change estimates (in arbitrary units) for each of the four item types in each participant. The main finding is that in the two anterior ROIs, dyslexic readers exhibited a strikingly different activation pattern compared to nonimpaired readers as they failed to exhibit the marked length effect for pseudowords shown by the nonimpaired readers. In the two posterior ROIs, the dyslexic readers, similar to the controls, exhibited length effects for both words and pseudowords, *p*s\<.05. Because of rather high activation in response to short pseudowords, the length effect for pseudowords in the occipital ROI was of borderline reliability, *p* = .07.
{#pone-0012073-g002}
A possible concern is that the absence of a length effect for dyslexic readers in the two left anterior OT ROIs (x = −36, y = −42, z = −20, and x = −44, y = −56, z = −22) is due to the fact that these ROIs were based on the nonimpaired sample only. We redid the ROI analysis based on left OT maxima of reading related activation in the combined sample of nonimpaired and dyslexic readers. The results were close to identical with the original analysis, which is not surprising given that these ROIs at x = −36, y = −42, z = −22, and x = −44, y = −56, z = −24 were very close to those from the nonimpaired readers.
### Left temporo-parietal (TP) regions {#s2b3}
As noted in the [Introduction](#s1){ref-type="sec"}, reviews of imaging studies assume that dysfunctions of posterior language areas are of primary importance for dyslexic reading problems. For selection of ROIs in the posterior superior temporal gyrus (STG) and superior temporal sulcus (STS), we relied on coordinates from our meta-analysis [@pone.0012073-Richlan1] and added a middle STG region which recently was found to exhibit underactivation in adult dyslexics in response to a task requiring the integration of letters and speech sounds [@pone.0012073-Blau1]. Furthermore, a region in the supramarginal gyrus (SMG) was based on the finding of dyslexic underactivation in response to pseudowords in the whole-brain analyses. [Figure 3A](#pone-0012073-g003){ref-type="fig"} shows the location of these ROIs and the extracted signal change estimates. Several findings are remarkable: First, there was no reliable activation compared to baseline in the middle STG and the posterior STS, and activation levels were also low in the posterior STG with only long pseudowords differing from baseline. In the SMG, corresponding to the whole-brain analysis, dyslexic readers exhibited reduced activation in response to pseudowords, *p*\<.01.
{ref-type="fig"}.](pone.0012073.g003){#pone-0012073-g003}
### Left frontal regions {#s2b4}
The whole-brain analysis in response to pseudowords revealed dyslexic underactivation in triangular and opercular parts of the IFG and dyslexic overactivation in precentral regions and the SMA. The ROIs were based on peaks of these clusters ([Figure 3B](#pone-0012073-g003){ref-type="fig"}). For the ROI in the IFG, dyslexic readers failed to exhibit the marked increase of activation from words to pseudowords of the nonimpaired readers. In the ventral precentral ROI, dyslexic readers exhibited higher activation compared to controls for both words and pseudowords, *p*s\<.05. A similar pattern was evident in the dorsal precentral ROI with again higher dyslexic activation for words, *p*\<.05, and a tendency for pseudowords, *p* = .06. In addition, both groups here exhibited length effects on activation for pseudowords, *p*s\<.05.
Discussion {#s3}
==========
Behavioral manifestation {#s3a}
------------------------
The dyslexic participants of the present study exhibited the behavioral manifestation of dyslexia in regular orthographies, that is, they suffered from a severe impairment of reading speed but not of reading accuracy. As evident from [Table 3](#pone-0012073-t003){ref-type="table"}, on the time-limited sentence reading test used for selection, they processed only about half as many sentences as nonimpaired readers. However, they hardly committed any errors. Similarly, for the accompanying reading aloud tests presenting lists of words and pseudowords, their reading rate was about half the rate of the controls, but accuracy even for pseudowords was close to ceiling with about 95% correct. Of specific importance for the behavioral similarity with acquired cases of letter-by-letter (LBL) readers is the abnormal word-length effect shown by the present dyslexic readers in the phonological lexical decision task (i.e., "Does xxx sound like a real word?"). Their response latencies increased by about 170 ms from short words (3--5 letters) to long words (6--10 letters). This latency increase was about three times the latency increase of the nonimpaired readers. This abnormal length effect speaks for a dysfunction of the lexical reading route (i.e., whole-word recognition and direct access to whole-word phonology) and reliance on serial sublexical orthographic-phonological coding instead. However, the abnormal length effect was not limited to words but was also observed for pseudowords. Here it may be due to reduced availability of multi-letter recognition units. Of importance is that the abnormal length effect on phonological lexical decisions in the scanner corresponds to the abnormal dyslexic length effect observed in reading aloud tasks and eye-movement studies mentioned in the [Introduction](#s1){ref-type="sec"}.
10.1371/journal.pone.0012073.t003
###### Means and standard deviations of participant characteristics.
{#pone-0012073-t003-3}
Nonimpaired readers Dyslexic readers
--------------------------------- --------------------- ------------------ --------------------------------------------
Age (years) 17.89 (1.13) 18.09 (1.12) −0.51
Sentence reading
Accuracy (% correct) 98.77 (0.76) 96.12 (3.91) \-
Speed (sentences correct/3 min) 53.17 (7.81) 26.17 (6.97) 10.38[\*\*\*](#nt103){ref-type="table-fn"}
corresponding reading quotient 102.25 (11.08) 63.96 (9.89)
Word reading
Accuracy (% correct) 99.89 (0.32) 97.53 (2.20) \-
Speed (items/min) 123.28 (12.42) 72.80 (22.64) 7.72[\*\*\*](#nt103){ref-type="table-fn"}
Nonword reading
Accuracy (% correct) 99.06 (1.41) 95.09 (6.03) \-
Speed (items/min) 82.00 (13.24) 43.73 (16.13) 7.49[\*\*\*](#nt103){ref-type="table-fn"}
Verbal IQ
Vocabulary 118.33 (9.70) 103.67 (10.08) 4.25[\*\*\*](#nt103){ref-type="table-fn"}
Similarities 114.44 (8.73) 106.33 (10.26) 2.46[\*](#nt102){ref-type="table-fn"}
Digit Span 101.39 (11.48) 91.33 (10.26) 2.63[\*](#nt102){ref-type="table-fn"}
Performance IQ
Block Design 110.00 (7.48) 112.67 (12.37) −0.76
Visual Puzzles 109.17 (14.48) 110.67 (15.22) −0.29
Coding 105.28 (11.31) 97.33 (14.00) 1.80
Statistically reliable group differences are indicated by asterisks.
\**p*\<.05,
\*\*\**p*\<.001.
Evidence for a left OT dysfunction {#s3b}
----------------------------------
In the [Introduction](#s1){ref-type="sec"} we hypothesized that the slow serial reading of our developmental dyslexia cases similar to the serial reading of acquired LBL readers may be due to a dysfunction of the left occipito-temporal (OT) cortex and specifically of the Visual Word Form Area (VWFA). Specific expectations were based on findings with nonimpaired readers showing that the left OT cortex is engaged by lexical route processes (i.e., storage of orthographic word representations and use of such representations for whole-word recognition), but even more so by sublexical route processes [@pone.0012073-Schurz1], [@pone.0012073-Kronbichler2]. Accordingly, we expected a left OT dysfunction to become evident as a failure of dyslexic readers to exhibit the "normal" length effect for pseudowords on OT activation. A dysfunction of left OT regions for visual word processing should also be reflected in generally reduced activation of left OT regions compared to activation shown by nonimpaired readers.
Both expectations found support. Specifically, dyslexic readers did not show the pseudoword-length effect of the nonimpaired readers in left OT sulcus regions which correspond to the VWFA. Absence of this length effect is remarkable as the effect of pseudoword-length on response latencies was larger for dyslexic than for nonimpaired readers. Furthermore, absence of a pseudoword-length effect in left OT sulcus regions stood in contrast to presence of this effect in a posterior fusiform region. It is also of interest that there was no word-length effect on left OT activation of dyslexic readers. Such an effect could have been expected as dyslexic readers -- different from nonimpaired readers -- exhibited a strong word-length effect on response latencies. The present finding that dyslexic readers failed to exhibit modulation of left OT activation in response to the length of words and pseudowords corresponds to previous findings showing that dyslexic readers failed to exhibit the increased left OT activation of nonimpaired readers to sublexical processing required by pseudohomophones, pseudowords, or low-frequency words [@pone.0012073-VanderMark1], [@pone.0012073-Wimmer2], [@pone.0012073-Bruno1], [@pone.0012073-Pugh2].
Dyslexic readers not only failed to exhibit length effects on activation in left OT regions, they also showed reduced activation of this region compared to nonimpaired readers. For words, the whole-brain analysis identified a small region with underactivation centered at (MNI-coordinates) x = −42, y = −46, z = −16. For pseudowords, a similarly centered but much larger region was identified (x = −44, y = −48, z = −18). In response to pseudowords, underactivation of the dyslexic readers was not limited to left OT sulcus regions, but was also found in posterior aspects of the inferior temporal gyrus and of the middle temporal gyrus. One may note that the reduced left OT activation of the dyslexic readers in response to words and to pseudowords was still substantial compared to fixation baseline. A more demanding visual baseline may have further reduced left OT activation shown by dyslexic readers in response to visual words. This possibility is suggested by the results of two recent studies which used complex visual displays as baseline and found dyslexic readers to exhibit no reliable left OT activation in response to visual word processing [@pone.0012073-VanderMark1], [@pone.0012073-Pugh2]. The present findings add to the still limited evidence for a specific dysfunction of left OT regions in dyslexic readers. Although the quantitative meta-analysis by Richlan et al. [@pone.0012073-Richlan1] did find a local maximum of underactivation corresponding to the VWFA, only three out of 17 studies reported foci of underactivation in regions corresponding to the VWFA and altogether only six studies reported underactivations in a larger OT reading system including posterior inferior and middle temporal regions in addition to ventral OT regions.
From a similarity of developmental dyslexia and acquired LBL reading one would not only expect a functional abnormality of left OT regions but also an anatomical abnormality. Several recent studies, including our own, found reduced gray matter volume in the left OT cortex in dyslexic readers [@pone.0012073-Frye1]--[@pone.0012073-Silani1]. Interestingly, Frye et al. [@pone.0012073-Frye1] divided the observed abnormalities in gray matter volume into reductions of cortical surface area and reductions of cortical thickness. It is assumed that cortical surface area is determined prenatally, whereas cortical thickness is determined during postnatal development. For the left OT cortex, dyslexic brain abnormalities were only found in terms of reduced cortical surface area and not in terms of cortical thickness. This suggests that the dyslexic brain abnormalities in the left OT cortex arise early during brain development and are not a consequence of the reduced amount of reading experience in dyslexics. Apart from the OT cortex, other gray matter abnormalities have been found in the cerebellum, the right superior temporal gyrus, and an anterior portion of the left inferior temporal gyrus (e.g., [@pone.0012073-Kronbichler3]--[@pone.0012073-Eckert1]).
Occipital underactivation {#s3c}
-------------------------
An unexpected finding was functional abnormalities in occipital regions. Specifically, in response to both words and pseudowords dyslexic readers exhibited underactivation in the right inferior occipital gyrus, and in response to pseudowords there was additional underactivation in medial occipital regions (lingual gyrus and cuneus). These occipital underactivations are unexpected given the much prolonged processing time of the dyslexic readers. They also differ from previous findings of overactivation in occipital regions [@pone.0012073-Kronbichler1], [@pone.0012073-Wimmer2]. One may reason that the long letter strings (6--10 letters) among the present items led to a left-to-right visual scanning strategy among the dyslexic readers. Such a focus on word-initial letters reduces information in the left visual field which projects to right occipital cortex. Reliance on left-to-right letter string scanning can be expected to have a marked length effect on regions engaged by serial grapheme-phoneme coding and phonological assembly. In this perspective, the failure of dyslexic readers to exhibit a pseudoword-length effect on left OT activation is remarkable. An abnormally strong length effect on activation was only identified in a left dorsal precentral region presumably engaged by silent articulatory processes.
No evidence for a left TP dysfunction {#s3d}
-------------------------------------
As noted in the [Introduction](#s1){ref-type="sec"}, in reviews of imaging research, the left temporo-parietal (TP) cortex is considered to be the prime locus of developmental reading difficulties by affecting self-reliant phonological word decoding based on serial grapheme-phoneme conversion [@pone.0012073-Dmonet1]-[@pone.0012073-Shaywitz1]. Indeed, our quantitative meta-analysis of imaging studies [@pone.0012073-Richlan1] identified maxima of underactivation in posterior aspects of the superior temporal gyrus (STG) and the superior temporal sulcus (STS) and also in the inferior parietal lobule which, in some accounts, is subsumed under the left TP reading circuit [@pone.0012073-Dmonet1], [@pone.0012073-Sandak1]. The present findings raise doubts on these assumptions. In response to pseudowords, nonimpaired readers exhibited no activation compared to fixation baseline in the left middle STG and left posterior STS, and, consequently, no underactivation of dyslexic readers could be observed. In the posterior STG, nonimpaired readers exhibited small but reliable activation compared to baseline, but so did dyslexic readers. Underactivation of dyslexic readers was only found in the left supramarginal gyrus (SMG). However, the whole-brain analyses raised doubts whether the SMG should be subsumed under the TP reading circuit. These analyses showed that the SMG activation of the nonimpaired readers was an extension of the high activation in a large intraparietal region which was quite distant from the sylvian fissure with absent or little activation.
Left inferior frontal underactivation accompanied by precentral overactivation {#s3e}
------------------------------------------------------------------------------
Different from the absence of dyslexic underactivation in left posterior temporal regions, there was evidence for functional abnormalities in frontal language regions. The whole-brain analysis identified extended regions with marked underactivation in response to pseudowords (but not to words) in bilateral inferior frontal opercular regions and in a left inferior frontal triangular region. The ROI analyses showed that the underactivation in response to pseudowords was mainly due to a failure to exhibit the increase of activation from words to pseudowords which was shown by the nonimpaired readers. From the whole-brain analysis it is evident that the reduced responsiveness of IFG regions to pseudowords stood in marked contrast to overactivation in adjacent precentral regions and also to overactivation in the SMA and in a right middle frontal region. The overactivation in left premotor regions was accompanied by overactivation in several subcortical regions (e.g., putamen, caudate, thalamus) and in the cerebellum. Overactivation in subcortical regions was also a dominant finding in our previous studies with German dyslexic readers [@pone.0012073-Kronbichler1], [@pone.0012073-Wimmer2] and may reflect the slow effortful reading of our dyslexic participants.
A disconnection between left OT and left IFG? {#s3f}
---------------------------------------------
A comparison of the ROI-based activation patterns in [Figure 2](#pone-0012073-g002){ref-type="fig"} and [Figure 3](#pone-0012073-g003){ref-type="fig"} shows an impressive similarity between left OT and left IFG regions as in both areas dyslexic readers failed to exhibit the increase of activation from words to pseudowords which was shown by the nonimpaired readers. Furthermore, they failed to exhibit the increase of activation from short to long pseudowords of the nonimpaired readers. These patterns suggest that in nonimpaired, but not in dyslexic readers, both the left OT and the left IFG regions were responsive to the increased demands of sublexical pseudoword reading. Recent studies of functional and effective brain connectivity in nonimpaired readers suggest that the left OT cortex is substantially involved in driving brain activation in left inferior frontal areas (e.g., [@pone.0012073-Bitan1]--[@pone.0012073-Mechelli1]). There is also a first study which points to abnormalities in effective connectivity of left OT to left IFG regions in dyslexic readers [@pone.0012073-Cao1]. Of main interest would be anatomical findings on integrity of white-matter tracts linking these regions. There are findings of white-matter abnormalities in dyslexic readers in the left hemisphere (e.g., [@pone.0012073-Beaulieu1]--[@pone.0012073-Richards1]). However, it is yet under debate which fiber tracts are specifically affected (see [@pone.0012073-BenShachar1]). A promising candidate fiber tract is the left superior longitudinal fasciculus linking OT and IFG regions. Future diffusion tensor imaging studies may shed light on this hypothesis.
Conclusions {#s3g}
-----------
On the phonological lexical decision task used for measuring brain activation, the present German-speaking dyslexic participants, similar to acquired cases of letter-by-letter readers, exhibited an abnormal length effect on response times for both words and pseudowords. This abnormal length effect corresponds to their severely impaired reading speed. Corresponding to lesions of left occipito-temporal (OT) regions in acquired cases, we found a dysfunction of this region in our developmental cases who failed to exhibit any responsiveness of left OT regions to the length of words and pseudowords. This absent responsiveness in the left OT cortex was accompanied by absent responsiveness to increased sublexical reading demands in phonological inferior frontal gyrus (IFG) regions. In contrast, corresponding to slow effortful dyslexic reading, our dyslexic readers exhibited abnormally high engagement of left premotor, subcortical, and cerebellar regions. Interestingly, neither nonimpaired nor dyslexic readers showed activation in left superior temporal regions which -- corresponding to the phonological deficit explanation -- are considered the prime locus of reading difficulties. The present functional imaging results suggest that developmental dyslexia similar to acquired letter-by-letter reading is due to a primary dysfunction of left OT regions.
Materials and Methods {#s4}
=====================
Participants {#s4a}
------------
Fifteen German-speaking dyslexic adolescents and young adults (age range: 16--20 years) were added to the sample of nonimpaired readers of the Schurz et al. [@pone.0012073-Schurz1] study. All participants were male, right-handed, and had normal or corrected-to-normal vision. The study was approved by the ethics committee of the University of Salzburg ("Ethikkommission der Universität Salzburg"). Participants gave written informed consent and were paid for their participation.
Group assignment was based on performance on a reading speed test which presents a list of sentences from which as many as possible have to be marked as correct (making sense) or incorrect within three minutes. The content of these sentences is simple as the main aim of the test is to allow a quick assessment of reading speed impairments. In studies assessing the validity of similar published tests for school-children, correlations between sentence reading scores and reading aloud performance on subtests of our Salzburger Lese- und Rechtschreibtest [@pone.0012073-Landerl2] ranged from .76 to .81.
Participants were assigned to the dyslexic group if their reading speed score (correctly scored sentences) was below percentile 10. All the nonimpaired readers had exhibited a reading speed score above percentile 15. Percentiles were based on a preliminary norm sample of about 300 adolescents and young adults. As evident from [Table 3](#pone-0012073-t003){ref-type="table"}, the dyslexic readers processed only about half of the number of sentences processed by the nonimpaired readers. Their mean reading quotient (*M* = 100, *SD* = 15) based on the norm sample was below 70, whereas that of the nonimpaired readers was about average. The close to perfect accuracy of the dyslexic sample in evaluating the sentences rules out that their low test scores may reflect an accuracy problem. Slow reading speed in the absence of an accuracy problem is also evident from the additional reading measures in [Table 3](#pone-0012073-t003){ref-type="table"} which characterize reading aloud lists of words and pseudowords with increasing difficulty (time-limit: one minute). The combined reading aloud scores were highly associated with the sentence reading scores, Spearman\'s *r*(33) = .91. For nonimpaired and dyslexic readers separately, these correlations were *r*(18) = .58, *p*\<.05, and *r*(15) = .80, *p*\<.001, respectively. In summary, reading speed of our dyslexic readers was about half the speed of the nonimpaired readers. In contrast, reading accuracy of the dyslexic sample was close to perfect even for pseudowords.
A further inclusion criterion for the dyslexic group was a nonverbal IQ score in the normal range (i.e., at least 90). Nonverbal IQ was measured by three subtests (Block Design, Visual Puzzles, and Coding) of the German adaptation [@pone.0012073-Tewes1] of the Wechsler Adult Intelligence Scale-Revised (WAIS-R). In addition to the Performance Scale subtests, three subtests (Vocabulary, Similarities, and Digit Span) of the Verbal Scale were presented. The means in [Table 3](#pone-0012073-t003){ref-type="table"} show that dyslexic readers exhibited lower scores on all three verbal subtests but on none of the performance subtests. However, with exception of the Digit Span subtest, the mean scores of the dyslexic sample on the Vocabulary and the Similarities subtest were still above average.
Stimuli and Task {#s4b}
----------------
Stimuli and task were identical to Schurz et al. [@pone.0012073-Schurz1] where an item list is provided. The task was to decide whether an item sounds like an existing word and the stimulus set consisted of 180 German words (mostly nouns), 180 pseudohomophones derived from these words, and 180 pronounceable pseudowords. Half of the items from each category were referred to as short (consisting of 3 to 5 letters) and the other half as long (consisting of 6 to 10 letters). Examples for short items of the three categories are "Text" (text) -- "Tekst" -- "Tokst". Examples for long items are "Produktion" (production) -- "Broduktion" -- "Proklinom". Actually, 69 out of 180 pseudohomophones were constructed by exchanging B/P, D/T and G/K in word-initial position but only when followed by L or R. In these consonant clusters, the aspiration of the unvoiced stops is largely lost and this is specifically so in the Southern variant of German. From our previous experience with the phonological lexical decision task [@pone.0012073-Bergmann1], [@pone.0012073-Kronbichler4] we knew that participants sometimes find it hard to believe that a "misspelling" (pseudohomophone) sounds exactly like the intended word. Therefore, during a familiarization with the task outside the scanner, participants were instructed to accept a "misspelling" as sounding like the intended word even when they (wrongly) felt that the pronunciation may not be fully correct. A substantial number of examples for "misspellings" were presented. However, this familiarization was of only limited success. Specifically, short pseudohomophones (with reduced letter overlap with the correct spelling) led to substantial numbers of wrong NO responses. Accuracy for short and long pseudohomophones was 73% and 79% for dyslexic readers, and 79% and 89% for nonimpaired readers, respectively. Furthermore, the specific difficulty of the short pseudohomophones may have been responsible for the absence of a reliable length effect in both dyslexic (short: 1206 ms, long: 1270 ms) and nonimpaired readers (short: 1015 ms, long: 1010 ms). Since the main focus of Schurz et al. [@pone.0012073-Schurz1] was on the brain reflection of a length by lexicality (familiar vs. unfamiliar letter strings) interaction, pseudohomophones were deleted and this was also done in the present study. However, there is little reason to suspect that the difficulty of pseudohomophones does affect processing of pseudowords on which -- together with words -- the present analyses are based. Importantly, the phonological instruction (i.e., "Does xxx sound like a real word?") and the presence of the pseudohomophones prevent that NO responses to pseudowords are simply based on orthographic (un)familiarity.
Each item was presented for 1260 ms with an inter-stimulus interval of 1360 ms during which a fixation cross was shown. YES responses (for words and pseudohomophones) were given by button press with the right index finger and NO responses (for pseudowords) with the right middle finger.
[Table 4](#pone-0012073-t004){ref-type="table"} shows item characteristics for short and long words and pseudowords. As evident from the means, the critical length manipulation was close to identical for words and pseudowords in terms of number of letters, number of syllables, and bigram frequency. Short and long words were matched for frequency of occurrence in written and spoken language and in number of orthographic neighbors (same-length words differing by one letter) based on the CELEX database [@pone.0012073-Baayen1]. However, long pseudowords had fewer orthographic neighbors than short ones (Mann-Whitney *U* test: z-value = 4.94, *p*\<.001). In absolute terms, the difference was small (1 neighbor) and very small compared to orthographic neighborhood size differences used in studies which found a neighborhood size effect on brain activation (e.g., [@pone.0012073-Binder1], [@pone.0012073-Fiebach1]). Importantly, the smaller number of orthographic neighbors of long compared to short pseudowords should have made the correct NO response easier. This effect could only have been very small as long pseudowords led to less correct NO responses than short ones in both groups as the combined accuracy percentages were 86% and 81% for short and long pseudowords, respectively. Furthermore, as evident from [Table 1](#pone-0012073-t001){ref-type="table"}, latencies of NO responses were substantially prolonged for long compared to short pseudowords.
10.1371/journal.pone.0012073.t004
###### Means and standard deviations of item characteristics.
{#pone-0012073-t004-4}
Short words Long words Short pseudowords Long pseudowords
------------------------ --------------- --------------- ------------------- ------------------
Number of letters 4.5 (0.6) 7.5 (1.2) 4.5 (0.6) 7.5 (1.1)
Number of syllables 1.3 (0.5) 2.1 (0.6) 1.3 (0.5) 2.2 (0.6)
Frequency per million 1.2 (0.7) 1.2 (0.6) \- \-
Coltheart\'s Neighbors 1.3 (1.1) 1.3 (1.5) 1.3 (1.7) 0.4 (0.8)
Bigram frequency 18638 (18088) 79972 (37815) 15463 (15928) 66639 (38876)
A fast event-related design was used to investigate the hemodynamic response to the different types of stimuli. In order to avoid that a participant had to evaluate both, a base-word and its pseudohomophone, participants were presented one of two item sequences which were designed such that for each word-pseudohomophone pair, one sequence contained the base-word and the other its pseudohomophone. Each of these sequences included only 90 items per category (45 short and 45 long ones). Presentation of the items was divided into 3 runs (90 items each) with each run additionally containing 25 null-events with a fixation cross in the middle of the screen. The runs were separated by short breaks. The order of items and null-events within each run was determined by a genetic algorithm [@pone.0012073-Wager1] which selects the most efficient sequence for testing stimulus contrasts. The stimulus onset asynchrony of 2620 ms is not a multiple of the TR of 2200 ms which enhances the efficiency of sampling the hemodynamic response at different time points. Before the experiment started, practice trials were used to familiarize participants with the task. Stimulus delivery and response registration was controlled by Presentation (Neurobehavioral Systems Inc., Albany, CA, USA).
Image acquisition and analysis {#s4c}
------------------------------
Data were obtained with a Philips Gyroscan NT 1.5 Tesla scanner (Philips Medical Systems Inc., Maastricht, the Netherlands). Functional images sensitive to blood oxygen level dependent (BOLD) contrast were acquired with a T2\* weighted gradient echo EPI sequence (TR 2200 ms, TE 45 ms, matrix 64×64 mm, FOV 220 mm, Flip Angle 90°). 25 Slices with a slice thickness of 5 mm and a slice gap of 0.7 mm were acquired within the TR. Scanning proceeded in 3 sessions with 146 scans per session. In addition, a high resolution (1×1×1.2 mm) structural scan was acquired from each participant with a T1 weighted MPRAGE sequence. For preprocessing and statistical data analysis, SPM5 software was used (<http://www.fil.ion.ucl.ac.uk/spm>) running in a MATLAB 6.5 environment (Mathworks Inc., Sherbon MA, USA). Functional images were realigned and unwarped, slice time corrected and then coregistered to the high resolution structural image. The structural image was normalized to the MNI T1 template image, and the resulting parameters were used for normalization of the functional images, which were resampled to isotropic 3×3×3 mm voxels and smoothed with a 6 mm FWHM Gaussian kernel.
Statistical analysis was performed in a two stage mixed effects model. In the subject-specific first level model, each stimulus onset was modeled by a canonical hemodynamic response function and its temporal derivative. Only correctly answered trials were included in the analysis. The incorrect answers and missed trials were modeled as covariates of no interest. The functional data in these first level models were high pass filtered with a cut-off of 128 seconds and corrected for autocorrelation by an AR(1) model [@pone.0012073-Friston1]. In these first-level models the parameter estimates reflecting signal change for short words vs. fixation baseline (which consisted of the interstimulus interval and the null events), long words vs. fixation, short pseudowords vs. fixation, and long pseudowords vs. fixation were calculated in the context of a GLM [@pone.0012073-Henson1]. These subject-specific contrast images were used for the second level random effects analysis. Within-group contrasts (words vs. fixation, pseudowords vs. fixation) were examined by *t*-tests thresholded at *p*\<.05 (corrected for multiple comparisons using the family-wise error rate) at the voxel-level combined with a minimum cluster extent threshold of at least 20 voxels. To reduce the multiple comparisons problem, these regions were used as masks to search for group differences. The group contrasts were thresholded at *p*\<.005 (uncorrected) at the voxel-level combined with the same cluster extent threshold of 20 voxels as the within-group contrasts.
We are grateful to the members of the Department of Radiology for their assistance. We would also like to thank Johannes Klackl for help with data analysis, and Julia Sophia Crone and Manuela Luber for proofreading the manuscript.
**Competing Interests:**The authors have declared that no competing interests exist.
**Funding:**This research was supported by grants of the Austrian Science Foundation (<http://www.fwf.ac.at>), grant number P18832-B02, and the European Union\'s 6th Framework Programme (<http://ec.europa.eu/research/fp6>), project NEURODYS. The funders had no role in study design, data collection and analysis, decision to publish, or preparation of the manuscript.
[^1]: Conceived and designed the experiments: FR DS MS MK GL HW. Performed the experiments: FR DS MS MK. Analyzed the data: FR DS MS MK. Wrote the paper: FR HW.
|
The Wind in the Willows (1987 film)
The Wind in the Willows is a 1987 American animated musical television film directed by Arthur Rankin, Jr. and Jules Bass. It is an adaptation of The Wind in the Willows by Kenneth Grahame. Set in a pastoral version of England, the film focuses on four anthropomorphised animal characters (Moley, Ratty, Mr. Toad, and Mr. Badger) and contains themes of mysticism, adventure, morality, and camaraderie. The film features the voices of Charles Nelson Reilly, Roddy McDowall, José Ferrer, and Eddie Bracken. The screenplay was written by Romeo Muller, a long-time Rankin/Bass writer whose work included Rudolph the Red-Nosed Reindeer, The Hobbit, and The Flight of Dragons, among others.
This was the last project produced by Rankin/Bass Animated Entertainment. The film was finished in 1985, but its television premiere was delayed several times, before finally airing July 5, 1987 on ABC. In this version the horse pulling the barge is the same horse who pulls Mr. Toad's caravan, Portly is Badger's nephew, and The Piper at the Gates of Dawn and Wayfarer's All chapters are included, although the events of Wayfarer's All occurs before the events of The Piper at the Gates of Dawn, and Ratty actually leaves the Riverbank, only to be found later by Mole (alongside Portly).
Plot
The "well-known and popular" Mr. Toad of Toad Hall (voice of Charles Nelson Reilly), a conceited and impulsive animal, embarks on a madcap river voyage in a paddleboat, nearly shipwrecking his friend Ratty (voice of Roddy McDowall) who is out for a leisurely row. At the same time, Toad whelms the entrance to the subterranean home of Moley (voice of Eddie Bracken). So disturbed, Moley comes above ground for the first time in his life, and is positively amazed by the surface world. At once he meets Ratty, who invites him to come along on his river cruise ("Wind in the Willows"). All too soon, Toad returns and recklessly overturns Ratty's boat, nearly drowning Moley, but Ratty saves him and pushes him along to shore.
Ratty resolves to have it out with Toad, and he and Moley paddle down the river together ("Messing Around in Boats"). On the way downriver to Toad Hall, they pass Badger (voice of Jose Ferrer), who is tending his land on the riverbank. Despite their friendly greetings, Badger gruffly reminds them that he is not the most social of animals and retreats. At Toad Hall, Ratty and Moley find that Toad (true to his form) has tired of boating and instead developed an appetite for overnight wagoneering. Not one to take no for an answer, Toad invites them to come along on his first trip, but Moley and Ratty find that he has planned the journey terribly, including forgetting to pack any food ("We Don't Have Any Paté de Foie Gras"). Toad shrugs off the criticism. The next day, their wagon is almost wrecked by a passing motorcar while the horse runs away and gets lost, inspiring Toad to forget wagoneering and turn his undivided attention to motoring. Within days of buying his first car ("Messing Around in Cars"), his reckless driving demolishes it ("Mr. Toad").
Nearing winter, Moley wishes to visit Badger in spite of Ratty's remonstrations. While Ratty dozes, Moley slips out to brave the Wild Wood and attempt to call on Badger. But as he walks through the Wild Wood, his imagination gets the better of him; perceiving evil faces in the trees all around him, he is frightened into hiding. Ratty eventually finds him, but heading for home, they lose their way in falling snow. By pure chance they happen upon Badger's front door, and although Badger is at first annoyed by their call ("I Hate Company"), he has a change of heart and welcomes them in when he recognises them as friends.
Badger hears of Toad's automotive antics from Ratty and Moley and resolves to do something about it come spring. When Toad still refuses to listen to reason after a quite intense confrontation with an accompanying thunderstorm, Badger orders him locked in his bedroom until he comes to his senses. Nonetheless, Toad still longs for the open road ("Messing Around in Cars Reprise"), and tricks Ratty into leaving him alone in the house. He secretly escapes his exile, makes his way to a nearby village and promptly makes off with another motorcar, which he just as promptly wrecks. After insulting a responding police officer, Toad is taken to court and sentenced to 20 years in prison ("Guilty!") for his offenses.
Fortunately for Toad, the warden's daughter takes pity on him and helps him escape in the guise of a washerwoman. At first hitching a ride on a train, Toad finds the police in hot pursuit but is aided in his getaway by the engine driver. His next reprieve comes from a barge woman, but when he bungles a load of laundry, he angrily reveals himself to the barge woman and finds himself back on the road with his old caravan horse. There he encounters the very same motorcar whose theft landed him in prison; but in his disguise he fools the owners into letting him drive again. Lesson still not learned, he loses control of the car and barely survives.
In the meantime, Ratty, unaware of Toad's escape, writes him a letter detailing the takeover of Toad Hall by Wild Wood animals, principally weasels. While describing the ruin wrought on Toad Hall ("A Party That Never Ceases"), Ratty hears the news about Toad from Badger. Not long thereafter, an old wayfarer visits Ratty and tells him all about the world beyond the riverbank. Overcome with wanderlust, Ratty follows him, but aborts his adventure when he finds Badger's young nephew Portly lost in the woods. Moley finds them at the same time as Badger finds Toad washed up on the riverbank, ostensibly with the help of a mystical wood-spirit called Pan.
As part of the scheme to retake Toad Hall, Moley calls upon the stoats guarding the gate, using Toad's washerwoman disguise. He vastly exaggerates the battle plan, fooling the stoats into thinking that overwhelming forces are advancing on Toad Hall. That night, Badger, Ratty, Moley and Toad sneak into Toad Hall via an old secret tunnel. Aided by the fear of Moley's warning, they deceive the weasels into surrendering and successfully reclaim Toad Hall. Even though he has won the day, Toad acknowledges that his experiences have done away with his conceit and ignorance ("Mr. Toad Reprise"). He openly adopts a new philosophy of charity and friendship before Badger, Moley, and Ratty, assuring his friends that he has changed for better. However, it is implied that, as with all his previous interests, he will somehow take his newfound interest in philanthropy too far.
Soundtrack
Wind in the Willows- Judy Collins
Messing Around in Boats- Roddy McDowall
We Don't Have Any Pate de Foie Gras- Roddy McDowall and Eddie Bracken
Messing Around in Cars- Charles Nelson Reilly
Mr. Toad- Charles Nelson Reilly
I Hate Company- José Ferrer, Roddy McDowall, and Eddie Bracken
Messing Around in Cars reprise
Guilty!- Robert McFadden and Trial Chorus
A Party That Never Ceases- Weasels Chorus
Mr. Toad reprise- Charles Nelson Reilly and Chorus
Wind in the Willows- instrumental
Cast
Charles Nelson Reilly .... Mr. Toad (voice)
Roddy McDowall .... Ratty (voice)
José Ferrer .... Mr. Badger (voice)
Eddie Bracken .... Moley (voice)
Paul Frees .... Wayfarer (voice)
Robert McFadden .... Magistrate (voice)
Ray Owens .... Clerk of the Court (voice)
Gerry Matthews .... Jailer (voice)
Ron Marshall .... (voice)
Alice Tweedie .... Washerwoman (voice)
Jeryl Jagoda .... (voice)
External links
See also
The Wind in the Willows (1983 film)
Wind in the Willows (1988 film)
The Wind in the Willows (1995 film)
The Wind in the Willows (1996 film)
The Wind in the Willows (1999 film)
Category:1987 films
Category:1987 animated films
Category:1980s American animated films
Category:1980s musical films
Category:American films
Category:Animated musical films
Category:Films scored by Maury Laws
Category:Animated films based on children's books
Category:Animated films about reptiles and amphibians
Category:Films about rats
Category:Films about badgers
Category:Films based on The Wind in the Willows
Category:Films directed by Arthur Rankin Jr.
Category:Films directed by Jules Bass
Category:Films featuring anthropomorphic characters
Category:Rankin/Bass Productions films
Category:Animated films based on novels
Category:1980s children's animated films
Category:Films with screenplays by Romeo Muller
|
"The key to executing a successful multichannel campaign is to know your audience, help them rather than sell to them and create meaningful content that shares the brand story appropriately across channels."
Product news
Auriga Laboratories, a specialty pharmaceutical company announced the launch of Coraz Lotion (hydrocortisone lotion USP, 2%) indicated for the relief of the inflammatory and pruritic manifestations of corticosteroid-responsive dermatoses, such as Seborrheic Dermatitis.
Next Article in Channel
Did you miss January's Top 40 Healthcare Transformers
issue? Read how these inventors, strategists, entrepreneurs and wonks are challenging, disrupting and otherwise transforming the healthcare business. And join us April 30 to honor them at the Transforming Healthcare Dinner. Click here.
|
The Biggest Red Flag for Credit Card Companies
Credit card companies make for great investments so long as they avoid the urge to grow at the expense of credit quality.
It's important to keep in mind that credit card loans are the riskiest types of loans a lender can make. In this year's stress test, for example, the Federal Reserve estimated that 13% of all credit card loans would default in a "severely adverse" economic downturn akin to the financial crisis. As you can see in the chart below, this is dramatically worse than any other loan category.
Continue Reading Below
Given this, it should come as no surprise that credit card companies were projected by the Fed to experience the largest loan loss rates among their financial industry peers if the economy turned south. Discover Financial was projected to lose 12.2% of its loan portfolio, Capital One came in at 10.8%, and American Express followed closely behind at 9.2%.
By contrast, traditional lenders were projected to lose roughly half as much across a diverse array of loan portfolios. According to the Fed, US Bancorpand Wells Fargowould lose somewhere along the lines of 6.5% and 5.8% of their total loan portfolios, respectively, given the same economic scenario.
This doesn't mean investors should avoid credit card companies altogether. Doing so would be a mistake, as companies like American Express have handily outperformed the market over the long-run. Since the mid-1990s, for instance, American Express's shares have returned a total of 1,250%. That's leaps and bounds ahead of the KBW Bank Index, which has experienced a decline over the same period.
What it does mean, however, is that investors need to be careful about which credit card companies to invest in. The trick is to identify the ones that have a history of surviving, and even thriving, throughout past economic downturns. This serves as potent evidence that they'll be able to do so again.
There are any number of ways to do this, however, the most straightforward approach is to examine the earnings of credit card companies throughout the financial crisis. By doing so, one clear winner stands out: American Express.
Advertisement
Among the major credit card companies that aren't simply payment processors like Visa and MasterCard, American Express was the only one to avoid losing money even at the nadir of the crisis. Discover Financial reported a $104 million net loss in the first quarter of 2010, and Capital One lost $1.4 billion in the fourth quarter of 2008.
These performances speak volumes about the risk management acumen of the three companies, and American Express in particular. They also reveal why Warren Buffett has long been an American Express shareholder. In short, any company that can generate double-digit yields on a loan portfolio when times are good without giving too much of that back when the credit cycle turns is a company that's worthy of investors' respect.
John Maxfield has no position in any stocks mentioned. The Motley Fool recommends American Express, MasterCard, Visa, Bank of America, Apple, and Wells Fargo. The Motley Fool owns shares of Capital One Financial., Apple, Bank of America, Discover Financial Services, MasterCard, Visa, and Wells Fargo and has the following options: short April 2015 $57 calls on Wells Fargo and short April 2015 $52 puts on Wells Fargo. Try any of our Foolish newsletter services free for 30 days. We Fools may not all hold the same opinions, but we all believe that considering a diverse range of insights makes us better investors. The Motley Fool has a disclosure policy.
|
Victoria Cup 2016 – Road to Victory
Victoria Cup 2015 – Synergy in Competition
In 23 May 2015, the Victoria Cup was once again being held and it took ‘synergy in competition’ as the theme of the event. The purpose of this event was to maintain the atmosphere of cohesiveness and partnership between PPIA Victoria and its sub-branches in Victoria area. Furthermore, the Victoria Cup also can be utilized by student who owns passion and interest in sport as an arena to show their skills in the sports game that were conducted based on ‘fair play’ concept.
The following PPIA branches that joined the Victoria Cup were: PPIA Holmes Institute, PPIA William Angliss, PPIA Monash, PPIA RMIT, PPIA Swinburne, PPIA Melbourne University, PPIA Deakin and PPIA La Trobe. There are three types of sport that being contested in the event, which were futsal, basketball and also badminton. Those three categories were conducted in three phase; the knockout phase, semifinal and final. Other than futsal, female athletes were participating in basketball and badminton competition. Moreover, the futsal and basketball players who showed an outstanding effort during the competition were given a Most Valuable Player (MVP) award.
The badminton competition was held in double-men, single-men and single-women categories. The first place for the double-men category was occupied by Valen and Andi who act as the representative of PPIA Melbourne University while Andi and Khrisna, which also came from PPIA Melbourne University gained the second place. Then, the third place was given to the representative of PPIA La Trobe University; Kevin and Wahyu. In the single-women category, Claudia from PPIA Melbourne University clinched the first place and followed by Evelyn from PPIA RMIT University in the second place. While in the single-man category, the first winner was obtained by Reynard from PPIA Melbourne University and followed by Andre from PPIA RMIT University in the second place.
In women basketball competition, the PPIA RMIT University were crowned as the first winner after defeating the PPIA Melbourne University team. While in the men basketball competition, the first place was gained by PPIA RMIT University A. Then, following in the second and third place were PPIA Melbourne University and Monash University team. Furthermore, Teddy, the player from PPIA RMIT University A team was being named as the Most Valuable Player of the 2015 basketball competition in Victoria Cup.
Moving to the futsal competition, PPIA Melbourne University team was named as the first winner following the win against the team A from PPIA RMIT University. Then, the third place were occupied by the PPIA Holmes Institute team. The Most Valuable Player title for futsal competition was given to Richie Masrin from PPIA Holmes Institute. This year, the event was running successfully. Furthermore, the 2015 Victoria Cup also being supported by PPIA Williams-Angliss Institute, who provided some Indonesian traditional snacks such as risoles, pisang coklat, martabak, toasted bread and etc. Moreover, the PPIA RMIT University also won a back-to-back best supporter award after they also won this category in the 2014 Victoria Cup.
Upon the successfulness of the Victoria Cup 2015, PPIA Victoria would like to send its biggest gratitude and congratulation toward all the winners and participants. We also would like to apologize if there were any mistakes or uncomfortable situation occurred during the event. See you again next year in Victoria Cup 2016!
To view the photo gallery of Victoria Cup 2015, please click the following link.
|
Management of nodules with initially nondiagnostic results of thyroid fine-needle aspiration: can we avoid repeat biopsy?
To identify demographic and ultrasonographic (US) features associated with malignancy after initially nondiagnostic results of fine-needle aspiration (FNA) to help clarify the role of repeat FNA, surgical excision, or serial US in these nodules. This study was HIPAA compliant and institutional review board approved; informed consent was waived. Thyroid nodules (n = 5349) that underwent US-guided FNA in 2004-2012 were identified; 393 were single nodules with nondiagnostic FNA results but adequate cytologic, surgical, or US follow-up. Demographic information and diameters and volume at US at first biopsy were modeled with malignancy as outcome through medical record review. Exact logistic regression was used to model malignancy outcomes, demographic comparisons with age were made (Student t test, Satterthwaite test), and proportion confidence intervals (CIs) were estimated (Clopper-Pearson method). Of 393 nodules with initially nondiagnostic results, nine malignancies (2.3%) were subsequently diagnosed with repeat FNA (n = 2, 0.5%) or surgical pathologic examination (n = 7, 1.8%), 330 (84.0%) were benign, and 54 (13.7%) were stable or decreased in size at serial US (mean follow-up, 3.0 years; median, 2.5 years; range, 1.0-7.8 years). Patients with malignancies were significantly older (mean age, 62.7 years; median, 64 years; range, 47-77 years) than those without (mean age, 55.4 years; median, 57 years; range, 12-94 years; P = .0392). Odds of malignancy were 4.2 times higher for men versus women (P = .045) and increased significantly for each 1-cm increase in anteroposterior, minimum, and mean nodule diameter (1.78, 2.10, and 1.96, respectively). In 393 nodules, no malignancies were detected in cystic or spongiform nodules (both, n = 11, 2.8%; 95% CI: 1.4%, 5.0%), nodules with eggshell calcifications (n = 9, 2.3%; 95% CI: 1.1%, 4.3%), or indeterminate echogenic foci (n = 39, 9.9%; 95% CI: 7.2%, 13.3%). Very few malignancies were diagnosed with repeat FNA following nondiagnostic FNA results (two of 336, 0.6%); therefore, clinical and US follow-up may be more appropriate than repeat FNA following nondiagnostic biopsy results.
|
Blazor 0.2.0 release now available
Daniel
April 17th, 2018
Just a few weeks ago we announced the first preview release of an experimental web UI framework called Blazor. Blazor enables full-stack web development using C# and WebAssembly. So far thousands of web developers have taken on the challenge to try out Blazor and done some pretty remarkable things:
The feedback and support from the community has been tremendous. Thank you for your support!
Today we are happy to announce the release of Blazor 0.2.0. Blazor 0.2.0 includes a whole bunch of improvements and new goodies to play with.
New features in this release include:
Build your own reusable component libraries
Improved syntax for event handling and data binding
Build on save in Visual Studio
Conditional attributes
HttpClient improvements
A full list of the changes in this release can be found in the Blazor 0.2.0 release notes.
Many of these improvements were contributed by our friends in the community, for which, again, we thank you!
You can find getting started instructions, docs, and tutorials for this release on our new documentation site at http://blazor.net.
Get Blazor 0.2.0
To get setup with Blazor 0.2.0:
Install the .NET Core 2.1 Preview 2 SDK. If you've installed the .NET Core 2.1 Preview 2 SDK previously, make sure the version is 2.1.300-preview2-008533 by running dotnet --version . If not, then you need to install it again to get the updated build. Install the latest preview of Visual Studio 2017 (15.7) with the ASP.NET and web development workload. You can install Visual Studio previews side-by-side with an existing Visual Studio installation without impacting your existing development environment. Install the ASP.NET Core Blazor Language Services extension from the Visual Studio Marketplace.
To install the Blazor templates on the command-line:
dotnet new - i Microsoft .AspNetCore .Blazor .Templates
Upgrade a Blazor project
To upgrade an existing Blazor project from 0.1.0 to 0.2.0:
Install all of the required bits listed above
Update your Blazor package and .NET CLI tool references to 0.2.0
Update the package reference for Microsoft.AspNetCore.Razor.Design to 2.1.0-preview2-final.
to 2.1.0-preview2-final. Update the SDK version in global.json to 2.1.300-preview2-008533
to For Blazor client app projects, update the Project element in the project file to <Project Sdk="Microsoft.NET.Sdk.Web">
element in the project file to Update to the new bind and event handling syntax
Your upgraded Blazor project file should look like this:
< Project Sdk = "Microsoft.NET.Sdk.Web" > < PropertyGroup > < TargetFramework > netstandard2.0 </ TargetFramework > < RunCommand > dotnet </ RunCommand > < RunArguments > blazor serve </ RunArguments > </ PropertyGroup > < ItemGroup > < PackageReference Include = "Microsoft.AspNetCore.Razor.Design" Version = "2.1.0-preview2-final" PrivateAssets = "all" /> < PackageReference Include = "Microsoft.AspNetCore.Blazor.Browser" Version = "0.2.0" /> < PackageReference Include = "Microsoft.AspNetCore.Blazor.Build" Version = "0.2.0" /> < DotNetCliToolReference Include = "Microsoft.AspNetCore.Blazor.Cli" Version = "0.2.0" /> </ ItemGroup > </ Project >
Build reusable component libraries
Blazor components are reusable pieces of web UI that can maintain state and handle events. In this release we've made it easy to build reusable component libraries that you can package and share.
To create a new Blazor component library:
Install the Blazor templates on the command-line if you haven't already dotnet new - i Microsoft .AspNetCore .Blazor .Templates Create a new Blazor library project dotnet new blazorlib -o BlazorLib1 Create a new Blazor app so we can try out our component. dotnet new blazor -o BlazorApp1 Add a reference from the Blazor app to the Blazor library. dotnet add BlazorApp1 reference BlazorLib1 Edit the home page of the Blazor app ( /Pages/Index.cshtml ) to use the component from the component library. @addTagHelper *, BlazorLib1 @using BlazorLib1 @page "/" <h1>Hello, world!</h1> Welcome to your new app. <SurveyPrompt Title= "How is Blazor working for you?" /> <Component1 /> Build and run the app to see the updated home page cd BlazorApp1 dotnet run
JavaScript interop
Blazor apps can call browser APIs or JavaScript libraries through JavaScript interop. Library authors can create .NET wrappers for browser APIs or JavaScript libraries and share them as reusable class libraries.
To call a JavaScript function from Blazor the function must first be registered by calling Blazor.registerFunction . In the Blazor library we just created exampleJsInterop.js registers a function to display a prompt.
Blazor.registerFunction( 'BlazorLib1.ExampleJsInterop.Prompt ', function (message) { return prompt(message, 'Type anything here'); });
To call a registered function from C# use the RegisteredFunction.Invoke method as shown in ExampleJsInterop.cs
public class ExampleJsInterop { public static string Prompt ( string message ) { return RegisteredFunction.Invoke< string >( "BlazorLib1.ExampleJsInterop.Prompt" , message); } }
In the Blazor app we can now update the Counter component in /Pages/Counter.cshtml to display a prompt whenever the button is clicked.
BlazorLib1 "/counter" <h1> Counter </h1> <p> Current count: <button onclick="@IncrementCount"> Click me </button> { int currentCount = 0; void IncrementCount() { currentCount++; ExampleJsInterop.Prompt( "+1!" ); } }
Build and run the app and click the counter button to see the prompt.
We can now package our Blazor library as a NuGet package and share it with the world!
cd ../BlazorLib1 dotnet pack
Improved event handling
To handle events Blazor components can register C# delegates that should be called when UI events occur. In the previous release of Blazor components could register delegates using a specialized syntax (ex <button @onclick(Foo)> or <button onclick=@{ Foo(); }> ) that only worked for specific cases and for specific types. In Blazor 0.2.0 we've replaced the old syntax with a new syntax that is much more powerful and flexible.
To register an event handler add an attribute of the form on[event] where [event] is the name of the event you wish to handle. The value of the attribute should be the delegate you wish to register preceded by an @ sign. For example:
<button onclick= "@OnClick" /> { void OnClick (UIMouseEventArgs e) { Console.WriteLine( "hello, world" ); } }
or using a lambda:
< button onclick = "@(e => Console.WriteLine(" hello, world "))"
If you don't need access to the UIEventArgs in the delegate you can just leave it out.
<button onclick= "@OnClick" /> { void OnClick () { Console.WriteLine( "hello, world" ); } }
With the new syntax you can register a handler for any event, including custom ones. The new syntax also enables better support for tool tips and completions for specific event types.
The new syntax also allows for normal HTML style event handling attributes. If the value of the attribute is a string without a leading @ character then the attribute is treated as normal HTML.
For some events we define event specific event argument types (ex UIMouseEventArgs as shown above). We only have a limited set of these right now, but we expect to have the majority of events covered in the future.
Improved data binding
Data binding allows you to populate the DOM using some component state and then also update the component state based on DOM events. In this release we are replacing the previous @bind(...) syntax with something more first class and that works better with tooling.
To create setup a data binding you use the bind attribute.
<input bind= "@CurrentValue" /> @ function s { public string CurrentValue { get ; set ; } }
The C# expression provided to bind should be something that can be assigned (i.e. an LValue).
Using the bind attribute is essentially equivalent to the following:
<input value="@CurrentValue" onchange="@((UIValueEventArgs __e) => CurrentValue = __e.Value)/> @ functions { public string CurrentValue { get; set; } }
When the component is rendered the value of the input element will come from the CurrentValue property. When the user types in the text box the onchange is fired and the CurrentValue property is set to the changed value. In reality the code generation is a little more complex because bind deals with a few cases of type conversions. But, in principle, bind will associate the current value of an expression with a value attribute, and will handle changes using the registered handler.
Data binding is frequently used with input elements of various types. For example, binding to a checkbox looks like this:
<input type = "checkbox" bind= "@IsSelected" /> @ function s { public bool IsSelected { get ; set ; } }
Blazor has a set of mappings between the structure of input tags and the attributes that need to be set on the generated DOM elements. Right now this set is pretty minimal, but we plan to provide a complete set of mappings in the future.
There is also limited support for type conversions ( string , int , DataTime ) and error handling is limited right now. This is another area that we plan to improve in the future.
Binding format strings
You can use the format-... attribute to provide a format string to specify how .NET values should be bound to attribute values.
<input bind= "@StartDate" format- value = "MM/dd/yyyy" /> @functions { public DateTime StartDate { get ; set ; } }
Currently you can define a format string for any type you want … as long as it's a DateTime ;). Adding better support for formating and conversions is another area we plan to address in the future.
Binding to components
You can use bind-... to bind to component parameters that follow a specific pattern:
@* in Counter.cshtml *@ <div>...html omitted for brevity...</div> @functions { public int Value { get ; set ; } = 1 ; public Action< int > ValueChanged { get ; set ; } } @* in another file *@ <Counter bind-Value= "@CurrentValue" /> @functions { public int CurrentValue { get ; set ; } }
The Value parameter is bindable because it has a companion ValueChanged event that matches the type of the Value parameter.
Build on save
The typical development workflow for many web developers is to edit the code, save it, and then refresh the browser. This workflow is made possible by the interpreted nature of JavaScript, HTML, and CSS. Blazor is a bit different because it is based on compiling C# and Razor code to .NET assemblies.
To enable the standard web development workflow with Blazor, Visual Studio will now watch for file changes in your Blazor project and rebuild and restart your app as things are changed. You can then refresh the browser to see the changes without having to manually rebuild.
Conditional attributes
Blazor will now handle conditionally rendering attributes based on the .NET value they are bound to. If the value you're binding to is false or null , then Blazor won't render the attribute. If the value is true , then the attribute is rendered minimized.
For example:
<input type= "checkbox" checked = "@IsCompleted" /> @functions { public bool IsCompleted { get ; set ; } } @* if IsCompleted is true , render as : *@ <input type= "checkbox" checked /> @* if IsCompleted is false , render as : *@ <input type= "checkbox" />
HttpClient improvements
Thanks to a number of contributions from the community, there are a number of improvements in using HttpClient in Blazor apps:
Support deserialization of structs from JSON
Support specifying arbitrary fetch API arguments using the HttpRequestMessage property bag.
Including cookies by default for same-origin requests
Summary
We hope you enjoy this updated preview of Blazor. Your feedback is especially important to us during this experimental phase for Blazor. If you run into issues or have questions while trying out Blazor please file issues on GitHub. You can also chat with us and the Blazor community on Gitter if you get stuck or to share how Blazor is working for you. After you've tried out Blazor for a while please also let us know what you think by taking our in-product survey. Just click the survey link shown on the app home page when running one of the Blazor project templates:
Have fun!
|
2-octyl cyanoacrylate adhesive for conjunctival wound closure in rabbits.
To evaluate the efficacy and histology of 2-octyl cyanoacrylate in conjunctival wound closure in rabbits. Ten eyes of 10 New Zealand white rabbits were used. Eight rabbits had conjunctival wounds that were repaired with 2-octyl cyanoacrylate. Two rabbits were killed at 1 week and two rabbits were killed at 2 weeks and their conjunctivae were examined histologically. From two additional rabbits, conjunctival strips were obtained that underwent tensile strength testing. All conjunctival wounds closed well with 2-octyl cyanoacrylate. Histology revealed minimal inflammation of the wounds. The tensile strength of conjunctival strips glued together was 25.5 g (standard deviation, 1.9 g). 2-Octyl cyanoacrylate may be a possible tissue adhesive for conjunctival wound closure.
|
Q:
Passed anonymous callback function detected as undefined
The next() function in the code below passes an anonymous function to the position() function. The position() function positions the bubble(sort of a lightbox) in the DOM and at the end of the execution, it calls the anonymous function, which in turn, shows the bubble. Any idea why my anonymous function is undefined?
;(function ($) {
Bubble = {
init: function() {
$('.bubble:not(:first)').hide();
$(document).on('click', '.next', Bubble.next);
},
next: function() {
$('.bubble').next().addClass('current');
Bubble.position(function(){
$('.current').fadeIn();
});
},
position: function(callback) {
$('.current').css({ /**/ });
callback(); // Console shows that 'callback' is undefined
}
}
$(function() {
Bubble.init();
});
})(jQuery);
A:
try this. Might b this solves your problem.
if($.isFunction(callback)){
callback.apply();
}
|
Alfred Nobel University
Alfred Nobel University, Ukraine () is a higher educational institution with the IV level of accreditation.
It is committed to enhancing innovative technologies in teaching and it helps to strengthen the country's position in the international arena, which is reflected in its mission.
The university creates up-to-date education and scientific values that correspond to the demands of the 21st century and are geared towards dynamic development of the economy and society, towards European and global integration of Ukraine.
History
Alfred Nobel University was founded in 1993 as a private higher education institution with a focus on management and economics. Until 2010, it was known as "University of Economics and Law, Dnipropetrovsk". From the start, it was the central mission of DUAN to meet the demands of the Ukrainian labour market – especially small and medium-size enterprises – for qualified personnel with a background in Management, Economics and Law and additional skills required in a competitive and possibly multinational business environment. Since its foundation, the university has continuously expanded its portfolio of study programmes: currently, 16 Bachelor programmes and 18 Master programmes are on offer, including an MBA programme for professionals, as well as a smaller number of doctoral and postdoctoral programmes.
In October, 2010 the university was renamed in honour of Alfred Nobel — the founder of the Nobel Prize — for a weighty contribution to promoting Nobel movement in Ukraine through holding events connected with spreading Nobel ideas and became Alfred Nobel University.
In recent years, university has focused particularly on introducing programmes beyond the disciplinary boundaries of Economics and Law, such as Psychology, Political Studies and Social Work.
In the year 2015-16, about 3.400 students were enrolled at Alfred Nobel University, about 20% of who study at Master's level.
In total, the number of faculty amounts to about 150 persons, including full- and part-time teachers.
The large majority of DUAN students is recruited from the city of Dnipro or the surrounding area. Most graduates find employment on the local market.
International Nobel Congresses
International Nobel Congresses have been held at Alfred Nobel University since 2008.
The First Nobel Economic Forum "The Global Economy of the XXI century: Cycles and Crises" was held on 11–13 September 2008 and welcomed more than one hundred participants from different regions of Ukraine, Romania, Russia, the USA, Poland. In the course of four plenary sessions and two workshop sessions participants discussed global issues of cyclical development, the forecast of the development of world civilization up to 2050, the transformation of economic, social and cultural dimensions, philosophy of modern society and the human factor in economic development, globalization and regionalism etc.
The Second Nobel International Economic Forum "The World Economy in the XXI Century: Cycles and Crises" held on 19–22 May 2010 was devoted to general problems, determined by the motto: Innovation as a basis for overcoming the global crisis. Its goals were attracting young people to research the economies of countries on the basis of the work of Nobel laureates, forging real creative contacts between young researchers from around the world. The forum combined the intellectual efforts of over 200 participants from all over Ukraine, as well as the CIS and foreign countries: Russia, Poland, the USA, Germany, Austria, Romania, Armenia, Italy, France, Spain, Oman and other countries. The central question of the forum was the problem of using fundamental innovations as a basis for overcoming the consequences of the economic crisis in the context of the ideas of Friedrich von Hayek, Nobel Laureate in Economics in 1974.
The Third Nobel International Economic Forum was held in 2012. Its plenary sessions and sections were devoted to the discussion of the pressing topic "The Role of Economic Science in Forming National Strategies". The main speakers were Alexander Ermolaev director, National Institute of Strategic Studies under the president of Ukraine), Grzegorz Kołodko (former deputy prime minister of the Republic of Poland, professor of Economics, director of the Research Institute for "TIGER" Kozminski University, Warsaw), Max Alier (official representative of the IMF in Ukraine) and other leaders of national economic institutions and some of the world's most eminent economists, from Ukraine, Russia, Belarus, Kazakhstan, Romania, Poland, Montenegro".
The Fourth Nobel International Economic Forum was held in 2014. More than 120 scientists from nine countries (Kazakhstan, Belarus, Poland, Russia, Austria, Sweden, India, the USA and Ukraine) provided materials. The congress was divided in two areas: the real and virtual. In the virtual part was the transcontinental online workshop "Modern Education: Challenges of the cross-cultural communication" (Ukraine - USA) with Dr. J. Johnson (Walden University, USA), Dr. Svetlana Buko (Ukraine), and (over Skype ) Dr. Boyd Johnson (Illinois, USA). Events of this sseminar were important for students of international economics English programmes, as well as for other economic areas.
The Fifth International Nobel Congress devoted to “Peacebuilding and educational mission of Nobel Laureates in Modern Global Conditions” was held in 2016. The Congress started precisely on September 21 — the International Day of Peace — as its mission is to achieve peace-building and education goals. According to the decision of the university's Academic Council the ceremonial conferral of the title of and attributes of the emeritus professors of Alfred Nobel University took place on September 22, 2016 during the ceremony at the memorial park complex “Alfred Nobel Planet”. The title and attributes were awarded to His Excellency Gerardo Angel Bugallo Ottone, Ambassador Extraordinary and Plenipotentiary of the Kingdom of Spain to Ukraine, Professor Michael Nobel, philanthropist and entrepreneur, multi-year president of the Nobel Family Society, co-founder of the Nobel Charitable Trust (Sweden), as well as Dr. Bob Johnson, head of Independent Commission of the European Council for Business Education (ECBE).
Accreditation
ZEvA - Central Evaluation and Accreditation Agency (Germany)
ECBE
Programmes
English-medium programmes
Preparatory language course
Alfred Nobel University and The University of Occupational Safety Management in Katowice, Poland:
BA in English Philology
Alfred Nobel University & Cyprus Institute of Marketing:
BA in Marketing Management,
BA in Tourism Management,
BA in Financial Management and Computer technologies
Ukrainian-medium programmes
Preparatory language course, (Ukrainian, Russian)
Bachelor's degree (4 years)
Master's degree (1,5 years)
PhD programmes: Professional Education, Economics, Management, Entrepreneurship, Trading and Exchange activities
External links
Nobel Planet
Nobel Congresses
International Accreditation
University Publishing Office
Category:Universities in Ukraine
Category:Educational institutions established in 1993
Category:1993 establishments in Ukraine
Category:Alfred Nobel
|
The Senate amendment is not as muscular as the bipartisan legislation backed by the House, which was sponsored by Florida Congressman Alan Grayson, an aggressive progressive, and Texas Congressman Ron Paul, an equally agressive conservative with libertarian leanings. The Grayson-Paul bill authorizes audits by the Government Accountability Office of every item on the Federal Reserve’s balance sheet, including all credit facilities and all securities purchase programs; there would be exemption only for unreleased transcripts, minutes of closed-door meetings and the most recent decisions of the central bank. The Senate measure is narrower in its focus, but it would require the GAO to scrutinize some several trillion dollars in emergency lending that the Fed provided to big banks after the September, 2008, economic meltdown.
The actual amount of public money that has been set aside for private banks is not known. That’s one reason why this audit is so important. But there can be no doubt that the figure is astronomical. The Center for Media and Democracy’s Wall Street Bailout Tally shows that since 2008, the U.S. government has flooded Wall Street banks and financial institutions with $4.7 trillion dollars in taxpayer money, mostly in the form of loans from the Fed reserve. The Fed has never told us which firms got these loans and what type of collateral American taxpayers got in return. This will now be revealed. We will also get an accounting of the Fed’s “stealth” bailout of Fannie Mae and Freddy Mac.
Sanders tried to pass a broader amendment, but when he faced roadblocks—and the prospect that audit laguage might be excluded entirely from the final bill—he agreed to propose an amendment outlining the one-time audit of post-meltdown Fed activity. That did not sit well with all senators. Even as Republicans such as New Hampshire’s Judd Gregg tried to prevent any demand for transparency, Louisiana Republican David Vitter proposed tougher language along the lines what Grayson and Paul pushed through the House. While most Democrats and a number of Republicans opposed the tougher language, Sanders joined the most serious reformers in the Democratic caucus—Wisconsin’s Russ Feingold, Washington’s Maria Cantwell, North Dakota’s Byron Dorgan, Arkansas’s Blanche Lincoln, Virginia’s Jim Webb and Oregon’s Ron Wyden—in voting "yes."
The Vitter amendment failed on a 62-37 vote and Feingold was especially disappointed. "Unfortunately," the Wisconsin progressive declared, "the defeat of the Vitter amendment means American taxpayers will still not have a complete picture of how one of the most powerful government agencies makes policy and spends their tax dollars.”
3
4
5
Still, Feingold acknowledged that, "Senator Sanders’ amendment will mean more transparency for the Federal Reserve, so the public will have a better idea of how it is spending taxpayer dollars."
That transparency is consequential, noted Sanders.
“Let’s be clear,” he explained, “when trillions of dollars of taxpayer money are being lent out to the largest financial institutions in this country, the American people have a right to know who received that money and what they did with it. We also need to know what possible conflicts of interest exist involving the heads of large financial institutions who sat in the room helping to make those decisions.”
The "Audit the Fed" language that is included in the final legislation remains to be seen, as the differences between the House and Senate proposals will have to be reconciled by a conference committee.
That will provide an opening for Grayson, Paul, Sanders and their allies to push for the broadest possible transparency.
But, make no mistake, there will be pushback.
Fed Fed Chairman Ben Bernanke has repeatedly refused to respond to demands from Sanders and others for information about the banks that have been bailed out by the taxpayers—and that continue to pad their accounts with public dollars.
President Obama, Treasury Secretary Tim Geithner and their aides are critics of the "Audit the Fed" push, as well.
So why, with so much official opposition, did the "Audit the Fed" movement win a 96-0 vote in the Senate? Campaigners on the left and right made the issue a high priority. A good deal of credit must go to Sanders and Paul—long-time critics of the Fed who opposed the 2008 Wall Street bailouts and then steered anger at those bailouts toward the "Audit the Fed" movement—which was boosted on the left by websites such as Jane Hamsher’s Firedoglake and on the right by the Paul-linked Campaign for Liberty, as well as by outspoken economists such a Dean Baker and watchdog operations such as CMD’s BanksterUSA project.
Ultimately, however, much of the credit must go to Grayson, who embraced Paul’s proposal—which had languished in the House—and led the campaign to get Democrats to sign on to the bill. As Hamsher says, "Tremendous credit goes to Alan Grayson. It was Grayson who decided to take up Ron Paul’s bill and bring Democratic support for it. When Grayson had a tough time getting Dems to cosponsor anything with Michelle Bachman, FDL whipped liberal validators which allowed Grayson to say “don’t worry about Michelle Bachman, Jamie Galbraith says its a good thing.”
Sanders, who took some hits for compromising, also deserves credit at this point for making sure, even when he was forced to trim back on his amendment, that critical elements of the initial proposal by Paul—especially the defined role for the GAO—were retained. That will make it harder for the Obama White House and their allies in the congressional leadership to gut the audit language in the conference committee.
There will, as well, be additional fights.
“While passage of Senator Sanders’ amendment will provide some long overdue accountability and transparency for the Federal Reserve, the overall bill still needs a lot of work," said Feingold. "My test for this legislation is a simple one—whether or not it will prevent another financial crisis. While opening up the Fed is a good step to take, it does not solve that problem.
In particular, Feingold and other real reformers have focused on the need for the bill to restore the firewall between Main Street banks and Wall Street securities firms and insurance companies, which contributed to financial institutions growing “too big to fail.”
“For the last thirty years, Presidents and Congresses have consistently given in to Wall Street lobbyists and weakened essential safeguards,” says Feingold. “Members of both political parties are to blame. Legislation that paved the way for the creation of massive Wall Street entities and removed essential protections for our economy passed with overwhelming bipartisan support.”
While the bipartisan support for auditing the Fed represents a step in the right direction, Feingold is right when he says it is only one step on a long road toward addressing the way in which bad decisions by Congress "led to deregulation and the increased concentration of economic power and economic decision-making."
|
Chris Smith Running to Eliminate his Own Office
Orangetown Democrat Chris Smith believes one way to shrink government costs is to eliminate your own position.
Smith is running for the office of Orangetown receiver of taxes on the plan that he’s the man to help eliminate the position. He is supporting a referendum that residents and town board members are also backing to consolidate the position with the clerk’s office.
Smith said receiver of taxes would probably remain a full-time job for two years before becoming a part-time job and then merging into the clerk’s office. The young “up-and-coming” Democrat noted that in many counties the clerk of the town already is the receiver of taxes and there is no reason Clerk Charlotte Madigan’s office cannot handle it in Orangetown.
In the Town of Clarkstown a similar transition recently happened with a successful result.
There is support for the idea among the Orangetown Town Board, but what longtime receiver of taxes Bob Simon thinks remains to be seen. More on that in a future issue.
Smith explained, “The position of receiver of taxes unnecessarily costs taxpayers hundreds of thousands of dollars per year. In these tough economic times hard working Orangetown residents can no longer afford to fund redundant layers of bureaucracy. When I’m elected I’ll eliminate this office by having it absorbed by the town clerk, after voters approve a referendum in this year’s election.”
Orangetown Supervisor Andy Stewart is supporting Smith and he was among a crew of 50 or so Democrats who attended a fundraiser for the young aspirant held in Pearl River at Kwan Thai Restaurant this past weekend. Such luminaries as former town supervisor Thom Kleiner, Legislator Ilan Schoenberger, Sheriff Louis Falco, Chairwoman Kristen Stavisky, Senator David Carlucci, retired legislator Connie Coker, Clarkstown Councilwoman Stephanie Hausner, Assemblywoman Ellen Jaffee and many others were in attendance.
“I welcome all those who want to put people before politics to join me on the campaign trail, because I cannot do this alone. Together we will continue to make Orangetown a better place to live and raise a family,” Smith said in a statement released prior to the event.
Smith is a public relations professional, has helped run campaigns for local Democrats and is a former president of Rockland County Young Democrats.
|
Friday, March 23, 2012
California’s Endangered Charter Schools
But the union wolf is always at education's door in the Golden State, and in late January, the state assembly voted 45 to 28 to approve Assembly Bill 1172. Authored by state assemblyman and former teacher's union activist Tony Mendoza, and sponsored by the CTA, AB 1172 would allow local school boards to block the creation of a new charter school if it would have a "negative fiscal impact" on the school district. Trouble is, the bill doesn't clearly define what that means. California's charter law already provides several clearly defined reasons why new petitions may be denied. Mendoza's bill would only obscure the existing law. And besides, charter schools get less funding than traditional public schools. According to the nonpartisan California Legislative Analyst Office, new charters received $721 less per pupil in 2010-11 than traditional public schools. The bill currently awaits a vote from the state senate's rules committee.
AB 1172 doesn't merely threaten to kill new charters. Jed Wallace, president of the California Charter School Association, argues that hostile school districts could broadly construe "negative fiscal impact" as an excuse not to renew existing charter schools after the statutory five-year period. The only other way for a charter to be granted would be for an operator to appeal to a county board or the state board of education. But these entities don't have the manpower to take on all charter-authorization duties. Thus, if AB 1172 passes, the number of charter schools in California could plummet within a few years.
|
In a magnetic recording and reproducing device such as a tape recorder or a video tape recorder, a magnetic tape is run to be in sliding contact with a magnetic head so as to convert an electric signal to a magnetic signal or a magnetic signal to an electric signal.
However, if a magnetic recording and reproducing device such as mentioned above is continued to be utilized, foreign substances adhere to a sliding surface of the magnetic head, and decrease of reproduced signals occurs by the adhesion layer. The adhering foreign substances are a whited substance generated in accordance with sliding between the magnetic head and the magnetic tape, and are regarded as being mainly composed of oxides produced by adhesion and oxidation of silicone, which is present in a slight amount in air, by frictional heat at the time of sliding or by minute energy of static electricity.
Conventionally, such adhesion of foreign substances was not so large a problem; however, in recent years, according as the signal of the magnetic recording and reproducing device changes from analog to digital, or according as the recording density of the magnetic tape increases, the design precision of the magnetic head or the like is becoming severer, so that even if a minute foreign substance adheres to the magnetic head, it will have a large influence on the reading precision of the magnetic data.
Particularly, if a metal vapor deposition tape capable of high-density recording is used as the magnetic tape, the adhesion of foreign substances to the magnetic head will be much, and often has an influence on the data reading precision. This seems to be due to the fact that, since the magnetic head and the metal vapor deposition tape are both made of metal materials, the heat generated by friction is large, and the amount of generated oxide is large. For this reason, prevention or reduction of adhesion of foreign substances to the magnetic head is an objective to be achieved.
Restraint of the adhesion of oxides is disclosed also in Publication of Unexamined Japanese Patent Application No. 5-86005; however, the oxides herein referred to are a blacked substance produced by oxidation of an organic substance being present in air and having an unsaturated bond by an extremely large energy such as a spark at an electric contact point between a brush and a commutator, and degrade the electrical conduction state of the electric contact point. As compared with this blacked substance, the aforesaid whited substance is extremely smaller, and does not have a large influence on the electrical conductivity even if it is generated at the electric contact point, so that the problem caused by the whited substance is different from that caused by the blacked substance.
The object of the present invention is to provide a magnetic recording and reproducing device that can restrain the adhesion of foreign substances to the magnetic head.
|
Most Americans haven’t heard of the Media Foundation or its magazine Adbusters: Journal of the Mental Environment, but each day, more and more people get hit by one of its “mindbombs.” That’s what Kalle Lasn — editor of Adbusters and cofounder of the Media Foundation — calls the organization’s “subvertisements”: advertisements aimed at subverting consumer culture.
Nearly everyone is familiar with Joe Camel, the cartoon camel used by RJ Reynolds for ten years to sell cigarettes — especially to children, critics said. In response, Lasn’s Media Foundation gave us Joe Chemo, a bald camel lying in a hospital bed with IVs in both arms. Another cigarette-ad parody showed a Marlboro Man look-alike smoking a limp cigarette over the caption “Smoking Causes Impotence.” Still other counterads have taken on alcohol (a battered child seen through a vodka bottle, with the caption “Wipe That Smirkoff”), food monopolies, the fashion industry, and consumer culture in general.
In addition to its advertising campaigns, the Media Foundation sponsors annual consumer campaigns like Buy Nothing Day and TV Turnoff Week. And, of course, it publishes Adbusters, which started out as a little Pacific Northwest alternative publication and now has a circulation of eighty thousand. “It’s an ecological magazine,” the editors say, “dedicated to examining the relationship between human beings and their physical and mental environment. We want folks to get mad about corporate disinformation, injustices in the global economy, and any industry that pollutes our physical or mental commons.”
Central to all of Lasn’s work is the fight against corporate control, not only of politics, but also of our hearts and minds. He has written, “I see Americans and Canadians as having lost spontaneity, verve, individuality and having become consumer drones. We are like rats in a box, and the box is the shopping mall. It’s funny but also very sad. You have to wonder sometimes, ‘Are we really still free?’ . . . Corporations, these legal fictions that we ourselves created two centuries ago, now have more rights, freedoms, and powers than we do. And we accept this as a normal state of affairs. We go to corporations on our knees: Please don’t cut down any more ancient forests. Please don’t pollute any more lakes and rivers (but please don’t move your factories and jobs offshore, either). Please don’t use pornographic images to sell fashion to my kids. Please don’t play governments off each other to get a better deal. We’ve spent so much time bowed down in deference, we’ve forgotten how to stand up straight.”
Lasn was born in Estonia, a republic of the former Soviet Union, in 1942. His family fled the country in 1944, and he grew up in Australia. In the 1960s, he worked as an advertising executive in Japan, until he got fed up with the immorality hidden behind the industry’s claims of “ethical neutrality.” In his thirties, Lasn immigrated to British Columbia, Canada, and took up documentary filmmaking.
He cofounded the Media Foundation in 1989, after he ran afoul of corporate control over the so-called public airwaves. “The lumber companies had begun an ad campaign blanketing viewers with propaganda about how clear-cutting was good for British Columbia,” he says. “All lies, of course. They’d cut so much timber that only 15 percent of the old growth was left.” But when Lasn came up with his own thirty-second advertising spots criticizing the clear-cutting, he found that the networks would not sell him time.
“I came from Estonia, where you were not allowed to speak up against the government,” he says. “Here I was in North America, and suddenly I realized you can’t speak up against the sponsor. There’s something fundamentally undemocratic about private control of our public airways.”
Lasn and his fellow adbusters make no bones about their mission: “to topple existing power structures and forge a major shift in the way we will live in the twenty-first century.” Lasn lays out his strategy for how to accomplish this in his book Culture Jam: How to Reverse America’s Suicidal Consumer Binge — And Why We Must (Quill). He describes in detail how we can go about “uncooling” brands, “demarketing” fashions, and breaking free of our “media trance.”
Lasn lives on five acres of land outside Vancouver, British Columbia, with his family, animals, and gardens. “When I come home after a stressful day,” he says, “I just immerse myself in nature. It rejuvenates me.”
I met Lasn for this interview at the Media Foundation’s offices (1243 West Seventh Avenue, Vancouver, BC V6H IB7, Canada). I liked him immediately. He is warm, frank, and openly revolutionary. We talked all through the afternoon about the insidious effects of advertising and the battle to control the culture.
All the images that appear throughout this interview are courtesy of www.adbusters.org.
KALLE LASN
Jensen: What is “culture jamming,” and how did it come about?
Lasn: More than ten years ago, when we first started the Media Foundation, we had a feeling that all the old political movements had run out of steam, and many activists had burned out. Some of us were feminists who’d grown jaded; others were discouraged environmentalists; many were leftists who couldn’t feel that fire burning in the belly anymore. As we plotted and brainstormed, we found that we got most excited whenever we talked about culture.
By that time, we’d put out a couple of issues of Adbusters magazine, and the feedback we’d received told us we were on to something — that the really important battle of the future might not be over race or gender or the environment, and it certainly wouldn’t be that old left/right opposition. What it might be, instead, was the fight to control the culture. The people no longer sang the songs and told the stories and created the culture from the bottom up. The culture was spoon-fed to us now by advertisers, sponsors, and a commercial mass media. Our reliance on cars, our overconsumption, our hollow lifestyles, our lack of democracy — we saw all these as parts of the same package. And the question we kept asking ourselves was “How can we break out of this top-down media trance and start creating an authentic culture from the bottom up again?”
Then we came across the magic phrase “culture jamming.” I first saw it in a New York Times article by cultural critic Mark Dery, but the term actually had been coined long before by the audio-collage band Negativeland. “Culture jamming” seemed the perfect description of what we were trying to do, so we adopted it as the name of our fledgling movement. We became culture jammers — people who opt out of the mainstream and devote our lives to hacking and pranking and provoking and trying any which way we can to break up the seamless charade our culture has become.
The most powerful narcotic in the world is the promise of belonging, and in this culture, we belong by being cool. Our desire for belonging can be satisfied at any store, for the right price.
Jensen: What’s wrong with the way things are?
Lasn: We’ve been reduced to spectators, consumers. We’re discouraged from actively participating in society. We’re just supposed to listen and watch, and then to buy. The mass media keep us in a trance by dispensing a kind of Huxleyan “soma” that drives us to conform and consume: to buy the best cars, to wear the trendiest fashions, to be “cool.” The most powerful narcotic in the world is the promise of belonging, and in this culture, we belong by being cool. Our desire for belonging can be satisfied at any store, for the right price.
American “cool” has become a global pandemic. Communities, traditions, and entire cultures are being replaced by American consumer culture. And it’s killing the planet. It’s a measure of the depth of our consumer trance that the death of the planet is not sufficient to break it.
Culture jamming is about jamming the signals that put us in this trance in the first place. It’s about creating cognitive dissonance, disseminating as many seeds of truth to as many people as you can, with the ultimate goal of toppling existing power structures and changing the way we’ll live in the twenty-first century. Because the way we live has become intolerable.
It’s impossible to live a free, authentic life in America today. We’ve been so deeply manipulated; our emotions, personalities, and core values have become programmed. We sleep, eat, sit in a car, work, shop, watch TV, go to sleep again. I doubt there’s more than a handful of free, spontaneous minutes anywhere in that cycle. Sometimes, in a bank or a mall or a supermarket, I get the sense that real life has passed me by, and I’ll do anything to escape the consumerist cage.
Jensen: What are some examples of culture jamming?
Lasn: One of our best jams so far happened in November 1999, during the “Battle in Seattle” — the protests against the World Trade Organization. We produced a powerful sixty-second TV spot questioning globalization, which aired repeatedly on CNN as the protests unfolded, and on dozens of community and public-access stations in the weeks leading up to the protests. A radio version aired on many college radio stations. We also put up three “System Error” billboards in Seattle to inspire the protesters as they marched by. And activists all over the world who didn’t make it to Seattle visited our Culture Jammers Headquarters on the Internet. It was very exciting and a great example, I think, of a new kind of pincers strategy that combines street action with sophisticated mass-media thrusts.
Over the years, we’ve produced dozens of print “subvertisements” and TV “uncommercials.” You may have seen some of them. One shows a male model holding out the elastic waistband of his underwear to peer down at his genitals, with the caption “Obsession for Men.” The “Obsession for Women” TV spot begins with a collage of cool, sexy fashion images and a voice-over asking, “Why do nine out of ten women feel dissatisfied with some aspect of their own bodies?” A model then vomits into a toilet, and the voice says, “The beauty industry is the beast.”
The old activist movements, especially of the left, relied heavily on text — dense manifestoes and critiques, with a drawing or a cartoon thrown in every now and then. Right from the start, we decided that culture jamming would be driven not by text but by images, sounds, and video, which slip easily into the collective psyche.
It’s impossible to live a free, authentic life in America today. . . . Our emotions, personalities, and core values have become programmed. We sleep, eat, sit in a car, work, shop, watch TV, go to sleep again. I doubt there’s more than a handful of free, spontaneous minutes in that cycle.
Jensen: How are Adbusters and culture jamming perceived among mainstream designers and advertising people?
Lasn: Maybe 70 or 80 percent dismiss us as the lunatic fringe, but the other 20 or 30 percent welcome us as a breath of fresh air.
Jensen: That’s not a bad percentage.
Lasn: Many ad-industry people feel disenchanted with the work they do and with the ethical neutrality that reigns in their profession. But advertising is a $350 billion-per-year business worldwide, and, if you’ve got a mortgage to pay, it’s very hard to opt out of it.
Jensen: Is advertising ethically neutral?
Lasn: If you ask ad executives, “How can you possibly work on a campaign for Ford SUVs?” and you begin to explain to them about smog and the paving of the planet and global warming, they’ll cut you off in midsentence with: “That’s not our problem. We’re artists, technicians, highly creative people. We provide a service to clients, and we don’t take sides. Sure, we’ll work for Ford, but we’ll just as quickly do a job for Greenpeace, so stop bugging us about it.” Advertising people are morally detached — and proud of it. That’s why they can, with an untroubled conscience, promote even a killer product like tobacco.
Jensen: That reminds me of what Robert Jay Lifton wrote about physicians at Auschwitz. Many of them, he said, acted as ethically as they could without questioning what he called “the Auschwitz mentality.” Perhaps many of these ad people and designers can consider what they do ethical so long as they ignore the fact that the economic system they serve is grossly unethical.
Lasn: Yes, they have to remain cool, detached professionals to hide the unethical nature of the business. But once you realize that consumer capitalism is by its nature unethical, then you realize that it’s not unethical to jam it any way you can.
Last year, in collaboration with six other graphic-design magazines, we launched a “First Things First” manifesto, which calls for a reversal of priorities in favor of more useful, lasting, and democratic forms of communication — a mind-shift away from product marketing and toward the exploration and production of a new kind of meaning. We asked designers to confront the unprecedented environmental, social, and cultural crises that flow out of the corporate and commercial work they do. It was a curveball to the heart of the profession, and it caused quite a stir. I think almost all the professions — engineering, journalism, medicine, law — need a wake-up call and a period of soul-searching about the role they play in the larger scheme of things.
Many ad-industry people feel disenchanted with the work they do and with the ethical neutrality that reigns in their profession. But advertising is a $350 billion-per-year business worldwide, and, if you’ve got a mortgage to pay, it’s very hard to opt out of it.
Jensen: You’ve called corporate advertising “the largest single psychological experiment ever carried out on the human race.”
Lasn: Yes, ads are everywhere: on billboards and buildings, buses and cars. You fill your car with gas, and there’s an ad on the nozzle. There are ads on bank machines. Kids watch Pepsi and Snickers ads in classrooms and tattoo their calves with Nike swooshes. Administrators in Texas have plans to sell ad space on the roofs of their schools. There are ads on bananas at the supermarket. In San Francisco, IBM beamed its logo onto clouds with a laser; it was visible for ten miles. In the United Kingdom, Boy Scouts sell ad space on their merit badges. In Australia, Coca-Cola cut a deal with the postal service to cancel stamps with a Coke advertisement. There are ads at eye level above urinals. There’s really nowhere to hide. And adspeak — the language of the ad — means nothing. Worse, it’s an antilanguage that annihilates truth and meaning wherever the two come in contact.
As yet, we have absolutely no idea what this constant advertising babble is doing to us. The situation is similar to what we were experiencing at the start of the environmental movement forty years ago, when people just didn’t want to believe that three parts per billion of some chemical in the air or water could be toxic and have all kinds of unforeseen consequences down the road.
Today we are repeating that same mistake in our mental environment, nonchalantly absorbing thousands of marketing messages every day without a second thought as to how, in the long run, they may be affecting us: creating anxieties, addictions, depressions, mood disorders, and other mental problems. The commercial media breed insecurity, because then corporations can offer us ways to buy back our feeling of security, however temporarily. We also need to consider how this corporate branding-and-advertising project influences the way we think about the big social issues of our time, such as global warming, economic globalization, and genetically engineered food.
Jensen: In your book Culture Jam, you say that America is no longer a country, but a trillion-dollar brand.
Lasn: Yes, I think America today is essentially no different from McDonald’s or Marlboro or General Motors. It’s a product image that’s sold to us and to consumers worldwide. The American brand is associated with catchwords like “democracy,” “opportunity,” and “freedom,” but, like cigarettes that are sold as symbols of vitality and youthful rebellion, America in reality is very different from its brand image. The real America has been subverted by corporate agendas. Its elected officials bow down before corporations as a condition of their survival in office. America isn’t really a democracy anymore: it’s a corporate state.
The recent presidential election was a perfect example of the corporate state in action. It was a magnificent spectacle, with a media hoopla that dominated our lives for months. The candidates debated each other, shouted at each other, aimed angry TV messages at each other. And then we all held our breath to see whom the American people would finally elect. But, if you think about it, it was a bogus choice, like choosing between Coke and Pepsi. Both major-party candidates were corporate sponsored. There was never a hint of talk about reining in corporate power and putting the people back in charge.
Jensen: You’ve been specifically critical of the beauty industry on many occasions.
Lasn: The makers of cosmetics and such have altered our concept of what a good relationship and good sex are all about. Our mental environment is saturated with pouting lips, pert breasts, buns of steel, erotic titillations of all kinds. I think these images distort our sexuality and our sense of self-worth. Over time, they actually change our personalities — the way we feel, for example, when someone puts his or her hand on our shoulder, or flirts with us, or asks us for a date.
In some ways, I was lucky: I didn’t see television until I was fifteen years old. Even after that, I didn’t watch it as much as kids do now. Children today don’t grow up in a natural environment; they grow up in an artificial, electronic environment that’s corporate-driven, erotically charged, and very violent. Kids growing up in America today are — to use a crude term — getting mind-fucked every day. They associate “life” with cereal, “wonder” with bread, and “joy” with dish-washing soap. What does it do to their psyches to relate sex to everything from cars to bubble gum? It’s not quite the same as sexual abuse, but it’s abuse nonetheless, and the psychic scars last a lifetime.
I think America today is essentially no different from McDonald’s or Marlboro or General Motors. It’s a product image that’s sold to us and to consumers worldwide. . . . America isn’t really a democracy anymore: it’s a corporate state.
Jensen: What led you to become a critic of consumer culture?
Lasn: One of the most profound influences in my life has been a group of European artists, philosophers, and anarchists who called themselves the Situationists. They were the first to use the word spectacle to describe a form of mental slavery where we’re free to resist, but it never occurs to us to do so. In his book The Society of the Spectacle, Guy Debord says consumer society is a world in which everything has been commodified, where consumers have the illusion of unlimited choice and freedom, but in fact their lives have been reduced to preselected experiences: adventure movies, nature shows, Net surfing, celebrity romances, political scandals —
Jensen: Like Monica Lewinsky.
Lasn: Yes, that spectacle mesmerized America for almost a year.
Jensen: And it was absolutely meaningless.
Lasn: Well, in that particular case, I think there was actually plenty of meaning. But instead of a careful examination of that meaning, all we got was innuendo, lewd jokes, guesswork, and gossip.
Jensen: I’m curious: what do you think the meaning of the Monica Lewinsky scandal was? Because when the world is being killed before our eyes, I don’t care if the President gets a blow job. To me, that’s meaningless.
Lasn: What is meaningful to me is that the President looked the American people in the eye and blithely lied through his teeth. And even more meaningful is how easily the American people shrugged off this insult. That is the essence of the spectacle; that’s exactly how it works: we become so bedazzled and dumbed down and cynical that we allow those in power to manipulate us; not only that, we accept this manipulation as routine. When those in power routinely lie, and we routinely accept it, what sort of democracy do we really have?
The Situationists talked about our lives being “kidnapped” by the spectacle. In the great Situationist text The Revolution of Everyday Life, Raoul Vaneigem argues that the spectacle has made us self-conscious about even our most personal gestures. Our intimate moments are not truly our own anymore, because moments just like them have already been presented to us in a magazine or a movie or a sitcom.
At root, culture jamming is just a way to stop the flow of spectacle long enough for people to remember that they have their own lives. To get your life back, you have to tune out, switch off the computer, refuse to download your e-mail on your day off, break out of habitual routines. When the TV malfunctions, don’t fix it; decide to suffer through the withdrawal. Fight your way out of the consumerist cage. If you have enough guts and self-discipline to make it to the other side, you’re ready to move on to bigger things, such as jamming the culture yourself.
It’s quite clear that you don’t need to match Nike or McDonald’s dollar for dollar to beat them. All you need is the truth on your side and a truly free marketplace of ideas in which to compete . . . We’re going to take on the global automakers, the industrial food giants, the fashion moguls, and the biotech megacorporations, and we’ll beat them just as those earlier crusaders beat the tobacco companies.
Jensen: But how do we deprogram ourselves when, every day, we are still confronted with thousands of plugs for consumerism? How can your advertising budget match Nike’s or McDonald’s or that of General Motors?
Lasn: We don’t need million-dollar advertising budgets to beat Nike and McDonald’s at their own game. Think back to twenty-five years ago, when cigarette ads were still running on TV. Do you remember those brilliant antismoking ads that started appearing? I remember them vividly: the extreme close-ups of the glowing tips of cigarettes; the X-rays of blackened lungs; Yul Brynner, just months before he died of cancer, looking the world squarely in the eye and saying, “Whatever you do, don’t smoke.” Those ads were so compelling, so real, that within a few months the tobacco companies — even though they were outspending the antitobacco crusaders by maybe a hundred to one — were simply unable to compete. For all its financial might, the tobacco industry was crushed and forced to “voluntarily” accept a federal ban on TV ads for cigarettes.
It’s quite clear that you don’t need to match Nike or McDonald’s dollar for dollar to beat them. All you need is the truth on your side and a truly free marketplace of ideas in which to compete. I predict that, over the next few years, TV jammers will repeat that tobacco story again and again. We’re going to take on the global automakers, the industrial food giants, the fashion moguls, and the biotech corporations, and we’ll beat them just as those earlier crusaders beat the tobacco companies.
Jensen: How do you see this information war playing out?
Lasn: I think it will unfold something like this: A few subvertisements will start popping up, as they did on CNN during the Battle in Seattle — a sort of TV graffiti, a low-level “meme” warfare, a meme being an idea or phrase that moves through the culture like a virus. These ads will remind people that the status quo is being challenged, that there exists a strong and committed opposition to the corporate state, consumer culture, and the way the global economy is currently being run.
And then will come the crucial step, the scenario I’ve fervently believed in for the last ten years: we culture jammers will win a dramatic First Amendment legal victory against the TV networks, which for a decade have refused to sell us any airtime for our campaigns.
Jensen: Even when you come to them with cash in hand?
Lasn: Cold cash. We want to buy thirty- and sixty-second spots under the same rules and conditions as Nike or McDonald’s, but the networks refuse to sell to us. They have a policy that says they’ll sell airtime for product ads, but not for what they call “advocacy advertising.” If, however, we win a First Amendment legal action, and the courts declare that freedom of speech includes the right to walk into your local TV station, slap your money on the table, and freely buy airtime, then the meme warfare, the culture war, can begin in earnest. That’s the moment when the mindbombs will start exploding on the evening news, and a new era will be born.
I believe there will be a groundswell of support for our cause once people wake up to what’s at stake: our freedom to communicate with each other. If we, as a society, lose our voice completely, and corporations start doing all the talking, then we’ll be utterly lost. To some degree, this has already happened. Our ability to envision a future collectively has already been severely compromised.
Jensen: Have you approached attorneys about the feasibility of mounting a First Amendment challenge?
Lasn: Yes, and most of them say it’s a very difficult proposition, given that all previous legal actions against the TV networks have failed. But there is cause for hope. We are the first group that has collected letters, faxes, and transcripts of phone conversations with network executives, proving that not just a single proposed thirty-second spot, but whole classes of information about transportation, nutrition, fashion, and sustainable consumption have been systematically kept off the public airwaves.
Jensen: Should the airwaves be opened up so that even the Ku Klux Klan could air a spot?
Lasn: I don’t have a problem with that. I’d rather live in a world where people I dislike are allowed to express their views than in our current system, where we are being propagandized on a massive scale with no real opportunity to speak back.
We want to buy . . . spots under the same rules and conditions as Nike or McDonald’s, but the networks refuse to sell to us. They have a policy that says they’ll sell airtime for product ads, but not for what they call “advocacy advertising.” If . . . we win a First Amendment legal action, and the courts declare that freedom of speech includes the right to walk into your local TV station, slap your money on the table, and freely buy airtime, then . . . the culture war can begin.
Jensen: What happens after you win a First Amendment legal victory against the TV networks?
Lasn: People will feel empowered by the battle of ideas on TV, and, bit by bit, they will come to wonder why they cannot have an even bigger voice on the so-called public airwaves. They will question why they have to pay for access to something they own. In this kind of atmosphere, I think we will find support for the idea of giving some airtime — maybe two minutes per hour — back to the people. I call this “The Two Minute Media Revolution,” a first-come, first-served system of free TV access for individuals, communities, and groups.
In the information age, we need information rights. Race, gender, and environmental rights were fought for and won in previous eras. Now I think we’ll have to fight another great battle to make the right to communicate a fundamental human right of every person on earth.
Jensen: Where would that take us? What do you want?
Lasn: I can’t answer that first question. In fact, I don’t even want to, because once we cast off what my friend Rick Crawford calls “the chains of market-structured consciousness,” who knows where we’ll go and what we’ll do? Why try to predict it?
But I can answer the second question: What do I want? I want freedom. I want to live in a world where I don’t feel oppressed by my TV set, my telephone company, my bank, and the pharmaceutical company that sells me the pills I need to survive. I want to live in a world where human beings, not corporate entities, call the shots — a world in which the people create the culture, instead of having it rammed down their throats. I just can’t stand to live in this consumer world anymore. It doesn’t feel right. I feel hollow, as if I’m not really living.
Jensen: Guy Debord wrote, “Revolution is not showing life to people, but making them live.”
Lasn: Yes, that’s what culture jamming is all about. There’s another Situationist saying: “Live without dead time.” Imagine what that would be like. Or, better still, don’t imagine it; live it.
|
//
// TagsModel.h
// SDTagsView
//
// Created by apple on 2017/2/22.
// Copyright © 2017年 slowdony. All rights reserved.
//
#import <Foundation/Foundation.h>
@interface TagsModel : NSObject
<NSCoding>
/**
标签标题
*/
@property (nonatomic,strong)NSString *title;
/**
标签颜色
*/
@property (nonatomic,strong)NSString *color;
-(instancetype )initWithTagsDict:(NSDictionary *)dict;
+(instancetype)tagsModelWithDict:(NSDictionary *)dict;
@end
|
These Four “Ligers” Are The World’s First Cross Breed Species Of Wild Cat
Meet the family: Yeti, Odlin, Sampson and Apollo are the world’s first ever white lion-tiger hybrids – or ‘ligers’. These adorable cubs may look cute and unassuming but they are the rarest of their species – and could potentially grow to be the biggest cats in the world.
The four handsome male ‘liger’ cubs are the first ever to be born from a white male lion and white female tiger, which makes them the world’s most unique big cats.
There are only around 300 white lions and 1,200 white tigers left in the world, so the cubs’ father, Ivory and mother, Saraswati, are extremely rare in their own right.
|
1. Field of the Invention
The present invention relates to a power supply interrupting apparatus which interrupts a dark current of a battery installed on a vehicle such as an automobile, and more particularly, to a power supply interrupting apparatus which is made to interrupt a power supply in a simple operation.
2. Description of the Related Art
Various types of electronic components have been installed on motor vehicles produced in recent years. An onboard battery supplies a minute current (that is, dark current) to some of the electronic components even when the vehicle is parked with an engine turned off. Due to the battery supplying current to the electronic components when the engine is off, the voltage of the onboard battery is reduced when the engine is turned off for a long period of time, resulting in a state where the onboard battery is left uncharged, leading to a flat battery (that is, the overdischarge of the onboard battery).
To prevent such an incident, conventional practice is to disconnect a battery terminal from a battery, as shown in FIG. 25, when the vehicle is kept at rest for a long period of time, is put in a garage for repair, or to remove a fuse disposed upstream of a dark current consuming electronic control unit (hereinafter, referred to as “ECU”), as shown in FIG. 26, when the vehicle is transported on a transport vehicle.
There is known a vehicle power supply interrupting apparatus which requires manual operation to interrupt the electric continuity (refer to JP-A-8-279321). When the power supply interrupting apparatus is pushed down, the operating portion is designed to rotate 90 degrees by a coil spring incorporated within the apparatus, and a contact, engaged with the operating portion, moves to an OFF position in association with the rotation of the operating portion, while an indication mark on the operating portion indicates an “OFF” position. Due to this, the operator can visually recognize from the position of the indication mark that a power supply line has been opened.
In addition, when attempting to return the operating portion from the OFF position to an ON position, the operating portion is pushed down and rotated 90 degrees in a reverse direction to reach the ON position, and thereafter, the pressure applied to the operating portion is released.
However, the method of interrupting the power supply by disconnecting the battery terminal is dangerous and troublesome to users in general. In addition, the removal of the fuse is also troublesome work. Additionally, the power supply interrupting apparatus described in Patent Document No. 1 has the problem with operability.
|
is a in -46*a**3/15 + 88*a**2/15 - 38*a/15 - 4/15 = 0?
-2/23, 1
Find y such that 5*y**5 + 150*y**4 + 1490*y**3 + 4740*y**2 - 4015*y - 25410 = 0.
-11, -7, -3, 2
Factor x**2/8 - 23*x/2 - 48.
(x - 96)*(x + 4)/8
Determine u, given that 5*u**3 + 295*u**2 + 570*u = 0.
-57, -2, 0
Let -3*f**3/2 - 66*f**2 - 960*f - 4608 = 0. What is f?
-16, -12
Let -5*o**3/2 - 22*o**2 - 61*o/2 + 7 = 0. Calculate o.
-7, -2, 1/5
Factor -s**5 - 12*s**4 - 21*s**3 - 10*s**2.
-s**2*(s + 1)**2*(s + 10)
Solve -2*j**4 + 14*j**3 + 24*j**2 - 56*j - 64 = 0 for j.
-2, -1, 2, 8
Factor 4*h**5 + 36*h**4 + 104*h**3 + 136*h**2 + 84*h + 20.
4*(h + 1)**4*(h + 5)
Determine v so that 3*v**2/2 + 111*v/2 = 0.
-37, 0
Factor -4*y**5 - 152*y**4 - 1056*y**3 - 3008*y**2 - 3904*y - 1920.
-4*(y + 2)**4*(y + 30)
Let -s**2/2 + 184*s - 16928 = 0. What is s?
184
Factor -4*k**2 - 2796*k + 2800.
-4*(k - 1)*(k + 700)
Find b, given that 2*b**5 - 3*b**4 - 5*b**3 + 6*b**2 = 0.
-3/2, 0, 1, 2
Factor 5*b**3 - 405*b**2 + 1180*b - 780.
5*(b - 78)*(b - 2)*(b - 1)
What is x in -2*x**5/7 + 18*x**4/7 + 288*x**3/7 + 656*x**2/7 - 96*x/7 - 864/7 = 0?
-6, -2, 1, 18
Factor -5*k**5 + 115*k**4 - 410*k**3 + 590*k**2 - 385*k + 95.
-5*(k - 19)*(k - 1)**4
Suppose 5*b**4 - 137*b**3 + 649*b**2 + 497*b - 294 = 0. Calculate b.
-1, 2/5, 7, 21
Determine a, given that 49*a**4/3 + 5558*a**3/3 - 2941*a**2 + 3676*a/3 - 460/3 = 0.
-115, 2/7, 1
Factor i**2/5 + 2*i + 24/5.
(i + 4)*(i + 6)/5
Factor 5*z**2 - 125*z + 120.
5*(z - 24)*(z - 1)
Factor b**4/4 - 23*b**3/4 + 93*b**2/2 - 160*b + 200.
(b - 10)*(b - 5)*(b - 4)**2/4
What is z in -3*z**4/4 + 105*z**3/2 - 918*z**2 - 105*z/2 + 3675/4 = 0?
-1, 1, 35
Solve -3*o**2 + 4998*o - 2081667 = 0 for o.
833
Solve -2*m**2/7 - 332*m/7 - 13778/7 = 0 for m.
-83
Solve -v**4 + 590*v**3 = 0.
0, 590
Factor -z**5 - 92*z**4 - 2881*z**3 - 32490*z**2 - 56700*z - 27000.
-(z + 1)**2*(z + 30)**3
Determine l so that -2*l**3/21 + 2*l**2/21 + 88*l/21 - 8 = 0.
-7, 2, 6
Let -f**4/4 + 433*f**3/4 + 1091*f**2/2 + 875*f + 438 = 0. Calculate f.
-2, -1, 438
Determine y so that -2*y**2/13 + 230*y/13 + 232/13 = 0.
-1, 116
Factor -2*x**4 + 34*x**3 - 62*x**2 + 30*x.
-2*x*(x - 15)*(x - 1)**2
Let -12*w**4/11 + 34*w**3/11 + 78*w**2/11 - 84*w/11 - 16/11 = 0. What is w?
-2, -1/6, 1, 4
Solve 81*o**5/2 + 171*o**4/2 + 93*o**3/2 - 3*o**2/2 - 3*o = 0 for o.
-1, -1/3, 0, 2/9
Factor -3*j**3/4 - 63*j**2 - 1383*j/4 + 819/2.
-3*(j - 1)*(j + 7)*(j + 78)/4
Factor 8*f**2 + 936*f + 27378.
2*(2*f + 117)**2
What is s in s**2/4 + 20*s + 39 = 0?
-78, -2
Let -9*g**4/2 - 8*g**3 - 5*g**2/2 + g = 0. Calculate g.
-1, 0, 2/9
Determine r, given that -43*r**3/5 - 256*r**2/5 - 332*r/5 + 16/5 = 0.
-4, -2, 2/43
Factor 12*t**2 + 16856*t + 11232.
4*(t + 1404)*(3*t + 2)
Factor w**3 + 73*w**2 + 1295*w - 1369.
(w - 1)*(w + 37)**2
Let v**4/7 - 60*v**3/7 - 256*v**2/7 = 0. What is v?
-4, 0, 64
Solve 5*i**2 - 265*i = 0 for i.
0, 53
Suppose -6*w**3/7 + 30*w**2/7 + 6*w/7 - 30/7 = 0. What is w?
-1, 1, 5
Solve 2*q**3/11 - 228*q**2/11 + 630*q - 2200 = 0.
4, 55
Let -9*k**5/8 - 69*k**4/8 + 84*k**3 - 207*k**2 + 186*k - 42 = 0. Calculate k.
-14, 1/3, 2
Factor -o**2/3 - 20*o - 59/3.
-(o + 1)*(o + 59)/3
Factor -5547*w**2/2 + 129*w - 3/2.
-3*(43*w - 1)**2/2
Let -2*c**2 + 160*c/7 + 72 = 0. Calculate c.
-18/7, 14
Determine f so that -4*f**3 - 72*f**2 - 32*f + 1536 = 0.
-16, -6, 4
Factor -2*k**2/9 - 64*k/9 - 512/9.
-2*(k + 16)**2/9
Factor -3*m**3 + 4416*m**2 + 3*m - 4416.
-3*(m - 1472)*(m - 1)*(m + 1)
Find s, given that 2*s**5 - 12*s**4 + 18*s**3 - 8*s**2 = 0.
0, 1, 4
Solve -5*w**4 - 20*w**3 - 10*w**2 + 20*w + 15 = 0 for w.
-3, -1, 1
Determine q, given that -2*q**3/11 + 2*q**2 - 38*q/11 + 18/11 = 0.
1, 9
Factor 2*l**4 - 524*l**3 + 3096*l**2 - 6160*l + 4096.
2*(l - 256)*(l - 2)**3
Let -2*d**2/7 - 156*d/7 - 3042/7 = 0. Calculate d.
-39
Find c such that -45*c**3 + 11080*c**2 - 683265*c + 151290 = 0.
2/9, 123
Let -2*p**3 + 74*p**2 - 184*p - 680 = 0. Calculate p.
-2, 5, 34
Solve z**4/2 - z**3/2 - 15*z**2/2 - 23*z/2 - 5 = 0.
-2, -1, 5
Determine n, given that -21*n**3 - 90*n**2 - 108*n - 24 = 0.
-2, -2/7
What is i in -2*i**4 - 88*i**3 - 1052*i**2 - 1848*i - 882 = 0?
-21, -1
What is c in 142*c**2/5 + 146*c/5 + 4/5 = 0?
-1, -2/71
Suppose -8*h**5 + 12*h**4 + 16*h**3 - 12*h**2 - 8*h = 0. Calculate h.
-1, -1/2, 0, 1, 2
Determine w, given that -7*w**5 - 68*w**4 - 43*w**3 + 18*w**2 = 0.
-9, -1, 0, 2/7
Determine z so that z**2 - 4*z - 21 = 0.
-3, 7
Factor -3*i**2 + 489*i - 3720.
-3*(i - 155)*(i - 8)
Determine j so that j**5/9 - 64*j**4/9 + 82*j**3/3 - 364*j**2/9 + 241*j/9 - 20/3 = 0.
1, 60
Suppose 3*s**3 + 18*s**2 + 9*s - 30 = 0. What is s?
-5, -2, 1
Factor -r**2/8 + 15*r/8 + 17/4.
-(r - 17)*(r + 2)/8
Factor -4*i**2 - 2776*i - 481636.
-4*(i + 347)**2
Factor -4*t**4 + 4*t**3.
-4*t**3*(t - 1)
Factor -5*u**5 - 25*u**4 - 30*u**3 + 20*u**2 + 40*u.
-5*u*(u - 1)*(u + 2)**3
Factor 2*u**2/9 - 2168*u/9 + 587528/9.
2*(u - 542)**2/9
Suppose 12*n**2/7 + 80*n/7 - 4 = 0. What is n?
-7, 1/3
Determine w, given that -4*w**4 + 76*w**3 + 252*w**2 + 260*w + 88 = 0.
-1, 22
What is c in -2*c**3/17 - 108*c**2/17 - 1944*c/17 - 11664/17 = 0?
-18
Let -n**3/4 + 2*n**2 + n/4 - 2 = 0. What is n?
-1, 1, 8
Factor 2*j**5/7 + 34*j**4/7 + 86*j**3/7 - 482*j**2/7 + 80*j - 200/7.
2*(j - 1)**3*(j + 10)**2/7
Let -6*c**5/7 + 213*c**4/7 - 15*c**3 = 0. Calculate c.
0, 1/2, 35
Factor t**3/11 + 6*t**2 + 251*t/11 + 186/11.
(t + 1)*(t + 3)*(t + 62)/11
Determine m, given that 8085*m**5 + 798*m**4 - 1083*m**3 - 60*m**2 + 36*m = 0.
-2/7, 0, 1/5, 3/11
Suppose 2*r**5/19 - 564*r**4/19 + 2234*r**3/19 - 2784*r**2/19 + 1112*r/19 = 0. What is r?
0, 1, 2, 278
Find y such that 5*y**4 + 20*y**3 + 5*y**2 - 30*y = 0.
-3, -2, 0, 1
Find s such that s**4 - 101*s**3 + 2499*s**2 + 2601*s = 0.
-1, 0, 51
Factor -2*n**2 + 30*n + 308.
-2*(n - 22)*(n + 7)
Solve -c**2 - 125*c - 366 = 0 for c.
-122, -3
Factor 5*c**4/4 + 11*c**3/2 + 33*c**2/4 + 5*c + 1.
(c + 1)**2*(c + 2)*(5*c + 2)/4
Solve m**5/9 + 2*m**4/9 - 35*m**3/9 + 92*m**2/9 - 92*m/9 + 32/9 = 0.
-8, 1, 2
Factor 2*y**5/7 - 8*y**3/7 + 4*y**2/7 + 6*y/7 - 4/7.
2*(y - 1)**3*(y + 1)*(y + 2)/7
Factor 45*f**3 - 948*f**2 - 2007*f + 138.
3*(f - 23)*(f + 2)*(15*f - 1)
Let -3*c**4 - 2*c**3 + 9*c**2 - 4 = 0. Calculate c.
-2, -2/3, 1
Factor 3*h**3 + 495*h**2 + 20664*h + 20172.
3*(h + 1)*(h + 82)**2
Let -2*p**2/9 - 4*p = 0. What is p?
-18, 0
Determine u, given that -2*u**2 - 48*u - 256 = 0.
-16, -8
Suppose -63*q**2/8 + 317*q/8 - 5/4 = 0. What is q?
2/63, 5
Find y such that -y**3/5 - 158*y**2 - 154433*y/5 + 630436/5 = 0.
-397, 4
Solve p**4/2 + 46*p**3 + 1584*p**2 + 24192*p + 138240 = 0 for p.
-24, -20
Factor -2*t**4/3 - 152*t**3/15 - 274*t**2/15 - 44*t/5.
-2*t*(t + 1)**2*(5*t + 66)/15
Suppose f**4/6 + 26*f**3/3 - 797*f**2/6 + 514*f - 390 = 0. Calculate f.
-65, 1, 6
Determine d so that -d**4/7 + 12*d**3/7 - 41*d**2/7 + 6*d = 0.
0, 2, 3, 7
Factor -n**4 + 10*n**3 + 81*n**2 - 90*n.
-n*(n - 15)*(n - 1)*(n + 6)
Determine k, given that -k**2/7 - 820*k/7 - 117 = 0.
-819, -1
Let 4*r**2 - 4127*r - 1032 = 0. What is r?
-1/4, 1032
Determine k, given that -2*k**3/7 - 152*k**2/7 + 1670*k/7 - 4300/7 = 0.
-86, 5
Solve 2*z**3 + 834*z**2 + 115926*z + 5371238 = 0.
-139
Determine v so that 19*v**5/4 + 511*v**4/4 - 27*v**3/2 = 0.
-27, 0, 2/19
Let -46*b**2/7 + 34*b/7 + 12/7 = 0. Calculate b.
-6/23, 1
Factor -5*b**3 + 40*b**2 + 305*b + 260.
-5*(b - 13)*(b + 1)*(b + 4)
Solve 2*t**4 - 6*t**3 - 6*t**2 + 22*t - 12 = 0 for t.
-2, 1, 3
Factor 4*g**2 - 4728*g + 1397124.
4*(g - 591)**2
Suppose -5*o**3 + 45*o**2 + 50*o = 0. What is o?
-1, 0, 10
Factor -5*a**2 + 18940*a - 17936180.
-5*(a - 1894)**2
Suppose 2*m**5 + 4*m**4 - 248*m**3 + 476*m**2 - 234*m = 0. Calculate m.
-13, 0, 1, 9
Factor p**4 + 6*p**3 + 12*p**2 + 8*p.
p*(p + 2)**3
Let 5*r**4 - 15*r**3 + 20*r = 0. Calculate r.
-1, 0, 2
Suppose -5*v**2 - 135*v + 290 = 0. Calculate v.
-29, 2
Factor 3*s**3 + 78*s**2 + 420*s - 1176.
3*(s - 2)*(s + 14)**2
Factor -2*g**2/5 + 252*g/5.
-2*g*(g - 126)/5
Suppose -6*h**4/5 + 28*h**3/5 - 32*h**2/5 + 4*h/5 + 6/5 = 0. What is h?
-1/3, 1, 3
Find c such that -95*c**3 - 250*c**2 - 85*c + 70 = 0.
-2, -1, 7/19
Suppose 7*l**5/5 - 44*l**4/5 + 103*l**3/5 - 22*l**2 + 52*l/5 - 8/5 = 0. What is l?
2/7, 1, 2
Factor 2*a**3/5 - 68*a**2/5 + 248*a/5 - 48.
2*(a - 30)*(a - 2)**2/5
Solve w**4/4 -
|
Q:
Why is it wrong to interpret SVM as classification probabilities?
My understanding of SVM is that it's very similar to a logistic regression (LR), i.e. a weighted sum of features is passed to the sigmoid function to get a probability of belonging to a class, but instead of the cross-entropy (logistic) loss function, training is performed using the hinge loss. The benefit of using the hinge loss is that one can do various numerical tricks to make kernelisation more efficient. A drawback, however, is that the resulting model has less information than a corresponding LR model could have. So, for example, without kernelisation (using a linear kernel) the SVM decision boundary would still be at the same location where LR would output a probability of 0.5, BUT one cannot tell how quickly the probability of belonging to a class decays away from the decision boundary.
My two questions are:
Is my interpretation above correct?
How does using the hinge loss make it invalid to interpret SVM results as probabilities?
A:
A SVM does not feed anything into a sigmoid function. It fits a separating hyperplane to the data that tries to put all data points from your training set that are of one class on one side, and all points of the other class on the other. Consequently, it assigns class based on which side your feature vector is on. More formally, if we denote the feature vector as $\mathbf{x}$ and the hyperplane coefficients as $\mathbf{\beta}$ and $\beta_0$ the intercept, then the class assignment is $y = sign(\beta \cdot \mathbf{x} + \beta_0)$. Solving an SVM amounts to finding $\beta, \beta_0$ which minimize the hinge loss with the greatest possible margin. Therefore, because an SVM only cares about which side of the hyperplane you are on, you cannot transform its class assignments into probabilities.
In the case of a linear SVM (no kernel), the decision boundary boundary will be similar to that of a logistic regression model, but may vary depending on the regularization strength you used to fit the SVM. Because the SVM and LR solve different optimization problems, you are not guaranteed to have identical solutions for the decision boundary.
There are many resources out there about the SVM which will help clarify things: here is one example, and another one.
|
Sydney: New Sydney FC striker Adam Le Fondre admits being surprised by the standard of the A-League.
Le Fondre has the unenviable task of filling the record-breaking boots of Bobo for the Sky Blues this season after joining the club on a multi-year deal.
Adam Le Fondre scores from the spot for Sydney FC during the FFA Cup semi-final against Western Sydney Wanderers. Credit:AAP
Based on his trial form, the former Premier League forward has quickly found his footing for the perennial contenders with two goals in as many games.
"I've been really impressed by the quality of the boys that create chances," Le Fondre said ahead of their season-opener against Adelaide on Friday.
|
HRSA’s Response to HIV Treatment Advances
4 of 12
Hope was replaced by elation in July 1996, at the XI International Conference on AIDS, when David Ho announced that HIV could be eradicated if it was completely suppressed for 2 or 3 years. At the same time, several reports suggested that HIV could be fully suppressed by combining two NRTIs with either an NNRTI or a PI. The HAART era had begun. “We had turned directions really quickly. It was like a light switch, going from terrible pessimism to exaggerated optimism in less than a year,” says Cheever.
17. Centers for Disease Control and Prevention. Recommendations of the U.S. Public Health Service Task Force on the Use of Zidovudine to Reduce Perinatal Transmission of Human Immunodeficiency Virus. MMWR. 1994;43:1-20. Available at: www.cdc.gov/mmwr/preview/mmwrhtml/00032271.htm. Accessed August 8, 2011.
18. Centers for Disease Control and Prevention. US Public Health Service recommendations for human immunodeficiency virus counseling and voluntary testing for pregnant women. MMWR. 1995;44.
39. National Alliance of State and Territorial AIDS Directors. The fiscal status of state AIDS Drug Assistance Programs: findings from a January 1996 national survey of state AIDS directors. April 1996.
67. Panel on Antiretroviral Guidelines for Adults and Adolescents. Guidelines for the use of antiretroviral agents in HIV-1-infected adults and adolescents. Department of Health and Human Services. December 1, 2009. Available here (PDF – 1.5 MB). Accessed August 19, 2011.
69. Centers for Disease Control and Prevention. Report of the NIH Panel to Define Principles of Therapy of HIV Infection and Guidelines for the Use of Antiretroviral Agents in HIV-Infected Adults and Adolescents. MMWR. 1998;47. Available here. Accessed August 14, 2011.
110. Based on information at the FDA Web site Timeline/history, available here. Accessed August 1, 2011.
111. Source: Panel on Antiretroviral Guidelines for Adults and Adolescents. Guidelines for the use of antiretroviral agents in HIV-1-infected adults and adolescents. Department of Health and Human Services. December 1, 2007. Available here (PDF – 2.3 MB). Accessed August 24, 2011.
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.