text
stringlengths 8
5.77M
|
---|
/***************************************************************************
qgsquickcoordinatetransformer.h
--------------------------------------
Date : 1.6.2017
Copyright : (C) 2017 by Matthias Kuhn
Email : matthias (at) opengis.ch
***************************************************************************
* *
* This program is free software; you can redistribute it and/or modify *
* it under the terms of the GNU General Public License as published by *
* the Free Software Foundation; either version 2 of the License, or *
* (at your option) any later version. *
* *
***************************************************************************/
#ifndef QGSQUICKCOORDINATETRANSFORMER_H
#define QGSQUICKCOORDINATETRANSFORMER_H
#include <QObject>
#include <QGeoCoordinate>
#include <qgspoint.h>
#include <qgscoordinatetransformcontext.h>
#include <qgscoordinatereferencesystem.h>
#include <qgspoint.h>
/**
* Helper class for transform of coordinates (QgsPoint) to a different coordinate reference system.
*
* It requires connection of transformation context from mapSettings, source position and source CRS to
* calculate projected position in desired destination CRS.
*
* \note QML Type: CoordinateTransformer
*
*/
class QgsQuickCoordinateTransformer : public QObject
{
Q_OBJECT
//! Projected (destination) position (in destination CRS)
Q_PROPERTY( QgsPoint projectedPosition READ projectedPosition NOTIFY projectedPositionChanged )
//! Source position (in source CRS)
Q_PROPERTY( QgsPoint sourcePosition READ sourcePosition WRITE setSourcePosition NOTIFY sourcePositionChanged )
//! Source coordinate for integrating with QtPositioning, alternative to source position
Q_PROPERTY( QGeoCoordinate sourceCoordinate READ sourceCoordinate WRITE setSourceCoordinate NOTIFY sourceCoordinateChanged )
//! Destination CRS
Q_PROPERTY( QgsCoordinateReferenceSystem destinationCrs READ destinationCrs WRITE setDestinationCrs NOTIFY destinationCrsChanged )
//! Source CRS, default 4326
Q_PROPERTY( QgsCoordinateReferenceSystem sourceCrs READ sourceCrs WRITE setSourceCrs NOTIFY sourceCrsChanged )
//! Transformation context, can be set from QgsQuickMapSettings::transformContext()
Q_PROPERTY( QgsCoordinateTransformContext transformContext READ transformContext WRITE setTransformContext NOTIFY transformContextChanged )
/**
* The altitude value of captured coordinates is corrected by the amount of deltaZ.
* This can be used to correct the altitude with the antenna height for example.
*/
Q_PROPERTY( qreal deltaZ READ deltaZ WRITE setDeltaZ NOTIFY deltaZChanged )
/**
* Skips any altitude correction handling during CRS transformation. deltaZ will still be applied.
*/
Q_PROPERTY( bool skipAltitudeTransformation READ skipAltitudeTransformation WRITE setSkipAltitudeTransformation NOTIFY skipAltitudeTransformationChanged )
public:
//! Creates new coordinate transformer
explicit QgsQuickCoordinateTransformer( QObject *parent = nullptr );
//!\copydoc QgsQuickCoordinateTransformer::projectedPosition
QgsPoint projectedPosition() const;
//!\copydoc QgsQuickCoordinateTransformer::sourcePosition
QgsPoint sourcePosition() const;
//!\copydoc QgsQuickCoordinateTransformer::sourcePosition
void setSourcePosition( const QgsPoint &sourcePosition );
//!\copydoc QgsQuickCoordinateTransformer::destinationCrs
QgsCoordinateReferenceSystem destinationCrs() const;
//!\copydoc QgsQuickCoordinateTransformer::destinationCrs
void setDestinationCrs( const QgsCoordinateReferenceSystem &destinationCrs );
//!\copydoc QgsQuickCoordinateTransformer::sourceCrs
QgsCoordinateReferenceSystem sourceCrs() const;
//!\copydoc QgsQuickCoordinateTransformer::sourceCrs
void setSourceCrs( const QgsCoordinateReferenceSystem &sourceCrs );
//!\copydoc QgsQuickCoordinateTransformer::transformContext
void setTransformContext( const QgsCoordinateTransformContext &context );
//!\copydoc QgsQuickCoordinateTransformer::transformContext
QgsCoordinateTransformContext transformContext() const;
/**
* The altitude value of captured coordinates is corrected by the amount of deltaZ.
* This can be used to correct the altitude with the antenna height for example.
*/
qreal deltaZ() const;
/**
* The altitude value of captured coordinates is corrected by the amount of deltaZ.
* This can be used to correct the altitude with the antenna height for example.
*/
void setDeltaZ( const qreal &deltaZ );
QGeoCoordinate sourceCoordinate() const;
void setSourceCoordinate( const QGeoCoordinate &sourceCoordinate );
/**
* Skips any altitude correction handling during CRS transformation. deltaZ will still be applied.
*/
bool skipAltitudeTransformation() const;
/**
* Skips any altitude correction handling during CRS transformation. deltaZ will still be applied.
*/
void setSkipAltitudeTransformation( bool skipAltitudeTransformation );
signals:
//!\copydoc QgsQuickCoordinateTransformer::projectedPosition
void projectedPositionChanged();
//!\copydoc QgsQuickCoordinateTransformer::sourcePosition
void sourcePositionChanged();
void sourceCoordinateChanged();
//!\copydoc QgsQuickCoordinateTransformer::destinationCrs
void destinationCrsChanged();
//!\copydoc QgsQuickCoordinateTransformer::sourceCrs
void sourceCrsChanged();
//!\copydoc QgsQuickCoordinateTransformer::transformContext
void transformContextChanged();
/**
* The altitude value of captured coordinates is corrected by the amount of deltaZ.
* This can be used to correct the altitude with the antenna height for example.
*/
void deltaZChanged();
/**
* Skips any altitude correction handling during CRS transformation. deltaZ will still be applied.
*/
void skipAltitudeTransformationChanged();
private:
void updatePosition();
QgsPoint mProjectedPosition;
QgsPoint mSourcePosition;
QgsCoordinateTransform mCoordinateTransform;
/**
* The altitude value of captured coordinates is corrected by the amount of deltaZ.
* This can be used to correct the altitude with the antenna height for example.
*/
qreal mDeltaZ = 0;
bool mSkipAltitudeTransformation = true;
};
#endif // QGSQUICKCOORDINATETRANSFORMER_H
|
from django import forms
class TweetForm(forms.Form):
body = forms.CharField(max_length=140) |
With two storage cases and a top shelf perfect for storing books, toys, or whatever else your child desires, this Logik Twin Bookcase Headboard is guaranteed to be a hit with your son or daughter. Give your child a headboard they will love and appreciate for years to come with the Logik Twin Bookcase Headboard. Features:– Pure White laminate finish.– Constructed from engineered wood products.– Coordinates with the Logik Twin Mates Bed.– Two storage spaces and a top shelf.– Profiled edges.– Rounded corners for safety.– Available in Twin size.– 5 year manufacturer’s limited warranty.– Overall Dimensions: 42″ H x 41″ W x 7.5″ D. |
Wednesday, November 24, 2010
Scenario: You want to deploy a SQL Compact / .NET based application, using private deployment only. Your application depend on a certain .NET Framework version. The table below illustrates your options, as you can see there are special considerations, if your clients only have .NET 4.0 and not .NET 3.5 SP1 installed.
Also, notice that all files required for private deployment are included in the private folder in either Program Files or Program Files (x86) (C:\Program Files\Microsoft SQL Server Compact Edition\v4.0\Private) for version 4.0.
Tuesday, November 16, 2010
As you may know by now, the major new feature of SQL Server Compact 4.0 is support for ASP.NET starter websites. In addition, the Entity Framework support has been improved with the following features:
- Support for Code First development (requires EF 4 Feature CTP 4), allowing you to create database and schema in code.
. Support for paging (can be implemented with Skip and Take in LINQ).
- Support for server generated keys (IDENTITY)
The purpose of this post is to show how to use Entity Framework 4 with SQL Server Compact 4.0 and ASP.NET without having the full support for SQL Server Compact 4.0 in VS 2010.
I will cover the following scenarios in the sample application:
1: Migrate data and schema for the solution from either SQL Server Compact 3.5 or SQL Server 2005 or later.
3: Create a layered application, where the UI has no knowledge of Entity Framework, in order to improve testability, minimize UI code and allow the Data Access layer to be replaced with another Data Access Technology (unlikely, I know )
4: Provide the initial implementation of a music track list displayed in a grid, which can be sorted and paged.
7: Use various extension methods, that make your life with Entity Framework smoother.
For this sample I am using the Chinook database from CodePlex, which is delivered in script format and as a 3.5 SDF file. The Chinook database schema represents a digital media store, including tables for artists, albums, media tracks (3500 tracks), invoices and customers.
Creating the database (optionally migrating from 3.5 or Server)
Depending on your starting point, there are many ways to get to a 4.0 database.
If you have a 3.5 database, you can use SqlCeCmd40.exe to upgrade a copy of this database to 4.0:
Have a 3.5 database handy with the exact same table definition (schema) as the 4.0 database. After generating the EDM based on the 3.5 database, tweak the model to work with a 4.0 database. Let’s see how this is done:
Start by creating an empty solution, named Chinook, to hold our projects:
Then add a C# Class library project to the solution, and name it Chinook.Data:
Remove Class1.cs, then go to file system, and copy the Chinook.sdf (the 3.5 version) to the solution folder (C:\projects\chinook).
(I have also copied the 4.0 version, so I can easily find it later). Now we can add the EDM based on the 3.5 database file:
Name the model ChinookModel.edmx and click Add. In the next step, select Generate From Database, and click Next.
On the “Choose you data connection” step, create a new connection to the Chinook.sdf 3.5 version database, using the SQL Server Compact 3.5 provider, and click Next:
Then you get this question:
(I suggest you reply No)
Select all tables, select pluralize and click Finish. Now we have our Model:
Now, let’s make the Model work with our SQL Server Compact 4.0 file. First, modify the connection string in app.config as follows:
Then modify the emdx file (right click the file, and select Open With.. XML Editor).
Verify your changes by opening the edmx file in the visual designer.
Creating the POCO Entities for use with Repository
Now let us create a separate class library for our POCO entities based on the model, This will allow us to reference this Model project from both the data access layer and the UI layer. In order to do this, follow the steps in this EF Team blog post, and you will end up with a solution structure like this:
Notice the following change,that was made to ChinookModel.tt in order to have the entities in a separate project:
string inputFile = @"..\Chinook.Data\ChinookModel.edmx";
Also, a reference to the Chinook.Model project was added to Chinook.Data:
And the Custom Tool Namespace for the Chinook.Model.Context.tt file was set to Chinook.Model:
Creating the Repository
Now, add a Chinook.Repository project to the solution, to create the data access methods used by the UI. This project should reference the Chinook.Model and the Chinook.Data projects. As always, remove the Class1.cs file. Now, we want to create a method that allows the UI to get a page of Track data for display in a GridView. This is an initial implementation (notice the parameters, which are passed by default when using and ObjectDataSource from the UI):
I will be present in the Technical Learning Centre, SQL Server Data Technologies & Developer Tools booth during the event, so feel free to come and have a chat about some of the technologies and tools, that the SQL Server Data Programmability team provides. |
Q:
Re-arranging array
I have an assignment they ask me to re-arrange an array from the even numbers to the odd numbers
like this:
Sample Output:
Please enter array of 5 integers:
1 2 5 6 4
the array after re-arranging:
2 6 4 1 5
I couldn't do it " I cant use methods" can anyone help me ?
this is my code:
public static void evenOdd(int[] arr){
int i=0;
int arr1[] = new int[5];
for (i=0;i<5;i++)
{
if (arr[i]%2==0)
arr1[i]=arr[i];
}
for (i=0;i<5;i++){
if(arr[i]%2!=0)
arr1[i]=arr[i];
}//end for
for(i=0;i<5;i++)
System.out.print(arr1[i]+" ");
System.out.println("");
}//end method
THANK YOU
A:
The problem is when you add them into the new array you are putting them in the same position: i. Use a separate int to keep count of what part of the index you are on.
public static void evenOdd(int[] arr){
int i=0;
int count = 0;
int arr1[] = new int[5];
for (i=0;i<5;i++) {
if (arr[i]%2==0) {
arr1[count]=arr[i];
count++;
}
}
for (i=0;i<5;i++){
if(arr[i]%2!=0) {
arr1[count]=arr[i];
count++;
}
}//end for
for(i=0; i < 5; i++) {
System.out.print(arr1[i]+"\n");
}
}//end method
|
Bumper crop of senior forwards heading to MLS
Editor's note: This is the fourth in a series of previews for the 2009 MLS SuperDraft.
There's no doubt that the 2009 SuperDraft is the year of the forward. This is as good a group of senior strikers as I can recall and when the projected Generation adidas players are included it goes off the charts. The forward spot is not often a deep one, and while the talent eventually drops off, there is more depth than usual.
The top five seniors all look like legit pro prospects, and there are a handful of possible hidden gems that will be available later in the draft. Compare that to last year when there was only one legit prospect, Patrick Nyarko, and little to speak of after that. The depth would have been even better in the 2009 class if not for the loss of some solid prospects to Europe like Eliseo Giusfredi from Seton Hall, Alex Elliott from Portland and Dejan Jakovic from Alabama-Birmingham.
Just as I've done with the other positions, the probable Generation adidas players are left out for now because nothing has been announced by MLS. Players like Steve Zakuani from Akron, who could be the top pick, and Peri Masosevic from Michigan, who is also highly sought after, will be at the top of the list if they do decide to enter the draft.
Top 10 forward prospects
1. Marcus Tracy, Wake Forest -- Tracy, a Hermann Trophy finalist and first-team All-American, is one of the best striker prospects to come out of the college game in a long time. Tracy was one of two players in D-I to register double digits in both goals (13) and assists (10) this past season, but it's the pure talent and upside that has him at the top of this list. At 6-foot-1, 170 pounds, he has the size, speed and athleticism of an Eddie Johnson. Tracy combines that with fantastic touch, the ability to link and tremendous work ethic and training habits. He's as complete a package as you'll see in the college system.
2. Mike Grella, Duke -- Grella is the ACC Player of the Year, two-time Herman semifinalist and two-time All-American. The only consistent scoring threat for the Blue Devils, Grella still produces despite receiving the entire focus of the opposition defense. He has the rare talent of being able to create his own space to score. Grella has tremendous self confidence, but has the numbers to back it up with a career 41 goals and 27 assists. A former U.S. U-18 and U-20 member, Grella might be eligible for a European Union passport through his Italian-born parents, which makes him a threat to bypass MLS and head overseas to play.
2009 MLS SuperDraft
Jan. 15
St. Louis2 p.m. ET, ESPN2
3. Chris Pontius, California Santa Barbara -- A highly versatile and polished player, Pontius played left midfield early in his college career before moving up front, where he lite up the score sheet. It's unclear yet if he will play up top or wide in the midfield at the pro level, but he has the size and skill to do either. The 2007 Big West Offensive Player of the Year, Pontius added 14 goals in 2008 to bring his career total to 29.
4. Quincy Amarikwa, California Davis -- A terrific athlete who has a great burst, Amarikwa also has a real nose for the goal. At 5-foot-9, 160 pounds, he's a bit on the short side, but has the strength to hold off bigger defenders. Amarikwa exploded with 15 goals in his senior year to win the 2008 Big West Offensive Player of the Year award and ended his career with 31 goals.
5. O'Brian White, Connecticut -- The 2007 Hermann Trophy winner, White chose to pass on MLS last year to stay his senior year with the Huskies. It seems like that move has backfired as White blew out his ACL after 14 games this season. But White still won the Big East Offensive Player of the Year award for the second time and was named an All-American for the second time. While he won't be ready to play until April or so, his talent level is so high that the 6-1 White is still ranked in the top five prospects (he'd would have been second on this list without the injury). White leaves UConn with career totals of 46 goals and 23 assists. Although he went to high school in Toronto, White is a Jamaican who has played with Jamaica's U-15, U-17 and U-20 squads.
6. Graciano Brito, Quinnipiac -- Often listed as a midfielder, I'm going to list Brito as a forward until he proves he can't score in the pro environment. Brito led Quinnipiac in scoring the past three years, was named Northeast Conference Player of the Year twice and has been named an All-American twice. He set a single-season school record with 18 goals, led the nation in goals per game this year with 0.95 and leaves the Bobcat program with the most goals ever (40). At 6-2, 175 pounds, he has the size to play up top at the pro level. Brito is from Sao Nicolau, Cape Verde, but has a green card.
7. Doug DeMartin, Michigan State -- The 6-feet redshirt senior put the Big Ten on notice in his junior year with 12 goals. Apparently the Big Ten wasn't paying attention, because DeMartin scored 17 goals in 2008 to lead the defensive-minded Spartans to Big Ten regular-season and tournament titles. He also picked up the Big Ten Player of the Year award and second-team All-American honors. DeMartin has a good soccer brain, terrific positional sense and good vision, but isn't highly regarded in terms of athleticism.
8. Jordan Seabrook, South Florida -- A former U.S. U-20 player and long considered as someone with big upside and potential, Seabrook hasn't progressed all that much at South Florida. Seabrook burst onto the scene as a freshman when he led the Big East in scoring with 14 goals, but hasn't scored more than six goals in a season since. Sure, he's a marked man, but he has underwhelmed with only 31 career goals and a succession of second and third-team Big East awards. Perhaps motivation may have been a problem for him in the college game. However, speed kills and Seabrook has plenty of it.
9. Graham Zusi, Maryland -- Zusi, the standout leader and big-game player for the national champs, has slid down some charts as time moves on from the College Cup, but not this one. Even though he played in the midfield for the Terps and is listed there by most people, I've never thought he was much of a midfielder. Instead, I see a winger or withdrawn striker with a tremendous long-range shot and skills as a free-kick specialist. Zusi also has leadership skills, a professional's work rate, a quick burst, and a opportunistic streak and sense of timing. Is he a can't miss prospect? No, but if you need someone to play the high wing in a 4-3-3 or behind a target as a second striker, you can do much worse than Zusi. A strong combine might prove he's not this year's Xavier Balc.
10. Tosaint Ricketts, Wisconsin Green Bay -- Ricketts, 6-feet, 175 pounds, has been one of the top scorers for Green Bay for four seasons now and was named First Team All-Horizon League the last two years. A former Canadian U-17 member, Ricketts played for Canada's U-20s at the 2007 FIFA U-20 World Cup, and has most recently been named to the Canadian U-23s. Remarkably five of his six goals in his junior year were game-winners. A top sprinter in high school, pace is certainly not a question here. Ricketts also notably scored a hat trick against the U.S. U-20 team in a friendly on June 6, 2007.
Ten more seniors to watch
Brandon Barklage, St Louis
Mfanafuthi Bhembe, Alabama A&M
Joshua Boateng, Liberty
Kyle Christensen, Denver
Michael Fucito, Harvard
Maxwell Griffin, UCLA
Brad Peters, Eastern Illinois
Daniel Revivo, Winthrop
Chris Salvaggione, North Carolina Charlotte
Chris Wright, New Mexico
Buzz Carrick is the publisher of 3rd Degree, the FC Dallas News Source. He also works in the freelance sports television business and can be reached by e-mail at [email protected]. |
Contents
This is the only reference to map layouts in the entire article. It deserves its own section because at first look, this seems to be simple, but in all reality, it isn't.
For many of these gametypes, especially the CTF-based ones, it's better to plan the map instead of doing one base and replicating it. Game editors don't get along well with brush/patch rotation. However, if you insist on converting a FFA map into CTF, here's the process:[1]
Before doing the rotation, make sure you have nothing filtered off.
Before making a mass selection, select and hide geometry on the existing base side that already exists in the area we are intending to place the cloned base. (The central area)
Draw out a large brush over the existing base, then do a "select inside" and then a "invert selected", then "hide selected".
Tidy up the parts of the base to be selected, hiding each brush that isn't going to be selected.
When only the parts of the base we require are left, select all, and then unhide the rest of the map.
Clone the base. Switch to top down view, if you haven't already. Rotate the selection 180 degrees.
Zoom in and move the selection carefully into place. This is by no means an easy task, take your time and use a lot of care.
Models and other brushes and patches won't rotate automatically with the rest of the map. You must rotate them manually. Some models may also need a remap with new textures in order to make them fit into the bases' visual coherence.
Place red and blue colored decorations (tapestry, arrows, etc.) around the arena, to help people find and distinguish the two bases. Decal arrows guiding to those bases should be added as well. To add to the overall effect, the colour of the base light entities should be done in such a way to reflect the teams' colours. Cyan for the blue base and orange for the red base should work. Both the texture work and the lighting should be used together to reflect the teams' bases.[2]
Some advices on this:
Move away the cloned base from the rest of the map and save the level with a temporary name. This way, if you make a mistake, selecting the base a second time will be straight forward using the select inside tool.
Add location names in the maps (like "blue base", "red armor", "bridge", "central square", etc.) by using the target_location entity. After doing this, during team-based gametypes, players will be informed of the location of their team-mates, in the team overlay infos, and when they use the "chat-team" feature.
Weapon/item placement should be even, even in non-symmetrical team-based maps, with not-so-powerful weapons in bases and very powerful weapons in the middle in order to promote aggressive play and local side fights for powerful items. Also, powerups shouldn't be in bases, but rather in the middle area.[2]
Team-based games are best suited to real players (although if you optimise your level for bots well enough they should give you a reasonable contest). If possible, beta test the level against humans in order to get a real feel for how well the level plays.
General/respawning spawnpoint for non-objective based gametypes (FFA, TDM, LMS, 1on1) and Single Domination. The "INITIAL" flag ("spawnflags" "1") allows players and spectators to spawn in these points. Id Software recommends this over the old info_player_start. There should be at least 16 per map, without restrictions.
Initial spawning points for CTF-based modes. There are two of them: team_CTF_blueplayer and team_CTF_redplayer. Players joining each team will spawn in one of these points.[4] There should be at least 32 of such points, 16 per team, located near the team's own bases or inside them.[5]
Double DOM-specific team spawnpoints. There should be at least 32 of such points, 16 per team, located far from both points.
Independently from the kind of spawn points you decide to use for DD mode, you should make players not spawn right next to the DD points, otherwise it may be almost impossible to keep both points for 10 consecutive seconds.
These are the key entities of the game, used to mark where the key objectives are.
In all of them, avoid the use of the "SUSPENDED" spawnflag, even if the editor and the map seem to allow its use, as bots cannot reach suspended objectives, and they must be reachable by players of both teams alike. Unlike weapons and other items placement, for gametype objectives it's recommended to perfectly align their "origin" point with the ground.
Domination neutral point. It changes to the team color of the last player who touched it. It is used in Domination mode, NOT in Double Domination mode.
You can place up to six of them in the map (if there are more than three, scoring occurs every four seconds instead of two), and you can (should) identify them with distinctive names by setting the "message" key.
Flags for CTF, One Flag CTF and CTF Elimination gametypes. In Double Domination, red and blue flags automatically become the A and B control points (remember: B point spawns in the place of the Blue flag). Additionally, there's a "neutral" flag only available for One Flag CTF.
For One Flag CTF, the flag should be placed in an area that is roughly equidistant from both bases and can be easily reached by players from either team.[6]
Skull receptacles for Harvester, and Overload power diamond sources. Also commonly used as flag bases. The "neutral" obelisk is the Skull Generator for Harvester.
They should work correctly out-of-the-box, without the need to tweak their models. Simply place the entities aligning their "origin point" with the ground (this is very important to prevent problems to bots in Overload mode) and don't worry if models look like "buried in the ground" in the editor.
The skull generator in Harvester tosses skulls about it to a maximum distance of 96 units. Id Software recommends a radius of 104 to 128 units as a minimum. As a rule, the generator should drop skulls only in a places accessible to the players. Skulls should not drop out into death fog or the void. Also the generator should be placed in an area that is roughly equidistant from both bases and can be easily reached by players from either team.[6]
For Overload, when designing the base for the placement of the skull obelisk, don’t make it easy for attackers to shoot the obelisk from protected locations.[6]
Sometimes, mappers want to limit some items to a few gametypes. Each item has a flag, called "gametype", which determines in which gametype it should spawn.
There's also an OA-specific key, "!gametype", which works as the opposite. Every item marked with this key won't spawn in the marked gametypes. This can be useful to provide compatibility with future gametypes, but one has to take in account that this negative key didn't exist in the original Quake 3 game, so while playing with old mods based upon Q3 game logic, it will be ignored, and thus that entity will be shown in ALL gametypes.
Note that both "gametype" and "!gametype" are intended for weapon/item usage, NOT for key objective entities, as these may be required for some mods. Ditto for the "notq3a" and "notta" keys, which are now useless since the Missionpack items are already included into OA itself, and may also be required for some mods.
Mappers can set their creations so they can only be selected via menu or voted by way of the ".arena" file. This file is placed in the "scripts/" folder of the .pk3 archive. The line which sets the gametypes this map supports is "type".
Here are the "type" denominations for each gametype to be supported via menu: |
Medical Politics
Health Politics. Politics affects health, hospital management, physicians and patients in a big way. Dr. David Samadi will explore major national and global health political issues and debates affecting the patient outcome. Learn what you need to know and get Dr. Samadi's take.
HEALTH POLITICS
Zika virus has been making headlines with increasing frequency of late But what is it really, and are you at risk?
Officials in several countries including El Salvador and the Philippines have issued an unprecedented warning, urging women of childbearing age to avoid getting pregnant until 2018 in an attempt to stem the spread of the virus which has been linked to microcephaly, a condition which results in stunted brain and head growth and developmental delay.
Zika is spread by the Aedes species of mosquito, which also brought mankind the dengue and chikungunya viruses. These hardy bugs can survive indoors and out, and the World Health Organization has warned that every country in the Americas with the exception of Canada and continental Chile are havens for the insects.
Virologists have been unable to determine exactly how the virus was able to migrate from Uganda in the 1940s, or indeed how it has been able to spread so quickly now. Twenty-one countries and territories have reported Zika cases since the outbreak first hit the region in May 2015.
How will you know if you've been infected by Zika? You might not, ever. According to the Centers for Disease Control, only 1 in 5 people infected will ever show any symptoms.
Those who are symptomatic of Zika rarely exhibit conditions severe enough to require any hospitalization. Symptoms include headache, fever, conjunctivitis, vomiting, rash, joint pain and muscle pain -- all of which can last up to a week.
Prior to recent Zika outbreaks there have been reports of Zika patients developing the serious auto-immune disorder Guillain-Barré Syndrome. Researchers are also currently investigating a possible connection between maternal Zika infection and infant microcephaly. This is a neurological condition wherein a baby's head is much smaller than normal, and can can contribute to seizures, mental retardation and other health issues. Since October 2015, Brazil has seen an increase in microcephalic births by a factor of ten, and while Zika virus is suspected, it has not been definitively linked to microcephaly.
Although there is no treatment, the CDC recommends that Zika patients rest, increase their fluid intake, and use medications such as acetaminophen for fever relief. They are recommending against aspirin use until dengue fever has absolutely been ruled out, due to the risk of hemorrhage.
With no vaccine yet available, we must all be diligent to both avoid the virus, and avoid spreading it if there is a chance we might have contracted it. Everything you might use to avoid being bitten by your ordinary garden variety mosquito will work against the Aedes species. That includes mosquito netting, avoiding areas with standing water, and mosquito repellent. The CDC recommends using products that contain IR335, picaridin, or DEET. Once bitten and having contracted Zika, it is imperative to avoid being bitten by another mosquito during the first week of infection, to prevent the further spread of the disease.
The CDC is recommending that pregnant women avoid travel to Zika “hot spots”as efforts are underway to formulate a vaccine, which some experts predict could be at least three years away.
If travel to any of these countries is unavoidable during the current crisis, please discuss your visit with a health care professional to make sure you have the most up-to-date information available. |
Q:
What is the best way to resolve an object?
I've written a resolver so I can have a very primitive DI framework. In the framework I allow for a dependency resolver to specify what default types to load if nothing is specified or registered.
However, the way I do the default loading has got me wondering. I'm not sure I'm doing it the best way it could be done.
Example:
T LoadDefaultForType<T>()
{
T _result = default(T);
if (typeof(T) == typeof(ISomeThing)
{
result = new SomeThing();
}
... more of the same
else
{
throw new NotSupportException("Give me something I can work with!");
}
return _result;
}
Update
The use of this would be to get the default object for a given interface in the event that a module or assembly has not configured the interface with a concrete type.
So for instance:
IoC.Resolve<ISomeThing>();
would need to return back to me a SomeThing object if nothing else has been registered to ISomeThing. The LoadDefaultForType in this case is kind of a last ditch effort to use a default (in this case whatever my domain model is).
The Resolve might shed some light on this as well:
T Resolve<T>()
{
T _result = default(T);
if (ContainedObjects.ContainsKey(typeof(T))
_result = (T)ContainedObjects[typeof(T)];
else
_result = LoadDefaultForType<T>();
return _result;
}
Any thoughts? Is there a better way to load default types given that I'm trying to allow for a Convention Over Configuration approach?
A:
A few of suggestions:
You could create an attribute that can be used to mark the default implementation type of a particular interface. When you attempt to resolve the type, you could search for this attribute on T and use reflection to dynamically instantiate the type.
Alternatively, you could use reflection to search the available (loaded) assemblies or a concrete type that implements the interface. This can be a slow and expensive processes, so it would only make sense if the default case is rare.
Finally, if you're comfortable with naming conventions, you could search for a class that has the same name as the interface but without the leading "I". Not the best approach, but certainly one that can be made to work in a pinch.
|
Directory
Kate Spade
$$
The day to day slog doesn’t have to be a somber affair and Kate Spade’s playful collection is the perfect splash of fun. This witty New York designer caters to girls wanting everything from shoes to a bit of wedding bling. |
1. Field of the Invention
The present invention relates to an advertising device for commercial purposes.
2. Description of the Related Art
An advertising device comprises a billboard panel for sticking advertising bills thereon. The bills are stuck on the panel by means of an adhesive agent like a paste for securing them to the panel with certainty. By coating the paste on the panel or the bill, the bill surface is secured with respect to the panel surface.
However, the operation of coating the paste on the panel or the bill and sticking the bill on the panel and the operation of removing the bill from the panel are troublesome and time consuming as well as costly.
On the other hand, it is proposed to secure the bill to the panel by means of a pin or a nail instead of adhesive agent so as to easily stick the bill to the panel and remove it therefrom.
However, when the bill is stuck to the panel by means of pin or nail, openings are easily formed between the bill and the panel so that the bill is apt to be torn by the draft passing through the openings. |
If you have a vulnerable F5, basically attackers can sign anything with your RSA private key. An F5 BIG-IP virtual server configured with a Client SSL profile may be vulnerable to an Adaptive Chosen Ciphertext attack (AKA Bleichenbacher attack) against RSA, which when exploited, may result in plaintext recovery of encrypted messages.https://support.f5.com/csp/article/K21905460
al-khaser is a PoC malware with good intentions that aims to stress your anti-malware system. It performs a bunch of nowadays malware tricks and the goal is to see if you stay under the radar.https://github.com/LordNoteworthy/al-khaser
Puffs is a domain-specific language and library for parsing untrusted file formats safely. Examples of such file formats include images, audio, video, fonts and compressed archives.https://github.com/google/puffs
There was a vulnerability in CouchDB caused by a discrepancy between the database’s native JSON parser and the Javascript JSON parser used during document validation. Because CouchDB databases are meant to be exposed directly to the internet, this enabled privilege escalation, and ultimately remote code execution, on a large number of installations.https://justi.cz/security/2017/11/14/couchdb-rce-npm.html
Privacy Pass is a browser extension for Chrome and Firefox, which uses privacy-preserving cryptography to allow users to authenticate to the services without compromising their anonymity. It uses blind signature schemes.https://privacypass.github.io
There are at least 14 newly discovered vulnerabilities in the Linux kernel USB subsystem. The vulnerabilities were found by the Google syzkaller kernel fuzzer. According to the researchers, all of them can be triggered with a crafted malicious USB device in case an attacker has physical access to the machine.http://www.openwall.com/lists/oss-security/2017/11/06/8
Software and HDL code for the PCILeech FPGA based devices that can be used for the Direct Memory Access (DMA) attack and forensics is now available on a GitHub. The FPGA based hardware provides full access to 64-bit memory space without having to rely on a kernel module running on the target system.https://github.com/ufrisk/pcileech-fpga
Those guys published an interesting paper about the secure cryptographic computation with the threat model without attackers based on Earth. They are proposing SpaceHSM hardware secure devices on the orbit.
"SpaceTEE: Secure and Tamper-Proof Computing in Space using CubeSats"https://arxiv.org/abs/1710.01430
Malscan is a robust and fully featured scanning platform for Linux servers built upon the ClamAV platform, providing all of the features of Clamscan with a host of new features and detection modes.https://github.com/jgrancell/malscan
Interesting research on the possibility of a cheap online surveillance.
"In this work we examine the capability of [..] an individual with a modest budget -- to access the data collected by the advertising ecosystem. Specifically, we find that an individual can use the targeted advertising system to conduct physical and digital surveillance on targets that use smartphone apps with ads."https://adint.cs.washington.edu/
Microsoft security department were contacted by a worried user that found 2 seemingly identical µTorrent executables, with valid digital signatures, but different cryptographic hashes. As they have found out there were marketing campaign identifier in "a text file inside a ZIP file inside a PE file, BASE64 encoded and injected in the digital signature of a PE file.". Quite complicated...https://isc.sans.edu/forums/diary/Its+in+the+signature/22928/
A vulnerability (CVE-2017-15361) in generation of RSA keys used by a software library adopted in cryptographic smartcards, security tokens and other secure hardware chips manufactured by Infineon Technologies AG allows for a practical factorization attack, in which the attacker computes the private part of an RSA key. The attack is feasible for commonly used key lengths, including 1024 and 2048 bits, and affects chips manufactured as early as 2012, that are now commonplace.https://crocs.fi.muni.cz/public/papers/rsa_ccs17
Computer manufacturer company Purism is currently running crowdfunding campaign to finance Librem 5 – A Security and Privacy Focused Phone.
From the campaign webpage:
"Librem 5, the phone that focuses on security by design and privacy protection by default. Running Free/Libre and Open Source software and a GNU+Linux Operating System designed to create an open development utopia, rather than the walled gardens from all other phone providers."
Support them!https://puri.sm/shop/librem-5/ |
#pragma once
#include <torch/csrc/jit/api/module.h>
#include <torch/csrc/jit/frontend/concrete_module_type.h>
#include <torch/csrc/jit/frontend/sugared_value.h>
#include <torch/csrc/jit/python/pybind_utils.h>
#include <memory>
#include <sstream>
#include <string>
#include <vector>
namespace torch {
namespace jit {
std::string typeString(py::handle h);
inline std::shared_ptr<SugaredValue> toSimple(Value* v) {
return std::make_shared<SimpleValue>(v);
}
// NB: This should be the single entry-point for instantiating a SugaredValue
// from a Python object. If you are adding support for converting a new Python
// type, *add it in this function's implementation*.
std::shared_ptr<SugaredValue> toSugaredValue(
py::object obj,
Function& m,
SourceRange loc,
bool is_constant = false);
c10::optional<StrongFunctionPtr> as_function(const py::object& obj);
struct VISIBILITY_HIDDEN PythonValue : public SugaredValue {
PythonValue(
py::object the_self,
c10::optional<py::object> rcb = c10::nullopt,
Value* module_self = nullptr)
: self(std::move(the_self)),
rcb(std::move(rcb)),
moduleSelf_(module_self) {}
FunctionSchema getSchema(
const size_t n_args,
const size_t n_binders,
const SourceRange& loc);
// call it like a function, e.g. `outputs = this(inputs)`
std::shared_ptr<SugaredValue> call(
const SourceRange& loc,
Function& m,
at::ArrayRef<NamedValue> inputs_,
at::ArrayRef<NamedValue> attributes,
size_t n_binders) override;
std::string kind() const override;
std::vector<std::shared_ptr<SugaredValue>> asTuple(
const SourceRange& loc,
Function& m,
const c10::optional<size_t>& size_hint = {}) override;
std::shared_ptr<SugaredValue> attr(
const SourceRange& loc,
Function& m,
const std::string& field) override;
Value* asValue(const SourceRange& loc, Function& m) override {
throw ErrorReport(loc)
<< kind() << " cannot be used as a value. "
<< "Perhaps it is a closed over global variable? If so, please "
<< "consider passing it in as an argument or use a local varible "
<< "instead.";
}
protected:
py::object getattr(const SourceRange& loc, const std::string& name);
void checkForAddToConstantsError(std::stringstream& ss);
py::object self;
c10::optional<py::object> rcb;
Value* moduleSelf_ = nullptr;
};
struct VISIBILITY_HIDDEN PythonModuleValue : public PythonValue {
explicit PythonModuleValue(py::object mod) : PythonValue(std::move(mod)) {}
std::shared_ptr<SugaredValue> attr(
const SourceRange& loc,
Function& m,
const std::string& field) override;
};
// Represents all the parameters of a module as a List[Tensor]
struct VISIBILITY_HIDDEN ConstantParameterList : public SugaredValue {
ConstantParameterList(Value* the_list) : the_list_(the_list) {}
std::string kind() const override {
return "constant parameter list";
}
std::shared_ptr<SugaredValue> call(
const SourceRange& loc,
Function& caller,
at::ArrayRef<NamedValue> inputs,
at::ArrayRef<NamedValue> attributes,
size_t n_binders) override {
return toSimple(the_list_);
}
private:
Value* the_list_;
};
struct VISIBILITY_HIDDEN ModuleDictMethod : public SugaredValue {
explicit ModuleDictMethod(SugaredValuePtr iterable, const std::string& name)
: iterable_(iterable), name_(name){};
std::string kind() const override {
return name_;
}
std::shared_ptr<SugaredValue> call(
const SourceRange& loc,
Function& f,
at::ArrayRef<NamedValue> inputs,
at::ArrayRef<NamedValue> attributes,
size_t n_binders) override {
if (inputs.size() || attributes.size()) {
throw ErrorReport(loc)
<< name_ << " method does not accept any arguments";
}
return iterable_;
}
SugaredValuePtr iterable_;
const std::string name_;
};
struct SugaredDict;
// defines how modules/methods behave inside the script subset.
// for now this does not have any interaction with python.
// in the future, we will add the ability to resolve `self.foo` to python
// {functions, modules, constants} so this SugaredValue is defined here
// anticipating we will eventually need to replace Module with a py::object
// holding the actual nn.Module class.
struct VISIBILITY_HIDDEN ModuleValue : public SugaredValue {
ModuleValue(Value* self, std::shared_ptr<ConcreteModuleType> concreteType)
: self_(self), concreteType_(std::move(concreteType)) {}
std::string kind() const override {
return "module";
}
Value* asValue(const SourceRange& loc, Function& m) override;
SugaredValuePtr asTupleValue(const SourceRange& loc, Function& m) override;
// select an attribute on it, e.g. `this.field`
std::shared_ptr<SugaredValue> tryGetAttr(
const SourceRange& loc,
Function& m,
const std::string& field);
// select an attribute on it, e.g. `this.field`
std::shared_ptr<SugaredValue> attr(
const SourceRange& loc,
Function& m,
const std::string& field) override;
// select an attribute on it, e.g. `this.field`
bool hasAttr(const SourceRange& loc, Function& m, const std::string& field)
override;
// call module.forward
std::shared_ptr<SugaredValue> call(
const SourceRange& loc,
Function& caller,
at::ArrayRef<NamedValue> inputs,
at::ArrayRef<NamedValue> attributes,
size_t n_binders) override {
return attr(loc, caller, "forward")
->call(loc, caller, inputs, attributes, n_binders);
}
std::shared_ptr<SugaredDict> getSugaredDict(
const SourceRange& loc,
Function& m);
std::shared_ptr<SugaredDict> getSugaredNamedBufferDict(
const SourceRange& loc,
Function& m);
void setAttr(
const SourceRange& loc,
Function& m,
const std::string& field,
Value* newValue) override;
SugaredValuePtr iter(const SourceRange& loc, Function& m) override;
std::shared_ptr<SugaredValue> getitem(
const SourceRange& loc,
Function& m,
Value* idx) override;
private:
Value* self_;
std::shared_ptr<ConcreteModuleType> concreteType_;
};
bool isNamedTupleClass(const py::object& obj);
TypePtr registerNamedTuple(const py::object& obj, const SourceRange& loc);
void recurseThroughNestedModules(
const SourceRange& loc,
Function& m,
std::vector<SugaredValuePtr>& keys,
std::vector<SugaredValuePtr>& values,
std::shared_ptr<ModuleValue> self,
const std::string& prefix,
const std::string& field);
// Used to support named_modules()
struct VISIBILITY_HIDDEN SugaredDict : public SugaredValue {
explicit SugaredDict(
std::shared_ptr<ModuleValue> self,
std::shared_ptr<SugaredTupleValue> keys,
std::shared_ptr<SugaredTupleValue> modules) {
self_ = std::move(self);
keys_ = std::move(keys);
modules_ = std::move(modules);
}
std::string kind() const override {
return "ModuleDict";
}
std::shared_ptr<SugaredTupleValue> getKeys() {
return keys_;
}
std::shared_ptr<SugaredTupleValue> getModules() {
return modules_;
}
std::shared_ptr<SugaredValue> attr(
const SourceRange& loc,
Function& m,
const std::string& field) override;
SugaredValuePtr iter(const SourceRange& loc, Function& m) {
return keys_;
};
std::shared_ptr<ModuleValue> self_;
std::shared_ptr<SugaredTupleValue> keys_;
std::shared_ptr<SugaredTupleValue> modules_;
};
struct VISIBILITY_HIDDEN BooleanDispatchValue : public SugaredValue {
BooleanDispatchValue(py::dict dispatched_fn)
: dispatched_fn_(std::move(dispatched_fn)) {}
std::string kind() const override {
return "boolean dispatch";
}
std::shared_ptr<SugaredValue> call(
const SourceRange& loc,
Function& caller,
at::ArrayRef<NamedValue> inputs,
at::ArrayRef<NamedValue> attributes,
size_t n_binders) override;
private:
py::dict dispatched_fn_;
};
struct VISIBILITY_HIDDEN PythonClassValue : public ClassValue {
PythonClassValue(ClassTypePtr type, py::object py_type)
: ClassValue(std::move(type)), py_type_(std::move(py_type)) {}
std::string kind() const override {
return "Python type";
}
std::shared_ptr<SugaredValue> attr(
const SourceRange& loc,
Function& m,
const std::string& field) override;
bool hasAttr(const SourceRange& loc, Function& m, const std::string& field)
override;
private:
py::object py_type_;
};
struct VISIBILITY_HIDDEN PythonExceptionValue : public ExceptionValue {
explicit PythonExceptionValue(const py::object& exception_class)
: ExceptionValue(
py::str(py::getattr(exception_class, "__name__", py::str("")))) {}
std::string kind() const override {
return "Python exception";
}
std::shared_ptr<SugaredValue> call(
const SourceRange& loc,
Function& caller,
at::ArrayRef<NamedValue> inputs,
at::ArrayRef<NamedValue> attributes,
size_t n_binders) override;
};
// Python Slice class.
struct VISIBILITY_HIDDEN PythonSliceClass : public SugaredValue {
explicit PythonSliceClass() {}
std::string kind() const override {
return "Python slice class";
}
std::shared_ptr<SugaredValue> call(
const SourceRange& loc,
Function& caller,
at::ArrayRef<NamedValue> inputs,
at::ArrayRef<NamedValue> attributes,
size_t n_binders) override;
};
} // namespace jit
} // namespace torch
|
But you've forgotten that, my fellow Americans. You've forgotten how hard you rock, and you've given in to fear. You fear that America's powers are in decline. You fear that this country is crumbling to enemies both domestic and foreign. You fear that there's nothing you can do about it, or worse: that you can, but it requires effort.
Look, I won't lie to you: America's bleeding. But let me ask you a question, Sniffles O'Buttercup -- are you going to sit there posting Facebook statuses about how hard you weep for this country, or are you going to sack up, cinch in, and light this patriotism shit off?
You can cry about the America we have, or you can help build the America we want. The best way to do the latter is by solving one problem with another. See, we are fortunate enough to have problems that fit together into a self-devouring crisis ecosystem. Therefore I am proposing that Congress turn the following weaknesses into strengths:
#4. Use the Unemployed to Fight Obesity, Power the Nation
Jesus Diabetes Christ, America, you've let yourself go. You're so fat that when you sit around the house, you sit around the ICU ward recuperating from your fifth coronary. I don't want to kick you while you're down, but I honestly can't tell if you're down or up now that you've shaped out into a perfect sphere. The average American's weight has gone up so much since the 1940s that birth certificates now give the options of "male," "female," and "ham monster."
GettyWhen you're sweating corn syrup, it's time for the nation to reconsider its lifestyle.
This is mostly because of our diet -- we eat so poorly that science now recognizes sodium nitrate as a blood type. But it's also because air conditioning allows us to stay inside playing video games instead of sweating it all out on the football field, bleeding and losing teeth, like people did when they still knew how to have fun. So now you're fat and you need more air conditioning to prevent mold from thriving under your clammy breasts. It's a drain on the electricity, and it's going to stop.
Wasting electricity is an American tradition, and we're not about to give that up. But America is already suffering from rolling power outages. We need to find a way to feed our energy addiction before it forces us into a spiral of responsibility. Unfortunately, rising unemployment and obesity mean that more people are sitting at home, requiring more and more energy to cool their expanding bodies, and that fewer tightly coiled balls of American whoop-ass kicking are at work at the ... electricity factories? Wherever electricity gets made.
The Solution: Obesity + Power Shortages + Unemployment = Green Power
Up to this point, the green people have clogged up our roads with bikes, and the obesity and electricity epidemics have only fed one another. It's time to force feed that snake its own tail.
I'm talking roving gangs of bike wranglers combing the streets for the unemployed and the pedal-powered alike and taking them to a warehouse full of stationary bikes wired up to a capacitor. Their efforts will power a massive game of Mario Kart, and the high scorer for the day gets a $50 bonus in their paycheck.
Is it inefficient? Hell yeah, if your only goal is to generate electricity. We're reducing fossil fuel consumption while forging an army of road warriors. And after a few weeks of 30- to 90-minute shifts under medical supervision, we'll have a slimmer America that gets its fill of video games at work and recreational bicyclists clear from our nation's auto lanes, no longer struggling to pass one another as they dream of clearing Lance Armstrong's name and earning his friendship.
#3. Convert America to a Carnivorous Wildlife Reserve, Give People a Reason to Be Armed
It's not the president's place to interpret or rewrite the Second Amendment, so rest assured, no one is taking your guns away. Although if they were, what are you scared of? That's precisely why you have a gun, you sexy well-regulated militia, you. Were they to somehow disarm you while leaving you alive, you'd be vulnerable to all manner of burglars, caribou, and teenagers.
Meanwhile, this debate is distracting attention from the very real ecological havoc caused by global warming, and thousands upon thousands of species stand to lose their habitats.
That's why every home will be issued its own endangered beast. You will enjoy the protection of a big ol' honking wolf, lion, or cinema's Gary Busey, as well as the entertaining wrasslin' matches that come with that bloody territory. You'll also be guaranteeing a future for these beasts and their prey and stimulating the economy, since feeding these things ain't cheap and you really can't put a price on the value of keeping the lion in your living room well-fed.
I know what you're thinking: "Won't the invader just bring a rhino to a lion fight?"
Don't be absurd. Have you ever tried to drag a rhino across town and coerce it into a burglary? They're not going anywhere they don't want to -- and even if they do, statistically speaking, most rhinoceros crime is nonviolent fiscal fraud. Your enemy's best bet is still to bring a gun, and science has yet to invent the firearm that beats Armed Homeowner Riding a Polar Bear.
GettyLike you wouldn't trade all your guns to be best friends with a polar bear. |
286 F.Supp. 801 (1968)
UNITED STATES of America
v.
BEACH ASSOCIATES, INC., a corporation, Edgar S. Kalb, Bay Carry-Out Shop, Inc., a corporation, William F. Kalb, George Bryant and Florence Bryant, d/b/a Bryant Real Estate Company.
Civ. No. 18759.
United States District Court D. Maryland.
July 15, 1968.
*802 Ramsey Clark, Atty. Gen. of United States, Walter E. Barnett, Frank E. Schwelb, and Robert J. Wiggers, Attys., Dept. of Justice, Washington, D. C., and Stephen H. Sachs, U. S. Atty., Baltimore, Md., for plaintiff.
C. Maurice Weidemeyer, Annapolis, Md., for defendants.
THOMSEN, Chief Judge.
This action was instituted by the Attorney General on behalf of the United States on September 21, 1967, under Title II of the Civil Rights Act of 1964, 42 U.S.C. § 2000a et seq. (the Act), to desegregate a bathing beach on the Chesapeake Bay in Anne Arundel County, Maryland, known as Beverley Beach Club, and a beach cottage or apartment house (the cottage) in the same area. The defendants are Beach Associates, Inc., a Maryland corporation which operates the Beverley Beach Club *803 and the cottage; Bay Carry-Out Shop, Inc., which owns and operates a restaurant immediately adjacent to the Beach Club; Edgar S. Kalb, who is president of Beach Associates, Inc., and manager of the Beach Club and of the cottage; William F. Kalb, the son of Edgar S. Kalb, who is the president and manager of Bay Carry-Out Shop, Inc.; and George and Florence Bryant, who are agents of Edgar S. Kalb for the rental of units within the cottage.
On May 17, 1968, plaintiff filed a motion for a preliminary injunction on the ground that irreparable injury would result to the plaintiff and to Negro citizens if the Beach Club and cottage remained racially segregated for the summer of 1968.
The defendants admit that Negroes are excluded from the facilities of Beverley Beach Club and from the cottage[1] and that the principal issues before the Court for decision are whether these facilities are within the coverage of the Act. By agreement of the parties, and in order to obviate the necessity for two hearings, the hearing on the motion for a preliminary injunction has been consolidated with the trial on the merits.
The facts are not in dispute and are set forth in a stipulation between the parties and in the depositions taken by plaintiff of several of the defendants. Upon this record, the Court enters the following Findings of Fact, Conclusions of Law, and Decree:
FINDINGS OF FACT
1. Beach Associates, Inc., which operates a beach facility known as Beverley Beach Club in a development known as Beverley Beach, in Mayo, Maryland, was incorporated in the State of Maryland on December 12, 1966. The incorporators, each of whom owns 100 shares of stock except Esther K. Hancock, who owns 200 shares, are Esther K. Hancock, Raymond W. Kalb and Ann J. Kalb, his wife, Edgar S. Kalb and Adela P. Kalb, his wife. Edgar S. Kalb is the President and Manager of the corporation. Raymond W. Kalb is the brother and Esther K. Hancock the sister of Edgar S. Kalb, who is the dominant figure in the family.
2. The land and improvements described in Finding No. 1 are owned as tenants in common by Shirley K. Carter, Esther K. Hancock, Miriam Hancock, William S. Kalb, Dolores Wurzbacher, each of whom owns a 1/9th interest, and by Raymond W. Kalb and Ann J. Kalb, his wife, as tenants by the entireties as to 2/9ths, and Edgar S. Kalb and Adela P. Kalb, his wife, as tenants by the entireties as to 2/9ths. This property is leased by the owners to Beach Associates, Inc., at an annual rental of $16,800, and is operated by Beach Associates, Inc., as Beverley Beach Club. Shirley K. Carter, Miriam Hancock and Dolores Wurzbacher are nieces of Edgar S. Kalb, and William F. Kalb is his son.
3. Prior to the 1966 season, the property described in Finding No. 1 was leased from the owners and operated as Beverley Beach Club by a partnership known as Kal-Han Co. The partnership known as Kal-Han Co. was composed of Esther K. Hancock, Edgar S. Kalb and Adela P. Kalb, Raymond W. Kalb and Ann J. Kalb.
4. During the years 1951 to 1964, inclusive, the partnership known as the Kal-Han Co., operated the property described in Finding No. 1 as Beverley Beach Club, and operated a restaurant on that property during the periods in each of those years when this property was operated as a bathing beach.
5. After the conclusion of the 1964 season, and following the enactment of the Civil Rights Act of 1964, Kal-Han Co., the partnership, permanently discontinued the operation of the restaurant referred to in Finding No. 4.
*804 6. Beverley Beach Development Company, Inc. (the Development Company) is a Maryland corporation engaged in the real estate business. In the fall of 1964, the officers of the Development Company were Raymond W. Kalb, President; Esther K. Hancock, Vice-President; and Edgar S. Kalb, Secretary-Treasurer. These three persons were also the directors of the Development Company. In the fall of 1964, the Development Company, knowing that the Kal-Han Company was going to discontinue the sale of food, decided to put up a building for the sale of food as close as possible to the Beverley Beach Club and sell or lease the building. In accordance with that decision, Edgar S. Kalb designed, and the Development Company built a building immediately adjacent to the Beverley Beach Club. This building is now called the Bay Carry-Out Shop. On behalf of the Development Company, Edgar S. Kalb then arranged that his son, William F. Kalb, and his nieces, Shirley K. Carter, Miriam Hancock and Dolores Wurzbacher, should purchase the completed building.
7. Bay Carry-Out Shop, Inc., a Maryland corporation, was incorporated on March 5, 1965, in order to implement the plans described in Finding No. 6. William F. Kalb is the President and Manager, Miriam Hancock is the Vice-President, Shirley K. Carter is the Secretary and Dolores Wurzbacher is the Treasurer of Bay Carry-Out Shop, Inc.
8. Shortly after its incorporation Bay Carry-Out Shop, Inc., purchased the land and improvement described in Finding No. 6 from the Development Company for a consideration of $45,000. This land comprises parts of lots 70-76A, inclusive, in a real estate sub-division known as Beverley Beach Company. The building now used as the Bay Carry-Out Shop had already been constructed at the time of the purchase.
9. Beginning with the summer of 1965, Bay Carry-Out Shop has been primarily operated to provide food for patrons of the Beverley Beach Club. The menu offered by Bay Carry-Out Shop is more varied than that offered by the restaurant which was operated on the premises of the Beverley Beach Club before the effective date of the Act. There is free access between the Beach and the eating facility, and 75-80% of the customers of Bay Carry-Out Shop come from, and return to Beverley Beach Club. The two facilities are open on the same days, and both are closed during the winter months. During the season, Beverley Beach Club is open from approximately 9:00 A.M. to 11:00 P.M., while Bay Carry-Out Shop is open from approximately 10:00 A.M. to 10:00 P.M. There are signs on the premises of the Beverley Beach Club which point to the Bay Carry-Out Shop. These signs, according to the testimony of Edgar S. Kalb, were put up at the request of Beverley Beach Club's employees because "people were setting them crazy, asking how could they go get something to eat."
10. Bay Carry-Out Shop sells food, including soft drinks, beer, coffee, hot dogs, hamburgers, potato chips, cole slaw, barbecue, tuna fish, ham sandwiches, cheese sandwiches, cheeseburgers, a variety of sea foods, and other items. It is sold in such form that it is ready to be consumed.
Bay Carry-Out Shop has two counters, with a common kitchen. The part of the building in which one of the counters is located opens onto a public street, contains a small area in which food may be consumed and serves all races. There is no passage open to the public from that part of the building to the other part, in which is located the other counter, which opens only onto the Beach Club property and serves only patrons of the Beach Club. Although a patron of the Beach Club could buy food at that counter and eat it in his car or take it home, almost all of the food sold at that counter is consumed on the Beach Club property.
11. On the premises of Beverley Beach Club, immediately adjoining Bay Carry-Out Shop, there is located a large building which is under a roof and entirely *805 enclosed. This building contains tables and chairs at which approximately 200 persons may be seated to eat, to rest, or to be protected from inclement weather. The distance between Bay Carry-Out Shop and the nearest of these tables is approximately 30 to 45 feet.
12. William F. Kalb, the manager of Bay Carry-Out Shop, is employed by Beach Associates, Inc., during the off season.
13. There has been no correspondence between Beach Associates, Inc., and Bay Carry-Out Shop, Inc.
14. As a practical matter, Beverley Beach Club and the Bay Carry-Out Shop are operated by Edgar S. Kalb and members of his family in conjunction with one another, so that bathers at Beverley Beach may obtain and eat food during their visit. While legal title to the two establishments is separate, the Court finds that the principal purpose of this technical separation is to avoid coverage under the Civil Rights Act of 1964 and to exclude Negroes from the Beverley Beach Club. The separation of title has no effect on the operation of the facilities for the benefit of the patrons of the Beach Club.
15. Beverley Beach Club distributes folders which solicit patrons from other states to come to the beach; the folders provide directions, and suggest that the patrons bring their friends. Since the majority of Bay Carry-Out Shop's patrons come from Beverley Beach Club, and since Bay Carry-Out Shop sells to all persons indiscriminately, the Court finds that Bay Carry-Out Shop serves and offers to serve interstate travelers. It is not disputed that a substantial portion of the food sold by Bay Carry-Out Shop has moved in interstate commerce.
16. In addition to bathing beach facilities, there is located on the Beverley Beach Club property operated by Beach Associates, Inc., a penny arcade containing pinball machines, coin-operated miniature bowling, other coin-operated amusement devices, and a building in which a bingo game is operated. The beach facilities, the amusement devices and the bingo games are open to the patrons of the beach who care to participate therein. There are benches adjacent to the miniature bowling, seating approximately twelve people. There are no roller coasters, ferris wheels, carousels or other similar devices. Many of the people who come to the kiddie rides and other amusement devices do so to watch and care for their children, some of whom have moved in interstate commerce in order to come to the establishment.
17. Edgar S. Kalb is the manager of a building in the Beverley Beach subdivision of Mayo, Maryland, which is owned by Shirley K. Carter, Miriam Hancock, Dolores Wurzbacher, Esther K. Hancock and William F. Kalb, as tenants in common with respect to a 5/9th share, by Raymond W. Kalb and Ann J. Kalb as tenants by the entireties with respect to a 2/9th share, and by Edgar S. Kalb and Adela P. Kalb as tenants by the entireties with respect to a 2/9th share. George and Florence Bryant are rental agents for this building on behalf of the owners, but all rents are approved by Edgar S. Kalb.
18. The building described in Finding No. 17 contains six complete and separate apartments. Except as indicated in Finding No. 20, infra, each apartment has a living room with a table, chairs and a cot, and two bedrooms, each with a double bed and built-in closet. Each apartment has a kitchen with a gas stove operated by metered gas, an electric refrigerator, a sink with running hot and cold water, a kitchen table, chairs and a built-in cupboard. Each apartment has a separate bathroom containing a wash basin and a toilet. The building is unheated and therefore suitable only for summer rentals. Each apartment is furnished with dishes and cooking utensils, but tenants must bring their own bed linens, towels, wash cloths and blankets. Each apartment has its own entrance door and rear door. Apartments are *806 rented on a weekly basis. A majority of the persons renting these apartments do so for one week only. Rentals may be booked in advance and reservations therefor made only with the real estate agency of George Bryant, or the real estate agency of Lydia A. Cole, or directly with the owners.
19. Advertising circulars have been distributed by real estate agents, including George and Florence Bryant, which advertise the availability for rental of the apartments in the apartment building referred to in Finding No. 17, and also advertise for rent cottages in the Beverley Beach sub-division which are owned by private individuals other than the defendants herein. These circulars have contained the statement "occupancy limited to members of the white race only." The rental agreements which George and Florence Bryant have used to rent apartment units in the apartment building referred to in Findings 17 and 18 have contained the statements "white race only" and "occupancy of the cottage hereby rented is restricted to the white race only."
20. Since the institution of this action, the defendants have been advised by the Anne Arundel County Department of Inspection that said apartment building cannot be licensed for use as a multiple dwelling because it fails to meet the requirement of a recent ordinance of the County Council of Anne Arundel County. Therefore, apartments in that building will not be offered for rent during the summer of 1968. There are no present plans to make the necessary alterations. Five apartments are currently being used as a storage warehouse and one is used as a dormitory for lifeguards employed by Beach Associates, Inc. There are no present plans to tear down the building.
21. There is a sign at the main entrance to the property leased by Beach Associates, Inc., and operated as a bathing beach under the trade name of Beverley Beach Club, which states that the bathing beach is not a public beach, and that no invitation to the public is extended or implied. The tickets given to persons parking their automobiles on the parking area in the vicinity of the buildings operated as Beverley Beach Club have printed upon them the following: "This is a private clubnot a public park." Defendants concede that Beverley Beach Club is not in fact a private club, and that this type of advertising is done only to keep out people they do not want to admit.
22. It is undisputed that Negroes are excluded from the facilities of Beverley Beach Club and from the apartments in the cottage managed by Edgar S. Kalb which are described in Findings 17 and 18. It has been stipulated by the parties that Bay Carry-Out Shop, Inc., has not refused to sell to any person. Bay Carry-Out Shop, Inc., and William F. Kalb, however, have participated with Edgar S. Kalb and Beach Associates, Inc., in transactions designed to enable Beverley Beach Club to remain effectively segregated.
CONCLUSIONS OF LAW
1. This Court has jurisdiction of the defendants and of the subject matter of this action. 42 U.S.C. § 2000a-6.
2. Bay Carry-Out Shop, Inc., serves and offers to serve interstate travelers, and a substantial portion of the food which it sells has moved in interstate commerce. Since the food is sold by Bay Carry-Out Shop in a form fit for consumption on the premises, that establishment is a place of public accommodation within the meaning of 42 U.S.C. § 2000a(b) (2). Newman v. Piggie Park Enterprises, 377 F.2d 433 (4 Cir. 1967), modified as to counsel fees, 390 U.S. 400, 88 S.Ct. 964, 19 L.Ed. 1263 (1968); see Gregory v. Meyer, 376 F.2d 509 (5 Cir. 1967); Adams v. Fazzio Real Estate Co., 268 F.Supp. 630 (E.D.La.1967).
3. Section 201(b) (4) of the Act, 42 U.S.C. § 2000a(b) (4) provides:
"(b) Each of the following establishments which serves the public is a place of public accommodation within the meaning of this sub-chapter if *807 its operations affect commerce, or if discrimination or segregation by it is supported by State action:
* * * * * *
"(4) any establishment (A) (i) which is physically located within the premises of any establishment otherwise covered by this subsection, or (ii) within the premises of which is physically located any such covered establishment, and (B) which holds itself out as serving patrons of such covered establishment."
Plaintiff relies on (b) (4) (A) (ii) and (b) (4) (B), contending that Beverley Beach Club is (A) (ii) an establishment within the premises of which is physically located a covered establishment (Bay Carry-Out Shop, Inc.), and that Beverley Beach Club is also (B) an establishment which holds itself out as serving patrons of such covered establishment (Bay Carry-Out Shop, Inc.).
4. The Court concludes that under all the facts and circumstances of this case, set out in the Findings of Fact, above, the premises on which the Beach Club and Bay Carry-Out Shop, Inc., are located should be considered as a unit, and that Bay Carry-Out Shop, Inc., should be held to be physically located within the premises of the Beverley Beach Club, within the meaning of section 2000a(b) (4) (A) (ii).
5. Moreover, it appears from the evidence that Beverley Beach Club holds itself out as serving patrons of Bay Carry-Out Shop, Inc., a covered establishment, by supplying the tables at which most of such patrons consume the food purchased at the shop, which provides no such facilities for those customers. Beverley Beach Club therefore is covered by section 2000a(b) (4) (B), quoted above. Courts deal with the substance, rather than the form of transactions, and will not permit important legislative policies to be defeated by artifices affecting legal title but not the practical consequences of the existing situation. Knetsch v. United States, 364 U.S. 361, 81 S.Ct. 132, 5 L.Ed.2d 128 (1960); United States v. Reading Co., 253 U.S. 26, 62, 40 S.Ct. 425, 64 L.Ed. 760 (1920); Chicago, M. & St. Paul R.R. Co. v. Minneapolis Civic & Commerce Association, 247 U.S. 490, 501, 38 S.Ct. 553, 62 L.Ed. 1229 (1918); see also United States v. Northwestern Louisiana Restaurant Club, 256 F.Supp. 151 (W.D.La. 1966), and Bradshaw v. Whigam, 11 Race Rel.L.Rep. 934 (S.D.Fla.1966), applying this principle to hold that nominal private clubs are subject to Title II.
6. Without question Beverley Beach Club has advertised for out-of-state patrons, and its operations, as well as those of Bay Carry-Out Shop, Inc., affect interstate commerce. Accordingly, Beverley Beach Club is a place of public accommodation within the meaning of 42 U.S.C. § 2000a(b).[2] Evans v. Laurel Links, 261 F.Supp. 474 (E.D.Va.1966); Adams v. Fazzio Real Estate Co., 268 F. *808 Supp. 630 (E.D.La.1967); United States v. All Star Triangle Bowl, Inc., 283 F. Supp. 300 (1968) (No. 68-111 D.S.C. February 23, 1968); Scott v. Young, 12 Race Rel.L.Rep. 428 (E.D.Va.1968) (consent judgment); and see opinion of Mr. Chief Justice Warren in Drews v. Maryland, 381 U.S. 421, 428, n. 10, 85 S.Ct. 1576, 14 L.Ed.2d 693 (1965). See also Nesmith v. Young Men's Christian Association of Raleigh, N. C., 397 F.2d 96 (1968) (No. 11,931, 4 Cir. June 7, 1968).
7. It is not necessary to decide whether Beverley Beach Club is a place of exhibition and entertainment within the meaning of 42 U.S.C. § 2000a(b) (3).
8. The beach apartments, managed by the defendant Edgar S. Kalb and offered for rent by the defendants George and Florence Bryant, provide lodging for transient guests within the meaning of 42 U.S.C. § 2000a(b) (1). United States v. Sadler (No. 570 E.D. N.C. January 15, 1968). See Hearings before Subcommittee No. 5 of the Committee on the Judiciary, House of Representatives, 88th Cong., 1st Session, Part II, Series No. 4, p. 1402; Hearings before the Senate Commerce Committee, 88th Cong., 1st Session, in S. 1732, July 8, 1963; Series 26, p. 213. The right of any citizen, regardless of race, to rent these apartments is also protected by 42 U.S.C. § 1982. Jones v. Mayer, 392 U.S. 409, 88 S.Ct. 2186, 20 L.Ed.2d 1189 (1968).
9. The discontinuance, since this action was instituted, of the use of the beach apartments as a place of lodging for summer guests does not defeat plaintiff's right to relief. While five of the apartments are now being used for storage, there are no plans to tear the building down, and it can be used for its original purpose if the defendants comply with local ordinances. Under these circumstances, the Court is compelled to issue an injunction enjoining the operation of the lodging facility on a racial discriminatory basis. As stated in Gray v. Sanders, 372 U.S. 368, 376, 83 S.Ct. 801, 9 L.Ed.2d 821 (1962): "* * * the voluntary abandonment of a practice does not relieve a court of adjudicating its legality, particularly where the practice is deeply rooted and long standing. For if the case were dismissed as moot, appellants would be `free to return to * * * [their] old ways.'" United States v. All Star Triangle Bowl, Inc., 283 F.Supp. 300 (1968) (No. 68-111 D.S.C. February 23, 1968); see also, Cypress v. Newport News Gen., etc., Mem. Hosp., 375 F.2d 648, 657-658 (4 Cir. 1967).
10. In cases of racial discrimination "* * * the court has not merely the power but the duty to render a decree which will so far as possible eliminate the discriminatory effects of the past as well as bar like discrimination in the future." Louisiana v. United States, 380 U.S. 145, 154, 85 S.Ct. 817, 822, 13 L.Ed.2d 709 (1965). Where, as here, defendants have represented the Beverley Beach Club to be a private club, excluded non-whites from it, and stated in a variety of ways that the units in the cottage were available to whites only, notice to the general public that the beach and cottage are places of public accommodation, that they are not private, and that they are available to persons of all races on an equal basis is the appropriate means of eliminating the effects of the past discrimination practiced by the defendants. See, e. g., United States v. Coffee Pot, 12 Race Rel.L.Rep. 1515 (M.D.Ala.1967). Since, however, the apartments are not now being rented, no notice that they are available should be presently required.
11. The foregoing Conclusions of Law as to coverage under the Act and as to the relief required are further bolstered by the holdings of the Supreme Court of the United States and of the Court of Appeals for the Fourth Circuit that the Civil Rights Act is to be afforded a liberal construction in order to carry out the purpose of Congress to eliminate the inconvenience, unfairness *809 and humiliation of racial discrimination. Hamm v. Rock Hill, 379 U.S. 306 (1964); Nesmith v. Young Men's Christian Association of Raleigh, N. C., 397 F.2d 96 (1968) (No. 11,931, 4 Cir. June 7, 1968); Miller v. Amusement Enterprises, 394 F.2d 342 (1968) (5 Cir. April 8, 1968 en banc).
DECREE
Pursuant to the foregoing Findings of Fact and Conclusions of Law, it is hereby ordered that the defendants, their officers, agents, employees and successors, and all those in active concert or participation with them, be and they are hereby permanently enjoined from
1. Engaging in any act or practice in the operation of the Beverley Beach Club, the Bay Carry-Out Shop, Inc., or the apartment building described in the foregoing Findings of Fact, which directly or indirectly denies any person the full and equal enjoyment of the goods, services, facilities, advantages and accommodations of any of the aforesaid establishments on the ground of race, color, religion or national origin;
2. Holding out or representing Beverley Beach Club or any of the other facilities described in the foregoing Findings of Fact as being a private club or any type of establishment other than a place of public accommodation;
3. Failing or refusing, within fifteen days after service of a copy of this Order on Edgar S. Kalb or the attorney of record for the defendants, to replace all notices, advertising, tickets and other literature or materials which represent any of these facilities as being a private club, with similar notices, advertising, tickets and other literature or materials which represent said facilities as being places of public accommodation open to all persons of all races without discrimination.
Each party shall bear its own costs.
The Court retains jurisdiction of the action for all purposes.
NOTES
[1] The Bay Carry-Out Shop and its manager, however, deny any racially discriminatory policies or practices. They admit that Bay Carry-Out Shop is a place of public accommodation within the meaning of the Act.
[2] The following facts in this case, among others, require the conclusion that any separation between the two legal entities is insubstantial and intended simply to defeat coverage under the Civil Rights Act:
(a) There is free access between the two properties;
(b) They are open at the same time;
(c) Most of Bay Carry-Out Shop's customers come from Beverley Beach Club;
(d) Bay Carry-Out Shop replaced a restaurant on the beach property shortly after the passage of the Civil Rights Act of 1964;
(e) There are signs on the beach pointing to the Bay Carry-Out Shop, and tables on the beach property less than 40 feet from the food facility:
(f) The Kalb family controls both establishments, as well as the Development Company, and the dealings between the various family enterprises were not arm's length transactions;
(g) The defendants have, in their advertising, held out Beverley Beach Club to be a private club, although they have known that it is not one;
(h) The provision of food for beach patrons is generally an integral part of the operation of a beach, and the Bay Carry-Out Shop was designed to help attract customers to the beach.
|
Site Mobile Navigation
The N.F.L.’s Head Cases
AFTER an unusually large number of brain-jarring tackles last week, the National Football League went on the offensive against players. Commissioner Roger Goodell doled out a total of $175,000 in fines to three players and threatened future suspensions for what a league official called “devastating” hits to the head.
As someone who played in the N.F.L. for six years, I’m all for reducing reckless play as much as possible. But the league’s effort to police particular kinds of hits raises plenty of questions. For instance, what if I lead with my head to make a tackle and knock myself out? Do I get suspended for that? What if I lead with my head and no one gets hurt? What if I hit an opponent with my shoulder and knock him out? What if I hit him in the rib cage and puncture his lung? What if we’re both going for the ball and I catch him under the chin with my helmet? What if he dies?
The truth is that N.F.L. players have been using their heads as weapons since they first donned pads as children. It’s the nature of the sport. Sure, coaches tell you to wrap up an opponent with your arms, to keep your head up, to see what you hit. But when a player is moving forward, his knees are bent and his body is leaning forward. The head leads no matter what.
Some say players should block and tackle with the shoulder pads instead. Doing that means choosing a side, trying to hit an opponent with the left or right shoulder. That technique will get you cut by any professional team before you can begin to perfect it. It uses only half of your body and half of your strength, and it removes your arms from the equation. In a head-first hit, the arms are free to follow the first contact with a bear hug that brings the opponent to the ground.
In my first two seasons in the N.F.L., I played wide receiver, so I rarely had to concern myself with blocking or tackling. Then I was moved to tight end, where I quickly learned that to have any chance of containing the large men across the line of scrimmage, I had to hit them square in the face with my helmet. “Put a hat on him,” coaches implore.
Photo
Credit
Graham Roumieu
I felt woozy or “saw stars” plenty of times, but that didn’t stop me, because using my head was the only effective technique. It was either lead with my head or get trampled. On kickoff returns, I had to sprint back 30 yards, whip around, size up the man I was assigned to block and take his helmet directly in my face. Avoid that contact and your manhood is questioned. The brain cells I lost on plays like that were of less concern to me than being called out in meetings by coaches.
While only the most violent, dramatic and egregious hits make the highlights, there are probably six or seven helmet-to-helmet hits on every play in the N.F.L. The offensive and defensive linemen are smacking heads, running backs are colliding with linebackers, tight ends are blocking defensive ends, safeties are flying in to make tackles.
Before the 1950s, when they wore soft helmets without face masks, players didn’t lead with their heads. They dived at opponents’ legs and corralled them with their arms. Leading with the head meant facial disfigurement and lots of stitches. But once leather was replaced by hard plastic, enclosing the head in protective armor, all bets were off. Couple that with the size of today’s players and the speed of the modern game, and you have a recipe for cerebellum custard.
I understand the N.F.L.’s desire to protect “defenseless” players. But how do we define defenseless? Someone who isn’t paying attention? Someone who doesn’t see you? There are instances where it’s obvious, like a player jogging on the opposite side of the field from the action. The N.F.L. already does a good job of penalizing those types of hits.
But when a receiver is trying to catch a ball or avoid being tackled, the height of his head is constantly changing, often making it impossible for a defensive player to judge the point of impact. One of the players fined by the N.F.L. last week, James Harrison of the Pittsburgh Steelers, was right to say that the penalties handicap his playing style. Maybe a new helmet design would help, something that would better protect the skull and brain but also offer a more forgiving outer surface. The N.F.L. could also try educating coaches, who now believe that a headless hit is an ineffectual one, about the perils of head-first tackling, in hopes that over time safer techniques would become the norm. Or maybe the league should do away with helmets altogether and return to its early “rag days,” bloody noses and all.
But stiffer on-field penalties, fines, suspensions, seminars, summit meetings, press releases — these are knee-jerk public-relations reactions that will do little. The only way to prevent head injuries in football is no more football. It is a violent game by design. The use of helmets plays a critical role in creating that violence. The players understand the risks, and the fans enjoy watching them take those risks. Changing the rules enough to truly safeguard against head injuries would change the game beyond recognition. It wouldn’t be football anymore.
Nate Jackson played for the Denver Broncos from 2003 to 2008.
A version of this op-ed appears in print on October 24, 2010, on page WK11 of the New York edition with the headline: The N.F.L.’s Head Cases. Today's Paper|Subscribe |
THE managing partner of a Bradford law firm, his brother, and one of the firm's solicitors have been found guilty of conspiring to defraud the Legal Aid Agency out of nearly £600,000.
Mohammed Ayub, 55, the boss of Chambers solicitors and his brother Mohammed Riaz, 48, were today convicted of conspiracy to defraud by a jury after a five-week trial at Sheffield Crown Court.
The jury returned half an hour later to find Chambers immigration supervisor Neil Frew, 48, guilty of the same charge by a 10-2 majority
All three defendants were granted bail by Judge Robert Spragg who will sentence them at a later date.
The jury had been out since last Friday.
Defence counsel will spend the next fortnight drafting submissions which the judge will consider along with the Crown's submissions before sentencing.
Prosecutors said the defendants formed a sham company called Legal Support Services, run by Riaz, to claim inflated expenses or disbursements from the LAA for immigration and asylum contract work awarded to Chambers from September, 2010 to October, 2014.
Prosecutor Simon Kealey said disbursements such as payment for interpreters was not included in the fixed fees of the contract with the LAA and were claimed as out-of-pocket expenses.
Almost £600,000 was paid into LSS accounts over a four-year period but the firm was practically "invisible" and was not registered at Companies House and there were no records of it paying corporation tax, VAT or utility bills.
The postal address for LSS was Fulton Street in Bradford city centre - only 20 yards from Chambers Solicitors in Grattan Road.
Investigators were called in after an audit in February, 2012 revealed suspicious travel expenses for interpreters claimed by LSS.
They found invoices for interpreting work had been deliberately inflated and none of the interpreters booked through Chambers had ever heard of LSS or Riaz.
In one example a £16.20 invoice for an interpreter who never worked for LSS was submitted for reimbursement of £99 from the Legal Aid Agency.
Police were alerted and they found no records for LSS, only a mobile which Riaz used which was paid for out of Chambers' office bank account.
LSS had a "tatty and insecure" door and there was no evidence of it ever offering interpreting services.
Ayub claimed the Legal Aid Agency had been "hounding" him ever since he successfully challenged a £118,000 bill which the LAA claimed he owed.
Cheques totalling £234,894 were paid to LSS in 2012 and 2013 but Ayub said they were for interpreting services.
Frew initially claimed to have no knowledge of LSS when interviewed by police and said he did not know who owned it or that it was located next door.
He said Ayub was the "money man" and handled all the invoices. "He's just very, very controlling," he told the court.
Later he admitted lying to the police because he believed social services might take his children away. He denied doing anything unlawful but admitted knowing Riaz.
Ayub, a former cancer research scientist, claimed everything he did was under the terms of Chambers contract with the LAA and it was permissible to "uplift" interpreters fees to make a profit.
He said all the LSS invoices were prepared by Riaz or Riaz's daughter who worked as an accounts clerk at Chambers.
Riaz told the court he withdrew £537,000 from the bank at the beginning of 2014 to pay the tax bill for three companies he ran. He admitted not having paid tax for ten years.
He said he intended to take the cash to Liechtenstein where he had been told he could settle his tax affairs without being prosecuted by the Inland Revenue.
When he found out it was a scam he put the cash in a safe at the LSS offices.
Riaz likened himself to Walt Disney in setting up the LSS deal with his brother's law firm.
He claimed he had a private arrangement with Chambers to provide interpreters with none of the case workers and few of the interpreters knowing they were actually working for LSS.
He said it fulfilled the "doctrine of undisclosed principals" in law. "I had seen this on a Sky documentary many years ago," he said.
The court heard Disney apparently used agents acting as his "undisclosed principal" to buy land in Florida for Disney World without declaring his identity which would have upped the price of the land.
Riaz claimed he adopted this strategy with LSS, booking interpreters who believed they were working for Chambers to protect his business against rivals setting up a competing interpreter's agency.
"Walt Disney was the principal as I was the principal," he told the court. "Chambers were working on my behalf. They were working as agents for me."
Ayub, of Aireville Drive, Shipley, Riaz, of Southfield Square, Manningham, and Frew, of Hoyle Court Drive, Baildon, had all denied conspiracy to defraud.
After the case, Peter Mann, head of CPS Yorkshire and Humberside’s Complex Casework Unit, said: "This was a calculated, significant and systematic fraud on the Legal Aid Agency, carried out over a number of years.
"It is disgraceful that those who are themselves offering professional legal services should engage in a criminal conspiracy to cynically defraud a government agency of thousands of pounds. It seems that the motive was simple greed.
"Despite offering various implausible explanations for their actions, it’s clear that today the jury has seen through their lies and have found all three guilty of conspiracy to defraud. This sends out a clear message that no-one is above the law."
MORE TOP STORIES
|
Flow dependence of nonelectrolyte absorption in the nephron.
The axial flow dependence of nonelectrolyte absorption was examined in terms of a model incorporating interactions between net volume absorption and both saturable and nonsaturable solute absorption. The model solutions demonstrated that changes in transepithelial solute transport are produced by changes in the average luminal solute concentration. Even passive non-saturable solute absorption was shown to exhibit dependence on the perfusion rate, and, therefore, on the solute delivery rate, which could be incorrectly interpreted as demonstrating the presence of a saturable absorptive mechanism. For a unidirectional lumen-to-bath solute flux mediated in part by a saturable mechanism, the observed flux is dependent on the permeability of any parallel nonsaturable permeation pathway. This permeability also sets a lower bound on the luminal solute concentration which may be achieved during active net solute absorption by determining the rate of passive solute backleak. Extension of the model to incorporate dependence of net volume absorption on the delivery of nonelectrolytes predicted a relationship between perfusion rate and net volume absorption equivalent to approximately one-third of complete glomerulotubular balance. |
Super Lightweight Purple Garden Shoes
£16.99
Select Size
Select Size
4
5
6
7
8
What do you wear to put out the bins, potter in the garden or let the dog out? These super lightweight garden shoes are ideal to leave by the front door and slip on quickly to do those little jobs. You will not believe you have survived this far without a pair!
These shoes are made from super light EVA material and have an aerated padded sole for extra comfort.
Suitable for ladies in a funky lilac purple colour. They are not a wide fitting shoe.
Why We Like Them: Everybody needs a pair of garden shoes - quick to slip on for those little jobs in the garden. |
Correlation among subcortical white matter lesions, intelligence and CTG repeat expansion in classic myotonic dystrophy type 1.
To analyze the correlation among intelligence, brain magnetic resonance images (MRI) and genotype in classic myotonic dystrophy type 1 (DM1) patients. Seventeen patients with classic DM1 were administered intelligence and neuropsychological tests and brain MRI focusing on a semi-quantitative rating scale of subcortical white matter lesions (WMLs). Statistical analysis was measured to evaluate the correlation among clinical manifestations, intelligence, brain MRI abnormalities, and CTG repeat expansion. There were statistically significant correlations between intelligence test and insular WMLs for all DM1 patients and between intelligence quotient and temporal WMLs for those patients with less than 400 of the CTG repeat size. We also documented that temporal WMLs were related to the disease course, and frontal WMLs were correlated with aging in all DM1 patients. However, a poor correlation was found among CTG repeat size and clinical pictures, neuropsychological impairments, and brain MRI abnormalities in all DM1 patients. These results suggest that subcortical WMLs are correlated with focal dementia in classic DM1 patients. Temporal and insular WMLs may be responsible for the global intellectual dysfunction of adult DM1 patients. |
Q:
ASP.net c# - Different modes for redirecting user Edit and Add New
I have a form which brings back a listing of customers in the db. There is also an Add Customer button to add a new customer and a hyperlink where the user could edit existing customers. When clicking the edit link I am able to bring back the correct data for that customer but if I make changes and click the "Update" button it doesn't edit the existing data. The other problem is that the "Update" button is also present when redirecting to add a new customer (the user enters the data for the new customer and clicks "Update"). Is it possible to refer to different code for different actions (Add New or Edit)/queries? Here is what I have so far. Thank you for any help.
<asp:Content ID="Content1" ContentPlaceHolderID="chpContent" runat="server">
<div>
<h2>Customer Listing</h2>
<br />
</div>
<p style="text-align:center">
<asp:Button ID="btnCustomer" class="button" runat="server" Text="Add New Customer" onclick="btnCustomer_Click" />
</p>
<asp:ListView ID="lv" runat="server"
onselectedindexchanged="lv_SelectedIndexChanged">
<LayoutTemplate>
<table width="110%" class="TableListing">
<tbody>
<thead>
<th width="150">Customer Name</th>
<th width="150">Email</th>
<th width="150">City</th>
<th width="40">State</th>
<th width="110">Phone</th>
<th width="80">Modify</th>
</thead>
<tr id="itemPlaceholder" runat="server"></tr>
</tbody>
</table>
<asp:DataPager ID="ItemDataPager" runat="server" PageSize="20">
<Fields>
<asp:NumericPagerField ButtonCount="5" />
</Fields>
</asp:DataPager>
</LayoutTemplate>
<ItemTemplate>
<tr>
<td><%# Eval ("LastName") %>, <%# Eval ("FirstName") %></td>
<td><%# Eval ("Email") %></td>
<td><%# Eval ("City") %></td>
<td><%# Eval ("State") %></td>
<td><%# Eval ("Phone") %></td>
<td>
<asp:HyperLink ID="lnkEdit" runat="server" NavigateUrl='<%# "CustomerEdit.aspx?ID=" + Eval("CustomerID") %>' Text="Edit" />
</td>
</tr>
</ItemTemplate>
Here is my CustomerEdit.aspx page:
public partial class CustomerEdit : System.Web.UI.Page
{
protected void Page_Load(object sender, EventArgs e)
{
this.Master.HighlightNavItem("Customers");
int CustomerID = Int32.Parse(Request.QueryString["ID"]);
//Declare the connection object
SqlConnection Conn = new SqlConnection();
Conn.ConnectionString = ConfigurationManager.ConnectionStrings["MyDatabase"].ConnectionString;
//Connect to the db
Conn.Open();
//Define query
string sql = "SELECT * FROM Customer where CustomerID=@CustomerID";
//Declare the Command
SqlCommand cmd = new SqlCommand(sql, Conn);
//Add the parameters needed for the SQL query
cmd.Parameters.AddWithValue("@CustomerID", CustomerID);
//Declare the DataReader
SqlDataReader dr = null;
//Fill the DataReader
dr = cmd.ExecuteReader();
//Get the data
if (dr.Read() == false)
{
//No Records
dr.Close();
Conn.Close();
return;
}
txtFirstName.Text = dr["FirstName"].ToString();
txtLastName.Text = dr["LastName"].ToString();
txtEmail1.Text = dr["Email"].ToString();
txtEmail2.Text = dr["Email"].ToString();
txtPassword1.Text = dr["Password"].ToString();
txtPassword2.Text = dr["Password"].ToString();
txtAddress1.Text = dr["Address1"].ToString();
txtAddress2.Text = dr["Address2"].ToString();
txtCity.Text = dr["City"].ToString();
txtState.Text = dr["State"].ToString();
txtZip.Text = dr["Zip"].ToString();
txtPhone.Text = dr["Phone"].ToString();
txtFax.Text = dr["Fax"].ToString();
dr.Close();
Conn.Close();
}
protected void btnCancel_Click1(object sender, EventArgs e)
{
Response.Redirect("Customers.aspx");
}
protected void btnUpdate_Click(object sender, EventArgs e)
{
int CustomerID = Int32.Parse(Request.QueryString["ID"]);
//Declare the connection object
SqlConnection Conn = new SqlConnection();
Conn.ConnectionString = ConfigurationManager.ConnectionStrings["MyDatabase"].ConnectionString;
//Connect to the db
Conn.Open();
//Define query
string sql = "UPDATE Customer SET Fax=@Fax Where CustomerID=@CustomerID";
//Declare the Command
SqlCommand cmd = new SqlCommand(sql, Conn);
//Add the parameters needed for the SQL query
cmd.Parameters.AddWithValue("@FirstName", txtFirstName.Text);
cmd.Parameters.AddWithValue("@LastName", txtLastName.Text);
cmd.Parameters.AddWithValue("@Email", txtEmail1.Text);
cmd.Parameters.AddWithValue("@Password", txtPassword1.Text);
cmd.Parameters.AddWithValue("@Address1", txtAddress1.Text);
cmd.Parameters.AddWithValue("@Address2", txtAddress2.Text);
cmd.Parameters.AddWithValue("@City", txtCity.Text);
cmd.Parameters.AddWithValue("@State", txtState.Text);
cmd.Parameters.AddWithValue("@Zip", txtZip.Text);
cmd.Parameters.AddWithValue("@Phone", txtPhone.Text);
cmd.Parameters.AddWithValue("@Fax", txtFax.Text);
//Execute the query
int NumRows = 0;
NumRows = cmd.ExecuteNonQuery();
Conn.Close();
lblUpdate.Text = "Updated " + NumRows.ToString() + " record";
}
}
}
And my Customers.aspx.cs page where the user is redirected.
public partial class Customers : System.Web.UI.Page
{
protected void Page_Load(object sender, EventArgs e)
{
this.Master.HighlightNavItem("Customers");
//Declare the connection object
SqlConnection Conn = new SqlConnection();
Conn.ConnectionString = ConfigurationManager.ConnectionStrings["MyDatabase"].ConnectionString;
//Connect to the db
Conn.Open();
//Define query
string sql = "SELECT CustomerID, LastName, FirstName, Email, Password, Address1, Address2, City, State, Zip, Phone, Fax FROM Customer";
//Declare a SQL Adapter
SqlDataAdapter da = new SqlDataAdapter(sql, Conn);
//Declare a DataTable
DataTable dt = new DataTable();
//Populate the DataTable
da.Fill(dt);
//Bind the Listview
lv.DataSource = dt;
lv.DataBind();
dt.Dispose();
da.Dispose();
Conn.Close();
}
protected void btnCustomer_Click(object sender, EventArgs e)
{
Response.Redirect("CustomerEdit.aspx");
}
protected void lv_SelectedIndexChanged(object sender, EventArgs e)
{
Response.Redirect("CustomerEdit.aspx");
}
}
}
A:
The Update is not working because you overwrite the data on PageLoad. Use the IsPostBack to avoid that as:
protected void Page_Load(object sender, EventArgs e)
{
this.Master.HighlightNavItem("Customers");
if(!IsPostBack)
{
int CustomerID = Int32.Parse(Request.QueryString["ID"]);
//Declare the connection object
SqlConnection Conn = new SqlConnection();
Conn.ConnectionString = ConfigurationManager.ConnectionStrings["MyDatabase"].ConnectionString;
//Connect to the db
Conn.Open();
//Define query
string sql = "SELECT * FROM Customer where CustomerID=@CustomerID";
//Declare the Command
SqlCommand cmd = new SqlCommand(sql, Conn);
//Add the parameters needed for the SQL query
cmd.Parameters.AddWithValue("@CustomerID", CustomerID);
//Declare the DataReader
SqlDataReader dr = null;
//Fill the DataReader
dr = cmd.ExecuteReader();
//Get the data
if (dr.Read() == false)
{
//No Records
dr.Close();
Conn.Close();
return;
}
txtFirstName.Text = dr["FirstName"].ToString();
txtLastName.Text = dr["LastName"].ToString();
txtEmail1.Text = dr["Email"].ToString();
txtEmail2.Text = dr["Email"].ToString();
txtPassword1.Text = dr["Password"].ToString();
txtPassword2.Text = dr["Password"].ToString();
txtAddress1.Text = dr["Address1"].ToString();
txtAddress2.Text = dr["Address2"].ToString();
txtCity.Text = dr["City"].ToString();
txtState.Text = dr["State"].ToString();
txtZip.Text = dr["Zip"].ToString();
txtPhone.Text = dr["Phone"].ToString();
txtFax.Text = dr["Fax"].ToString();
dr.Close();
Conn.Close();
}
}
|
Q:
Result of LINQ query is not equal to the result of a SQL query
I have to make a SELECT over a handful of entities (tables) which needs a lot of JOINs.
When I write that query in SQL Server Management Studio, it works, but in my C# code with LINQ, I get no matches.
Here are a few examples:
SELECT
dbo.Person.PersonID,
dbo.Person.txtFirstName,
dbo.Person.txtLastName,
dbo.Person.txtAccount
FROM
[dbo].[Person]
INNER JOIN
dbo.CustomFieldData_Person ON dbo.Person.PersonID = dbo.CustomFieldData_Person.PersonID
INNER JOIN
dbo.CustomFieldData ON dbo.CustomFieldData_Person.CustomFieldDataID = dbo.CustomFieldData.CustomFieldDataID
INNER JOIN
dbo.CustomFieldListData ON dbo.CustomFieldData.CustomFieldDataID = dbo.CustomFieldListData.CustomFieldDataID
INNER JOIN
dbo.CustomListItem ON dbo.CustomFieldListData.CustomListItemID = dbo.CustomListItem.CustomListItemID
WHERE
[dbo].[CustomListItem].[CustomListItemID] = 218
AND [dbo].[CustomListItem].[CustomListID] = 41
AND [dbo].[Person].[InstanceID] = 80
Matches: 30
List<Person> result =
(from p in DB_Instance_Singleton.getInstance.Person
join cfdp in DB_Instance_Singleton.getInstance.CustomFieldData_Person on p.PersonID equals cfdp.PersonID
join cfd in DB_Instance_Singleton.getInstance.CustomFieldData on cfdp.CustomFieldDataID equals cfd.CustomFieldDataID
join cfld in DB_Instance_Singleton.getInstance.CustomFieldListData on cfd.CustomFieldDataID equals cfld.CustomFieldDataID
join cli in DB_Instance_Singleton.getInstance.CustomListItem on cfld.CustomListItemID equals cli.CustomListItemID
where (cli.CustomListItemID == iCustomListItemID)
&& (cli.CustomListID == iCustomListID)
&& (p.InstanceID == iInstanceID)
select p).ToList<Person>();
Matches: 0
SELECT dbo.Person.PersonID,
dbo.Person.txtFirstName,
dbo.Person.txtLastName,
dbo.Person.txtAccount
FROM [dbo].[Person]
INNER JOIN dbo.CustomFieldData_Person ON dbo.Person.PersonID = dbo.CustomFieldData_Person.PersonID
INNER JOIN dbo.CustomFieldData ON dbo.CustomFieldData_Person.CustomFieldDataID = dbo.CustomFieldData.CustomFieldDataID
INNER JOIN dbo.CustomFieldListData ON dbo.CustomFieldData.CustomFieldDataID = dbo.CustomFieldListData.CustomFieldDataID
INNER JOIN dbo.CustomListItem ON dbo.CustomFieldListData.CustomListItemID = dbo.CustomListItem.CustomListItemID
WHERE [dbo].[Person].[InstanceID] = 80
Matches: 142
List<Person> result =
(from p in DB_Instance_Singleton.getInstance.Person
join cfdp in DB_Instance_Singleton.getInstance.CustomFieldData_Person on p.PersonID equals cfdp.PersonID
join cfd in DB_Instance_Singleton.getInstance.CustomFieldData on cfdp.CustomFieldDataID equals cfd.CustomFieldDataID
join cfld in DB_Instance_Singleton.getInstance.CustomFieldListData on cfd.CustomFieldDataID equals cfld.CustomFieldDataID
join cli in DB_Instance_Singleton.getInstance.CustomListItem on cfld.CustomListItemID equals cli.CustomListItemID
where (p.InstanceID == iInstanceID)
select p).ToList<Person>();
Matches: 142
It seems that I have a problem with the columns from the entity CustomListItem in the WHERE clause.
But I don't understand why.
A:
Thanks to JamieD77 i have found my mistake.
The LINQ-SQL is correct but i in my C#-code i swapped two parameters.
|
Localization of mRNAs of two androgen-dependent proteins, SMR1 and SMR2, by in situ hybridization reveals sexual differences in acinar cells of rat submandibular gland.
Androgen-dependent sexual differences in the granular convoluted tubules of mouse and rat submandibular glands (SMG) have been extensively reported. We studied two major androgen-dependent mRNAs of the rat SMG encoding proteins named SMR1 and SMR2. To determine which cell type in the SMG is responsible for synthesis of these mRNAs, we performed in situ hybridization with digoxigenin-labeled RNA probes coupled with alkaline phosphatase detection. We show that SMR1 and SMR2 mRNAs are synthesized in the acinar cells of the SMG. A clear difference in SMR1 and SMR2 mRNA levels in male and female is demonstrated. During the course of this study we also confirmed the acinar localization of mRNAs encoding the glutamine/glutamic acid-rich proteins (GRP) of rat SMG. Our data are the first clear evidence of androgen-dependent sexual differences in acinar cells of rat submandibular gland. |
glabel BgSpot01Idohashira_Init
/* 0090C 808AB5EC 27BDFFC8 */ addiu $sp, $sp, 0xFFC8 ## $sp = FFFFFFC8
/* 00910 808AB5F0 AFA5003C */ sw $a1, 0x003C($sp)
/* 00914 808AB5F4 AFBF001C */ sw $ra, 0x001C($sp)
/* 00918 808AB5F8 AFB00018 */ sw $s0, 0x0018($sp)
/* 0091C 808AB5FC 3C05808B */ lui $a1, %hi(D_808AB840) ## $a1 = 808B0000
/* 00920 808AB600 00808025 */ or $s0, $a0, $zero ## $s0 = 00000000
/* 00924 808AB604 0C01E037 */ jal Actor_ProcessInitChain
/* 00928 808AB608 24A5B840 */ addiu $a1, $a1, %lo(D_808AB840) ## $a1 = 808AB840
/* 0092C 808AB60C 02002025 */ or $a0, $s0, $zero ## $a0 = 00000000
/* 00930 808AB610 0C010D20 */ jal DynaPolyInfo_SetActorMove
/* 00934 808AB614 00002825 */ or $a1, $zero, $zero ## $a1 = 00000000
/* 00938 808AB618 3C040600 */ lui $a0, 0x0600 ## $a0 = 06000000
/* 0093C 808AB61C AFA00028 */ sw $zero, 0x0028($sp)
/* 00940 808AB620 2484075C */ addiu $a0, $a0, 0x075C ## $a0 = 0600075C
/* 00944 808AB624 0C010620 */ jal DynaPolyInfo_Alloc
/* 00948 808AB628 27A50028 */ addiu $a1, $sp, 0x0028 ## $a1 = FFFFFFF0
/* 0094C 808AB62C 8FA4003C */ lw $a0, 0x003C($sp)
/* 00950 808AB630 02003025 */ or $a2, $s0, $zero ## $a2 = 00000000
/* 00954 808AB634 8FA70028 */ lw $a3, 0x0028($sp)
/* 00958 808AB638 0C00FA9D */ jal DynaPolyInfo_RegisterActor
## DynaPolyInfo_setActor
/* 0095C 808AB63C 24850810 */ addiu $a1, $a0, 0x0810 ## $a1 = 00000810
/* 00960 808AB640 3C048016 */ lui $a0, 0x8016 ## $a0 = 80160000
/* 00964 808AB644 2484E660 */ addiu $a0, $a0, 0xE660 ## $a0 = 8015E660
/* 00968 808AB648 AE02014C */ sw $v0, 0x014C($s0) ## 0000014C
/* 0096C 808AB64C 8C831360 */ lw $v1, 0x1360($a0) ## 8015F9C0
/* 00970 808AB650 28610004 */ slti $at, $v1, 0x0004
/* 00974 808AB654 5020000F */ beql $at, $zero, .L808AB694
/* 00978 808AB658 24010004 */ addiu $at, $zero, 0x0004 ## $at = 00000004
/* 0097C 808AB65C 948E0EDE */ lhu $t6, 0x0EDE($a0) ## 8015F53E
/* 00980 808AB660 31CF0010 */ andi $t7, $t6, 0x0010 ## $t7 = 00000000
/* 00984 808AB664 11E00008 */ beq $t7, $zero, .L808AB688
/* 00988 808AB668 00000000 */ nop
/* 0098C 808AB66C 8C980004 */ lw $t8, 0x0004($a0) ## 8015E664
/* 00990 808AB670 17000005 */ bne $t8, $zero, .L808AB688
/* 00994 808AB674 00000000 */ nop
/* 00998 808AB678 0C00B55C */ jal Actor_Kill
/* 0099C 808AB67C 02002025 */ or $a0, $s0, $zero ## $a0 = 00000000
/* 009A0 808AB680 1000001B */ beq $zero, $zero, .L808AB6F0
/* 009A4 808AB684 8FBF001C */ lw $ra, 0x001C($sp)
.L808AB688:
/* 009A8 808AB688 10000018 */ beq $zero, $zero, .L808AB6EC
/* 009AC 808AB68C AE000164 */ sw $zero, 0x0164($s0) ## 00000164
/* 009B0 808AB690 24010004 */ addiu $at, $zero, 0x0004 ## $at = 00000004
.L808AB694:
/* 009B4 808AB694 1461000E */ bne $v1, $at, .L808AB6D0
/* 009B8 808AB698 24190001 */ addiu $t9, $zero, 0x0001 ## $t9 = 00000001
/* 009BC 808AB69C AE190164 */ sw $t9, 0x0164($s0) ## 00000164
/* 009C0 808AB6A0 3C088016 */ lui $t0, 0x8016 ## $t0 = 80160000
/* 009C4 808AB6A4 8D08FA90 */ lw $t0, -0x0570($t0) ## 8015FA90
/* 009C8 808AB6A8 3C01808B */ lui $at, %hi(D_808AB9D0) ## $at = 808B0000
/* 009CC 808AB6AC C428B9D0 */ lwc1 $f8, %lo(D_808AB9D0)($at)
/* 009D0 808AB6B0 85091468 */ lh $t1, 0x1468($t0) ## 80161468
/* 009D4 808AB6B4 44892000 */ mtc1 $t1, $f4 ## $f4 = 0.00
/* 009D8 808AB6B8 00000000 */ nop
/* 009DC 808AB6BC 468021A0 */ cvt.s.w $f6, $f4
/* 009E0 808AB6C0 46083280 */ add.s $f10, $f6, $f8
/* 009E4 808AB6C4 46005407 */ neg.s $f16, $f10
/* 009E8 808AB6C8 10000008 */ beq $zero, $zero, .L808AB6EC
/* 009EC 808AB6CC E61000BC */ swc1 $f16, 0x00BC($s0) ## 000000BC
.L808AB6D0:
/* 009F0 808AB6D0 24010006 */ addiu $at, $zero, 0x0006 ## $at = 00000006
/* 009F4 808AB6D4 14610003 */ bne $v1, $at, .L808AB6E4
/* 009F8 808AB6D8 00000000 */ nop
/* 009FC 808AB6DC 10000003 */ beq $zero, $zero, .L808AB6EC
/* 00A00 808AB6E0 AE000164 */ sw $zero, 0x0164($s0) ## 00000164
.L808AB6E4:
/* 00A04 808AB6E4 0C00B55C */ jal Actor_Kill
/* 00A08 808AB6E8 02002025 */ or $a0, $s0, $zero ## $a0 = 00000000
.L808AB6EC:
/* 00A0C 808AB6EC 8FBF001C */ lw $ra, 0x001C($sp)
.L808AB6F0:
/* 00A10 808AB6F0 8FB00018 */ lw $s0, 0x0018($sp)
/* 00A14 808AB6F4 27BD0038 */ addiu $sp, $sp, 0x0038 ## $sp = 00000000
/* 00A18 808AB6F8 03E00008 */ jr $ra
/* 00A1C 808AB6FC 00000000 */ nop
|
South African Korfball Federation
South African Korfball Federation (SAKF) is the governing body for the sport of Korfball in South Africa. The national body has 10 regional member associations in its organisation structure. It is affiliated with the world governing body International Korfball Federation. SAKF organises men's and women's competitions annually amongst its regional members across age groups. The men's national team have won three All-Africa Korfball Championship and participated at the IKF World Korfball Championship.
Regional members
This is a list of SAKF regional member associations in its governance structure, below them are the Korfball clubs.
Gauteng East
Gauteng North
Sedibeng
Mpumalanga South
Stellaland
Northern Cape
Southern Cape
Kwa-Zulu Natal
Northern Kwa-Zulu Natal
Eastern Cape
See also
South Africa national korfball team
References
External links
International Korfball Federation official website
Korfball
Category:Korfball in South Africa
Category:Korfball governing bodies |
Austerity and recovery: East Asian lessons for Europe
Anusha Chari, Peter Blair Henry
In the wake of the Great Recession, a contentious debate has erupted over whether austerity is helpful or harmful for economic growth. This column compares the experiences of the East Asian countries – whose leaders responded to the East Asian financial crisis with expansionary fiscal policy – with those of the European periphery countries during the Great Recession. The authors argue that it was a mistake for the European periphery countries to pivot from fiscal expansion to consolidation before their economies had recovered.
In the wake of the Great Recession, a contentious debate has erupted over whether fiscal consolidation, less formally known as ‘austerity’, is helpful or harmful for economic growth. One side argues that austerity is expansionary when achieved via spending cuts rather than tax increases (Alesina and Perotti 1995, Alesina and Ardagna 2010). An alternative view, consistent with textbook prescriptions for countercyclical fiscal policy, suggests that fiscal consolidation is harmful to growth when implemented in the midst of a crisis (Blanchard and Leigh 2013). Both camps, however, ignore the wealth of information inherent in comparing the economic performance of countries that pursue fiscal austerity with those that opt for a different path.
In contrast to the previous literature on fiscal adjustment, this is precisely the approach we adopt in a new paper, “Two Tales of Adjustment: East Asian Lessons for European Growth” (Chari and Henry 2015). Roughly a decade apart, East Asia and Europe were each struck by recessions caused by a similar set of factors: excessive lending (especially in real estate) leading to a high incidence of non-performing loans and failure of financial institutions, followed by a severe credit crunch. Leaders of East Asia responded with standard textbook expansionary fiscal policy, while European leaders switched from fiscal expansion to consolidation before their crisis-ridden economies had recovered.
Using a macro case study in the spirit of the policy experiment approach (see Henry 2007, Henry and Miller 2009), we exploit the similarities between the causes of the Asian financial crisis of 1997–1998 and the Global Crisis of 2008–2009 – and the differences in economic policy responses – to provide a setting in which we can more definitively answer the following question: Did the large and abrupt reversal from fiscal stimulus to fiscal consolidation in Europe at a moment when output was still falling cause its post-crisis recovery to be slower and less complete than it would have been in the absence of this policy reversal?
Two crises, two fiscal policy responses
At the onset of the Asian crisis, officials from the International Monetary Fund (IMF) urged Asian governments to pursue fiscal consolidation as a means of improving the current account through a decrease in absorption, thereby stabilising the balance of payments. On the brink of losing capital market access and in desperate need of liquidity, Asian crisis countries complied with the IMF’s prescription in order to receive emergency loans. Shortly after the initial agreements were signed, however, the IMF reversed course with respect to its initial prescription and allowed its East Asian clients to increase their deficits by enabling automatic stabilisers to take hold.
The policy approach in Europe following the Global Crisis was quite different. There, starting in the fall of 2008, the IMF encouraged countries to pursue fiscal stimulus. Two years later European governments changed tack and pivoted to austerity. They reduced budget deficits as a fraction of GDP and announced the European Fiscal Compact in March 2011. Europe’s pivot away from stimulus toward a starkly different policy stance in the midst of a crisis with very similar causes to the one in Asia enables us to view the trajectory of output in Asia as a proxy for what might have happened in the peripheral countries of Greece, Ireland, Italy, Portugal, and Spain (GIIPS) had Europe stayed the course with stimulus.
Two simple graphs – one of the deficit and the other of GDP growth, with both plotted in region-specific event time – illustrate the differing policy responses in Asia and Europe and their attendant consequences for growth. Figure 1 demonstrates that East Asia pursued a relatively neutral to expansionary fiscal policy stance in the midst and immediate aftermath of the crisis. Figure 1 also shows the markedly different approach taken in the European periphery countries (GIIPS). In the GIIPS, structural and primary fiscal balances expanded significantly in 2008 and 2009. Starting in 2010, however, the modus operandi in European economic policy switched from stimulus to austerity. Charting the cyclically adjusted primary balance (not pictured here) reveals a similarly abrupt pattern as the region pivots toward austerity.
Figure 1. Primary fiscal balance in event time
Figure 2 plots the evolution of the growth rate of GDP in affected countries before and after the East Asian and European crises. The two crises caused sharp economic contractions in both East Asia and in the GIIPS. But while the recovery in Asia was a rapid and robust ‘V’-shaped affair, Europe is still struggling to mount a recovery – more of a ‘W’, less the final upstroke. A striking feature of the data is the speed with which growth recovered in East Asia. Within a year of the crisis, GDP growth turned positive. The average growth rate of GDP during the four-year period after the crisis was about 5% – not quite back to the pre-crisis average, but a strong economic performance by most standards.
Figure 2. Real GDP growth in event time
The event-time profile of GDP growth in the GIIPS stands in sharp contrast to the East Asian profile. While output falls on impact and the recession deepens in the first year after the crisis hits, the pace of contraction slows in the second year as GDP growth becomes slightly less negative. But rather than growth continuing to recover as it did in East Asia, the GIIPS economies experience a ‘double dip’, contracting even more sharply in Year 3 and falling to about -2.5% by Year 4. The correspondence between the components of this three-quarter ‘W’ and the evolution of fiscal policy depicted in Figure 1 provides strong prima facie evidence that the so-called double dip was triggered by the large and rapid pivot from stimulus to austerity after Year 2.
Of course there are numerous reasons why these preliminary observations should be interpreted with caution. First, in contrast to the 2008–2009 Global Crisis, the East Asian crisis began in the periphery of the world economy and never fully penetrated the core, so that continuing growth in the advanced economies could act as a buffer to support a quick, export-oriented recovery in Asia. Second, in terms of initial macroeconomic conditions, the East Asian countries had accumulated surpluses by running countercyclical fiscal policy; they had much lower pre-crisis debt-to-GDP ratios and therefore a larger fiscal cushion with which to absorb the impact of their crisis than did European countries at the onset of the Great Recession. Third, in addition to allowing automatic fiscal stabilisers such as the expansion of spending on the social safety net to kick in, the adjustment of prices – specifically the exchange rate – played a central role in the rapid recovery of output in East Asia.
In spite of these caveats, however, our results do provide substantial evidence that fiscal consolidation in Europe exerted a powerful, negative impact on growth. Across the board, t-tests of differences in differences confirm the simple visual story of Figures 1 and 2. T-tests of differences in differences on unemployment are also consistent with the growth results, and all of our results are robust to alternative time frames for the pre- and post-pivot windows. Panel regression estimates that control for country-fixed effects, changes in exchange rates, and differences in debt-to-GDP ratios confirm that the change in fiscal stance from stimulus to austerity had a negative and statistically significant impact on real GDP growth in Europe. In East Asia, the impact of fiscal policy is evident on impact during and following the crisis, and had a statistically significant and positive effect on real GDP growth in the post-crisis period.
Conclusion
Asia’s recovery following its financial crisis was more rapid and robust than Europe’s, and the decision by policymakers in the two regions to adopt very different fiscal strategies provides a leading explanation for why this was the case. Although the impact on growth and employment of Europe’s pivot to austerity could have been exacerbated by the absence of other policy levers such as exchange rate flexibility and monetary policy independence, the data seem to corroborate the wisdom of countercyclical fiscal policy. By running surpluses when times are good, governments can accumulate a stockpile of funding that allows them to spend, stimulate aggregate demand, and cushion the blow when the economy is hit with a negative shock. Comparing the divergent recoveries in Europe and East Asia also yields the conclusion that, in response to similar crises, it is not simply the size of the fiscal stimulus that matters but also its variability and persistence. While cold-turkey deficit reduction may be the optimal strategy for balancing the budget in some circumstances, on other occasions a gradual path toward recovery and eliminating the deficit may constitute the more prudent and productive course of action.
References
Alesina, A and S Ardagna (2010), “Large Changes in Fiscal Policy: Taxes versus Spending”, in J R Brown (ed.), Tax Policy and the Economy, Volume 24, Chicago: University of Chicago Press: 35–68.
Alesina, A, and R Perotti (1995), “Fiscal Expansions and Adjustments in OECD Economies”, Economic Policy 10(21): 207–247.
Blanchard, O and D Leigh (2014), “Learning about Fiscal Multipliers from Growth Forecast Errors”, IMF Economic Review 62: 179–212.
Chari, A and P B Henry (2015), “Two Tales of Adjustment: East Asian Lessons for European Growth”, IMF Economic Review (forthcoming).
Henry, P B (2007), “Capital Account Liberalization: Theory, Evidence and Speculation”, Journal of Economic Literature 45: 887–935.
Henry, P B and C Miller (2009), “Institutions versus Policies: A Tale of Two Islands”, American Economic Review 99(2): 261–267. |
Generation of S-expression conversion functions from type definitions
Part of the Jane Street's PPX rewriters collection.
|
---
layout: post
title: CentOS 7:使用HAProxy实现Nginx负载均衡
---
HAProxy是一款功能强大、灵活好用的反向代理的开源软件,它提供了负载均衡、服务器代理的功能。HAProxy是Willy Tarreau使用C语言编写的,它支持SSL、压缩、keep-alive、自定义日志格式和header重写。
HAProxy是轻量级的负载均衡和代理服务软件,占用系统资源较少。很多大型的网站都在使用它,例如Github、StackOverflow。
下面我安装配置HAProxy做为两个Nginx服务器的负载均衡。一共需要使用3个服务器,在一台机器上安装HAProxy,另两台机器安装Nginx服务。
# HAProxy的基本概念
## 4层和7层
HAProxy可以使用两种模式运行:TCP 4层模式和HTTP 7层模式。TCP模式:HAProxy把原始TCP数据包从客户端转向到应用服务器;HTTP模式:解析http请求,然后转向到web服务器。我们将使用HTTP 7层模式。
## 负载均衡算法
HAProxy使用负载均衡算法决定把请求发送给哪个服务器,使用的算法:
### Roundrobin-轮流算法
这是最简单的负载均衡算法。对每个新连接,总是下一个后端服务器处理。如果到达最后一个后端服务器,从头开始。
### Lastconn
有最少连接的后端服务器处理新请求。当请求量较大时非常好。
### Source
根据客户端IP决定哪个后端服务器处理。如果IP1是server1处理,那么这个IP1的所有请求都由server1处理。根据IP地址的哈希值决定后端服务器。
# 系统要求
3个CentOS 7服务器:
* 处理负载均衡的HAProxy服务器:192.168.0.101
* Nginx1服务器:192.168.0.108
* Nginx2服务器:192.168.0.109
## 第一步
编辑HAProxy服务器(102.168.0.101)的/etc/hosts:
{% highlight shell %}
vim /etc/hosts
{% endhighlight %}
添加Nginx1和Nginx2的主机名:
```
192.168.0.108 nginx1.your_domain.com nginx1
192.168.0.109 nginx2.your_domain.com nginx2
```
保存退出。
同样,编辑两个Nginx服务器的/etc/hosts,添加:
```
192.168.0.101 loadbalancer
```
在两个Nginx服务器上都要设置。
## 第二步
在HAProxy服务器上安装HAProxy:
{% highlight shell %}
# yum update
# yum install haproxy
{% endhighlight %}
haproxy的配置文件位于/etc/haproxy/。为了防止出错,先备份原始配置文件:
{% highlight shell %}
# cd /etc/haproxy/
# mv haproxy.cfg haproxy.cfg.backup
{% endhighlight %}
编辑配置文件:
{% highlight shell %}
# vim haproxy.cfg
{% endhighlight %}
写入如下内容:
```
#---------------------------------------------------------------------
# 全局设置
#---------------------------------------------------------------------
global
log 127.0.0.1 local2 # 日志
chroot /var/lib/haproxy
pidfile /var/run/haproxy.pid
maxconn 4000
user haproxy # Haproxy在haproxy用户和组下运行
group haproxy
daemon
# 开启 stats unix socket
stats socket /var/lib/haproxy/stats
#---------------------------------------------------------------------
# 基本设置
#---------------------------------------------------------------------
defaults
mode http
log global
option httplog
option dontlognull
option http-server-close
option forwardfor except 127.0.0.0/8
option redispatch
retries 3
timeout http-request 10s
timeout queue 1m
timeout connect 10s
timeout client 1m
timeout server 1m
timeout http-keep-alive 10s
timeout check 10s
maxconn 3000
#---------------------------------------------------------------------
# HAProxy Monitoring 配置
#---------------------------------------------------------------------
listen haproxy3-monitoring *:8080 # Haproxy Monitoring 的使用端口:8080
mode http
option forwardfor
option httpclose
stats enable
stats show-legends
stats refresh 5s
stats uri /stats # HAProxy monitoring的网址
stats realm Haproxy\ Statistics
stats auth testuser:test1234 # 登录Monitoring的用户和密码
stats admin if TRUE
default_backend app-main
#---------------------------------------------------------------------
# FrontEnd 配置
#---------------------------------------------------------------------
frontend main
bind *:80
option http-server-close
option forwardfor
default_backend app-main
#---------------------------------------------------------------------
# 使用roundrobin做为负载均衡算法
#---------------------------------------------------------------------
backend app-main
balance roundrobin # 使用的负载均衡算法
option httpchk HEAD / HTTP/1.1\r\nHost:\ localhost # 检查nginx服务器是否连通- 200状态码
server nginx1 192.168.0.108:80 check # Nginx1
server nginx2 192.168.0.109:80 check # Nginx2
```
**配置rsyslog**
我们需要使用rsyslog记录HAProxy的日志,编辑rsyslog.conf配置文件,打开UDP的514端口:
{% highlight shell %}
# vim /etc/rsyslog.conf
{% endhighlight %}
去掉如下行的注释:
```
$ModLoad imudp
$UDPServerRun 514
```
如果你想指定特定IP,可以更改如下行:
```
$UDPServerAddress 127.0.0.1
```
保存退出。
创建rsyslog配置文件:
{% highlight shell %}
# vim /etc/rsyslog.d/haproxy.conf
{% endhighlight %}
写入如下内容:
```
local2.=info /var/log/haproxy-access.log # 访问日志
local2.notice /var/log/haproxy-info.log # haproxy执行信息
```
重启rsyslog:
{% highlight shell %}
# systemctl restart rsyslog
{% endhighlight %}
启动HAProxy:
{% highlight shell %}
# systemctl start haproxy
# systemctl enable haproxy
{% endhighlight %}
## 第三步
安装配置Nginx。
Nginx1和Nginx2服务器配置方法相同。
安装epel-release:
{% highlight shell %}
# yum install epel-release
{% endhighlight %}
安装Nginx:
{% highlight shell %}
# yum install nginx
{% endhighlight %}
创建index.html测试文件,Nginx1(192.168.0.108):
{% highlight shell %}
# cd /usr/share/nginx/html/
# echo "<h1>nginx1.your_domain.com</h1>" > index.html
{% endhighlight %}
Nginx2(192.168.0.109):
{% highlight shell %}
# cd /usr/share/nginx/html/
# echo "<h1>nginx2.your_domain.com</h1>" > index.html
{% endhighlight %}
启动Nginx服务:
{% highlight shell %}
# systemctl enable nginx
# systemctl start nginx
{% endhighlight %}
## 测试
测试nginx1、2,使用浏览器访问:
```
192.168.0.108
192.168.0.109
```
正常访问网站:http://192.168.0.101,如果有域名,指向这个IP。
登录HAProxy web管理页面:
```
http://192.168.0.101:8080/stats
```
你应该可以看到nginx、http请求的转发信息。 |
Browns sign former Chiefs RB Kareem Hunt
Former Kansas City Chiefs running back Kareem Hunt had 1,202 yards from scrimmage and 14 touchdowns in 11 games this season before being released in December. File Photo by Aaron Josefczyk/UPI | License Photo
Cleveland announced the signing Monday. Hunt, 23, led the NFL in rushing during his rookie campaign in 2017. He had 1,202 yards from scrimmage and 14 touchdowns in 11 games this season before being released in November.
The Chiefs cut Hunt after TMZ released footage of the Pro Bowl running back getting into a physical altercation with a woman.
"First off, I would like to once again apologize for my actions last year. What I did was wrong and inexcusable," Hunt said in a news release from the Browns. "That is not the man I was raised to be, and I've learned a great deal from that experience and certainly should have been more truthful about it after the fact. I'm extremely grateful that John Dorsey, Dee and Jimmy Haslam and the Cleveland Browns organization are granting me the opportunity to earn their trust and represent their organization in the best way possible on and off the field."
Hunt said he is committed to following the necessary steps and learning to be a "better and healthier person."
"I also understand the expectations that the Browns have clearly laid out and that I have to earn my way back to the NFL," Hunt said. "I'm a work in progress as a person, but I'm committed to taking advantage of the support systems that I have in place to become the best and healthier version of myself."
A source told NFL Network that Hunt's contract could be worth more than $1 million, not factoring in a possible suspension. He will be a restricted free agent in 2020.
"My relationship and interaction with Kareem since 2016 in college was an important part of this decision making process but we then did extensive due diligence with many individuals, including clinical professionals, to have a better understanding of the person he is today and whether it was prudent to sign him," Browns general manager John Dorsey said.
"There were two important factors: one is that Kareem took full responsibility for his egregious actions and showed true remorse and secondly, just as importantly, he is undergoing and is committed to necessary professional treatment and a plan that has been clearly laid out," Dorsey added.
NFL commissioner Roger Goodell said Jan. 30 that Hunt is still under investigation. He said Hunt will go on the commissioner's exempt list when he signs with a new team, until the discipline process has concluded.
Dorsey said the Browns "fully understand and respect the complexity of questions and issues in signing a player" with Hunt's history and do not condone his actions.
"Given what we know about Kareem through our extensive research, we believe he deserves a second chance but certainly with the understanding that he has to go through critical and essential steps to become a performing member of this organization, aside from what the NFL determines from their ongoing investigation," Dorsey said.
"We fully understand that Kareem is subject to discipline by the NFL. Here at the Browns, there is a detailed plan with expectations laid out that he understands and must follow, because any similar incident will not be tolerated."
Dorsey added that the Browns will support Hunt and utilize their resources to help the running back become successful on and off of the field "as long as he continues to show the commitment necessary" to represent the franchise. |
Q:
Python—Executing All Permutations of List of Functions
I am looking to execute all permutations of a list of functions, both partial and full, and add the results and put them in a list.
For example, say I have three functions:
foo():
return 1
bar():
return 2
bat():
return 3
I want to execute foo(), bar(), bat(), foo() bar(), foo() bat() bar() bat(), and foo() bar() bat().
Therefore, the resulting list would be: [1, 2, 3, 3, 4, 5, 6].
Any idea how I could call all these functions? In reality I will have around 50 functions and want to record all combinations of all functions.
Thank you for any help you give.
A:
Did you know that you could store functions in lists in Python?
You can define all your functions first:
def foo():
return 1
def bar():
return 2
def bat():
return 3
Then, create a list to hold all of them:
list_of_functions = [foo, bar, bat]
Now you can use itertools.combinations to do what you want:
from itertools import combinations
res_list = []
for i in range(len(list_of_functions)):
comb_list = list(combinations(list_of_functions, i+1))
for combination in comb_list:
x = sum(e() for e in combination)
res_list.append(x)
print(res_list)
|
No longer maintained. BambooInvoice is free Open Source invoicing software intended for small businesses and independent contractors. Built on CodeIgniter, its priorities are ease of use, user-interface, and beautiful code.
http://bambooinvoice.org |
Small size-specific umbilical vein diameter in severe growth restricted fetuses that die in utero.
To study changes in umbilical vein (UV) blood flow velocity, diameter and blood flow volume in intrauterine growth retardation (IUGR) fetuses who die in utero (IUD-IUGR). Twelve singleton IUGR fetuses who died in utero below 600 g were included. All cases had abnormal uterine and umbilical arteries PI. UV diameter and velocity were measured at the time of diagnosis, and at the last exam, within 24 hours prior to intrauterine death. UV flow was calculated per unit weight (mL/min/kg) and abdominal circumference (AC) (mL/min/cm). UV diameter and velocity were normalized per unit AC. Findings were compared to 14 severe viable-IUGR and 22 normal gestational age-matched fetuses. UV flow (mL/min/kg) was significantly lower in IUD-IUGR compared to viable-IUGR (87 +/- 30 mL/min/kg) and control fetuses (131 +/- 33 mL/min/kg) both at the first (79 +/- 40 mL/min/kg) (P < 0.0001), and at the last exam (54 +/- 29 mL/min/kg) (P < 0.0001). No significant longitudinal flow changes were observed. UV velocity/AC was significantly reduced both in IUD-IUGR and viable-IUGR compared to normal fetuses. UV diameter/AC, was significantly reduced only in IUD-IUGR and not in viable-IUGR compared to normal fetuses. UV flow (mL/min/kg) was significantly lower in IUD-IUGR fetuses both versus viable-IUGR and normal fetuses. A low flow was due to a decreased UV flow velocity, but also due to a reduced vessel size. This significantly smaller UV size observed in IUGR fetuses with the worst outcome could be considered a severe prognostic sign because of the diagnosis of severe growth restriction. |
Thomas Gounley
[email protected]
The Gordmans department store in Springfield, along with several others around the state, appears to have been spared closure.
The Nebraska-based retailer filed for bankruptcy protection last month, saying at the time that it planned to liquidate the inventory of its more than 100 discount stores in 22 states. On Thursday, however, Texas-based Stage Stores announced it was the winning bidder for Gordmans’ assets.
Stage Stores said at the time it plans to buy and run at least 50 stores and one of Gordmans’ distribution centers, but it did not identify the fate of specific stores.
Additional details, however, emerged in documents filed late Friday in U.S. Bankruptcy Court in Omaha.
The filings contain a list of 48 closing stores. That list includes several Missouri stores, in Chesterfield, Blue Springs, Liberty and Kansas City, where the chain has two stores.
An additional 57 stores — those that appear to have been spared closure — are on a list labeled "Designation Rights Stores." The location at 3303 S. Campbell Avenue is on that list, along with several other existing Missouri stores, in Fenton, St. Joseph, Independence, St. Charles, O'Fallon, Arnold and Kansas City.
The list of closings filed with the court might be subject to change. Stage Stores said Friday the definitive list would be posted to Gordmans' website this week, according to the Omaha World-Herald.
Stage Stores already operates roughly 800 stores under several brands, including Bealls, Goody’s, Palais Royal, Peebles and Stage.
Stage CEO Michael Glazer says he thinks the Gordmans stores it is buying can thrive once they are free of significant debt and unprofitable locations.
Private equity firm Sun Capital Partners bought Gordmans in 2008 and still owned about half of the company that employed more than 5,000 people.
“We plan to maintain the Gordmans brand and look forward to welcoming a significant number of Gordmans employees to our Company,” Glazer said in a statement.
Retail chains that have closed, or are in the process of closing, stores in the Springfield area so far this year are Staples, Kmart, Vanity, Yankee Candle and MC Sports.
Information from the Associated Press contributed to this report.
Operators of defunct Cowboys 2000 opening country nightclub in west Springfield
Local hot dog stand Wonder Wieners to open 'airport-style sports bar' at Battlefield Mall |
McDonalds sells the Filet-o-fish in spring For all the Christians who don't eat meat on Friday
168 shares |
SAN FRANCISCO (Reuters) - Shares of Snap Inc SNAP.N jumped 9 percent on Wednesday after the owner of messaging app Snapchat received a second analyst "buy" rating following a red-hot public listing this month and with Wall Street skeptical about its lofty valuation.
A woman stands in front of the logo of Snap Inc. on the floor of the New York Stock Exchange (NYSE) while waiting for Snap Inc. to post their IPO, in New York City, NY, U.S. March 2, 2017. REUTERS/Lucas Jackson
The listing on March 1 was the largest by a technology firm in three years, but trading has been volatile, with many investors critical of lack of profitability and decelerating user growth.
Snap’s stock was up 7.1 percent at $21.84 early Wednesday afternoon and traders bought call options contracts at the fastest pace since they first became available on March 10, according to options analytics firm Trade Alert.
A call conveys the right to purchase shares at a fixed price and is usually used to bet on share price gains.
In the newest vote of confidence for Snap, Drexel Hamilton analyst Brian White on Tuesday launched coverage with a “buy” rating and a $30 target price.
“We view Snap as a platform for the imagination that unlocks the creativity of its users and allows uninhibited expression with friends. Snap is a fun place to spend time which can be monetized,” White wrote in a note to clients.
The Los Angeles-based company's app, which allows users to share short-lived messages and pictures, is popular with young people but faces intense competition from larger rivals such as Facebook Inc's FB.O Instagram. Snap has warned it may never become profitable.
Based on the analysts' average buy, sell and neutral recommendations, Snap has the second-worst rating among 282 U.S. companies that have a market capitalization of at least $20 billion, according to Thomson Reuters data. The worst-rated is Sprint Corp S.N.
Most analysts do not expect the stock to rise over the next year.
Including White, two analysts now recommend buying Snap’s stock, while five recommend selling, and four have “neutral” ratings, according to Thomson Reuters data. Their median price target is $21.
In its first two days of trading, Snap surged 59 percent from its $17 initial public offering price. |
You are currently viewing our site as a guest which gives you limited access to view most discussions and access our other features. By joining our free community you will have access to post topics, communicate privately with other members (PM), respond to polls, upload content and access many other special features. Registration is fast, simple and absolutely free so please, join our community today!
If you have any problems with the registration process or your account login, please contact contact us.
Awesome... So it's Physics I suppose!... Good, I'm planning to study Physics here in Lima... This year I'm finishing school... I applied to Electronic Engineering but I'll move on to Physics soon.
By the way... did you changed your msn? or did you get bored of talking to me? Maybe because I was 13 :P I think the last time we talked on msn it was ages ago !!!!
About Me
About Quetch
Real name
Twinsen
Location
Citadel Island
Gender
Male
Interests
To live happily among my friends !
Occupation
Magician Student
Favorite game
Little Big Adventure
Biography
I'm a nice , decent Quetch , married with another named Zoe . I wear a blue Tunic , Sendell's Medallion , and with the aid of my Magic Ball , I try to keep Twinsun as far away as possible from Funfrock's mennace .
Signature
"Because we don't know when we will die, we get to think of life as an inexhaustible well, yet everything happens only a certain number of times, and a very small number, really. How many more times will you remember a certain afternoon of your childhood, some afternoon that's so deeply a part of your being that you can't even conceive of your life without it? Perhaps four or five times more, perhaps not even that. How many more times will you watch the full moon rise? Perhaps twenty. And yet it all seems limitless." --- Paul Bowles |
You are here
Verona Road construction update for Aug. 25-29
Submitted by admin on Mon, 08/25/2014 - 14:49
The following update is provided by the Wisconsin Department of Transportation:
Over the past few weeks, various construction projects related to the Verona Road (US 18/151) Project were completed, and will no longer be included in these weekly construction updates. Those projects involved Beltline lane closures between Gammon Road and Whitney Way, Seminole Highway and Todd Drive, intersection improvements, and more.
All lane restrictions and work operations are weather dependent and subject to change.
Access remains open to area businesses and neighborhoods. Regardless of any roadwork inconvenience, please continue to patronize area businesses in the Verona Road work zone.
Verona Road work
Two lanes open to traffic (in each direction) on new northbound lanes, between the Beltline and Raymond Road. |
Facts About black psychiatrists near me Revealed
Facts About black psychiatrists near me Revealed
Kimberly Gordon, M.D. Will be the Southern Region Trustee Region II Kimberly Gordon M.D is really a board Licensed child and adolescent psychiatrist and assistant professor of scientific psychiatry at Tulane University University of Drugs. Dr. Gordon is enthusiastic about developing courses to do away with disparities in mental health and fitness treatment that disproportionately have an affect on underserved and minority communities. She is likewise enthusiastic about research during the regions of dependancy, trauma and resiliency for Girls and children with temper and anxiety Problems. She has in depth expertise Doing work in community and public psychiatry where by she serves as co-director and supervisor for an outpatient complex ADHD and Trauma Specialty Clinic in New Orleans, Along with serving as medical supervisor for an outpatient general public college dependent software Dr.
This text assembles many architectural sights in the contributions that blacks have made to American psychiatry. The accounts vary in depth and poignancy. But the chapters repeatedly evoke the crucial query of why such a proficient class of medical professionals has encountered so many impediments to working towards their artwork with unfettered encouragement. Spurlock and her colleagues remind us, in the thoughtful and intriguing fashion, that as being a historical make any difference, black physicians have not been in the position to go after excellence freely in these United states of america.
_We didn't consist of physicians who are retired, who are engaged purely in healthcare study, who now not take care of individuals, or that are not affiliated Using the medical job.
A native Detroiter, in each feeling from the term, Dr. Gloria Pitts has used her entire Specialist existence responding on the issues of increasing the lives of your people she touched.
Being a Trainer in a public university district and an instructor she led from the motion for bettering the instructional programs and the delivery approach. Continuing holistically she transitioned seamlessly towards the Office of Civil Legal rights, a constituted mandated point out company, being an investigator and subsequently a conciliator.
This e-book need to be examine by Individuals using an curiosity within the history of psychiatry and by those who marvel what psychiatrists do In combination with supporting people today triumph over the symptoms of These biological Conditions termed psychological ailment.—Journal of Scientific Psychiatry
Pitts has not slowed down. She carries on to function lecturer and mentor to colleges, universities and hospitals where by she spreads her understanding, historical past and encounters with students and colleagues alike.
The course on the BPA is dictated by the growth of our Business as well as current dilemmas experiencing African People. The initial and continuing philosophy should be to impact transform in American psychiatry for the betterment of African Americans as well as the state as a whole. Govt Committee
Now in personal apply, following possessing held many local and national plan directorships of agencies in Michigan, Dr.
The founders of your BPA recognized the worth to move progressively to insure the psychological and psychological advancement of African Americans, affording them the applications to cope and reach the face of persistent racism.
Dr. Bailey black psychiatrists near me also presents consultation into the Healthcare Director of your Texas Youth Commission as Co-Director of Psychiatric Solutions and teaches Ethics and Cultural Psychiatry for inhabitants in general and also baby and adolescent schooling. She serves to be a go to these guys mentor for clinical pupils all over their matriculation in professional medical school at UTHSCSA as well as a mentor to quite a few ethnic minority people over the United states. She presents psychotherapy and profession supervision to inhabitants in training at the same time. Her great site scientific apply focuses totally on evaluation and therapy issues of childhood mental Conditions. She makes use of a loved ones techniques technique, which requires the education and learning on the family members, Neighborhood referrals, and the school system in addition to her index individuals. Her knowledge is in psychosocial troubles as well as impact on psychiatric ailments. Dr. Bailey’s investigate interests contain domestic intercourse-trafficking of minors and she would like to extend her research expertise into Group psychiatry at the same time.
Speak with wellbeing industry experts and Other individuals such as you in WebMD's Communities. It's a Harmless forum in which you can build or engage in support teams and discussions about health and fitness matters that interest you.
The BPA, from its inception, realized its Specific obligation to emphasise the mental wellbeing and psychological growth of African Us citizens, and formulated objectives addressing requisite interdisciplinary action and definition of issues.
She has actually been a mentor to early vocation psychiatrists together with other mental wellbeing treatment specialists. She has yrs of practical experience in administration, policy setting up and prides herself in her "visionary Suggestions". She has served for a medical director before at various public and private professional medical settings. She's a robust advocate of social media marketing and Digital communications and brings these competencies to bear for the Affiliation. |
---
abstract: |
Let $\GG = \langle \AA,\BB\rangle$ be a non-elementary two generator subgroup of the isometry group of $\HH^2$. If $G$ is discrete, free and generated by two hyperbolic elements with disjoint axes, its quotient is a pair of pants and in [@GKwords] we produced a recursive formula for the number of essential self intersections (ESIs) of any primitive geodesic on the quotient. An alternative non-recursive proof of the formula was given in [@Vidur]. We used the formula to give a geometric description of how the primitive geodesic winds around the “cuffs" of the pants.
On a pair of pants, an ESI is a point of a “seam" where a primitive geodesic has a self-intersection. Here we generalize the definition of ESI’s to non-elementary purely loxodromic two generator groups $G \subset \Isom(\HH^3)$ which are discrete and free. We also associate an open geodesic to each generalized ESI we call a [*Connector.*]{} In the quotient manifold the connectors correspond to “opened up self-intersections". We then define a class of groups we call [*Winding groups*]{}; the connectors for these groups give us a way generalize the concept of winding of primitive geodesics in the quotient manifold to this context. For winding groups, the ESI’s and connectors satisfy the same formula as they do in the two-dimensional case. Our techniques involve using the [*stopping generators*]{} we defined in [@GKwords] for the group $\GG$ to make it a model. We then use the model to obtain an algebraic rather than geometric definition for ESI’s and generalize from the algebraic definition.
address:
- 'Department of Mathematics and Computer Science, Rutgers University, Newark, NJ 07079'
- 'Department of Mathematics, The Graduate Center and Lehman College, CUNY, New York, NY 10016'
author:
- Jane Gilman
- Linda Keen
title: 'Winding and Unwinding and essential intersections in $\HH^3$'
---
Introduction
============
In [@GKwords] we considered some geometric implications of the Gilman-Maskit discreteness algorithm, [@GM], for non-elementary two generator subgroups of $\Isom(\HH^2)$ whose generators were hyperbolic with disjoint axes and whose product was also hyperbolic. We showed that when the algorithm determines that the group is discrete and free, the quotient is a three holed sphere and the algorithm has determined discreteness by finding a special pair of [*stopping generators*]{} that correspond to the only three simple geodesics on the quotient surface, those around the waist and the cuffs. Every other geodesic on the quotient winds around the waist and cuffs and has self-intersections. We concentrate our attention on the [*primitive geodesics*]{} on the quotient. A primitive element of the fundamental group of the surface is one that together with one other element generates the fundamental group. A [*primitive curve*]{} is the geodesic in the free homotopy class of such a primitive element. A pair of such geodesics coming from a pair of elements that generate the fundamental group is a [*primtive pair*]{}. These conjugacy classes of primitive geodesics can be identified with the set of rational numbers, [@Enumeration; @KS1].
In discreteness considerations, it is standard to consider a group generated by three involutions in which the two generator group sits as a subgroup of index two. This can be done for two generator groups both in $\Isom(\HH^2)$ and $\Isom(\HH^3)$. For the subgroups of $\HH^2$ under consideration here, the fixed points of these involutions project to geodesics on the surface we call [*seams*]{}. Some of the self-intersections of the primitive geodesics necessarily lie on these seams. In [@GKwords] we called these [*Essential Self-Intersections*]{} to differentiate them from other self-intersections. We produced a recursive formula to count the essential self intersections of the primitive geodesics. We showed that in the quotient, one could view the primitive geodesics as curves that [*wind around*]{} the simple geodesics and that the winding reflects the rational identified with the geodesic. A non-recursive version of the formula for essential self-intersections was given in [@Vidur] along with a proof of the recursive version.
In this paper we generalize the concept of Essential Self-Intersections (ESI’s) of primitive geodesics to non-elementary two generator free discrete subgroups of $\Isom(\HH^3)$. The hyperbolic quotient manifold is now a genus two handlebody and the group elements correspond to non-trivial free homotopy classes of curves in the manifold. Each class has a unique geodesic and to simplify the exposition, we do not distinguish between the group element and the geodesic in the free homotopy class it represents. Also, for the sake of brevity and clarity of the exposition we restrict our discussion to purely loxodromic groups. The results can be extended to groups containing parabolic elements as our two dimensional treatment did.
We note that in [@Vidur] the original definition of ESI’s and the recursive formulas were extended to discrete groups that included elliptic elements and it is likely that these results can also be extended to the three dimensional case.
Generically, the projections of the axes of primitive elements of the group are simple closed curves in the quotient manifold so the there are no self-intersections. Therefore, in order to generalize the ESI’s we need to understand what happens to the intersection points when the subgroup of $\Isom(\HH^2)$ is deformed into a subgroup of $\Isom(\HH^3)$; that is, to understand how the geodesic “opens up” under the deformation. To this end we associate open geodesic arcs we call [*connectors*]{} to the generalized ESI’s we define for these more general groups. The connectors are perpendicular to a primitive geodesic in the quotient manifold and represent the opened up intersection point.
In [@GKhyp] we showed that the involutions of the degree two extension of the group induce a [*hyperelliptic*]{} involution of the quotient manifold that generalizes the hyperelliptic involution of its boundary. The fixed set of this involution consists of three bi-infinite open geodesic arcs and is a generalization of the seams. We prove
The connectors associated to the generalized ESI’s are arcs joining points on the seams and they are invariant under the generalized hyperelliptic involution; they satisfy the same two formulas as ESI’s satisfy in the two dimensional case.
We then define a certain class of these non-elementary rank two discrete free discrete subgroups of $\Isom(\HH^3)$ that we call [*Winding groups*]{}. For these groups we can define an analogue of the stopping generators and a geometric analogue of winding. For this class of groups we prove
For every primitive geodesic in the quotient manifold, there is an analogue of the [*winding*]{} we found in the two dimensional case. This winding reflects the rational number identified with the geodesic.
The paper is organized as follows. In Section 2 we give some background, define the terms we use and the enumeration scheme. In Section 3 we discuss the model group $\GG=\langle \AA,\BB \rangle \subset \HH^2$ and review Essential Self Intersections for this fixed group as an example of a non-elementary discrete free rank two purely hyperbolic group in $\Isom(\HH^2)$ whose generators have disjoint axes. In Section 4 we use the natural isomorphism from the model group to the discrete free purely loxodromic subgroup $G$ of $\Isom(\HH^3)$ to label elements of $G$ and its degree two extension $\tilde{G}$. We then use the labelling to define the generalized ESI’s and the connectors and we prove Theorem A for non-elementary discrete, free, purely loxodromic groups. In Section 5 we define a class of groups for which we prove Theorem B. We call these [*winding groups*]{}; they have the properties that the quotient manifold has a rational pleating locus (defined in that section) and any pair of pleating curves are primitive geodesics that can be represented by a pair of generators of the group. We expect that there are other classes of groups for which Theorem B holds but we leave that discussion for the future.
Background and Terminology {#background}
==========================
We use the following terminology. We consider $\HH^2 \subset \HH^3$ so all of the following makes sense for both the two and three dimensional settings. If $M$ is a geodesic in $\HH^3$ we let $H_M$ denote the half-turn about $M$; this isometry is an orientation preserving involution whose set of fixed points is the geodesic $M$. If $X$ is an isometry we let $Ax_X$ denote the invariant geodesic joining its fixed points; these may be on the boundary of $\HH^3$. This geodesic is called its axis. If $X$ has only one fixed point it is parabolic and the axis is the fixed point. When we restrict to $\HH^2$, the axis of an elliptic is also a point. For brevity and clarity of exposition, in this paper, we will always assume that the isometries we encounter are not parabolic and those that are elliptic have order two and are half-turns. An element of order two is a half-turn if and only if its axis is fixed pointwise.
If $M$ is any geodesic orthogonal to $Ax_X$, there is another geodesic $M'$ orthogonal to $Ax_X$ such that $X$ is the product of the two half-turns, $X=H_{L_M}H_{L_{M'}}$. Note that any two geodesics in $\HH^3$ have a unique common perpendicular. Any element of $\Isom(\HH^3)$ can be factored in an infinite number of ways as a the product of half-turns about a pair of geodesics perpendicular to its axis; if $X$ is loxodromic, the hyperbolic distance between the pair along the axis is half the translation length while if $X$ is elliptic they intersect the axis at the same point and if $X$ is parabolic they intersect at a point on the boundary of the hyperbolic space.
We are interested in discrete free groups $G$ of rank two; we always assume the groups are non-elementary and, for the sake of brevity, give no further mention of that assumption. We will be concerned with [*primitive elements of $G$*]{}. For a free group of rank $n$, an element is [*primitive*]{} if it is part of a minimal generating set [@MKS]. We call a geodesic [*primitive*]{} if it is in the free homotopy class of the fundamental group of the quotient represented by a primitive element. In this paper, a minimal generating set is a [*primitive pair*]{}.
If $G$ is generated by $A$ and $B$, the axes of $A$ and $B$ have a common perpendicular $L$ and there are a unique pair of geodesics $L_A$ and $L_B$ such that $A= H_L \circ H_{L_A}$ and $B = H_L \circ H_{L_B}$.
We denote by $\tilde{G}$ the group generated by the three half-turns $$\tilde{G}= \langle H_L, H_{L_A}, H_{L_B} \rangle.$$ It is clear that $G \subset \tilde{G}$ and that the index of $G$ in $\tilde{G}$ is $2$. It is a classical result that a group and a normal subgroup of finite index are simultaneously discrete and or non-discrete.
We have $A^{-1}B = H_{L_A} \circ H_{L_B}$ and its axis is the common perpendicular to $L_A$ and $L_B$; also $AB= H_L \circ H_{L_A} \circ
H_L \circ H_{L_B}$ and its axis is the common perpendicular to $ H_L \circ H_{L_A} \circ H_L$ and $H_{L_B}$. The cyclically ordered set of lines $$Ax_A, L_A, Ax_{A^{-1}B}, L_B, Ax_B, L$$ consists of six geodesics with the property that each is orthogonal to both of its neighbors. They form a [*right-angled hexagon*]{} as defined by Fenchel in [@Fenchel]. We denote this hexagon by $\H(A,B)$; it has three [*axis sides*]{} and three [*half-turn sides*]{}.
Note that in our discussion of subgroups of $\Isom(\HH^2)$ below, we always assume the axes of the given generators of our group are disjoint. The case where the axes intersect is subsumed in the general discussion of subgroups of $\Isom(\HH^3)$ above. Again for the sake of brevity, we leave a more detailed discussion of results about essential intersections for groups with intersecting axes for another time.
If $G$ acts invariantly on $\HH^2$ and is discrete and free, and if the axes of the generators are disjoint, the quotient $S=\HH^2/G$ is a three-holed sphere or pair of pants. A primitive curve on $S$ is the image of the axis of a primitive element in the group. The quotient $S$ is a two-fold covering of the quotient $\tilde{S}=\HH^2/\tilde{G}$ which is an orbifold; we can visualize it as identifying the front and back sides of a pair of pants. The orbifold points are the projections of the half-turn lines; we call these [*the seams*]{} of the pants. The involution that identifies the front and back is induced by any one of the half-turns in $\tilde{G}$.
Enumeration of Primitive Elements
---------------------------------
As we indicated in the introduction there are various ways to enumerate the conjugacy classes of primitive words. Each is an inductive scheme that associates a representative of the conjugacy class of primitive words to a rational number $p/q$. The scheme lists a word but not its inverse. The generators $A,B$ are assigned to $0/1$ and $1/0$ respectively and the representative word is built up from a sequence of steps using the Farey tessellation of the upper half plane. In [@Enumeration] we denoted the representative words by $E_{p/q}$ and called the enumeration scheme produced there the [*palindromic enumeration scheme*]{}. In that scheme, if $p+q$ is odd ($pq$ is even), then the word $E_{p/q}$ is a palindrome in $A$ and $B$ while if $p+q$ ($pq$ odd) is even, the word $E_{p/q}$ is a product of the two words in the previous two steps of the scheme; these last two words are palindromes and the product is chosen so that the next word in the scheme is again a palindrome. This scheme reflects the $H_L$ symmetry of the group because the axes of the palindromic words in this scheme are all perpendicular to the half-turn line $L$.
We will use the palindromic scheme here and assume $p/q>0$. Suppose first that $E_{p/q}$ is a palindrome. Then $p+q=2n+1$ and $E_{p/q}$ has the form $WU \overline{W}$ where $U \in \{A,B\}$ and $W=X_1X_2 \ldots X_n$ is a word of length $n=(p+q-1)/2$, $X_j \in \{A,B\}$ and $ \overline{W}=X_n \ldots X_1$. If $E_{p/q}$ is not a palindrome so that $p+q=2n$ is even, we write $E_{p/q}=X_1 \ldots X_{2n}$. There are a unique pair of rationals $l/m,r/s$ with $| ls-mr |=1$ such that $\frac{p}{q}=\frac{l}{m}+\frac{r}{s}$. We set $E_{p/q}=E_{l/m}E_{r/s}$ or $E_{p/q}=E_{r/s}E_{l/m}$ where the choice is made so that the next words in the scheme, $E_{\frac{p+l}{q+m}}$ and $E_{\frac{p+r}{q+s}}$ are palindromes. We omit the details here. The interested reader can find them in [@GKwords; @Enumeration].
The forms that the words take can be made more explicit, but we will not need them here. The only property of these words that we will need is
\[samesign\] In the identification of a rational and a primitive word, each time a generator appears in a given word, its exponent has the same sign. That is, in the palindromic enumerations scheme, if $p/q>0$ all of the exponents of $A$ and $B$ are positive whereas if $p/q<0$ the exponents of $A$ are all negative and the exponents of $B$ are all positive. Since $B^{-1}$ never appears, no word is an inverse of another.
$\HH^2$: The Model Group
========================
In this section we assume that we are given a fixed group $\GG=\langle \AA,\BB \rangle \subset \Isom(\HH^2)$ where the axes of $\AA$ and $\AA\BB$ are disjoint and that $\AA,\BB$ are stopping generators for the Gilman-Maskit algorithm. By results of [@GKwords], this means that their axes and the axis of $\AA^{-1}\BB$ project to simple curves on the quotient surface $S$ which is a three-holed sphere. All other axes of elements of $\GG$ project to curves with self-intersections. We also consider the degree two extension $\tilde\GG=\langle H_{\LL}, H_{\LLA}, H_{\LLB} \rangle$ of $\GG$.
The condition that $\AA,\BB$ are stopping generators also means that the hexagon $\H(\AA,\BB)$ is convex in $\HH^2$ and moreover, that $$\F= \H(\AA,\BB) \cup H_{\LL}(\H(\AA,\BB))$$ is a fundamental domain for $\GG$. It has the property that it is symmetric about the line $\LL$ where the symmetry is the half-turn $H_{\LL}$. Note that we use an overline to denote the image under $H_{\LL}$ so that $\overline{\H(\AA,\BB)}=H_{\LL}(\H(\AA,\BB))$ is also a convex hexagon with three axis sides, the axes of $\AA$, $\BB$ and $\BB\AA^{-1}$, and three half-turn sides $\LL$, $\LL_{\bar{\AA}}=H_{\LL}(\LLA)$ and $\LL_{\bar{\BB}}=H_{\LL}(\LLB)$. The hexagons $\H(\AA,\BB)$ and $\overline{\H(\AA,\BB)}$ are each fundamental domains for $\tilde{G}$.
In this model group the axes of the primitive elements $\EE{p/q}$ have geometric properties we want to look at. We assume throughout that $p/q>0$. To obtain the primitive words in the group in which $\AA$ appears with negative exponent and $-1<p/q<0$, we need to replace $\F$ by the fundamental domain for $\GG$ given by $$\F_{\BB}= \H(\AA,\BB) \cup H_{\LL_{\BB}}(\H(\AA,\BB)$$ and in the rest of the discussion, to replace $\LL$ by $\LLB$. For $p/q<-1$, we interchange the roles of $\AA$ and $\BB$; that is we replace $\F$ by the fundamental domain for $\GG$ given by $$\F_{\AA}= \H(\AA,\BB) \cup H_{\LL_{\AA}}(\H(\AA,\BB)$$ and in the rest of the discussion replace $\LL$ by $\LLA$. We will not carry this out but leave it to the reader.
Some of the propositions below and their proofs appear in one or more of [@Enumeration; @KS1; @Vidur], but because of their importance to the new definitions in $\HH^3$, we state the results using the current notation and give detailed proofs.
\[thru F\] The axis of $\EE_{p/q}$ intersects $\partial\F$ in half-turn sides.
One of the intervals on the circle containing the limit set of $\GG$ bounded by the fixed points of $\AA$ is an interval of discontinuity. Similarly, one of the intervals bounded by the fixed points of $\BB$ is, as is one of the intervals bounded by the axes of $\AA^{-1}\BB$ and $\BB\AA^{-1}$. Since these axes are mutually disjoint and the intervals of discontinuity are mutually disjoint, they are separated by the axes. The half-turn lines on $\partial\F$ are perpendicular to these axes so each has endpoints inside the intervals of discontinuity. No axis of a group element can enter the half planes bounded by these intervals of discontinuity so it cannot intersect any of the axis sides of $\F$.
Note that the same argument shows that the axis any element of $\GG$ cannot intersect any copy of $\F$ in an axis side.
\[intersectL\] The axis of $\EE_{p/q}$ intersects $\LL$ inside $\F$.
By Proposition \[thru F\] the axis of $\EE_{p/q}$ enters and leaves $\F$ through half-turn sides. Write $\EE_{p/q}$ as a product of half-turns. If, for example, it enters through $\LLA$ and leaves through the sides $\LLB$ the half-turn expression for $\EE_{p/q}$ would contain an adjacent pair $H_{\LLA}H_{\LLB}$ and hence the expression in terms of $\AA$ and $\BB$ would contain $\AA^{-1}\BB$. This cannot happen if $p/q>0$ by Remark \[samesign\]. The same contradiction would appear in every instance where the axis did not intersect $\LL$.
Our enumeration scheme reflects the symmetry of the domain $\F$ about $\LL$. We want to exploit this to label the set of copies of $\F$ that a fundamental segment of the axis of $\EE_{p/q}$ passes through. Suppose first that $p+q=2n+1$ and $\EE_{p/q}$ is a palindrome so that its axis is symmetric about $\LL$. This means that if $Ax_{\EE_{p/q}}$ leaves $\H(\AA,\BB)$ through $\LLA$, it leaves $\overline{\H(\AA,\BB)}$ through $\LL_{\bar{\AA}}$ and similarly for $\LLB$. In addition to passing through $\F$, a symmetric fundamental segment of the axis passes through $n$ copies of $\F=\F_0$ on one side of $\LL$ and $n$ copies on the other.
We label the sequence of $n$ copies of $\F=\F_0$, starting with the one adjacent to $\H(\AA,\BB)$ by $\F_{j}, j=1, \ldots, n$ and the sequence of $n$ copies of $\F=\F_0$, starting with the one adjacent to $\overline{\H(\AA,\BB)}$ by $\F_{-j}, j=1, \ldots, n$,. The axis of $\EE_{p/q}$ leaves $\F_0$ through the half-turn sides $L^{p/q}_{1}$ and $L^{p/q}_{-1}$ that as it enters $\F_1$ and $F_{-1}$ respectively. It leaves each $\F_{j}$, $j=-n, \ldots, n$ through a half-turn side that is the image of one of the four half-turn sides of $\F$ by an element of $\GG$. It also intersects a conjugate of $\LL$ in each copy of $\F$. We could use the technique of cutting sequences to use groups elements to label these side but the notation is clumsy and we will not need it here (see [@KS1; @Vidur].) Instead, we label the copy of $\LL$ in $\F_j$ by $\LL^{p/q}_{2j}$ and the boundary side through which it leaves $F_j$ by $L^{p/q}_{2j+1}$. We label the intersection point of $Ax_{\EE_{p/q}}$ with each $\LL^{p/q}_j$ by $Q^{p/q}_j$, $j=-2n-1, \ldots, 2n+1$.
Remember that for each $j$, $j=-2n-1, \ldots, 2n+1$ there is a unique word $\WW^{p/q}_j$ such that $\LL^{p/q}_{j}=\WW^{p/q}_j(\YY)$, $\YY \in \{\LL, \LLA, \LLB \}$ so we could use these words as our labels. The only information a labelling by group elements instead of indices would give us is that it would be obvious that $\EE_{p/q}(\LL^{p/q}_{-2n-1})=\LL^{p/q}_{2n+1}$ and $\EE_{p/q}(Q^{p/q}_{-2n-1})=Q^{p/q}_{2n+1}$. We take this for granted here. It then follows that $\EE_{p/q} = H_{\LL^{p/q}_{-2n-1}}H_{\LL}$ so that the axis is perpendicular to $\LL^{p/q}_{-2n-1}$ and $\LL^{p/q}_{2n+1}$ at $Q^{p/q}_{-2n-1}$ and at $Q^{p/q}_{2n+1}$ respectively.
We also have
\[nonright\] The angles at intersection points $Q_j^{p/q}$, $0<j<2n+1$ are not right.
Suppose that for some $0< |j| \leq 2n$ the angle between $L^{p/q}_{j}$ and $Ax_{\EE_{p/q}}$ were right. Then the product $H_{L_j}H_{\LL}$ would be an element sharing fixed points with $\EE_{p/q}$. Since the group is discrete, this would imply that there is an integer $m>1$ such that $(H_{L_j}H_{\LL})^m=\EE_{p/q}$. This cannot be since $\EE_{p/q}$ is primitive.
In [@Enumeration] we noted that if $P_1$ and $P_2$ were palindromes in the scheme, then the common perpendicular to $P_1P_2$ and $P_2P_1$ would intersect the common orthogonal $\LL$ to $P_1$ and $P_2$ and thus determine a point on it. We need an even more detailed analysis here.
That is we now suppose $p+q=2n$ is even so that $\EE_{p/q}=\EE_{l/m}\EE_{r/s}$ where $\frac{p}{q}=\frac{l}{m}+\frac{r}{s}$ with $| ls-mr |=1$. In this case a fundamental segment of $Ax_{\EE_{p/q}}$ goes through an even number of copies of $\F$.
We showed in [@Enumeration] that $\EE_{p/q}$ is a palindrome in $A$ and $AB$ or $B$ and $AB$ so that its axis is perpendicular to conjugates of both of the half-turn sides $\LLA$ and $\LLB$ of $\F$ but it is not perpendicular to $\LL$. Now we also consider $$(\tilde{\EE}_{p/q})^{-1}=H_{\LL}\EE_{p/q}H_{\LL} = H_{\LL} \EE_{l/m}\EE_{r/s} H_{\LL}=( \EE_{l/m})^{-1}(\EE_{r/s}){^-1}=(\EE_{r/s}\EE_{l/m})^{-1}$$ which gives us the other product, $\tilde{\EE}_{p/q}=\EE_{r/s}\EE_{l/m}$. Note that this is a conjugate of $\EE_{p/q}$, $$\EE_{l/m}\EE_{r/s}= \EE_{r/s}^{-1}\EE_{r/s} \EE_{l/m}\EE_{r/s}.$$ In this case we follow the axis of $\EE_{l/m}\EE_{r/s}$ as it leaves $\H(\AA,\BB)$ and mark off the $n-1$ adjacent fundamental domains it passes through. If it is not perpendicular to either of the sides through which it leaves $\F$, we go in both directions until we reach copies of $\F$ where the axis is perpendicular to the half-turn side it lands on. Starting with the furthest copy on either side, we label these $\F_{j}, j=1, \ldots, n$ and label conjugates of the half-turn side $\LL$ in each copy of $\F$ by $L^{p/q}_{2j}$ and the half-turn sides through which it leaves $\F_j$ by $L^{p/q}_{2j+1}$. Note that $\F=\F_{j}$ for one of the $j$’s, say $j^*$.
Next we follow the axis of $\EE_{r/s} \EE_{l/m}$ as it leaves $\overline{\H(\AA,\BB)}$ and mark off the $n-1$ adjacent fundamental domains it passes through until we reach copies of $\F$ where the axis is perpendicular to the half-turn side it lands on and, starting with the furthest copy either side, label them by $\F_{-j}, j=1, \ldots, n$; we label conjugates of the half-turn side $\LL$ in each copy of $\F$ by $L^{p/q}_{-j}$ and the half-turn sides through which it leaves $\F_{-j}$ by $L^{p/q}_{-2j-1}$. As above we label the intersection points of the axes and the half-turn lines respectively by $Q^{p/q}_j$, $j=-2n-1, \ldots,-1, 1, \ldots 2n+1$. Note that by the symmetry under $H_{\LL}$ we have $\F_{j*}=\F_{-j*}$
Now each axis passes through $n-1$ disjoint fundamental domains and each has a segment in $\F=\F_{j*}=\F_{-j^*}$. Again, if we were to use group elements to label the sides we would see that the union of the segments along the axis of $\EE_{p/q}$ and the conjugate of the union of the segments along $\tilde{\EE}_{p/q}$ by $\EE_{r/s}$ give us a fundamental segment for $\EE_{p/q}$.
Note that Proposition \[nonright\] holds for both these axes as well. We also have
For $p+q$ even, the axes of $\EE_{p/q}$ and $\tilde{\EE}_{p/q}$ intersect $\LL$ inside $\F$ in the same point.
A half-turn about a geodesic in the plane $\HH^2$ is a reflection in the geodesic. It follows that since $Ax_{\EE_{p/q}}$ intersects $\LL$, its reflection also does and since the points of $\LL$ are fixed, the intersection with $\LL$ is a fixed point of the reflection. Because these axes are not orthogonal to $\LL$ the intersection is not orthogonal.
This proposition implies that the two points we counted in $\F$ where the axes pass through $\LL$ are actually the same point.
Definition of ESI’s.
----------------------
We have shown that corresponding to any primitive $\EE_{p/q}$ of the palindromic enumeration there is a unique set of $4n+3$ half-turn geodesics. An ESI is a pair $( L_j^{p/q},Ax_{\EE_{p/q}})$. This intersection of the axis of $\EE_{p/q}$ and $L^{p/q}_j$ determines a point in $\HH^2$. If $\XX$ is any primitive element of the group, then $\XX$ is conjugate to $\EE_{p/q}$ for some $p/q$. Let $\XX = \WW \EE_{p/q} \WW^{-1}$ for $\WW \in \GG$. Then in the quotient, the image of the point determined by the pair $(\WW(L_j^{p/q}), Ax_{\XX})$ is the same as the image of the point determined by the pair $( L_j^{p/q},Ax_{\EE_{p/q}})$.
We say $P \in \HH^2$ is equivalent to $Q^{p/q}_j$ for some $p/q$ and $j$ if there is $\WW \in \GG$ such that $P=\WW(Q_j^{p/q})$. We denote the equivalence class by square brackets: $$[Q_j^{p/q}]= \{\WW(Q_j^{p/q}) \}_{\WW \in \GG}.$$
\[esi1\] Let $$[ESI_{p/q}] = {\bigsqcup}_{j=-2n+1}^{2n-1} [Q_j^{p/q}]$$ where $n=[p+q-1]/2$ and $ {\bigsqcup}_{j=2n-1}^{2n-1}$ means that if $(p+q)$ is odd we omit the term $j=0$ and if $p+q$ is even we omit the term $j=j*$. Thus we have removed those $j$ such the angle between $Ax_{\EE_{p/q}}$ and $L^{p/q}_j$ at $Q^{p/q}_j$ is right. These are the [*Essential Intersection points or ESI set*]{} of $\EE_{p/q}$. The full [*ESI set of $\GG$*]{} is $$ESI(\GG) = \bigcup_{p/q} [ESI_{p/q}].$$
The following theorem was proved in [@GKwords] using recursion and again in [@Vidur] where the proof was non-recursive.
\[thm1\] For any $p/q >0$, the number of ESI points of $\EE_{p/q}$ is $2(p+q-1)$. The number of points counted on the quotient surfaces is $p+q-1$.
The points $Q^{p/q}_j$ are uniquely defined by the pair of geodesics $(L^{p/q}_j,Ax_{\EE_{p/q}})$. Thus if $Q^{p/q}_j$ is equivalent to $\WW(Q_j^{p/q})$, for some $\WW \in \GG$, then $\WW(Q_j^{p/q})$ is uniquely defined by the pair of geodesics $(\WW(L^{p/q}_j),\WW(Ax_{\EE_{p/q}}))$.
This gives us an equivalence relation and we again denote the equivalence class by square brackets $[( L^{p/q}_j,Ax_{ \EE_{p/q}})]$.
Another characterization of the ESI set of $\GG$ is then given by
\[esi2\] The set of pairs, ${\bigsqcup}_{j=-2n+1}^{2n-1}[( L^{p/q}_j,Ax_{ \EE_{p/q}})]$ , where $n=[p+q-1]/2$ and $\bigsqcup$ has the same meaning as in Definition \[esi1\] are the [*Essential Intersection points or ESI set*]{} of $\EE_{p/q}$. The full set is $$ESI(\GG) = \bigcup_{p/q} {\bigsqcup}_{j=-2n+1}^{2n-1}[( L^{p/q}_j,Ax_{ \EE_{p/q}})]$$
The equivalence of these definitions is clear since the points $Q^{p/q}_j$ are just the intersection points of the pairs of geodesics. The advantage of the second definition, as we will see, is that we can generalize it to other groups besides the model group.
Loops and Winding in $\HH^2$
----------------------------
Under the projection $\pi:\HH^2 \rightarrow \HH^2/\GG=S$, the axes $Ax_{\AA}$, $Ax_{\BB}$ and $Ax_{\AA^{-1}\BB}$ project to three simple geodesics $\gamma_{0}=\pi(Ax_{\AA}), \gamma_{\infty}=\pi(Ax_\BB)$ and $\gamma_{-1}=\pi(Ax_{\AA^{-1}\BB})$ which we now label by their corresponding rational. These are the only simple geodesics on $S$. The half-turn lines $\LL$, $\LLA$ and $\LLB$ project to bi-infinite geodesics $\pi(L)=\ell, \pi(\LLA)=\ell_{\AA}$ and $\pi(\LLB)=\ell_{\BB}$ such that $\ell$ intersects $\gamma_0$ and $\gamma_{\infty}$ orthogonally and is disjoint from $\gamma_{-1}$, $\ell_{\AA}$ intersects $\gamma_0$ and $\gamma_{-1}$ orthogonally and is disjoint from $\gamma_{\infty}$ and $\ell_{\BB}$ intersects $\gamma_{\infty}$ and $\gamma_{-1}$ orthogonally and is disjoint from $\gamma_{0}$. The half-turn $H_{\LL}$ on $\HH^2$ induces an involution $\INV$ of $S$. The geodesics $\{\ell,\ell_\AA,\ell_\BB\}$ are the seams of $S$.
Thus we can write $\gamma_0=\sigma_0 \cup \INV(\sigma_0)$ where $\sigma_0$ is the segment from $\ell$ to $\ell_{\AA}$ to see that it is made up of two segments that form a loop. Similarly $\gamma_{\infty}= \sigma_{\infty} \cup \INV(\sigma_{\infty})$ is another loop. Each of these loops intersects exactly two of the seams once.
Write $\gamma_{p/q}=\pi(Ax_{E_{p/q}})$.
\[loops\] For every $p/q$, $\gamma_{p/q}$ can be written as a union of $p+q$ loops each intersecting $\ell$ and either $\ell_\AA$ or $\ell_\BB$.
Consider the segment of $Ax_{\EE_{p/q}}$ from $Q_j^{p/q}$ to $Q^{p/q}_{j+1}$. One of its endpoints lies inside a fundamental domain $\F_j$ and the other on its boundary. Denote the projection of the segment by $\sigma^{p/q}_j$; it is simple and one of its endpoints is on $\ell$ and the other is on either $\ell_\AA$ or $\ell_\BB$. Suppose for argument’s sake that the other end is $\ell_\AA$. The union $\sigma_j(p/q) \cup \INV(\sigma_j^{p/q})$ is a closed loop on $S$. Since it contains one segment going from $\ell$ to $\ell_A$ and another from $\ell_A$ to $\ell$, it is homotopic to $\gamma_0$ on $S$.
Since we can do this for every adjacent pair of points, we obtain $p+q$ loops, each homotopic to either $\gamma_0$ or $\gamma_{\infty}$.
We interpret this decomposition of the geodesic $\gamma_{p/q}$ into loops as showing that it [*winds*]{} a total of $p$ times around $\gamma_{0}$ and a total of $q$ times around $\gamma_{\infty}$. Note however, that the order in which it goes around each of the loops $\gamma_{0}$ and $\gamma_{\infty}$ is determined by the form of the primitive word $\EE_{p/q}$. The integer entries in the continued fraction expansion for $p/q$ determine the number of consecutive times it winds about each curve before it winds around the other curve. There are words in $\GG$ in which $\AA$ appears $p$ times and $\BB$ appears $q$ times that are not primitive. Our discussion does not apply to them.
Note that we obtain this geometric interpretation only because we started with stopping generators.
$\HH^3$: Generalized ESI’s
==========================
Transversals in the quotient
-----------------------------
The ESI points for our model group $\GG$ have a geometric interpretation on the quotient surface. Definition \[esi2\], however, makes sense for an arbitrary free discrete group $G=\langle A,B \rangle \subset \Isom(\HH^3)$ although the geometric interpretation is not clear because, generically, the pairs of lines do not intersect.
In the quotient manifold $M=\HH^3$ we can look at the projections $\gamma_{p/q}$ of of the axes of the words $E_{p/q}$ and the projections of the half-turn lines $L, L_A, L_B$. Adapting the notation in [@GKhyp; @GKwords] we call them $\ell, \ell_A, \ell_B$. In [@GKhyp] we proved that $\ell, \ell_A, \ell_B$ are three bi-infinite geodesics in $M$ and that the half-turn about any one of them projects to an involution $\INV$ of $M$ whose fixed set is precisely these three geodesics. We also proved that for any primitive element $E_{p/q}$ $G$, $\gamma_{p/q}$ is invariant (but not pointwise invariant) under the involution $\INV$.
Suppose for some $\xi$ there is a geodesic $\omega$ in $M$ joining $\xi$ to $\INV(\xi) \neq \xi$ and suppose $\omega$ meets $\gamma_{p/q}$ orthogonally at these points. We call such an $\omega$ a [*transversal*]{} since $\omega$ must also intersect one of $\ell, \ell_A, \ell_B$ orthogonally. For the sake of discussion, assume it is $\ell$. Then we can lift $\gamma_{p/q}$ to $Ax_{E_{p/q}}$ and find a lift of $\ell$, $W(L)$ for some $W \in G$ such that $\omega$ lifts to the common orthogonal $O$ to $Ax_{E_{p/q}}$ and $W(L)$.
Clearly $W$ is not uniquely determined and $O$ depends on the choice of $W$. If, however, $W(L)=L^{p/q}_j$ for some $j$, then $O$ can be interpreted as a generalization of the intersection point. In general, the number of transversals we can find for a given $\gamma_{p/q}$ is unrelated to $p/q$. Since our goal is to relate the generalized intersection points to $p/q$, at least for certain groups, we proceed below to define our generalization from the labelling of the model group transferred to the abstract group via the natural isomorphism rather than the geometry of $M$.
Generalized ESI’s for a group $G \in \HH^3$
--------------------------------------------
We now consider the group $G=\langle A,B \rangle$ as an arbitrary free purely loxodromic discrete group in $\Isom(\HH^3)$ and let and its degree two extension be $\tilde{G}=\langle H_L, H_{L_A},H_{L_B} \rangle$. As such, we can talk about axes and half-turn lines. We can transfer the labelling we have for the model group to the group $G$: words $E_{p/q}$ in $G$ are just the words $\EE_{p/q}$ with $\AA$ replaced by $A$ and $\BB$ replaced by $B$. Since each half-turn line $L^{p/q}_j$ for $\GG$ can be written as $\WW(\LL_{\XX_j})$ with $\LL_{\XX_{j}} \in \{ \LL, \LLA,\LLB\}$, we label a subset of half-turn lines for $G$ again by $L^{p/q}_j=W(L_{X_j})$, where $X_j$ corresponds to $\XX_j$ under the isomorphism.
The equivalence relation between pairs also transfers to $G$ in the obvious way: $(L^{p/q}_j,Ax_{E_{p/q}})$ is equivalent to $(L_X,Ax_{Y})$ for some half-turn line $L_X$ of $\tilde{G}$ and some primitive element of $Y \in G$ if there is a $W \in G$ such that $W(L^{p/q}_j)=L_X$ and $W(Ax_{(E_{p/q})}) =Ax_{E_{p/q}}$. Again using square brackets for equivalence classes, setting $n-[p+q-1]/2$ and defining $\bigsqcup$ as above we have
\[combESI\] Given $G=\langle A,B \rangle \subset \Isom(\HH^3)$. The [*Generalized ESI set*]{} for $G$ is defined as the collection of equivalence classes of pairs of geodesics: $$SESI(G)=\bigcup_{p/q \in \QQ} \{[ESI_{E_{p/q}} ] \} = {\bigsqcup}_{j=-2n-1}^{2n+1}[(L_j(p/q),Ax_{E_{p/q}})]$$ where the labeling and notation is taken from the model group $\GG=\langle \AA,\BB \rangle$ with stopping generators $\AA,\BB$.
The set $SESI(G)$ is well-defined for any free, purely loxodromic discrete group $G=\langle A,B \rangle \subset \Isom(\HH^3).$
The set $SESI(G)$ is defined by pairs of geodesics. These are defined by their endpoints in $\partial{\HH^3}$. For the set to be well-defined, these endpoints need to be distinct. This will be true of the axes if the group is free and all its elements are loxodromic. The half-turn lines will have distinct endpoints if the group is discrete.
The Connectors
--------------
Let $(L_j^{p/q},Ax_{E_{p/q}})$ be a representative pair for an equivalence class in $SESI(G)$. In general the two geodesics in a pair will not intersect so we consider their common orthogonal, $O_j^{p/q}$. Its endpoints can be computed using cross ratios from the endpoints of the geodesics of the pair. Thus, if the pair $(L_j^{p/q},Ax_{E_{p/q}})$ does intersect, the $O_j^{p/q}$ determined by the cross ratios is the common orthogonal through the intersection point to the plane they span. Thus for the model group $\GG$, this orthogonal $O_j^{p/q}$ is a geodesic perpendicular to the plane left invariant by $\GG$ and intersecting it at the point $Q^{p/q}_j$; it is therefore the appropriate generalization of the intersection point.
Continuing our use of bar notation, we set $\overline{E}^j_{p/q}=H_{L_j^{p/q}}E_{p/q}H_{L_j^{p/q}}$. Then since $G$ has index two in $\tilde{G}$, $$(L_j^{p/q},Ax_{\overline{E}^j_{p/q}}) \in [(L_j^{p/q},Ax_{E_{p/q}})].$$ Since $O_j^{p/q}$ is perpendicular to $L_j^{p/q}$, $H_{L_j^{p/q}}(O_j^{p/q})=O_j^{p/q}$. That is $O_j^{p/q}$ is also the common orthogonal for the pair $(L_j^{p/q},Ax_{\overline{E}^j_{p/q}})$. This leads us to define
\[connector\] For each representative pair of geodesics $(L_j^{p/q},Ax_{E_{p/q}})$ in $SESI(G)$, the common orthogonal $O_j^{p/q}$ to the pair is a geodesic called a [*connector*]{}. Note that the connectors depend on the presentation of $G$ and the labelling induced by the isomorphism to the model group.
The axes of $E_{p/q}$ and $\overline{E}^j_{p/q}$ project to the same geodesic $\gamma_{p/q} $ in $M$ and the connector $O_j^{p/q}$ projects to a geodesic $\omega_j^{p/q}$ joining two points on $\gamma_{p/q}$ and meeting it orthogonally at both these points. The geodesic $\omega_j^{p/q}$ also intersects the projection of the half-turn line $L_j^{p/q}$ orthogonally. This is one of the geodesics $\ell, \ell_A, \ell_B$. Otherwise said, the connectors project to transversals in the quotient $M$.
Thus we have proved Theorem A. We state it in two parts.
\[thm:connectors\] \[Theorem A in $\HH^3$\] Let $G=\langle A,B \rangle \subset \Isom(\HH^3)$ be discrete, free and purely loxodromic. For each rational $p/q$, there is a geodesic $\gamma_{p/q}$ in the quotient manifold $\HH^3/G$ with $2(p+q-1)$ marked points joined in pairs by geodesics $\omega_j^{p/q}$, $j=2, \ldots, p+q$ that meet $\gamma_{p/q}$ orthogonally.
We also have
\[thm:countloops\] For $G$ as above, the union of the curves $\gamma_{p/q}$ and $\omega_j^{p/q}$, $j=1, \ldots, p+q-1$ naturally divides into a set consisting of $p+q$ non-homotopically trivial loops. The order in which the same loop occurs a consecutive number of times is determined by the entries on the continued fraction expansion of $p/q$.
Denote the endpoints of $\omega_j^{p/q}$ on $\gamma_{p/q}$ by $\xi_j, \xi_j'$ so that they are joined by the projection of the connector $\omega_j^{p/q}$. Then following $\gamma_{p/q}$ from $\xi_j$ to $\xi_{j+1}$, next following $\omega_{j+1}^{p/q}$ to $\xi_{j+1}'$, next following $\gamma_{p/q}$ to $\xi_j'$ and finally following $\omega_j^{p/q}$ from $\xi_j'$ to $\xi_j$ we obtain a closed loop. Note that since each loop passes once through two distinct geodesics in the invariant set of the involution, $\{\ell, \ell_A, \ell_B\}$, it cannot be homotopically trivial.
We have used the presentation of the group to define the connectors. Note that while each connector is a transversal, there are many transversals that are not connectors. For example, in the model group $\GG$, $\gamma_0$ has no connectors but many transversals. One is the projection of the common orthgonal to $Ax_A$ and $L_B$.
Winding Groups
===============
In this section we define a class of groups, more general that the class of the model group, where the loops formed by the connectors are a generalization of [*winding*]{} around the generators. Key properties for these groups are that Propositions \[thru F\] and \[intersectL\] hold. To define these groups we need some preliminaries.
We denote the [*convex hull*]{} of the limit set of $G$ in $\HH^3$ by $\mathcal C$. It is invariant under $G$ and the quotient $\mathcal C/G$ is the [*convex core*]{} of $G$. For the model group $\GG$ with stopping generators, the convex hull of the limit set is formed by deleting all the half-planes bounded by the intervals of discontinuity of $\GG$. These are determined by the endpoints of the axes of $\AA,\BB,\AA^{-1}\BB$ and all of their conjugates. The convex core is the surface $S=\HH^2/\GG$ truncated along the geodesics $\gamma_0, \gamma_1$ and $\gamma_{\infty}$.
The boundary of the convex core $\tilde{S}=\partial\mathcal C/G$ is a surface of genus two. It is what is known as a [*pleated surface*]{}. For the purposes of this paper, what this means is that if more than one geodesic passes through a point on $\tilde{S}$ infinitely many do; that is, the surface looks like a piece of hyperbolic plane at that point. Points through which only one geodesic passes form the [*pleating locus*]{} of $\tilde{S}$. This consists of infinite open geodesics and/or closed simple geodesics. These are also called pleating curves. If there is a closed geodesic in the pleating locus, it is the projection of the axis of an element of $G$ and this axis lies on the boundary of $\mathcal C$.
The pleating locus of $\tilde{S}$ is called rational if it consists entirely of closed geodesics.
A special class of groups whose convex core boundary has rational pleating locus are what we term [*Winding Groups.*]{}
Let $G=\langle A,B \rangle$ be a group and suppose $\tilde{S}=\partial\mathcal C/G$ has rational pleating locus where the pleating curves are projections of the axes of $A,B, A^{-1}B$. Then $G$ is called a [*winding group*]{}.
We have
\[winding groups\] If $G$ is a winding group, then any palindromic word in the palindromic enumeration scheme $E_{p/q}$ ($p+q$ odd) has an axis that intersects the common perpendicular $L$ to the axes of $A$ and $B$ between its intersections with $A$ and $B$. If $p+q$ is even, the common perpendicular to $\tilde{E}_{p/q}=H_{L}E_{p/q}H_{L}$ and $E_{p/q}$ intersects the axes of $A$ and $B$ between its intersections with $A$ and $B$.
This follows from the definition of the convex hull. No axis can intersect the boundary of the convex hull transversally; if it intersects the boundary it lies entirely in the boundary. If $p+q$ is odd, the palindromic property implies the axis of $E_{p/q}$ intersects $L$ so it must do it inside the convex hull. If $p+q$ is even, the axes of $\tilde{E}_{p/q}$ and $E_{p/q}$ lie inside the convex hull. By the symmetry in the definition their common orthogonal intersects $L$ and by the convexity the intersection point is inside the convex hull.
The hexagons $\H(A,B), \overline{\H(A,B)}$ are well defined for $G$ and so we can think of their union $\F$ as a piecewise geodesic polygon in $\HH^3$, but not a fundamental domain. The lines $L^{p/q}_j$ are sides of translates of these hexagons. For a winding group, the axis sides of the hexagon project to pleating curves. The content of Proposition \[winding groups\] is that Propositions \[thru F\] and \[intersectL\] hold for winding groups with this definition of $\F$. The generators of the winding groups play the role of the stopping generators of the model group.
Thus we have a geometric interpretation of Theorems \[thm1\] and \[thm:countloops\] for these groups. We summarize this as
\[thm:summary\]\[Theorem B\] Given a winding group $G$, for every primitive geodesic in the quotient manifold, there is an analogue of the winding we found in the two dimensional case that reflects the rational number identified with it.
[99]{}
Fenchel, Werner [*Elementary Geometry in Hyperbolic Space*]{} deGruyter, 1989.
Gilman, Jane and Keen, Linda, [*Two generator Discrete Groups: Hyperelliptic Handlebodies*]{} Geom. Dedicata, Volume 110(no. 1), (2205), 159-190.
Gilman, Jane and Keen, Linda, [*Word Sequence and Intersection Numbers*]{}, Cont. Math [**311**]{} (2002), 331-349.
Gilman, Jane and Keen, Linda, [*Discreteness Criteria and the Hyperbolic Geometry of Palindromes*]{}, Journal of Conformal Geometry and Dynamics 13 (2009),
Gilman, Jane and Keen, Linda [*Enumerating Palindromes in Rank Two Free Groups*]{}, [*Journal of Algebra*]{}, (2011) 1-13. Gilman, Jane and Keen, Linda, [*Canonical Hexagons and the $PSL(2,\CC)$ Discreteness Problem*]{} preprint, arXiv.
Gilman, Jane and Maskit, Bernard, [*An Algorithm for Two-generator Discrete Groups*]{} [*Michigan Math J **38*** ]{} (1991), 13-32.
Keen, Linda; Series, Caroline, [*Pleating Coordinates for Teichmüller Space*]{}, Bull. AMS, vol. 26, 1, 1992, 141-146
Magnus, Wilhelm; Karass, Abraham; and Solitar, Donald [*Combinatorial Group Theory*]{} (1966) John Wiley & Sons, NYC.
Mailik, Vidur, [*Curves Generated on Surfaces by the Gilman-Maskit Algorithm,*]{} AMS-CONM, vol. 510 (2010), 209-239.
|
Q:
Multiple message box showing in c#
I am making a one form application and created a hard coded class for my GUI and event handlers.
At first the messagebox is showing once but when I click another button it is showing multiple times, increasing every click of a button.
I have not yet created a unhandled exception is that something to do with that? And if it is unhandled exception how can I do it?
private void btnInventoryAddFanbelt_click(object sender, EventArgs e)
{
// CONTENTS
// labels
lblFanbeltName.Name = "lblFanbeltName";
lblFanbeltName.Text = "Fanbelt name";
lblFanbeltName.Visible = true;
lblFanbeltName.Location = new Point(10, 10);
// textbox
txtFanbeltName.Name = "txtFanbeltName";
txtFanbeltName.Visible = true;
txtFanbeltName.Location = new Point(115, 8);
// buttons
btnInventorySaveFanbelt.Name = "btnInventorySaveFanbelt";
btnInventorySaveFanbelt.Text = "Add fanbelt";
btnInventorySaveFanbelt.Visible = true;
btnInventorySaveFanbelt.Location = new Point(125, 50);
// END OF CONTENTS
// REMOVE CONTROLS
split3.Panel2.Controls.Clear();
// ADD CONTROLS
split3.Panel2.Controls.Add(lblFanbeltName);
split3.Panel2.Controls.Add(txtFanbeltName);
split3.Panel2.Controls.Add(btnInventorySaveFanbelt);
// EVENTHANDLERS
btnInventorySaveFanbelt.Click += new EventHandler(btnInventorySaveFanbelt_click);
}
private void btnInventorySaveFanbelt_click(object sender, EventArgs e)
{
MessageBox.Show("Fanbelt added");
}
A:
Every time you click on btnInventoryAddFanbelt, you are adding another click event:
btnInventorySaveFanbelt.Click += new EventHandler(btnInventorySaveFanbelt_click);
Only add it once, usually best to do that in the constructor or through the designer. It can also be shortened to just:
btnInventorySaveFanbelt.Click += btnInventorySaveFanbelt_click;
Also, split3.Panel2.Controls.Clear(); does not dispose of the controls, it just removes them, so you are leaking memory here. Try using:
while (split3.Panel2.Controls.Count > 0) {
split3.Panel2.Controls[0].Dispose();
}
|
‘I really don’t do this often but… since it’s NFL Sunday let’s talk about these coaches folks ?,’ Nige wrote into America’s national consciousness. ‘Introducing Christopher Foerster Miami Dolphin offensive line coach ????? Hey honey are you still high.’
In the video (see below) Foerster, who ranked as of the highest-paid assistant coaches in the NFL, at a salary valued between $2.5 million and $3 million a year, states how much he misses Nige and how he thinks about the times they share together when he ingests the illicit substance.
Tells the amped coach, ‘Hey babe, miss you, thinking about you,’
‘How about me going to a meeting and doing this before I go?’
“What do you think, I’m crazy?” Foerster asks after snorting the second line.
Then Foerster says, ‘It’ll be a while before we can do this again. Because I know you have to keep that baby. But I think about you when I do it. I think about how much I miss you. How high we got together. How much fun it was.’
Baby? Whose baby? Whose the daddy? And how often where they ‘doing it’?
Foerster ends the video by licking some scraps and saying ‘I wish I was licking this off your pxssy.’
In a since-deleted comment, Nige had posted on Facebook, ‘coaches should take responsibility for their actions,’ as players who protest during the national anthem are chastised over their decisions on whether to stand.
She wrote on social media that she posted the video because of the backlash against black NFL players who have kneeled during the National Anthem in protest over racial inequality.
‘I have plenty of white friends so I’m not making this a race issue. People are missing the point. My point is everyone has to be held accountable for their decisions they roast players over anthems while the coaches be high as s–t and probably can’t sing along,’ she wrote,per Obnoxious Boston Fan.
Kijuana Nige black model/stripper: ‘This isn’t a white thing.’
Posted Nigeon Facebook come Monday, ‘The white people mad at me like I forced blow down this mans nose and like I recorded it on tha low,’
Adding, ‘No those are his habits and he recorded himself and sent it to me professing his love.’
‘So quick to make excuses for him but will roast a minority player over an athem [sic], dog fight, weed, domestic issues etc. But y’all keep saying ALL LIVES MATTER STFU!!’ she continued.
Nige took to social media to blast offensive line coach Christopher Foerster, after the Dolphins organization told players to stand for the national anthem ahead of Sunday’s game against the Tennessee Titans. In the interim, the model stripper insists the leak was nothing personal, or a black or a white thing, but just her setting shxt straight….
So how did Kijuana Nige know Chris Foerster anyway?
Of intrigue, the relationship between Foerster and Nige remains clear. That said, in the since leaked video, our collective hero says he misses her.
But now he will miss his job too….
Less than 12 hours after the recording surfaced, Foerster announced his resignation Monday following one season and four games with the Miami Dolphins. Explaining that he was now going to get help for his addiction to coke and strippers.
Told our hot potato, ‘I am resigning from my position with the Miami Dolphins and accept full responsibility for my actions. I want to apologize to the organization and my sole focus is on getting the help that I need with the support of my family and medical professionals.’
Foerster joined the Dolphins in 2016. The organization addressed his resignation with a separate statement.
‘We were made aware of the video late last night and have no tolerance for this behavior,’ the team stated Monday. ‘After speaking with Chris this morning, he accepted full responsibility and we accepted his resignation effective immediately. Although Chris is no longer with the organization, we will work with him to get the help he needs during this time.’
Out one door, in comes a new hero. According to ModelMayhem.com (since deleted), Nige is a Kansas City native who was ‘nationally ranked in sports.’ Her bio adds that she enjoys ‘acting, singing, modeling, and being active.’ Define active? And how active? And with whom?
A regard of Nige’s Facebook page profile describes her occupation as ‘professional tease’ (do you suppose?) and saying she is self-employed. A picture on her site shows a woman with her fist raised, while wearing a bikini that says ‘Anti-Trump.’ |
Il Real Madrid non mollaanche perché le Merengues andranno incontro ad una vera e propria rivoluzione in attacco al termine della stagione. Uno tra Ronaldo, Bale e Benzema lascerà il Bernabeu in estate eCome riporta Rai Sport il Real Madrid punta anche il talento argentino per rifare il look al pacchetto offensivo e starebbe pensando di offrire Dani Carvajal più soldi in cambio de La Joya che nelle ultime ore avrebbe deciso di non rinnovare il contratto di affitto della sua casa a Torino. |
Q:
Equals override vs. IEquatable<>
For the life of me, I can't get my WPF binding to work correctly for a RibbonComboBox's SelectedItem property.
Then I started reading about how .NET compares items. My understanding is that, in some cases, it compares the actual pointer. In which case, loading a new and equal value from a database, for example, it may not be considered equal.
So then I started looking into explicitly implementing Equals for my type. However, this seems a bit confusing as there are at least two different versions I can implement.
The code below shows I can either override object.Equals, or I can implement IEquatable<>. In fact, the code below implements both, and testing indicates that both are called.
public class TextValuePair : IEquatable<TextValuePair>
{
public string Text { get; set; }
public int Value { get; set; }
public override bool Equals(object obj)
{
if (obj == null || !(obj is TextValuePair))
return false;
return Value == (obj as TextValuePair).Value;
}
public override int GetHashCode()
{
return Value;
}
public bool Equals(TextValuePair obj)
{
Debug.Assert(obj != null);
if (obj == null)
return false;
return Value == obj.Value;
}
}
Can someone help me understand what is required to avoid my objects from being compared for equivalence by .NET library routines according to pointers having the same value? Is it really necessary to implement both versions of Equals?
A:
As pointed by msdn, if you are implementing IEquatable<T> you will still need to override Equals because it will still be called with the signature Equals(System.Object, System.Object) and yhe override should be consistent with the methods implemented from IEquatable<T>.
Also as in the question about the difference between iequatable and just overriding object equals which Arno showed in the comment, IEquatable<T> is used when operations on collections are required to optimize them, not to need the boxing anymore, and instead call the direct Equals with the specific type.
You have two options:
If you are interested in performance when you are working with collections in your program, you could keep implementing the both Equals methods;
or
You could just remove the IEquatable<T> and only override Equals to simplify your code.
Additionally, whenever you override Equals, you should also always override GetHashCode as well.
|
Characterization of prenatally assessed de novo small supernumerary marker chromosomes by molecular cytogenetics.
Small supernumerary marker chromosomes (sSMC) are structurally abnormal chromosomes that cannot be identified or characterized unambiguously by conventional banding cytogenetics alone, and they are generally equal in size or smaller than a chromosome 20 of the same metaphase spread. sSMC are reported in 0.043% of newborn infants and 0.075% of prenatal cases. Molecular cytogenetics is necessary to characterize the origin of an sSMC, and many highly sophisticated approaches are available throughout the literature for their comprehensive description. However, because in a prenatal diagnostic laboratory such techniques are not available, I suggest here a straightforward scheme to characterize at least the sSMC's chromosomal origin as quickly as possible. Based on this scheme, it is possible to compare the actual present case with similar cases from the literature, which are summarized on http://www.med.uni-jena.de/fish/sSMC/00START.htm./ For a more wide-ranging sSMC characterization, a specialized laboratory should be contacted, e.g., my laboratory. |
Q:
Adding a class after completing the action
Good day.
I have a React Component. It's Navbar.
class Nav extends React.Component{
constructor(props){
super(props);
this.handleScroll = this.handleScroll.bind(this);
}
componentDidMount() {
window.addEventListener('scroll', this.handleScroll);
};
handleScroll(event) {
console.log('the scroll things', event)
};
render(){
return(
<div onScroll={this.handleScroll.bind(this)} className ="Nav">
<Logo/>
<Menu/>
</div>
)
}
};
In constructor should bind every actions.
Later before component Mount adding EventListener is required.
If user take action onScroll I need to add class .Nav Shadow.
How can add class in handleScroll function with the simplest solutions?
A:
Just set a state property in your constructor like
this.state={NavClass: 'Nav'}
In your handleScroll change it to
handleScroll(event) {
let shadow = this.state.shadowClass
this.setState({shadowClass : 'Nav_shadow' })
}
And refer this in your HTML as
className = `${this.state.Nav} Nav`
|
Q:
Google Chrome Extensions: create a window only once
I'm opening a new window by clicking on the extension button near the search bar.
I'd like to open a new window only if it's not already opened; in that case, I'd prefer showing the old one.
Here is my code, but it doesn't work.
var v = null;
var vid = null;
chrome.browserAction.onClicked.addListener(function(tab) {
chrome.windows.getAll({}, function(list) {
// check if already exists
for(window in window_list)
if(window.id == vid) { window.focus(); return; }
chrome.windows.getCurrent(function(w) {
v = chrome.windows.create({'url': 'my_url', 'type': 'panel', 'focused': true});
vid = w.id;
});
});
});
Can someone explain me how to fix it?
Most probably, both v and vid values are deleted after closing the app (after it finish to execute the script), but how can I fix it? If possible, without using localStorage or cookies.
I've tried specifying the tabId properties while creating the window, but it doesn't work.
I've also tried using the chrome.windows.onRemoved.addListener functionality, but it doesn't work too.
A:
Change window to another variable name.
Be consistent in variable names. window_list and list are different things.
Use chrome.windows.update instead of window.focus(), because the latter does not work.
Use chrome.windows.get to see whether the window exists, instead of maintaining a list of windows.
The details of the new window are available in the callback of chrome.windows.create. Use this method in the correct way:
Code:
chrome.windows.get(vid, function(chromeWindow) {
if (!chrome.runtime.lastError && chromeWindow) {
chrome.windows.update(vid, {focused: true});
return;
}
chrome.windows.create(
{'url': 'my_url', 'type': 'panel', 'focused': true},
function(chromeWindow) {
vid = chromeWindow.id;
}
);
});
Or, instead of checking whether the window exists, just update the window, and when an error occurs, open a new one:
chrome.windows.update(vid, {focused: true}, function() {
if (chrome.runtime.lastError) {
chrome.windows.create(
{'url': 'my_url', 'type': 'panel', 'focused': true},
function(chromeWindow) {
vid = chromeWindow.id;
});
}
});
|
Marie C. Baca
Albuquerque Journal
ALBUQUERQUE - Albuquerque resident Elsie Whittle says she supports the policy known as net neutrality, which prevents broadband providers from charging for certain websites or faster internet speeds.
But a comment submitted under her name and home address to the Federal Communications Commission's website, states that she believes net neutrality is a "misguided policy."
"When I saw it, I felt kind of sick," said Whittle. "It's something I would never say, so how did it happen?"
Whittle said she believes her comment was one of millions that watchdogs claim were improperly submitted to the FCC as it was considering net neutrality policies this year. The FCC voted 3-2 this month to repeal the Obama-era rules in a decision denounced by consumer groups and hailed by the telecommunications industry.
More:Net neutrality rules threaten to rewind the Internet back to 2014. Is that possible?
An Albuquerque Journal analysis of FCC records found 8,387 electronically-submitted comments purportedly from New Mexicans with the same message sent under Whittle's name: "Before leaving office, the Obama Administration rammed through a massive scheme that gave the federal government broad regulatory control over the internet. That misguided policy decision is threatening innovation and hurting broadband investment in one of the largest and most important sectors of the U.S. economy. I support the Federal Communications Commission's decision to roll back Title II and allow for free market principles to guide our digital economy."
Title II is the section of the Communications Act of 1934 that classifies entities as "common carriers" subject to certain regulations. In 2015, the FCC classified broadband providers as common carriers under Title II.
The Journal could not determine if any of the identical comments had been knowingly submitted by the users, or how many of the commenters were actually from New Mexico. The records show that at least three individuals with New Mexico home addresses, including Whittle, wrote to the FCC accusing others of improperly using their names or other information.
According to the nonpartisan Pew Research Center, more than half of the 21.7 million comments collected from April to August this year by the FCC contained "false or misleading" information.
More:After net neutrality, brace for Internet 'fast lanes'
Whittle said she discovered the comment attributed to her after typing her name into a website run by the attorney general of New York, who is investigating whether the comments "wrongfully used the identities of New Yorkers without their consent." (The attorney general is investigating only comments from New Yorkers, but the website can be used to search all comments).
A spokesman for New Mexico Attorney General Hector Balderas said that while the office "has not received any complaints regarding this specific matter, we are aware of the issue and working with other state attorneys general on its impact on the FCC's decision."
As for Whittle, she said her experience has led her to feel more strongly about her position than ever before.
"I've always been politically engaged, but this has definitely activated a desire to do something more about net neutrality," she said.
More:17 Things in 2017: Net neutrality and the future of the internet |
BEAM has grown during evenings and weekends since July 2015. It was inspired by the simple classics like Tetris, Space Invaders and Bubble Shoot.
It was the wall bouncing mechanic of Bubble Shoot that really was the seed for BEAM. I would always try to bounce the bubble even if I did not need to. So, with that in mind, BEAM came into being on a scrap of paper in almost the exact form you see it in here. (There might be a touch of melodrama in that origin story :D)
BEAM has been developed with java and libGDX (with box2d and box2d lighting) little bit of R.U.B.E |
/*
* Copyright (C) 2017 Apple Inc. All rights reserved.
*
* Redistribution and use in source and binary forms, with or without
* modification, are permitted provided that the following conditions
* are met:
* 1. Redistributions of source code must retain the above copyright
* notice, this list of conditions and the following disclaimer.
* 2. Redistributions in binary form must reproduce the above copyright
* notice, this list of conditions and the following disclaimer in the
* documentation and/or other materials provided with the distribution.
*
* THIS SOFTWARE IS PROVIDED BY APPLE INC. AND ITS CONTRIBUTORS ``AS IS'' AND ANY
* EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
* WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
* DISCLAIMED. IN NO EVENT SHALL APPLE INC. OR ITS CONTRIBUTORS BE LIABLE FOR ANY
* DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
* (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
* LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON
* ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
* (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
* SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
*/
#pragma once
#if USE(LIBWEBRTC)
#include "LibWebRTCMacros.h"
#include "RTCDataChannelHandler.h"
ALLOW_UNUSED_PARAMETERS_BEGIN
#include <webrtc/api/data_channel_interface.h>
ALLOW_UNUSED_PARAMETERS_END
namespace webrtc {
struct DataChannelInit;
}
namespace WebCore {
class Document;
class RTCDataChannelEvent;
class RTCDataChannelHandlerClient;
struct RTCDataChannelInit;
class ScriptExecutionContext;
class LibWebRTCDataChannelHandler final : public RTCDataChannelHandler, private webrtc::DataChannelObserver {
WTF_MAKE_FAST_ALLOCATED;
public:
explicit LibWebRTCDataChannelHandler(rtc::scoped_refptr<webrtc::DataChannelInterface>&& channel) : m_channel(WTFMove(channel)) { ASSERT(m_channel); }
~LibWebRTCDataChannelHandler();
static webrtc::DataChannelInit fromRTCDataChannelInit(const RTCDataChannelInit&);
static Ref<RTCDataChannelEvent> channelEvent(Document&, rtc::scoped_refptr<webrtc::DataChannelInterface>&&);
private:
// RTCDataChannelHandler API
void setClient(RTCDataChannelHandlerClient&) final;
void checkState();
bool sendStringData(const String&) final;
bool sendRawData(const char*, size_t) final;
void close() final;
size_t bufferedAmount() const final { return static_cast<size_t>(m_channel->buffered_amount()); }
// webrtc::DataChannelObserver API
void OnStateChange();
void OnMessage(const webrtc::DataBuffer&);
void OnBufferedAmountChange(uint64_t);
rtc::scoped_refptr<webrtc::DataChannelInterface> m_channel;
RTCDataChannelHandlerClient* m_client { nullptr };
};
} // namespace WebCore
#endif // USE(LIBWEBRTC)
|
Designed to hold all of the equipment needed for any hydrant operation. The 22 oz vinyl bag has a high density padded bottom to protect tools. The TUFF bottom provides a nearly indestructible base. A Velcro® closure on top allows for quick access, even with gloves on. Measures 24” L x 12” W x 9” H and has 2600 cu. in of space. Color: Red. Weight: 36 oz. |
/**
@file Vector4int8.cpp
Homogeneous vector class.
@maintainer Morgan McGuire, http://graphics.cs.williams.edu
@created 2007-02-09
@edited 2007-02-09
Copyright 2000-2007, Morgan McGuire.
All rights reserved.
*/
#include "G3D/platform.h"
#include "G3D/Vector4int8.h"
#include "G3D/Vector3.h"
#include "G3D/Vector4.h"
#include "G3D/BinaryInput.h"
#include "G3D/BinaryOutput.h"
#include <string>
namespace G3D {
Vector4int8::Vector4int8(const Vector4& source) {
x = iClamp(iRound(source.x), -128, 127);
y = iClamp(iRound(source.y), -128, 127);
z = iClamp(iRound(source.z), -128, 127);
w = iClamp(iRound(source.w), -128, 127);
}
Vector4int8::Vector4int8(const Vector3& source, int8 w) : w(w) {
x = iClamp(iRound(source.x), -128, 127);
y = iClamp(iRound(source.y), -128, 127);
z = iClamp(iRound(source.z), -128, 127);
}
Vector4int8::Vector4int8(class BinaryInput& b) {
deserialize(b);
}
void Vector4int8::serialize(class BinaryOutput& b) const {
// Intentionally write individual bytes to avoid endian issues
b.writeInt8(x);
b.writeInt8(y);
b.writeInt8(z);
b.writeInt8(w);
}
void Vector4int8::deserialize(class BinaryInput& b) {
x = b.readInt8();
y = b.readInt8();
z = b.readInt8();
w = b.readInt8();
}
} // namespace G3D
|
Aspiration cytology of tubular carcinoma. Diagnostic features with mammographic correlation.
The detection of early, well-differentiated breast carcinoma is increasing because of mammographic screening. Because fine-needle aspiration cytology is often used as an adjunctive diagnostic tool with mammography, the authors defined the cytologic criteria for the diagnosis of this early breast carcinoma. Aspirates from 24 cases of biopsy-confirmed tubular carcinoma were studied. The majority of these carcinomas were detected by mammography and were nonpalpable masses. Mammographically, the lesions were .3-1.5 cm and were often described as ill-defined, spiculated densities. The cytologic diagnoses in these 24 cases were as follows: negative (4), fibrocystic changes (1), atypia (12), malignant (3), and fibroadenomas (4), (including 2 fibroadenomata with atypia and 1 suspicious for carcinoma). The aspiration cytology in all cases were reviewed, and the following characteristics were found in the 20 adequate smears: mild to moderate atypia, increased cellularity, angular epithelial clusters, and single epithelial cells ranging from few to numerous. Myoepithelial cells were prominent in 7 of 20 smears. The authors compared these features with aspiration cytology of 10 fibroadenomas, as this was a frequently suggested diagnosis. The fibroadenomas showed no significant atypia, minimal angular epithelial clusters, and rare single epithelial cells. Myoepithelial cells were prominent in all fibroadenomas. The authors concluded that the presence of angular epithelial groups and single epithelial cells, along with nuclear atypia, should warrant consideration of the diagnosis of tubular carcinoma. |
Endpoints of resuscitation.
Despite the multiple causes of the shock state, all causes possess the common abnormality of oxygen supply not meeting tissue metabolic demands. Compensatory mechanisms may mask the severity of hypoxemia and hypoperfusion, since catecholamines and extracellular fluid shifts initially compensate for the physiologic derangements associated with patients in shock. Despite the achievement of normal physiologic parameters after resuscitation, significant metabolic acidosis may continue to be present in the tissues, as evidenced by increased lactate levels and metabolic acidosis. This review discusses the major endpoints of resuscitation in clinical use. |
Conditional expression of full-length humanized anti-prion protein antibodies in Chinese hamster ovary cells.
Because of their high antigen specificity and metabolic stability, genetically engineered human monoclonal antibodies are on the way to becoming one of the most promising medical diagnostics and therapeutics. In order to establish an in vitro system capable of producing such biosimilar antibodies, we used human constant chain sequences to design the novel human antibody expressing vector cassette pMAB-ABX. A bidirectional tetracycline (tet)-controllable promotor was used for harmonized expression of immunoglobulin type G (IgG) heavy and light chains. As an example we used anti-prion protein (anti-PrP) IgGs. Therefore, the variable heavy (V(H)) and light chain (V(L)) sequences of anti-PrP antibodies, previously generated in our laboratory by DNA immunization of prion protein knock-out mice, were isolated from murine hybridoma cell lines and inserted into pMAB-ABX vector. After transfection of Chinese hamster ovary (CHO) cells, a number of stable antibody producing cell clones were selected. One cell line (pMAB-ABX-13F10/3B5) stably expressing the recombinant humanized antibody (rechuAb) 13F10/3B5 was selected for detailed characterization by Western blot, immunofluorescence, and flow cytometric analyses. The full-length recombinant humanized IgG antibody showed a high level of expression in the cytoplasm. In conclusion, the new cell system described here is a suitable tool to produce functional intact full-length humanized IgG antibodies. |
Q:
How to validate a parameter's type in method when using Roslyn
I'm doing code analysis with Roslyn in order to validate that even though I have the following signature
public void MyMethod(object anObject, MyCustomObject customObject);
I only want to receive, as parameters, a string (1st) and a child from MyCustomObject (2nd). I have no power over the signature, it cannot be changed.
Here's what I did to evaluate my method (Here's a snippet)
public void OnMethodInvocation(SyntaxNodeAnalysisContext context)
{
var invocation= context.Node as InvocationExpressionSyntax;
var symbol = context.SemanticModel.GetSymbolInfo(invocation).Symbol as IMethodSymbol;
if (symbol?.Name.ToString()== "MyMethod")
{
var parameterList = invocation.Parameters;
}
As of now, I can manipulate my IParameterSymbol objects from the property Parameters (symbol.Parameters). What I don't get is the following : I've gone through my result IEnumerable containing both my parameters, but because of the method signature, it expects to receive an object and a MyCustomObject instances. I'm not in a position (at the moment) to be certain that the first parameter is indeed an object and not a string (merely an example, could have been anything else) and that when I'm expecting a child of MyCustomObject, if I give it a null, I want to know it's a null parameter.
I'll be grateful to anyone who can un-stuck me from this sticky situation !
UPDATES
Here's what kind of information is given to me when I get into an ArgumentSyntax object :
ArgumentSyntax Argument exception
ContainsAnnotations: false
ContainsDiagnostics: false
ContainsDirectives: false
ContainsSkippedText: false
Expression: IdentifierNameSyntax IdentifierName exception
FullSpan: {[550..559)}
HasLeadingTrivia: false
HasStructuredTrivia: false
HasTrailingTrivia: false
IsMissing: false
IsStructuredTrivia: false
KindText: "Argument"
Language: "C#"
NameColon: null
Parent (Microsoft.CodeAnalysis.SyntaxNode): ArgumentListSyntax ArgumentList (exception,exception)
ParentTrivia: SyntaxTrivia None
RawKind: 8638
RefOrOutKeyword: SyntaxToken None
Span: {[550..559)}
SpanStart: 550
A:
What you should be doing is getting the arguments (not parameters -- they are different things!) and calling SemanticModel.GetTypeInfo() on the ArgumentSyntax. That'll give you the type of the expression being passed. From there you can do whatever checks you need.
|
<template>
<view class="myprofit">
<block v-if="Info.usermoney">
<view class="top">
<view>
<view class="total">¥{{ totoalMoney }}</view>
<view class="control">
<view @tap="rightDrawerVisible = true">全部</view>
<!-- <view>查看报表</view> -->
<view>
<picker mode="date" :value="params.time" :start="startDate" :end="endDate" @change="bindDateChange">
<view>{{ params.time }}</view>
</picker>
</view>
</view>
<view class="num">
<view>
<text>待结算</text>
<text>¥{{ Info.usermoney.total_profiy }}</text>
</view>
<view>
<text>已结算</text>
<text>¥{{ Info.usermoney.total_money }}</text>
</view>
</view>
</view>
</view>
<view class="main">
<scroll-view scroll-y class="srx" @scrolltolower="loadMove">
<navigator :url="'/pages/profitDetail/index?batchcode='+item.batchcode+'&id='+item.id" hover-class="none" class="item" v-for="(item, index) in record" :key="index">
<view class="name">{{ item.own_user_name }}</view>
<view class="info">
<view>{{ item.createtime }}</view>
<view><uni-badge :text="item.paytype" :type="style[item.type]"></uni-badge> </view>
<view class="price">¥{{ item.reward }}</view>
</view>
</navigator>
</scroll-view>
<empty-data v-if="noData && !record.length">没有发现相关记录</empty-data>
</view>
<uni-drawer class="draw" :visible="rightDrawerVisible" mode="right" @close="ToggleDrawer">
<view>
<view class="uni-card">
<view class="uni-list">
<block v-for="(list,index) in lists" :key="index">
<view class="uni-list-cell uni-collapse">
<view class="uni-list-cell-navigate uni-navigate-bottom" :class="list.show ? 'uni-active' : ''" @click="trigerCollapse(index)">
{{list.title}}
</view>
<view class="uni-collapse-content" :class="list.show ? 'uni-active' : ''">
<view v-if="list.type === 'list'">
<view class="uni-list">
<view @tap="selectCate(item, idx)" :class="['uni-list-cell', {act: currentCate === idx}]" hover-class="none" v-for="(item, idx) in list.list" :key="idx">
<view class="uni-list-cell-navigate uni-navigate-right">{{ item.name }}</view>
</view>
</view>
</view>
</view>
</view>
</block>
</view>
</view>
<view class="btn"><button @tap="searchCate" type="warn" size="mini">确认</button></view>
</view>
</uni-drawer>
</block>
</view>
</template>
<script>
import { MyProfit } from '@/common/api'
import uniBadge from "@/components/uni-badge.vue"
import uniDrawer from '@/components/uni-drawer'
import { mapState } from 'vuex'
export default {
name: 'myprofit',
components: { uniBadge, uniDrawer },
data() {
const currentDate = this.getDate({
format: true
})
return {
params: {
type: 1,
time: currentDate,
page: 1,
user_id: '',
},
noData: true,
currentCate: 0,
Info: {},
record: [],
style: {
0: 'default',
2: 'warning',
9: 'danger'
},
rightDrawerVisible: true,
lists: [
{
title: "分类",
type: 'list',
show: true,
list: []
}
]
}
},
onLoad() {
this.params.user_id = this.userInfo.id
this.getInfo()
},
methods: {
searchCate () {
this.params.page = 1
this.record = []
this.getInfo()
},
bindPickerChange: function(e) {
console.log('picker发送选择改变,携带值为', e.target.value)
this.index = e.target.value
},
bindDateChange: function(e) {
this.params.time = e.target.value
this.params.page = 1
this.record = []
this.noData = true
this.getInfo()
},
bindTimeChange: function(e) {
this.time = e.target.value
},
getInfo () {
uni.showLoading()
MyProfit(this.params).then(res => {
uni.hideLoading()
this.Info = res.data
this.record = [ ...this.record, ...res.data.record ]
this.lists[0].list = res.data.btnArray
this.rightDrawerVisible = false
if (!res.data.record.length) {
this.noData = false
if (this.params.page !== 1) {
uni.showToast({
title: '没有更多记录啦>_<',
icon: 'none'
})
}
}
})
},
loadMove() {
if (this.noData) {
this.params.page++
this.getInfo()
}
},
getDate(type) {
const date = new Date();
let year = date.getFullYear();
let month = date.getMonth() + 1;
let day = date.getDate();
if (type === 'start') {
year = year - 60;
} else if (type === 'end') {
year = year + 2;
}
month = month > 9 ? month : '0' + month;;
day = 1;
return `${year}-${month}-${day}`;
},
trigerCollapse(e) {
for (let i = 0, len = this.lists.length; i < len; ++i) {
if (e === i) {
this.lists[i].show = !this.lists[i].show;
} else {
this.lists[i].show = false;
}
}
},
ToggleDrawer() {
this.rightDrawerVisible = !this.rightDrawerVisible
},
selectCate(item, idx) {
this.currentCate = idx
this.params.type = item.id
}
},
computed: {
...mapState([
'userInfo'
]),
startDate() {
return this.getDate('start');
},
endDate() {
return this.getDate('end');
},
totoalMoney () {
return (this.Info.usermoney.total_profiy + this.Info.usermoney.total_money).toFixed(2)
}
},
}
</script>
<style lang="less">
page, uni-page-body, .myprofit {
height: 100%;
overflow: hidden;
}
.myprofit {
display: flex;
flex-direction: column;
flex-flow: column;
}
.myprofit {
.top {
background-color:#0099ff;
color:white;
display: flex;
align-items: center;
justify-content: center;
text-align: center;
font-size: 26upx;
padding: 30upx 0;
.total {
font-size: 40upx;
}
.num {
display: flex;
justify-content: space-between;
align-items: center;
& > view {
display: flex;
flex-direction: column;
flex-flow: column;
& > text {
}
}
}
.control {
display: flex;
margin: 20upx 0;
& > view {
background: white;
color: #03A9F4;
border-radius: 16px;
padding: 8px 22px;
font-size: 12px;
margin-right: 30upx;
&:last-of-type {
margin-right: 0;
}
// &:nth-of-type(2) {
// margin: 0 20upx;
// }
}
}
}
.main {
flex: 1;
overflow: hidden;
padding: 8px 0;
box-sizing: border-box;
position: relative;
.srx {
height: 100%;
.item {
background-color: white;
border-radius: 10px;
margin: 0 11px 8px;
padding: 8px;
position: relative;
&::after {
content: '';
position: absolute;
width: 15upx;
height: 15upx;
right: 20upx;
top:50%;
border-right:1px solid transparent;
border-top: 1px solid transparent;
border-color:#c7c7c7;
transform: translateY(-50%) rotate(45deg);
}
&:last-of-type {
margin-bottom: 0;
}
.name { font-size: 26upx;margin-bottom: 15upx;}
.info {
display: flex;
justify-content: space-between;
align-items: center;
font-size: 22upx;
.price {
color:#F44336;
margin-right: 40upx;
}
}
}
}
}
}
</style>
|
@startuml
sprite $crop_7_5 [48x48/16] {
000000000000000000000000000000000000000000000000
000000000000000000000000000000000000000000000000
000000000000000000000000000000000000000000000000
000000000000000000000000000000000000000000000000
000000000000000000000000000000000000000000000000
000000000000000000000000000000000000000000000000
000000000000000000000000000000000000000000000000
000000000000000000000000000000000000000000000000
000000000000000000000000000000000000000000000000
000000000000000000000000000000000000000000000000
000000000000000000000000000000000000000000000000
000000000000000000000000000000000000000000000000
000000000000000000000000000000000000000000000000
000000000000000000000000000000000000000000000000
00000001AFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFA10000000
0000001EFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFE1000000
000000AFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFA000000
000000FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF000000
000000FFFF0000000000000000000000000000FFFF000000
000000FFFF0000000000000000000000000000FFFF000000
000000FFFF0000000000000000000000000000FFFF000000
000000FFFF0000000000000000000000000000FFFF000000
000000FFFF0000000000000000000000000000FFFF000000
000000FFFF0000000000000000000000000000FFFF000000
000000FFFF0000000000000000000000000000FFFF000000
000000FFFF0000000000000000000000000000FFFF000000
000000FFFF0000000000000000000000000000FFFF000000
000000FFFF0000000000000000000000000000FFFF000000
000000FFFF0000000000000000000000000000FFFF000000
000000FFFF0000000000000000000000000000FFFF000000
000000FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF000000
000000AFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFA000000
0000001EFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFE1000000
00000001AFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFA10000000
000000000000000000000000000000000000000000000000
000000000000000000000000000000000000000000000000
000000000000000000000000000000000000000000000000
000000000000000000000000000000000000000000000000
000000000000000000000000000000000000000000000000
000000000000000000000000000000000000000000000000
000000000000000000000000000000000000000000000000
000000000000000000000000000000000000000000000000
000000000000000000000000000000000000000000000000
000000000000000000000000000000000000000000000000
000000000000000000000000000000000000000000000000
000000000000000000000000000000000000000000000000
000000000000000000000000000000000000000000000000
000000000000000000000000000000000000000000000000
}
!define MATERIAL_CROP_7_5(_alias) ENTITY(rectangle,black,crop_7_5,_alias,MATERIAL CROP_7_5)
!define MATERIAL_CROP_7_5(_alias, _label) ENTITY(rectangle,black,crop_7_5,_label, _alias,MATERIAL CROP_7_5)
!define MATERIAL_CROP_7_5(_alias, _label, _shape) ENTITY(_shape,black,crop_7_5,_label, _alias,MATERIAL CROP_7_5)
!define MATERIAL_CROP_7_5(_alias, _label, _shape, _color) ENTITY(_shape,_color,crop_7_5,_label, _alias,MATERIAL CROP_7_5)
skinparam folderBackgroundColor<<MATERIAL CROP_7_5>> White
@enduml |
Large cohort studies of people with a first-episode psychosis provide a unique opportunity for finding out why so many young people with schizophrenia spectrum disorders die at a young age. However, it seems that those psychiatrists who have access to the mortality data generally do not want the facts to come out.
In Parts I-IV, I discuss how the DA succeeded in gaining the conviction by means of highly emotional and at times misleading and untruthful manipulations in public and in the courtroom. Here I want to look more closely at the DA’s motivation and other activities. Was it a personal vendetta?
A common practice when antipsychotics are found to be ineffective for schizophrenia is to prescribe a second, additional psychoactive medication. Now, a new study suggests that this practice is not supported by the research. |
1. Field of the Invention
The invention relates in general to a memory technique, and more particularly to a technique for saving memory space.
2. Description of the Related Art
Code and data that are no longer to be modified after electronic products are shipped out of the factory are generally recorded in a read-only memory (ROM). In the recently years, one development trend for consumer electronic products has been to integrate various functions into a single product. For example, portable handsets are designed to support extra functions such as a camera and Internet browsing in addition to basic telephone functions. Diversified functions lead to large and complex coding. To store a greater amount of code and data, the capacity of a ROM built into an electronic product is inevitably and correspondingly enlarged, leading to increased hardware costs.
In response to the above issue, a current solution is to burn compressed code and data into a ROM. Taking an example of compressing a code of an application and burning the compressed code into a ROM, an electronic device first fetches the compressed code from the ROM, and then decompresses the code through a decompressor to a random access memory (RAM) for the use of a corresponding processor.
In the prior art, an application is utilized as a unit of compression/decompression. In other words, when a certain application is needed, an electronic device is required to decompress all code of the desired application to a RAM in order to utilize the application. However, the above approach suffers from a drawback that the RAM must have a large capacity for accommodating all kinds of decompressed code. Thus, hardware costs of an electronic product are again increased due to a costly RAM. |
I'm a C/C++ guy new to AmiBlitz3, using the cvs version 3.6.1 with PED as IDE and I'm having problems to get my files into a project using menu -> Project settings. The create new button is grayed out, the file request for input files doesn't react. Can someone tell me the way to get my files into a project and save it? |
NBA Draft Focus: Whose Draft Stock Is Rising?
A few college studs are expanding their bank accounts by the second. This money isn't in their possession yet, but it will be as soon as their rising draft stock has them flying off the draft board higher than any projections forecasted just a few months ago.
For some, this could mean they have put themselves in a position to be a lottery pick, and for others it could simply mean they will be drafted.
What they all have in common is that these are the players who, for various reasons, are rising up draft boards.
Bradley Beal, SG, Florida
At 6'3" and 207 pounds, Bradley Beal doesn't have the typical height a team looks for in a shooting guard. He also didn't get to play with the ball in his hands much this season as he shared the backcourt with Erving Walker and Kenny Boynton.
Despite this, he still averaged 14.6 points per game in his freshman season and was likely headed for a mid to late—first round selection.
Then he came up clutch in the NCAA tournament and showcased his poise and a maturity well beyond his years. This will continue to serve him well as teams interview him.
In the tournament, Beal proved he had the ability to get to the rim and finish against top—flight interior defenders.
Beal will also be helped by the fact that he is a solid rebounder; he averaged 6.5 a game last season, and he is an efficient scorer who had a field goal percentage of .445.
Michael Kidd-Gilchrist, SF, Kentucky
Kentucky was so loaded with talent it was tough to stand out. They played fantastic team ball, and as a result Michael Kidd-Gilchrist didn't get to showcase his amazing talent like he would have at another school.
Still the 6'7", 232 pound small forward's athleticism was undeniable, and he seemed destined to be a late lottery pick.
This is a player with tremendous intangibles and leadership. That was on vivid display in Kentucky's championship run.
He needs to work on his shooting stroke, but everything else about his game is NBA ready. He is also one of the best wing defenders in this draft, and teams are going to have a hard time passing on a player with the potential to dominate at both ends of the floor like Kidd-Gilchrist can.
Damian Lilllard, PG, Weber State
Playing at Weber State, Damian Lillard didn't get a chance to blow away national audiences with his play. However, after the dust of the season settled, and live action gave way to tapes, Lillard has emerged as the best point guard prospect in this draft.
He doesn't have the same command of the floor as North Carolina's Kendall Marshall, but he is a much better scorer.
At 6'2", he has solid size for the position, and there is no doubting his ability to put the ball in the bucket.
Lillard averaged 24.5 points per game while shooting 46.7 percent from the field last season. Sure, this wasn't against elite competition, but he has the athleticism and shooting stroke to score on any level.
Marshall knows how to get the ball to players in the perfect spot for them to succeed. This is a subtle talent that is hard to pick up on, but it was clear in his absence.
Marshall is the best pure point guard in this draft, and any team with solid scorers at other positions will be well served to have a point guard like Marshall. True floor generals like him are getting harder and harder to find.
I wouldn't be surprised to see him sneak into the tail end of the lottery.
Dion Waiters, SG, Syracuse
Dion Waiters spent the majority of his two years at Syracuse coming off the bench. This left him as an NBA draft afterthought.
However, the 6'4", 215 pound guard really grew into his role coming off of the bench, and there is no doubting his ability to score. He averaged 12.6 points in 24.1 minutes a game last season.
Waiters struggled in the Orange's last tournament game, but was fantastic leading up to that. During that run, he put his ability to penetrate the lane on full display. This is priceless on the NBA level.
Like all Syracuse players, his defense is a question mark as he's been stuck in a zone, but he has the athleticism to be a solid man-to-man defender.
If he works on his ball handling and court vision, Waiters has a chance to be a combo guard in the NBA. This potential could possible land him in the lottery and certainly won't have him hanging in the draft past the early 20s.
Moe Harkless, SF, St. John's
Moe Harkless' draft stock was on a steady rise his freshman year and that climb is not over.
He won the Big East Rookie of the Year last season and certainly had the stats to warrant it. He averaged 15.5 points and 8.6 rebounds a game.
He will be well served to add some bulk, as he is only 190 pounds, but he has the length at 6'8" that teams covet on the wing.
This young man is a complete player, and his potential is through the roof. He can drive, shoot and if he bulks up he will be able to get in the post against other small forwards. He is also an excellent defender.
Jared Cunningham, SG, Oregon State
Jared Cunningham is an athletic shooting guard who didn't generate a lot of draft buzz this season. He is not a dominant outside shooter and hit just 33.8 percent of his three-point shots last season. And at 6'4", his size is not overwhelming.
Also, let's face it. Playing at Oregon State may have gotten him noticed at the White House but not with a large audience.
This prospect's draft stock is rising because of his potential to be a combo guard. He has decent handles and dished out 2.8 assists per game last season despite not being the main distributor.
He knows how to penetrate the lane and has a ton of upside. Don't be surprised if he sneaks into the first round.
Darius Miller, SG, Kentucky
Darius Miller took a backseat to Kentucky's super youngsters and being drafted at all seemed like a longshot for Miller.
He could now possible be a late to early second—round selection.
Miller has the shooting—he shot 37.6 percent from three-point range last season—and ball handling to play shooting guard in the NBA. He also has the athleticism and height (6'8") to guard either shooting guards or small forwards.
This is extremely valuable in the NBA and he will be a nice piece for any team to bring off the bench.
Kyle O'Quinn, C/PF, Norfolk State
Kyle O'Quinn struggled with weight issues in his college career, and this was certainly a turnoff for NBA teams. However, with hard work and dedication, he was able to get that under control.
ESPN lists him at 6'10" and 240 pounds. Still, O'Quinn was not playing against elite competition at Norfolk State, and there were legitimate questions whether he had the athleticism to succeed at the NBA level. It seemed unlikely he would be drafted at all.
O'Quinn proved he can overcome his deficiencies to contribute in the NBA at the Portsmouth Invitational.
The Invitational features the top college seniors in the nation, and O'Quinn dominated. In fact, he was named the MVP.
He snagged 12 rebounds and added six blocks. This kind of interior defense is a valuable commodity, and it almost certainly earned O'Quinn a second—round draft selection. |
// LICENSE : MIT
"use strict";
import { UseCase } from "almin";
export default class DispatchUseCase extends UseCase {
constructor() {
super();
this.name = "DispatchUseCase";
}
execute(payload) {
this.dispatch(payload);
}
}
|
(function() {
var namespace = WEBLAB.namespace("WEBLAB.utils.loading");
var EventDispatcher = WEBLAB.namespace("WEBLAB.utils.events").EventDispatcher;
if (namespace.JSLoader === undefined) {
var JSLoader = function JSLoader() {
};
namespace.JSLoader = JSLoader;
JSLoader.LOADED = "loaded";
JSLoader.ERROR = "error";
var p = JSLoader.prototype = new EventDispatcher();
p.load = function(aFilePath, aIsAsync) {
var scope = this;
var script = document.getElementsByTagName('script')[0];
var newjs = document.createElement('script');
newjs.onreadystatechange = function() {
if (newjs.readyState === 'loaded' || newjs.readyState === 'complete') {
newjs.onreadystatechange = null;
scope.dispatchCustomEvent(JSLoader.LOADED, aFilePath);
}
};
newjs.onload = function() {
scope.dispatchCustomEvent(JSLoader.LOADED, aFilePath);
};
newjs.src = aFilePath;
newjs.async = aIsAsync;
script.parentNode.insertBefore(newjs, script.nextSibling);
};
}
})();
|
These are white and chocolate cakes covered with BC icing. They are topped with a square of white MMF imprinted with a edible ink baby foot print (I used a stamp bought at the craft store in the scrapebooking area). These took forever. I made a 9x13 cake and cut into squares, they were hard to ice without a bunch of crumbs and I won't volunteer this anytime soon! |
As integrated circuit clock frequencies and circuit densities continue to scale dramatically upward, the importance of a stable power supply voltage becomes critical for reliable operation. Power supply current demand and therefore voltage fluctuation is affected by changes in power consumption on the chip. Sustained changes of on-chip switching activity for more than one clock cycle change the average current demand (ΔI) of CMOS chips and create power voltage noise in the mid-and low frequency range. Thus, switched bypass resistors are often connected directly to the power supply.
The power supply noise is created because the power supply and voltage regulation functions are physically displaced from the chip, resulting in additional power loading on the power supply. Chip modules, circuit card assemblies (CCA) and printed circuit boards (PCB) often combine to present a complex distribution network for on-chip power supply regulation. The un-avoidable inductances in the power delivery network routed from the power supply to the on-chip circuits are a primary source of power supply noise. Increased switching activity causes a drop of the on-chip supply voltage and decreasing switching activity can result in voltage supply overshoot. The on-chip voltage fluctuations are attributable to high switching activity of a large percentage of active devices and their corresponding capacitive loads. This type of fluctuation in power supply voltage tends to occur over a period of about 5 nanoseconds.
Power supply noise impacts chip performance and can cause false switching in logic circuits. Power supply noise becomes more and more critical with increasing ΔI and decreasing supply voltage because noise margins for low voltage circuits are commensurately reduced.
Large leakage currents in the range of about 70 A can operate to reduce power supply noise in CMOS integrated circuits due to a damping effect in supply perturbations and also because of the relatively small dependency of the supply voltage to leakage resistance. However, in current process technologies, leakage currents present a major source of power dissipation as well as unique challenges to chip cooling, thereby mitigating any reliance on leakage currents as a means for reducing power supply noise.
Another common practice to reduce power supply noise is to place decoupling capacitors on-chip as well as on the module, CCA or PCB. On-chip decoupling capacitors are most efficient for mid-frequency power supply noise reduction, but the total amount of decoupling capacitance is limited by the chip size. Moreover, the path inductances of the power delivery network and of the decoupling capacitors themselves are reduced by appropriate design and technology. However, low inductance capacitors (LICA) placed on the module are significantly more expensive than general purpose capacitors. |
This invention is in the field of temporary or portable roadways, and in particular such roadways that are suitable for use in sensitive environments and soft ground.
It is often required for construction, exploration, and like purposes to construct roadways through rough territory including soft ground. These roadways are often temporary and in the interests of preserving the environment, it is desired to have a roadway wherein heavy equipment can enter an area to do a job as required and leave the area with as little damage to the ground surface as possible.
The military, emergency measures organizations and the like also have occasion to move equipment quickly into areas where no roads are available. Temporary air strips must sometimes be made under adverse conditions as well as roadways.
Also in soft ground vehicles get stuck and are unable to proceed until pulled by a tractor or the like, and even then they may not be able to proceed. The tractor further damages the ground, making ruts and so forth.
Corduroy roads, wherein logs and so forth are laid lengthwise across the path of the road have been used in the past to cross soft areas of ground. Improvements to the well known corduroy road have also been known, for example as disclosed in U.S. Pat. No. 5,282,692 to McLeod. The McLeod patent discloses a series of parallel members joined together and extending substantial perpendicular to the path of the roadway.
A problem with such prior art apparatuses for roadways is that the members are substantially perpendicular to the path of vehicles travelling on the roadway with the result that the wheels of the vehicles pass suddenly and directly from one lateral member to the next, causing significant impact loading. The weight of a vehicle on each member, combined with the impact loading, also causes the same to sink somewhat relative to the next adjacent member where no weight is present, and as the wheel rolls, it must climb up onto the next adjacent member to progress down the roadway, decreasing the efficiency of the vehicle. This effect also causes the wheels of the vehicle to push against the members of the roadway, putting added stress on the links holding one member to the next.
It is an object of the present invention to provide an apparatus that can be laid on the ground, including soft ground, as a roadway to facilitate travel by vehicles over the apparatus.
It is a further object of the present invention to provide such an apparatus that reduces damage caused to the ground surface by the vehicles.
It is a further object of the present invention to provide such an apparatus that enables a temporary roadway to be hauled to a site and quickly assembled for use.
The present invention addresses these objectives by providing a flexible roadway with advantages over apparatuses currently employed in the art. The apparatus comprises a number of sections held adjacent to each other by a retainer. Each of these sections comprises a top surface, a bottom surface, a front face and a back face. The front face of a section mates with the back face on an adjacent section to form an interface. The interface of the mating faces is at a non-perpendicular angle to the direction of travel substantially along its length.
This invention addresses the problem created by prior art roadways, which consist of members substantially perpendicular to the path of the vehicle, where the weight of the wheel passing over the sections causes an impact load on each section in turn. In the present design, the interface between adjacent sections is not perpendicular to the path of the vehicle so that the weight of the vehicle is applied gradually to each adjacent section rather than suddenly loading it. While even a minor deviance from the perpendicular will effect some reduction in impact loading, the greater the angle the more gradual the weight transfer. For practical design purposes, it is anticipated that an angle between 40 and 50 degrees will be most suitable for most applications.
The reduction in impact loading will reduce the amount each member sinks in relation to the adjacent members.
The present invention may further include a system to interlock a section to adjacent sections. The back face of one section may contain a groove that interlocks with a corresponding tongue contained in the front face of the adjacent section. Thus downward force on one section will exert a downward force on the adjacent sections, thereby increasing the area of the ground surface the force is being applied to, and further reducing the amount each section sinks.
The apparatus may also include hollow vertical tubes passing through the sections. These tubes brace the top surface of each section, reduce damage to the ground beneath the roadway by releasing pressure built up under the sections, and provide somewhat improved traction for the vehicle wheels on the surface of the apparatus.
Where the apparatus is made from a hollow formed plastic, the apparatus could be made light enough to be easily moved and quickly placed in position. |
Hydrodynamics of a microhunter: a chemotactic scenario.
Inspired by biological chemotaxis along circular paths, we propose a hydrodynamic molecular scale hunter that can swim and can find its target. The system is essentially a stochastic low-Reynolds-number swimmer with the ability to move in two-dimensional space and to sense the local value of the chemical concentration emitted by a target. We show that, by adjusting the geometrical and dynamical variables of the swimmer, we can always achieve a swimmer that can navigate and can search for the region with a higher concentration of a chemical emitted by a source. |
maxColumn = 160
rewrite.rules = [AvoidInfix]
<<< already in parens
(NotQuoted ~ any.*) map { x =>
x
}
>>>
(NotQuoted ~ any.*).map { x =>
x
}
<<< settings
Project("sub", file("sub")) delegateTo (root) settings (check <<= checkTask)
>>>
Project("sub", file("sub")).delegateTo(root).settings(check <<= checkTask)
<<< #739 AvoidInfix Bug
onLoad in Global := (Command.process("project server", _: State)) compose (onLoad in Global).value
>>>
onLoad in Global := (Command.process("project server", _: State)).compose((onLoad in Global).value)
<<< #934 1
object a {
b.c(_ foo 0)
}
>>>
object a {
b.c(_.foo(0))
}
<<< #934 2
object a {
b.c(foo bar _)
}
>>>
object a {
b.c(foo bar _)
}
<<< #934 3
object a {
b.c(foo _ bar 0)
}
>>>
object a {
b.c((foo _).bar(0))
}
<<< #934 4
object a {
b.c(_ foo bar baz 0)
}
>>>
object a {
b.c(_.foo(bar).baz(0))
}
<<< #934 5
object a {
b.c(foo bar _ baz 0)
}
>>>
object a {
b.c(foo bar _.baz(0))
}
<<< #1047 1
val i: Ordering[I] = Ordering.fromLessThan(_.i isAfter _.i)
>>>
val i: Ordering[I] = Ordering.fromLessThan(_.i isAfter _.i)
<<< #1141 1
object a {
implicit val locationReads: Reads[Location] = (
(JsPath \ "lat").read[Double] and
(JsPath \ "long").read[Double]
)(Location.apply _)
}
>>>
object a {
implicit val locationReads: Reads[Location] = (
(JsPath \ "lat").read[Double].and((JsPath \ "long").read[Double])
)(Location.apply _)
}
<<< #1141 2
maxColumn = 80
===
object a {
implicit val locationReads: Reads[Location] = (
(JsPath \ "lat").read[Double] and
((JsPath \ "long").read[Double]) and
((JsPath \ "anotherField").read[String])
)(Location.apply _)
}
>>>
object a {
implicit val locationReads: Reads[Location] = (
(JsPath \ "lat")
.read[Double]
.and((JsPath \ "long").read[Double])
.and((JsPath \ "anotherField").read[String])
)(Location.apply _)
}
<<< #842 1
maxColumn = 80
===
object a {
implicit val locationReads: Reads[Location] = (
(JsPath \ "lat").read[Double] and
((JsPath \ "long").read[Double]) and // comment
((JsPath \ "anotherField").read[String])
)(Location.apply _)
}
>>>
object a {
implicit val locationReads: Reads[Location] = (
(JsPath \ "lat")
.read[Double]
.and((JsPath \ "long").read[Double])
.and( // comment
(JsPath \ "anotherField").read[String]
)
)(Location.apply _)
}
|
The core of Sri Nisargadatta Maharaj's teaching is the knowledge of one's own identity. This knowledge is indeed the pivotal point around which moves everything. It is the crucial truth. And the apperception of this truth arisesonly from intense personal experience, not from a study of religious texts, which according to Maharaj, are nothing but 'hearsay.' Taking his stand on the bedrock of incontrovertible facts and totally discarding all assumptions and speculations, he often address a new visitor in the following words: "You are sitting there, I am sitting here, and there is the world outside -- and, for the moment, we may assume that there must be a creator, let us say God. These three/four items are facts or experience, not 'hearsay.' Let us confine our conversation to these items only." This basis automatically excludes along with the 'hearsay' the traditional texts too, and therefore there is always an exhilarating sense of freshness and freedom to Maharaj's talks. His words need no support from someone else's words or experiences which, after all, is all that the traditional texts can mean. This approach completely disarms those 'educated' people who come to impress the other visitors with their learning, and at the same time hope to get a certificate from Maharaj about their own highly evolved state. At the same time it greatly encourages the genuine seeker who would prefer to start from scratch. ...Maharaj tells the visitors that it is only about this consciousness or I-am-ness that he always talks. |
The present invention relates to an image processing device incorporated in a digital copier, facsimile transceiver or similar digital image forming apparatus for effecting various kinds of digital image processing, e.g., erasing, italicizing and shadowing, and blanking with any desired area of an image.
To effect image processing with a particular area of an image, a prerequisite with the above-described type of image processing device is that the particular area to be processed and the content of processing be recognized. Some different methods have heretofore been proposed for such recognition, as enumerated below:
(1) a method which determines contour data of a mark entered by a marker pen selects a pair of outer and inner contour loops as areas which may be processed while regarding the others inputs as commands, and recognizes the kind of the commands;
(2) a method which causes an operator to enter a desired area and a command by a marker pen and executes image processing with the desired area according to the command;
(3) a method which stores mark information entered in two colors in a memory and extracts area information out of one of the mark information while obtaining processing content information out of the other mark information; and
(4) a method which separates continuous pixels from mark information to thereby determine whether a desired image is a line image having area information or a text image having processing content information.
All the conventional methods, however, are not practicable unless marks are directly entered on documents by a marker pen, smearing documents. Therefore, such methods are not applicable to important documents.
When it is desired to erase image information representative of, for example, a table of a document except for title areas, the areas other than the title areas may be erased by a correcting liquid, instead of being marked by a marker pen. To italicize, blank, shadow or otherwise process title areas, for example, a document with such an image may be prepared independently of a desired document and then cut and adhered to the areas of interest of the desired document. While this kind of procedure does not need a marker pen, it simply retouches the desired document itself and, therefore, cannot be practiced without damaging the document. |
[FOM] Question about theoretical physics
My concern is simpler than this. I just want to know where there exists a computer program which takes as inputs the fine-structure constant and a desired output precision and returns a prediction of the magnetic moment of the electron to the requested precision, whether or not the program has good convergence properties.
In other words, picking where to stop the sequence of approximations may be "cheating" in some way, but I haven't even seen a proper description of how to generate the sequence of approximations that is specific enough to allow a good programmer to implement it. I am sure that such a program EXISTS because the "predicted value" we read about, that is supposed to match experiment so well, must have been actually calculated at some point, but the only descriptions I can find are much too full of hand-waving.
I want a pointer to a reference work that tells how to enumerate the relevant Feynman diagrams, how to define and numerically approximate the relevant Feynman integrals when given a Feynman diagram, and which terms to calculate to which levels of precision, in order to obtain an answer to a specified number of decimal places.
It doesn't need to be an actual program, just a good enough specification that computer scientists who do not have Ph.Ds in physics could agree "there must be a real algorithm in there" after enough shoveling is done.
Sent from my iPhone
On Feb 28, 2013, at 7:29 PM, "Timothy Y. Chow" <tchow at alum.mit.edu> wrote:
On Thu, 28 Feb 2013, Kreinovich, Vladik wrote:
> If the results are close but not that accurate, they try second approximation.
>> For QED, we get correct result with I think 10 digits or so, very accurate, by using the appropriate approximation, enough to explain most experiments
Again, allowing me to caricature the situation for simplicity, I'd say that the objection is this. If the sequence of approximations is not believed to converge, then this looks like "cheating" to an outsider. I compute the first approximation, and it's not so good. So I compute the second approximation, and it's better, but still not great. I compute the third approximation, and wow! It matches to 10 digits. I collect my Nobel Prize and conveniently forget to mention that if I had computed the fourth approximation, it would have matched only 5 digits.
Sort of like tossing a needle a multiple of 213 times so that after 3408 trials one can "estimate" pi to 7 digits.
I think I know what the correct rejoinder is. The situation is not like Buffon's needle because even if physicists have a whole array of different theoretical calculations that they could try, there's no reason a priori to expect *any* of the methods to agree with experiment to 10 digits. Admittedly, because the physicists can't precisely map out the space of possible theoretical calculations ahead of time, they can't make a precise quantitative statement about just how remarkable the agreement with experiment is. But that is generally the case with scientific predictions anyway---we don't have any quantitative estimate of "how remarkable" Einstein's calculation of the perihelion precession of Mercury is. Though QED isn't mathematically rigorous, that doesn't mean it's infinitely malleable, and it's still possible to have an intuitive sense that there's something very remarkable about a particular non-rigorous calculation agreeing with experiment to that extent.
Having said that, I think that popular accounts do sometimes give the impression that the large number of digits of agreement makes this the most remarkable agreement between theory and experiment of all time, and maybe that is overstating the case? It's not like every digit of agreement exponentially increases our confidence in the correctness of the theory?
Tim
_______________________________________________
FOM mailing list
FOM at cs.nyu.eduhttp://www.cs.nyu.edu/mailman/listinfo/fom |
The sun was shining on a brisk January day when Leland Yee took a seat at an undisclosed San Francisco coffee shop. Across from him sat a Cosa Nostra crime boss.
For more than two years, the California state senator had been engaged in a frantic quest for campaign cash. Over a steakhouse dinner the previous spring, he’d begun taking envelopes of cash—a risky move for the normally cautious politician. Now he was looking at a much bigger deal, one that could put his financial obstacles behind him in one stroke.
The mobster, who claimed to hail from New Jersey, wanted millions of dollars worth of smuggled firearms: automatic weapons, “shoulder-fired” missiles. Yee, 65, a career politician whose square, earnest face was a fixture in Chinatown, and who was perennially seen stumping for stricter gun control laws in Sacramento, said he was confident he could help. For a fee, the Democrat indicated he could connect the mobster with a high-end arms dealer with contacts in Russia, the Ukraine, “Muslim countries.”
“Do I think we can make some money? I think we can make some money,” Yee said. But the transaction was not for the “faint of heart,” he warned: The last time Yee had dealt with an arms dealer, they were in the Philippines, and Yee was surrounded by bodyguards with machine guns.
In truth, the coffee shop tete-a-tete was a trap. The mob boss sitting across the table from Yee was actually an undercover FBI agent wired with a recording device, according to documents filed this week in U.S. District Court in San Francisco, part of an elaborate sting that snared the politician.
It also was a defining moment in a five-year-long FBI investigation that began with an unsolved homicide in Chinatown. The detour into a complex political tale of influence peddling and desperate lunges for campaign and personal cash surprised even the veteran agents.
The probe was carried out by 14 undercover FBI operatives — colorful characters worming their way into Yee’s life: the mobster, an Atlanta developer, a tech industry consultant looking for state contracts, a medical marijuana entrepreneur.
San Francisco police and FBI agents talk near the entrance of a Chinatown fraternal organization being searched Wednesday, March 26, 2014, in San Francisco. California CREDIT: ASSOCIATED PRESS
Turning points of their investigation included a whispered conversation in a karaoke bar, an envelope of cash passed at a popular restaurant and promises of political patronage made at a state cafeteria, court records show. The investigation ping-ponged from the dingy back alleys behind the tchotchke-choked streets of Chinatown to the rarified environs of the city’s renowned restaurants.
And it ended this week with an indictment that accused 26 people of racketeering, bribery, even soliciting murder for hire. Among them were reputed Chinatown gangster Raymond “Shrimp Boy” Chow and his aides, accused of using a Chinatown benevolent association as a front for their crime family; Keith Jackson, a former president of the San Francisco school board, who is accused of working as Yee’s political bag man; and the most prominent of them all: Yee, a liberal lawmaker running for California secretary of state on a platform of political reform also known, the FBI said, as “Uncle Leland.”
The case has roiled the political scene in San Francisco, which Yee has represented through one elective office or another for 28 years. In a city with its share of scandals, this one stood out.
It also shook the California state Capitol, where Yee is the third senator to be charged with a felony during this legislative session — and the only lawmaker in state history to be accused of conspiring with international arms dealers in a quest to raise campaign cash.
Yee, freed on bail after being arrested at his home Wednesday, will plead not guilty, according to his lawyer.
The owner of the New Asia restaurant in San Francisco’s Chinatown was indicted in the case that
involves Raymond “Shrimp Boy” Chow and state Sen. Leland Yee. Credit: Sarah Rice for CIR
The government’s case describes a man on a collision course with political ambition and financial stress. Even as Yee mounted an expensive statewide race for secretary of state, he was laboring to pay off tens of thousands of dollars in debt left from his failed 2011 campaign for San Francisco mayor.
In a detailed 137-page affidavit, the government said Yee was aided in his crimes by Jackson, who is accused of serving as the senator’s liaison to underworld figures, promising them political favors in exchange for campaign contributions.
Yee emigrated from China’s Guangdong province as a toddler, grew up in San Francisco and earned a doctorate in child psychology. His political career began in 1986, first on the San Francisco school board, then the city’s board of supervisors, the state Assembly and, in 2006, the Senate.
Over the years, he burnished an image of a good-government advocate, crusading for gun control, government transparency and campaign finance reform. In 2012, the California Clean Money Action Fund named him a Clean Money Champion. His penchant for biting, no-B.S. quotes made him a media darling. Less than a week before his arrest, the Society of Professional Journalists honored him for confronting the governor and his own party on behalf of open public records.
Yet Yee also had a reputation for pushing some ethical boundaries.
While on the school board, he was caught registering his children under a fake address so they could be enrolled in better public schools. On a Hawaii vacation, he was arrested for shoplifting suntan lotion. Twice, San Francisco police stopped him on suspicion of soliciting prostitutes in the city’s Mission District. In each case, he denied wrongdoing.
Raymond “Shrimp Boy” Chow served as the “dragon head,” or leader, of the Chee Kung Tong
benevolent association, located on Spofford Street in San Francisco’s Chinatown. Credit: Sarah
Rice for CIR
Yee met Jackson, now 49, while they served together on the school board nearly 20 years ago. An African American with an engaging smile, Jackson grew up in the old North Beach housing projects near Fisherman’s Wharf and later worked as a bank teller. He became politically active building ties in both the gay and black communities, and in 1994 was elected to the school board on a reform slate.
Jackson worked to rename a school for Rosa Parks, and he hosted the civil rights pioneer at the ensuing ceremony.
He had ethical issues of his own. Jackson once had a job pursuing deadbeat dads as an investigator for the district attorney’s office, but the San Francisco Chronicle learned in 1997 that he was $5,000 in arrears on his own child support payments. He left the school board before his first term ended.
In the years that followed, Jackson worked as director of the city’s Black Chamber of Commerce, then became a political consultant. One big client was Lennar Urban, the giant homebuilding firm that is redeveloping the old Hunters Point Naval Shipyard in the heart of the city’s largest African American community. Other clients have included the San Francisco 49ers and Yee.
Jackson also consulted for Chinatown’s Chee Kung Tong, a benevolent association sometimes called the Chinese Freemasons. That put him in close contact with Raymond Chow, the compact, muscular man who served as the organization’s “dragon head,” or leader.
Raymond “Shrimp Boy” Chow from Facebook page photo
Chow said his mother named him “Shrimp Boy” to ward off evil spirits. By his own account, he became a Chinatown gangster soon after he emigrated from Hong Kong as a 16-year-old. At 17, according to an interview he gave to SF Weekly, he was present at the infamous 1977 Golden Dragon massacre — a wild predawn gang shootout in a Chinatown restaurant that left five dead and a dozen wounded — but escaped unhurt.
He became leader of the Hop Sing Boys, a violent Chinatown gang that was involved in extortion, loan sharking, arson and heroin dealing, as well as multiple shootings, court records show. “I owned the gang,” he bragged to one prosecutor.
After pleading guilty to federal racketeering charges in 2000, Chow became a government witness to reduce his 23-year prison sentence. Paroled three years later, Chow publicly declared he had reformed and said he was devoting himself to good works — campaigning for a new community college campus in Chinatown and working for the Chee Kung Tong, where he assumed control in 2006 after the unsolved killing of his predecessor, Allen Leung.
Chow’s tale of personal redemption struck a chord with liberal politicians, and he has been photographed with or publicly honored by many, including U.S. Sen. Dianne Feinstein, Lt. Gov. Gavin Newsom, San Francisco Mayor Ed Lee and Yee.
But after Leung’s fatal shooting, the FBI targeted Chow in a racketeering investigation, court records show. Investigators were building a case that the reformed gangster actually was involved in money laundering and selling heisted liquor, cigarettes and other stolen goods.
Political consultant Keith Jackson, accused of soliciting bribes on behalf of state Sen. Leland Yee,
allegedly discussed a murder-for-hire plot at Roy’s restaurant in San Francisco with an
undercover FBI agent. Credit: Sarah Rice for CIR
In May 2011, according to the FBI affidavit, Chow introduced Jackson to a new acquaintance involved in gambling, bookmaking and sports betting, who was trying to move into marijuana cultivation on the West Coast. That man was the undercover FBI agent posing as a boss of Cosa Nostra — another name for the Mafia in Sicily, Italy.
Jackson had stumbled into the FBI’s probe of organized crime and corruption in San Francisco’s Chinatown. And through Jackson, Yee appeared in the agents’ sights as well.
But the affidavit clearly shows the undercover agents didn’t immediately pivot their gangland Chinatown investigation toward Yee, who at the time was running for San Francisco mayor against Ed Lee, the man holding the job, and several other candidates. That shift was a product of Jackson’s dogged pursuit of campaign cash. He would not take no for an answer.
Jackson was Yee’s chief fundraiser. He immediately began hitting up the undercover agent for money, according to the affidavit.
The pretend mob boss demurred.
Jackson insisted.
The mobster tried to keep blowing him off.
Finally, the agent steered Jackson to another undercover agent, this one posing as a developer from Atlanta. The FBI set up a ruse designed to test whether Yee could be lured into soliciting political bribes. They concocted a story that the developer needed political juice to expand his operations into California. Could Yee help?
A series of stings outlined in the affidavit seemed to answer with a resounding yes.
Yee offered to chaperone mob-influenced public health legislation in exchange for cash. And later he went even further, so far that if the sting were a television show, it would have jumped the shark: The Democratic senator proffered himself as the linchpin of an international gun-running conspiracy involving Muslim terrorists in the Philippines.
The Hop Sing Tong, a Chinese fraternal organization, is located on Waverly Place in San
Francisco’s Chinatown. Accused racketeer Raymond “Shrimp Boy Chow” once boasted he
“owned” the Hop Sing Boys criminal gang. Credit: Sarah Rice for CIR
On Sept. 22, 2011, the agent posing as the Atlanta developer met Yee at a fundraising event in San Francisco and wrote him a $500 check — the maximum donation allowed under city law. Yee followed up with a voicemail, transcribed in the court filing: he “appreciate[d] the conversation and then hopefully, um, you know, there are things that uh, we can do to be of help uh, to you, and uh, but anyway just wanted to reach out and say thank you very, very much.”
Two days later, Yee called the developer twice. The first time, he said he wanted to discuss affordable housing development, particularly once he became mayor. In the second call, Yee said he couldn’t talk policy on the same call in which he asked for money. And then he asked the developer to raise $10,000 for his campaign.
The agent obliged. He got 10 undercover operatives to write $500 checks to Yee’s campaign. Then the agent wrote a $5,000 check — 10 times the legal limit. When Yee asked for even more money, the developer balked. He needed to know he’d get something in return.
Yee assured him that once he was mayor that would be no problem. “We control $6.8 billion, man, shit,” he reportedly said, referring to the city’s annual budget.
Yee never gained control of that budget. He placed fifth in the mayor’s race. California’s term limit law also meant he soon would be pushed out of his state Senate seat. To avoid a skidding halt to his quarter-century political career, he decided to run for secretary of state. For that, and for his campaign debts, he needed money badly.
That need bound him even more closely to the undercover agents, who in turn set an ever-larger trap.
In the affidavit, they are identified only by letters and numbers worthy of PayPal passwords. But the web they wove to catch Yee was intricate and precise.
The one posing as an Atlanta developer persuaded Yee to call a state health department official — actually another FBI agent — about a computer contract, the affidavit says. Yee agreed to help steer the contract to a software consulting company called Well Tech — supposedly a client of the developer. It actually was an FBI front run by an agent who used the alias Sonja Schmidt.
Yee and Jackson met with the developer Sept. 4, 2012, at the cafeteria in the California state building on Golden Gate Avenue in San Francisco, just across from the gold-domed City Hall. Yee complained about financial pressure.
“We’re 32 out now: $32,000 out from paying off the debt. … So if you could do another $10,000, that would be good,” Yee is quoted as saying.
The developer responded that Well Tech needed help with the state contract.
After receiving another $10,000 check from one of the undercover agents, Yee followed up with a letter of introduction for Schmidt on his Senate letterhead recommending her purported software firm, the affidavit says.
A five-year-long FBI investigation that began with an unsolved homicide in Chinatown ended this
week with an indictment that accused 26 people of racketeering, bribery and soliciting murder for
hire. Credit: Sarah Rice for CIR
In January 2013, Yee’s quest for cash led him to San Francisco’s Waterbar, a stylish seafood restaurant offering $110 iced shellfish platters in the shadow of the Bay Bridge. It was there that Yee for the first time met the agent pretending to be a Cosa Nostra boss. By then, the agent had so thoroughly infiltrated Chow’s Chee Kung Tong organization that he was working there as a consultant.
The agent told Yee that he needed a favor: a proclamation from Yee praising Chee Kung Tong.
Yee reportedly expressed concern about Chow’s criminal past: “He’s still hot stuff. So we just gotta be careful, man.” But he delivered the proclamation anyway and eventually received a $5,000 check from an agent in return.
Last March, Yee went to a Starbucks at the Marriott Marquis near the San Francisco Museum of Modern Art. An undercover FBI agent pretending to be a business associate of the Atlanta developer was there with yet another agent, this one posing as an Arizona businessman who styled himself as the “Anheuser-Busch of medical marijuana.”
This agent said he wanted to expand his medical marijuana businesses into California. He urged another kickback scheme: In exchange for a payoff, Yee would usher legislation to favor well-financed marijuana producers by requiring dispensaries to employ physicians.
Two months later, on May 17, the deal was sealed over dinner at Alexander’s Steakhouse near AT&T Park, where the Giants play baseball. It is a white-tablecloth establishment, where only six entrees on the extensive menu are identified as “not beef” and a 2-pound Wagyu ribeye costs $350. There, Yee would take cash from an FBI agent directly for the first time.
At first, Yee seemed to refuse the offer — $10,000 to reach out to another senator carrying a marijuana dispensary bill. He was not interested in money, the affidavit says, but instead wanted his friends to benefit from his work.
The agent posing as the marijuana distributor handed Yee an envelope containing $5,000 anyway. He also gave Yee a written proposal for legislation requiring that a doctor be available for consultations at medical marijuana clinics.
“Is there a check?” Yee reportedly asked.
“I don’t do checks,” the agent replied.
Yee later arranged for the agent to meet with another unidentified lawmaker on the issue, the affidavit says, but Yee didn’t sponsor any legislation. (Two bills pending in the Legislature at that time touched on professionalizing medical dispensaries — one by Santa Ana Sen. Lou Correa, another by San Francisco Assemblyman Tom Ammiano and Senate President Pro Tem Darrell Steinberg. All three have denied any role in the Yee matter.)
State Sen. Leland Yee campaigns in San Francisco’s Sunset District during the 2011 mayor’s
race. After he lost, the FBI says Yee tried to broker illegal arms deals to repay $70,000 in
campaign debt. Credit: Adithya Sambamurthy/CIR
Perhaps empowered by the series of successful multi-thousand-dollar transactions, Yee upped the ante — and in the process dug himself a far deeper hole with the FBI.
In August, according to the government’s account, Jackson told the agent posing as a mobster that Yee had a contact in the international arms trade. This kind of connection, subsequent conversations would show, could be worth $100,000 — or more — to the senator.
This new Yee enterprise emerged even as the senator was pushing gun control in Sacramento, the latest of his unsuccessful attempts to strengthen California’s assault-weapon ban. In interviews, Yee frequently talked about soldiering on despite vehement criticism — even death threats — from the gun lobby.
“This is not an easy issue,” Yee told KPIX-TV in 2012. “But I am a father, and I want our communities to be safe, and God forbid if one of these weapons fell into the wrong hands.”
Yet Yee would not only offer but insist on being the conduit between the supposed mobster and automatic weapons equivalent to military M16 rifles, the government maintains.
It all began with a suggestion planted by the FBI. While having dinner with Jackson at Roy’s restaurant in December, a Hawaiian fusion spot on Mission Street downtown known for its macadamia-crusted mahi-mahi, the mobster said he wanted guns. He needed security, he said, for illegal marijuana plantations he hoped to establish in Northern California.
The agent handed Jackson a white envelope containing $1,000. This, he declared, should motivate Yee to set up a meeting between the agent and the international arms dealer Yee had been promising to produce.
Jackson assured the agent that the trafficker had access to cargo containers full of weapons.
Then the conversation shifted to something far more sinister. The agent said he wanted one of his associates killed — and Jackson offered to connect him with a willing hit man.
Also at the dinner was Jackson’s 28-year-old son, Brandon, who works for his father’s consulting firm. Although he has no criminal record, Brandon Jackson expressed interest in carrying out the murder himself, the government says. He said he had a contact at the state Department of Motor Vehicles who could provide a photo of the intended target. Brandon Jackson said he would gather intelligence and study the target’s daily routine. His enthusiasm that evening helped him earn a slot in the 26-person indictment.
That dinner came a month before Yee met the Cosa Nostra agent at the San Francisco coffee shop and warned him that gun dealing was serious business.
As Jackson listened at the coffee shop this past January, Yee explained that the arms dealer was cautious about choosing business partners but “has things you guys want,” according to the affidavit. The arms dealer, Yee added, sourced his weapons from places as far flung as Russia and the Ukraine but also had contacts in Boston and Southern California.
“I know what he could do,” Yee said. “I have seen what he has done in the past on other products, and this guy has the relationships.”
The mobster pointed out that a few weeks before, he had given Yee $5,000 for his secretary of state campaign.
It was time to return the favor.
“Do I think we can make some money?” Yee said. “I think we can make some money. Do I think we can get the goods? I think we can get the goods.”
Yee told the mobster that their relationship was superbly beneficial. He said that once he became secretary of state, he wanted the mob boss and Jackson to keep all the money they might make from the gun transactions. He didn’t “want to go to jail,” Yee said.
The agent told Yee that he would pay the senator and Jackson hundreds of thousands of dollars for helping with the arms deal. As a measure of thanks, Yee told the mobster that once he became secretary of state, he would make sure the mobster could travel to Russia with an official state delegation.
About a month after that meeting, in late February, Yee again met with Jackson and the undercover agent. The lawmaker wanted to urge caution.
A state senator from Southern California, Ron Calderon of Montebello, had been indicted the day before on public corruption charges. Yee made it clear, the affidavit says, that he viewed Calderon’s indictment as a cautionary tale — not about staying clean, but about involving too many people in a crime.
The agent did not back down; in fact, he turned up the heat. He wanted to buy an entire container of weapons — $2 million for the first shipment. He wanted firearms that were mobile, light and powerful.
Yee told the agent his stance on the weapons deal was “agnostic.”
“People want to get whatever they want to get,” he said. “Do I care? No, I don’t care. People need certain things.”
Yee emphasized that the weapons trafficker would deal with the agent only under one condition: Yee had to be involved. He advised starting off doing small deals. He attributed his long career in public office, he told the man, to being careful and cautious.
And yet, Yee confided that he was unhappy with his life.
“There is a part of me that wants to be like you,” he reportedly said. “You know how I’m going to be like you? Just be a free agent out there.” Perhaps he would go hide out in the Philippines, he said.
A poster supporting state Sen. Leland Yee’s mayoral bid decorates a shop in San Francisco’s
Chinatown in 2011. He came in fifth. Credit: Adithya Sambamurthy/CIR
A few weeks later, on March 5, Jackson told the undercover agent that the intended arms dealer was tied up with world affairs. Instead, the agent would deal with a weapons trafficker in the Philippines. Their U.S. point of contact for the deal would be Dr. Wilson Lim, a Daly City dentist who lives in Hillsborough and has donated $3,500 to Yee’s Senate campaigns, according to secretary of state records.
Yee described Lim — also named in the government indictment — as originally from Mindanao, a region in the southern Philippines. Muslim rebels there, Yee said, had no problem “kidnapping individuals, killing individuals and extorting them for ransom.” It was that region, Yee reportedly added, where guards with automatic rifles surrounded him while visiting at the invitation of the Mindanao government.
Lim, he added, had a relative who would be their Philippines connection to a man who previously sold guns to individuals from Florida. Those unnamed individuals picked up the weapons in Cagayan de Oro, Mindanao’s largest seaport. The FBI agent posing as a mobster agreed to follow the same playbook, shipping the weapons from there to the Port of Newark, N.J., then on to Sicily and North Africa.
When the agent met with Lim, Yee and Jackson the following week, the affidavit says Lim asked the agent to put together a list of desired weapons. That list would take a circuitous route to the arms dealer: The agent would give it to Jackson, who would turn it over to Lim, who would pass it on to his nephew in the Philippines after the November election.
The agent met again with Yee and Jackson a few days later. The agent gave the list of weapons he wanted to Yee, who said he would photocopy it and give it to Lim.
Twelve days after receiving the list, Yee was arrested at his San Francisco home, ushered handcuffed into an unmarked car. The gun lobby was quick to label him a hypocrite. Steinberg, the state Senate president who has remained circumspect about the other two indicted members of his house, stepped to the microphones to issue a terse demand of Yee: “Leave. Don’t burden your colleagues and this great institution. Leave.”
Wearing a blue windbreaker and a stern expression, Yee left the court that afternoon, having relinquished his passport and a bond to cover half a million dollars in bail — more than 10 times what all his interactions with the FBI had netted.
Within less than 24 hours, he announced his withdrawal from the secretary of state race. And by week’s end, he was barred from the Senate. Steinberg led the vote and afterward told reporters that while Sacramento politicians go through extensive ethics training, “I know of no ethics class that teaches about the illegality or the danger of gunrunning or other such sordid activities.” |
Child Labour in Agriculture
Worldwide, agriculture is the sector where by far the largest share of child labourers is found – approximately 59 percent. Over 98 million girls and boys aged 5 to 17 years old work in crop and livestock production, helping supply some of the food and drink we consume and the fibres and raw materials we use to make other products. This figure includes child labourers in fisheries and forestry. Almost 70 percent of child labourers are unpaid family workers (ILO Global Estimates and Trends 2000-2012). Agriculture is one of the three most dangerous sectors in terms of work-related fatalities, non-fatal accidents and occupational diseases. About 59 percent (or 70 million) of all children in hazardous work aged 5–17 are in agriculture.
Child labour is defined by the ILO Convention No. 138 on Minimum Age, 1973, and the ILO Convention No. 182 on Worst Forms of Child Labour, 1999, as work that harms children’s well-being and hinders their education, development and future livelihoods (for more information: International Labour Standards on child labour in agriculture - webpage under construction).
When children are forced to work long hours, their ability to attend school or vocational training is limited, preventing them from gaining education that could help lift them out of poverty. Girls are particularly disadvantaged as they often undertake household chores following work in the fields. Much of agricultural work can be hazardous, especially when health and safety standards are low, and can cause sickness, injury or even death. Children are particularly at risk as their bodies and minds are still developing, and they are more vulnerable to hazards such as pesticides. The negative health consequences of their work can last into adulthood.
Especially in the context of family farming and other rural family endeavours, it is important to recognize that some participation of children in productive non-hazardous activities can be positive, as it contributes to the inter-generational transfer of skills and to children’s food security. Age-appropriate tasks that do not present risks and do not interfere with a child’s schooling and right to leisure can be a normal part of growing up in a rural environment. Indeed, many types of contributions to the household's livelihoods can provide children with practical and social skills for their future. However, for more than 98 million girls and boys, their work in agriculture goes beyond these limits and becomes child labour to be eliminated. The prevalence of child labour in agriculture undermines decent work, sustainable agriculture and food security.
Low family incomes, the absence of schools, the lack of regulations and enforcement, and ingrained attitudes and perceptions about the roles of children in rural areas are some of the factors which make child labour in agriculture particularly difficult to tackle. Unless a concerted effort is made to address its root causes such as poverty and food insecurity, it will be impossible to achieve the goal of eliminating all worst forms of child labour by 2016 as per the ILO's Global Action Plan on the Elimination of Child Labour. The International partnership for cooperation on child labour in agriculture brings together stakeholders from labour and agriculture organizations to find solutions to child labour in agriculture.
During the conference, a Workshop on "Political will: Action against child labour in agriculture" offered recommendations on a wide range of measures - sustainable development policies and food security, cross-sectoral policies and programme, decent work, and enhanced participation of rural stakeholders, companies and consumers. The International partnership for cooperation on child labour in agriculture issued a joint Statement to the participants at the Hague conference to support the inclusion in the Roadmap of a specific commitment and concrete actions on child labour in agriculture, including livestock rearing, fisheries and forestry.
Click to view the Video, ILO 2007
Since 2007, FAO and ILO are increasingly focusing on child labour in agriculture. A number of these activities are developed in close collaboration.
A Study on Child Labour and children’s economic activities in agriculture in Ghana (FAO - Humboldt University Berlin, with collaboration from ILO, 2008) addressed knowledge gaps on child labour issues prevailing in the agricultural sector – specifically in cocoa production, fishing and cattle herding - and provided recommendations for agricultural stakeholders. Some key recommendations are: 1) integrating child labour issues into programmes and activities; 2) increasing the knowledge on incidence and forms of child labour in all agricultural sub-sectors, and on successful policies and interventions; 3) building capacity through training and education material for decision makers, agricultural extension services, farmers, children and youth.
A newsletter on Participatory Approaches and Child Labour in Agriculture (FAO Participation Website Team, 2009) provides information on participatory methods, approaches and tools for combating child labour. The newsletters show examples of communities of practice, participatory disease surveillance, participatory and community-based research and assessments, participatory theatre and communication strategies.
The Workshop on Child Labour in Fisheries and Aquaculture (FAO, in cooperation with the ILO, 2010) was the first initiative to address child labour in the sector. It provided a forum to exchange and discuss knowledge, experiences and good practices related to child labour in fisheries and aquaculture and to agree on a set of recommendations, provide advice and define actions. |
<vector xmlns:android="http://schemas.android.com/apk/res/android"
android:width="24dp"
android:height="24dp"
android:viewportHeight="24.0"
android:viewportWidth="24.0">
<path
android:fillColor="#fff"
android:pathData="M18.92,6.01C18.72,5.42 18.16,5 17.5,5h-11c-0.66,0 -1.21,0.42 -1.42,1.01L3,12v8c0,0.55 0.45,1 1,1h1c0.55,0 1,-0.45 1,-1v-1h12v1c0,0.55 0.45,1 1,1h1c0.55,0 1,-0.45 1,-1v-8l-2.08,-5.99zM6.5,16c-0.83,0 -1.5,-0.67 -1.5,-1.5S5.67,13 6.5,13s1.5,0.67 1.5,1.5S7.33,16 6.5,16zM17.5,16c-0.83,0 -1.5,-0.67 -1.5,-1.5s0.67,-1.5 1.5,-1.5 1.5,0.67 1.5,1.5 -0.67,1.5 -1.5,1.5zM5,11l1.5,-4.5h11L19,11L5,11z" />
</vector>
|
Yobo signs permanent deal at Fenerbahce
06 August 2012 02:47
Everton defender Joseph Yobo has completed a permanent move to Fenerbahce for an undisclosed fee.
The 31-year-old Nigerian, who has spent the last two seasons on loan at the Turkish club, has singed a three-year deal.
Yobo told the Toffees' official website, www.evertonfc.com: "I would love to thank Everton and the management of Fenerbahce for reaching a deal."
He added: "My family have settled well in Turkey and enjoy the life there, so I'm glad they will be re-uniting with friends here.
"The permanent switch is done and I am also switching to help the team do well on the pitch.
"It's been a long journey into achieving this dream and now is the time to pay the club and fans back with a great performance."
Nigeria international Yobo joined Everton from French club Marseille, initially on loan, in July 2002 as manager David Moyes' first signing, making a permanent £3.5million switch the following summer.
He made more than 250 appearances for the club, the last of them in a 0-0 Barclays Premier League draw at Stoke in May 2010.
His contract at Goodison Park was due to run until the summer of 2014. |
Scientific classification (disambiguation)
Scientific classification may refer to:
Chemical classification
Mathematical classification, construction of subsets into a set
Statistical classification, the mathematical problem of assigning a label to an object based on a set of its attributes or features
Taxonomy, the practice and science of categorization
Biology
Alpha taxonomy, the science of finding, describing and naming organisms
Biological classification
Cladistics, a newer way of classifying organisms, based solely on phylogeny
Linnaean taxonomy, the classic scientific classification system
Virus classification, naming and sorting viruses
Astronomy
Galaxy morphological classification
Stellar classification
See also
Categorization, general
Classification of the sciences (Peirce)
Linguistic typology
Systematic name |
FTIR and NDIR spectroscopies as valuable alternatives to IRMS spectrometry for the δ(13)C analysis of food.
The (13)C/(12)C carbon isotope ratio is a chemical parameter with many important applications in several scientific area and the technique of choice currently used for the δ(13)C determination is the isotope ratio mass spectrometry (IRMS). This latter is highly accurate (0.1‰) and sensitive (up to 0.01‰), but at the same time expensive and complex. The objective of this work was to assess the reliability of FTIR and NDIRS techniques for the measurement of carbon stable isotope ratio of food sample, in comparison to IRMS. IRMS, NDIRS and FTIR were used to analyze samples of food, such as oil, durum, cocoa, pasta and sugar, in order to determine the natural abundance isotopic ratio of carbon in a parallel way. The results were comparable, showing a close relationship among the three techniques. The main advantage in using FTIR and NDIRS is related to their cheapness and easy-to-operate in comparison to IRMS. |
European Stocks Mixed on Fall in German Ifo Index
European stock indices are mixed on Tuesday after eurozone markets pared losses triggered by disappointing business climate data from Germany.
LONDON ( The Deal) -- European stock indices were mixed on Tuesday after eurozone markets pared losses triggered by disappointing business climate data from Germany. The data followed a largely positive day in Asia, where indices were buoyed by declining oil prices.
The closely watched Ifo German business climate index fell more than expected in June to a reading of 109.7 from 110.4 in May. The Munich-based Ifo institute said the businesses it had polled were worried about the potential impact of the crises in Ukraine and in Iraq on the economy.
From the U.S., June consumer confidence data, out at 10 a.m.EDT, could provide the focal point of afternoon trading.
In London, the FTSE 100 was down 0.27% at 6,782.27. In Frankfurt, the DAX fell 0.07% to 9,914.20, while the CAC 40 in Paris rose 0.09% to 4,519.50.
In London, Carpetright rose 2% after founder and executive chairman Phil Harris said he would stay on as non-executive chairman following the July arrival of a new CEO until a replacement chairman is found. He had earlier said he would step down in early September. The retailer on Tuesday released a report showing declining full-year revenue and earnings. Carpetright is having a particularly hard time in the Netherlands, though it said core retail same-store sales in its domestic U.K. market rose slightly.
But Sports Direct International fell more than 3% after the company disclosed a 4.8% stake in recently listed Australian online retailer MySale Grou . The holding follows the discount sporting goods retailer's stakebuilding in department stores group Debenhams. |
198 S.W.3d 327 (2006)
In the Matter of J.W., a Child, Appellant.
No. 05-05-00675-CV.
Court of Appeals of Texas, Dallas.
June 12, 2006.
*329 April E. Smith, Mesquite, for appellant.
William T. Hill, Dallas, for appellee.
Before Justices FITZGERALD, FRANCIS, and LANG-MIERS.
OPINION
Opinion by Justice FRANCIS.
A jury found that J.W., a juvenile, was a child engaged in delinquent conduct by committing theft, and the trial court ordered him committed to the Texas Youth Commission. In four issues, J.W. complains the evidence is legally and factually insufficient to support the jury's finding that he committed theft; the trial court erred in admitting his oral statement; and the trial court abused its discretion in committing him to TYC. We affirm.
Jim Villwok was a teacher at Poteet High School in Mesquite. J.W., who was sixteen years old at the time of the incident, was a student in Villwok's last class of the day. On the afternoon of October 29, 2004, Villwok found J.W. in his office, which is accessed through the classroom. Villwok asked J.W. what he was doing, and J.W. "really didn't say anything" but acted "like he shouldn't have been in there."
That night, Villwok was at the high school football game and saw J.W. He noticed that J.W. had a gray case on his belt that looked similar to one that Villwok used for his digital camera. Villwok kept the camera in his office under the computer. Suspicious, Villwok went to his office to check on his camera and found that it was missing. Villwok returned to the game and notified Mesquite Police Officer Darryl Simmons and school administrators.
Officer Simmons located J.W. in the stadium and asked about the case hanging on his belt. J.W. told him it was a camera. Officer Simmons asked to see the camera, and J.W. handed it to him. Officer Simmons asked where J.W. got the camera, and J.W. said he got it during the game from a "guy named Mike." J.W. said he did not know Mike's last name but described him for Officer Simmons. Officer Simmons told J.W. that the camera may be stolen and that he was going to keep it until he could verify his story.
The next week, Officer Simmons matched the serial number of Villwok's missing camera to the camera taken from J.W. Also, Officer Simmons talked to Mike Sanders, who he had determined was the "Mike" identified by J.W. Sanders had no knowledge of the camera. At trial, Sanders testified that he had a conversation with J.W. after Halloween in which J.W. asked for his help. According to Sanders, J.W. said he got a camera from a "retarded boy" and wanted Sanders, if asked by the police, to say that Sanders got the camera from a "retarded boy."
J.W. gave at least two other versions of where he obtained the camera. Villwok testified that he asked J.W. about the camera when J.W. returned to school, and J.W. told him that another student gave it to him. Additionally, two witnesses, both friends of J.W., testified that they saw J.W. with the camera after school on October 29. Both testified that J.W. told them he got the camera from his mother. J.W. took pictures of his friends with the camera.
*330 In issues one and two, appellant complains the evidence is legally and factually insufficient to support his adjudication for theft. Specifically, he argues that no one saw him take the camera from Villwok's office. J.W. argues these issues together.
In juvenile cases, we apply the standards used in criminal cases to determine the legal and factual sufficiency of the evidence. In re A.B., 133 S.W.3d 869, 871 (Tex.App.-Dallas 2004, no pet.) (legal sufficiency); In re Z.L.B., 115 S.W.3d 188, 190 (Tex.App.-Dallas 2003, no pet.) (factual sufficiency). In a legal sufficiency review, the relevant question is whether, after viewing the evidence in the light most favorable to the judgment, any rational trier of fact could have found the essential elements of the offense beyond a reasonable doubt. Jackson v. Virginia, 443 U.S. 307, 319, 99 S.Ct. 2781, 61 L.Ed.2d 560 (1979); In re A.B., 133 S.W.3d at 871. In a factual sufficiency review, we determine whether a neutral review of all the evidence demonstrates the proof of guilt is so obviously weak as to undermine confidence in the jury's determination or, although adequate if taken alone, is greatly outweighed by contrary proof. In re Z.L.B., 115 S.W.3d at 190.
A person commits theft if he unlawfully appropriates property with intent to deprive the owner of property. TEX. PEN.CODE ANN. § 31.03(a) (Vernon Supp. 2005). Unexplained possession of recently stolen property establishes the offense of theft. Jackson v. State, 12 S.W.3d 836, 839 (Tex.App.-Waco 2000, pet. ref'd). If a defendant offers an explanation as to his possession of recently stolen property, the record must demonstrate that the defendant's explanation at the time his possession is called into question is either false or unreasonable before the evidence will support the conviction of theft. Id. Whether the defendant's explanation is false or unreasonable is an issue to be decided by the trier of fact. Id. The falsity of the explanation may be shown by circumstantial evidence. Id. However, if the defendant's explanation is reasonable and is sufficient to rebut the circumstances of his possession of recently stolen property, and other evidence, including the surrounding circumstances, is not sufficient to show the defendant's explanation is false, then possession alone is insufficient to sustain the conviction. Id.
Here, the evidence showed that less than an hour after Villwok caught J.W. in his office without his permission, J.W. had a digital camera and was taking pictures of friends. That night, J.W. had Villwok's camera at the football game, and it was confiscated by the police. J.W. offered four different versions to different people of how he came into possession of the camera: his mother gave it to him; he got it from a "guy named Mike"; a classmate gave it to him; and he got it from a "retarded boy." Although no person actually saw J.W. walk out of Villwok's office with the camera, we conclude a rational trier of fact could deduce from the above circumstances, beyond a reasonable doubt, that J.W. stole the camera. Accordingly, the evidence is legally and factually sufficient to support the jury's finding of theft. We overrule the first and second issues.
In his third issue, J.W. complains the trial court erred in admitting his oral statements to Officer Simmons at the football game. J.W. does not complain about any particular statement that he made but generally about the conversation he had with Officer Simmons. He argues the conversation was the result of "custodial interrogation," and its admission violated section 51.095 of the Texas Family Code. We disagree.
*331 Under section 51.095, certain requirements must be met for a juvenile's statement to be admissible. See TEX. FAM.CODE ANN. § 51.095 (Vernon Supp.2005). The statute does not, however, preclude admission of a voluntary oral statement by a juvenile that does not stem from custodial interrogation. See TEX. FAM.CODE ANN. § 51.095(b)(1), (d)(2).
In determining whether a minor was in custody at the time of questioning, courts consider the age of the defendant and all the circumstances surrounding the interrogation to decide whether there was a formal arrest or a restraint of movement to the degree associated with formal arrest. In re V.P., 55 S.W.3d 25, 31 (Tex. App.-Austin 2001, pet. denied). In other words, courts ask whether, based on the objective circumstances, a reasonable child of the same age would believe his or her freedom of movement was significantly restricted. Id. Factors relevant to the question of whether a child was in custody include whether there was probable cause to arrest, the focus of the investigation, the officer's subjective intent, and the child's subjective beliefs. Id.
The evidence showed that Villwok reported to Officer Simmons and school administrators that he believed J.W. had his digital camera. In response, Officer Simmons began looking for J.W. in the stands at the football game. When Officer Simmons spotted J.W., a second officer was near J.W., and Simmons asked the officer to bring J.W. to him. Both Simmons and the second officer were in full police uniform and had guns.
At the time of the questioning, J.W. was standing above Simmons on the walkway in the stands next to the second officer; Officer Simmons was standing below J.W. on the field with two school administrators. Although Officer Simmons testified that J.W. was not free to leave, he did not communicate that to J.W. Further, although he told J.W. he believed the camera might be stolen, he did not accuse J.W. of theft. Finally, because Officer Simmons had not determined whether the camera was stolen, he did not have probable cause to arrest J.W.
As for J.W., he was not arrested, handcuffed, or restrained in any way. He was not placed in a patrol car or taken to the police station for questioning. He never asked to go home or asked for his mother or an attorney. Rather, he answered Officer Simmons's questions and turned over the camera.
Considering all the circumstances objectively, we conclude a reasonable sixteen-year-old in J.W.'s circumstances would have felt able to end the questioning, particularly since the officers did nothing to restrain or restrict appellant's movement. Because we conclude appellant was not in custody during the questioning, the trial court did not err in admitting the challenged statements. Issue three is without merit.
In his fourth issue, J.W. contends the trial court abused its discretion in finding that he should be committed to TYC. A juvenile judge has broad discretion to determine the proper disposition of a child who has been adjudicated as engaging in delinquent behavior. In re K.J.N., 103 S.W.3d 465, 465-66 (Tex.App.-San Antonio 2003, no pet.) We will not disturb the juvenile court's determination absent an abuse of discretion. Id. An abuse of discretion occurs when the trial court acts unreasonably or arbitrarily and without reference to guiding rules and principles. Id. The guiding rules and principles in juvenile cases involving commitment outside the child's home are found in the Texas Family Code. Id.
*332 The family code permits a trial judge to commit a child to TYC if (1) it is in the child's best interest to be placed outside the home; (2) reasonable efforts have been taken to prevent or eliminate the need for the child's removal from the home; and (3) while in the home, the child cannot receive the quality of care and level of support and supervision needed to meet the conditions of probation. TEX. FAM.CODE ANN. § 54.04(i) (Vernon Supp.2005).
Here, the trial court made the necessary statutory findings. Having reviewed the record, we conclude it supports those findings. Alicia Lawhorn, the court liaison officer for the Dallas County Juvenile Department, recommended that J.W. be committed to TYC. According to Lawhorn, J.W. needed a highly structured setting. He had been released from TYC only seven months prior to his arrest in this case and, before that, had been placed in a level five facility, CSC Medlock, where he had been unsuccessfully discharged. Lawhorn testified there are no other level five facilities with which Dallas County contracts, and she did not believe Medlock would take J.W. again, given information in his discharge summary.
Further, Lawhorn testified J.W. had a history of running away, associating with negative peers, getting expelled from school, using drugs, and associating with gangs. While being held in the detention facility awaiting trial, J.W. had been on restrictive activity plans for being defiant, argumentative, disruptive in class, and playful; talking without permission; not following instructions; using profanity; and once threatening a staff member.
We recognize that J.W.'s mother testified that since his release from TYC, he had made new friends and was no longer associating with "bad influences." She said his behavior had changed dramatically; he was going to church regularly and was working with children in Bible classes. However, the trial court was in the best position to resolve any issues with respect to J.W.'s sincerity and credibility, especially in light of J.W.'s behavior while in detention. Considering all the evidence before the trial court, we cannot conclude the trial court abused its discretion in committing J.W. to TYC. We resolve the fourth issue against him.
We affirm the trial court's judgment.
|
Wings waive Jan Mursak
DETROIT – Just one game after returning from a collar bone injury, Jan Mursak has been waived by the Wings.
If he clears waivers by noon Saturday, Detroit can assign him to Grand Rapids.
One of his problems of not being able to crack the lineup was his health.
Mursak, 25, had just two goals and two assists in 46 career games with the Wings.
“For Murs to be real good we need him to be on the forecheck, to be relentless,” Wings coach Mike Babcock said on Thursday. “He’s got a great shot. He’s got to shoot the puck and he’s got to be real good defensively, good on the wall and good decision-making at their blue line.”
Mursak, who was taken in the sixth round of the 2006 draft by the Wings, started on a line with Tomas Tatar and Joakim Andersson on Thursday against the Columbus Blue Jackets.
Mursak hasn’t had any luck with injuries over the last two seasons. Last year he broke his ankle late in the preseason.
“It hasn’t been fun,” Mursak said Thursday. “I’m just trying to stay positive. Some days I’m a little more frustrated than others, but hopefully that’s the end of the injuries. Hopefully I can keep playing here without being hurt.” |
News outlets report that Sills said an inmate released from jail last month informed authorities that Roberson was having sexual contact with a woman in custody. The sheriff's office installed a camera and captured an alleged sexual encounter between Roberson and the female inmate earlier this week.
Roberson was charged with sexual assault by a person with supervisory or disciplinary authority, aggravated sodomy and violation of oath by a public officer. It's unclear if he has a lawyer who could comment. |
Correlations among the Reiss Screen, the Adaptive Behavior Scale Part II, and the Aberrant Behavior Checklist.
Relations among instruments used in community mental health services for people with developmental disabilities were explored with 284 individuals. Correlation coefficients among the instrument subscales were interpreted in terms of statistical significance and effect size. Of the 157 coefficients, 44% were significant, p < .001, and 35% represented large effects, r > .50. Reiss Screen subscale scores correlated with Irritability, Lethargy, and Hyperactivity on the Aberrant Behavior Checklist (ABC) and with Social Behavior and Disturbing Interpersonal Behavior on the ABS Part II. Stepwise regression analyses predicting Reiss Screen scores from the ABS and ABC resulted in a significant regression, with an overall adjusted R2 of .67. Variance was largely accounted for by two ABS domains and two ABC subscales. |
/*
* Licensed to the Apache Software Foundation (ASF) under one or more
* contributor license agreements. See the NOTICE file distributed with
* this work for additional information regarding copyright ownership.
* The ASF licenses this file to You under the Apache License, Version 2.0
* (the "License"); you may not use this file except in compliance with
* the License. You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
package org.apache.dubbo.qos.command.util;
import org.apache.dubbo.qos.command.GreetingCommand;
import org.apache.dubbo.qos.command.impl.Help;
import org.apache.dubbo.qos.command.impl.Ls;
import org.apache.dubbo.qos.command.impl.Offline;
import org.apache.dubbo.qos.command.impl.Online;
import org.apache.dubbo.qos.command.impl.PublishMetadata;
import org.apache.dubbo.qos.command.impl.Quit;
import org.apache.dubbo.qos.command.impl.Ready;
import org.apache.dubbo.qos.command.impl.Version;
import org.junit.jupiter.api.Test;
import java.util.List;
import static org.hamcrest.MatcherAssert.assertThat;
import static org.hamcrest.Matchers.containsInAnyOrder;
import static org.hamcrest.Matchers.equalTo;
import static org.junit.jupiter.api.Assertions.assertFalse;
import static org.junit.jupiter.api.Assertions.assertNull;
import static org.junit.jupiter.api.Assertions.assertTrue;
public class CommandHelperTest {
@Test
public void testHasCommand() throws Exception {
assertTrue(CommandHelper.hasCommand("greeting"));
assertFalse(CommandHelper.hasCommand("not-exiting"));
}
@Test
public void testGetAllCommandClass() throws Exception {
List<Class<?>> classes = CommandHelper.getAllCommandClass();
assertThat(classes,
containsInAnyOrder(GreetingCommand.class, Help.class, Ls.class, Offline.class, Online.class, Quit.class,
Ready.class, Version.class, PublishMetadata.class));
}
@Test
public void testGetCommandClass() throws Exception {
assertThat(CommandHelper.getCommandClass("greeting"), equalTo(GreetingCommand.class));
assertNull(CommandHelper.getCommandClass("not-exiting"));
}
}
|
Best Photography Themes for WordPress in 2016 (So Far)
Whether a newbie or a pro, every photographer needs to showcase their work someplace. And there isn’t a better way to show off your photos than the web. Yet, you shouldn’t settle with an Instagram profile, a Behance page or a Pinterest board: You should have your own website. And you should use one of the best photography themes on the web to display your photos.
Lucky for you, we have that list right here. In this post, you’re going to find 8 of the best photography themes for WordPress, available in 2016. Without any further introduction, let’s dive in!
Have you ever been so confident about your work that you know you’ll succeed no matter what? That’s what we think with TwoFold.
TwoFold is our latest theme, and it’s already one of the best selling WordPress themes on ThemeForest’s “trending themes” list. With seven home layouts, six gallery designs and a unique structure of “galleries, albums and collections”, TwoFold is not only the most elegant-looking theme on the market, but also the most feature-packed one.
CSS Igniter always has original ideas, in terms of design, within their WordPress themes. Vignette is no exception: Bold typography and full-screen sliders (and a few tiny bugs), Vignette looks like a good choice.
If you’re looking for an extra-clean photography theme, Zoomy from Tesla Themes could be the theme you’re looking for. It’s actually looks more like a “multi-purpose” theme, but it could work wonders with your photography website.
If you fancy to make a photography website with portfolio features, MyThemeShop’s “Portfolio” might be the one to suit your needs. With the tagline “Clean and Minimal Portfolio Theme”, Portfolio surely keeps its promise and delivers a clean and minimal design.
Coming after our own TwoFold, I think I like Photex the most. The grids strike the user right from the beginning, and I kind of love how they used the accent color strategically. Be sure to check this out.
Although it seems to load a bit slower than other themes, Verticality looks like a good choice. The only downside, speed, is caused because the theme loads every page in a single page. Yup, this one’s actually a one-page theme. If you’re confident that you can optimize your pages for speed, this one’s for you.
I’m not going to lie: Made (by Minimal) looks just as promising as TwoFold; and with the gigantic set of features, it surely trumps all the other themes I’ve mentioned above. But the price tag is really high (even though it’s for five themes, not one). Can’t stop you if you want to give it a shot, of course.
Conclusion
On a scale of 1 to 10, how do you like these themes? Tell us what you think (and your scores) in the Comments section below. And if you liked the article, don’t forget to share it with your friends. |
Cannabis in the Republic of the Congo
Cannabis in the Republic of the Congo is illegal. Cannabis is known locally as mbanga.
History
As early as 1959, the year prior to independence from France, cannabis was noted growing throughout Congo, particularly in Pool Prefecture. The market appeared to have increased in that period, leasing farmers to grow cannabis in cassava plots.
During the conflicts of the 1990s, Congolese militias would take control of cannabis plantations in new areas, and encourage their soldiers to abuse the drug to enhance bravery.
References
Further reading
Republic of the Congo
Category:Drugs in the Republic of the Congo |
[GTPases of translational apparatus].
Protein biosynthesis is a complex biochemical process. It integrates multiple steps where different translation factors specifically interact with the ribosome in a precisely defined order. Among the translation factors one can find multiple GTP-binding or G-proteins. Their functioning is accompanied by GTP hydrolysis to the GDP and inorganic phosphate ion Pi. Ribosome stimulates the GTPase activity of the translation factors, thus playing a role analogues to GTPase-activating proteins (GAP). Translation factors--GTPases interact with the ribosome at all stages of protein biosynthesis. Initiation factor 2 (IF2) catalyse initiator tRNA binding to the ribosomal P-site and subsequent subunit joining. Elongation factor Tu (EF-Tu) is responsible for the aminoacyl-tRNA binding to the ribosomal A-site, while elongation factor G (EF-G) catalyses translocation of mRNA in the ribosome by one codon, accompanied by tRNA movement between the binding sites. In its turn, release factor 3 (RF3) catalyse dissociation of the ribosomal complex with release factors 1 or 2 (RF1 or RF2) following the peptide release. This review is devoted to the functional peculiarities of translational GTPases as related to other G-proteins. Particularly, to the putative GTPase activation mechanism, structure and functional cycles. |
Leg ulcer induced by hydroxycarbamide in sickle cell disease: What is the therapeutic impact?
Major sickle cell disease syndrome (SCD) is a set of potentially serious and disabling constitutional haemoglobin pathologies characterised by chronic haemolysis and vaso-occlusion phenomena. If expression takes the form of acute vaso-occlusive crisis, SCD is currently considered to be a chronic systemic pathology, primarily associated with vasculopathy and ischaemia-reperfusion phenomena. The haemolytic aspect of the disease may be associated with endothelial dysfunctional complications, including leg ulcers, which are a classic spontaneous complication of major SCD. Their frequency, all aetiologies combined, varies considerably according to the series under consideration. Hydroxycarbamide has become the standard treatment for some SCD phenotypes, but has classically been described as one of the causes of leg ulcer. This causality is widely debated and is still difficult to establish because it is a specific complication of the disease. Comorbidity factors (eg, iron deficiency) are also often implicated as causal or aggravating factors so research into all the potential aetiologies of leg ulcers in a sickle cell patient must be exhaustive. We discuss the aetiologies of a leg ulcer in a patient treated by hydrocarbamide for major SCD. The imputation of the drug was established, followed by a marrow allograft in this patient. |
Q:
Custom Code Behind for DataSet
I used to be able to double-click the work area of a dataset to create and load a code-behind page for it, where i could define some custom code to modify or extend the functionality.
I don't know if it's because I'm using VS 2008, but now that doesn't happen, and the only file "beneath" the xsd file is the xss code which is auto-generated and I don't want to touch.
how do I create that associated code-behind file for the dataset?
thanks!
A:
it turns out this is only available if the dataset is in a separate class library.
lame.
|
The future of cancer screening.
Lung and ovarian cancers are two of the most common and deadly cancers affecting men and women in the United States. The potential impact of an effective screening modality for early detection of these cancers is enormous. Yet, to date, no screening tool has been proven to reduce mortality in asymptomatic individuals, and no major organization endorses current modalities for screening for these cancers. Novel approaches, potentially relying on genomics and proteomics, may be the future for early detection of these deadly cancers. |
5RESEARCH AREA 4EMERGING TECHNOLOGIES
The transportation industry is arguably on the cusp of a technological revolution. In coming years, the industry will be incorporating two largely new sets of technologies that are the focus of this chapter: (a) propulsion technologies and fuels that will change the energy, pollution, and noise characteristics of vehicles; and (b) information, communication, and control technologies that will change the way vehicles are used. An important challenge is to create a policy environment that will facilitate and encourage the proliferation of these environmentally beneficial technologies (DeCicco and Delucchi 1997).
In this chapter, technology is addressed from two perspectives: as a key element of transportation systems that often leads to adverse environmental impacts, and as a source of solutions to environmental problems. The primary concern is with rapidly evolving technologies for vehicles, fuels, vehicle– highway user-support systems [i.e., intelligent transportation systems (ITS)], and telecommunications in the context of energy efficiency and supply, air quality, and climate change. A proliferation of new propulsion, fuel, information, communication, and control technologies are becoming available, promising major enhancements to the performance and environmental sustainability of transportation services and activities. The focus of this chapter is on those emerging technologies that have the largest potential environmental impacts, both negative and positive, but have not yet been fully addressed by publicly supported research and development (R&D).
Since technology is a broad category encompassing a vast array of material and knowledge sets, the aim in this chapter is not to be all-encompassing. Not addressed here, for example, are technologies for the construction and
Below are the first 10 and last 10 pages of uncorrected machine-read text (when available) of this chapter, followed by the top 30 algorithmically extracted key phrases from the chapter as a whole.Intended to provide our own search engines and external engines with highly rich, chapter-representative searchable text on the opening pages of each chapter.
Because it is UNCORRECTED material, please consider the following text as a useful but insufficient proxy for the authoritative book pages.
Do not use for reproduction, copying, pasting, or reading; exclusively for search engines.
OCR for page 105
Surface Transportation Environmental Research: A Long-Term Strategy - Special Report 268
5
RESEARCH AREA 4
EMERGING TECHNOLOGIES
The transportation industry is arguably on the cusp of a technological revolution. In coming years, the industry will be incorporating two largely new sets of technologies that are the focus of this chapter: (a) propulsion technologies and fuels that will change the energy, pollution, and noise characteristics of vehicles; and (b) information, communication, and control technologies that will change the way vehicles are used. An important challenge is to create a policy environment that will facilitate and encourage the proliferation of these environmentally beneficial technologies (DeCicco and Delucchi 1997).
In this chapter, technology is addressed from two perspectives: as a key element of transportation systems that often leads to adverse environmental impacts, and as a source of solutions to environmental problems. The primary concern is with rapidly evolving technologies for vehicles, fuels, vehicle– highway user-support systems [i.e., intelligent transportation systems (ITS)], and telecommunications in the context of energy efficiency and supply, air quality, and climate change. A proliferation of new propulsion, fuel, information, communication, and control technologies are becoming available, promising major enhancements to the performance and environmental sustainability of transportation services and activities. The focus of this chapter is on those emerging technologies that have the largest potential environmental impacts, both negative and positive, but have not yet been fully addressed by publicly supported research and development (R&D).
Since technology is a broad category encompassing a vast array of material and knowledge sets, the aim in this chapter is not to be all-encompassing. Not addressed here, for example, are technologies for the construction and
OCR for page 105
Surface Transportation Environmental Research: A Long-Term Strategy - Special Report 268
maintenance of safe, environmentally friendly facilities; technologies and infrastructure for protecting wildlife (e.g., tunnels and road overpasses for animals); technologies that provide incremental information-based improvements in traffic and fleet management; conventional transit and railroad services and technologies; telecommunications electronics; fuel manufacture and distribution; crashworthiness and crash-avoidance technologies; and whole-vehicle design and manufacture. The Advisory Board elected not to discuss these technologies because they are adequately covered by other research programs, such as the National Cooperative Highway Research Program; because they are central to industry R&D activities; because they may have little effect on environmental quality; because they facilitate only small incremental changes; or because they are covered in other chapters (in particular, technologies to protect wildlife are covered in Chapter 3, while improved planning and decision-making tools are covered in Chapter 7). On the other hand, emerging mass information services, although not technically classified as transport technologies, are included in this chapter to the extent that they have the potential to transform the manner in which the transportation system is currently utilized. This transformation could dramatically influence transportation’s impact on the environment.
SURFACE TRANSPORTATION AND EMERGING TECHNOLOGIES
Government plays a central role in guiding the development and diffusion of environmentally beneficial technologies. It regulates emissions, energy use, and safety; provides R&D funding through various programs; and owns and manages many transport services, facilities, and activities. But rapid advances in a range of technologies can render government policies, rules, and R&D programs anachronistic, while the marketplace treats environmental attributes largely as externalities.
A role for government is necessary to ensure the wise use of technology— this despite the fact that government seldom has perfect information and is routinely lobbied by special-interest groups that may have little or no interest in environmental protection. The problem is illustrated by the unintended consequences of some government-inspired initiatives, including the federal-aid highway program, which has led to species separation; dredging by the U.S. Army Corps of Engineers, which has reduced wetlands and destroyed marine habitats; and the development of large state- and municipal-owned airports that have
OCR for page 105
Surface Transportation Environmental Research: A Long-Term Strategy - Special Report 268
expanded noise footprints. Moreover, the government’s decision not to price the use of congested roads at the point of consumption has led to excessive road use, with associated pollution and noise impacts. It is important, then, that any government role regarding the use of transportation-related technologies be premised on a strong knowledge base to minimize the chances of negative environmental impacts. And given government’s expanding role in overseeing the environmental effects of transportation technologies, the challenge is to ensure that the potential benefits of new transportation technologies are realized in a cost-effective manner. These benefits are direct in reducing pollution, energy use per vehicle-mile traveled (VMT), noise, and so on, but also indirect in catalyzing shifts in travel patterns to more environmentally benign travel forms.
Industry is spending billions of dollars annually on transportation-related technologies R&D (AAAS 2000), and major technological changes are about to occur—with or without government direction. A range of new and enhanced research is needed to ensure that government exploits these changes effectively and wisely. A strong, sustained research agenda can address both the opportunities and concerns presented by new technologies. The goals of this research would be as follows:
To define and articulate an appropriate and effective role for public R&D in accelerating the development and commercialization of environmentally beneficial technologies (given that government resources are at a much smaller scale than the private investment in transportation technologies).
To create a scientific basis for effective and wise government policy-making, investment, and regulation with respect to transportation technologies to serve the ultimate government role of environmental stewardship.
To understand the relationship between government regulations and private-sector investments in R&D.
Grounded in such a research base, public investment in transportation-related technology R&D can fill critical gaps, leverage billions of private R&D dollars, and ensure the development of a more sustainable and healthy transportation system. The potential payoff is great. At the same time, it must be recognized that user response to technological change can be complex. The environmental balance sheet following the introduction of new technologies depends substantially on large numbers of micro decisions made by both consumers and suppliers about how to exploit the resulting new opportunities. It is important to note that those opportunities are not always
OCR for page 105
Surface Transportation Environmental Research: A Long-Term Strategy - Special Report 268
anticipated by the designers and promoters of new technologies; some are discovered or invented by consumers. A recent example is provided by consumers who offset fuel-efficiency improvements by buying more powerful vehicles and driving more miles. The aggregate effects of user responses to simultaneously introduced innovations, as well as interactions between responses, are even more difficult to anticipate. Behavioral responses to the two major technological revolutions discussed in this chapter may result in major changes in vehicle use patterns and concomitant environmental impacts.
Current Technology Context
The current situation in the United States with respect to transportation and the environment is one of both promise and concern. The largest success story is in the area of air pollution, though progress here is neither uniform nor—as population and travel patterns expand—ensured. Major reductions in vehicle emission rates have resulted mainly from technological advances in combustion efficiency, fuel reformulation, and the treatment of exhaust substances. Urban regions and major corridors have benefited from the elimination of lead in fuel and from major reductions in carbon monoxide. In addition, low-level ozone pollution is slowly improving, primarily as a result of large reductions in hydrocarbon emissions from vehicles.
The continuing challenge with regard to air pollution is to reduce the high levels of nitrogen oxides and ultra-fine particulate matter emitted by vehicles. Diesel engines, largely unnoticed by air quality regulators until the late 1980s, are responsible for a significant proportion of these two pollutants. Dramatic reductions in emission rates (per VMT) have been accomplished for carbon monoxide and hydrocarbons, but less so for nitrogen oxides. With large off-setting increases in VMT, the overall effect has been substantial net reductions in carbon monoxide and hydrocarbon emissions, but no net reduction in emissions of nitrogen oxides.1
1
High nitrogen oxide levels contribute to acid precipitation and thus have interregional and international implications, as well as impacts on urban air quality. Vehicular emissions of nitrogen oxide and sulfur oxide combine with industrial sulfur emissions to acidify soils and lakes over long distances. Although a concern for more than three decades, some cumulative effects of soil acidification have only recently been proven (for example, the serious degradation of sugar maple forests in Eastern Canada). Sulfur oxide emissions are a prominent contributor to acid precipitation in most regions. Sulfur oxide emissions from diesel engines were at one time important, but sulfur levels in fuel have been reduced, resulting in a significant decrease in these emissions.
OCR for page 105
Surface Transportation Environmental Research: A Long-Term Strategy - Special Report 268
An emerging issue related to vehicles is newfound evidence of the negative health impacts of fine particulate matter (see Chapter 2). Very small particulate matter emitted from diesel engines, but also from gasoline engines, is now recognized as posing perhaps the most significant health hazard of any vehicle-related pollution. Historically, however, improvements in transport-related air pollution have been attributable largely to technology advances. New emission standards continue to be adopted, spurring the development of technologies to meet those standards. It is believed that progressively tighter standards are likely to lead to continuing improvements in the near future, ultimately resulting in near-zero air pollutant emissions from vehicles.
Other, more problematic areas in which trends are moving in the wrong direction are fuel consumption and related greenhouse gas emissions. Such emissions are continuing to increase 1 to 2 percent annually in the U.S. transportation sector (Oak Ridge National Laboratory 2000). A growing body of evidence links carbon dioxide (CO2) and other greenhouse gas emissions to major changes in global climate and to such consequences as the flooding of human settlements and natural habitats, changes in growing seasons and water supplies for agriculture, desertification, and the introduction of tropical disease vectors into temperate regions (IPCC 2001) (see Chapters 2 and 3, respectively, for discussion of the human health and environmental impacts of greenhouse gas emissions). The contribution of the U.S. transportation system to greenhouse gas production, in particular the increasing output of CO2, is a major concern internationally.
As noted, while the technical energy efficiency of engines continues to improve through more efficient combustion and the use of lightweight materials and improved vehicle designs, fuel consumption continues to increase as a result of the production and sale of larger and more powerful vehicles and growth in travel. Indeed, as noted earlier, both motor vehicle stock and total VMT are growing more rapidly than the nation’s population. This pattern is repeated throughout the world. In other countries, however, private vehicles are, on average, substantially smaller and driven substantially less.
At present, the processes by which environment-enhancing technologies are introduced, diffused, and utilized are poorly understood, as is the role the public sector can play in guiding the commercialization of these technologies. As illustrated by the paradox cited above, rapid advances in energy and materials technologies have not automatically led to reduced fuel consumption per VMT. There is a need to refocus research on the demand for vehicles, fuels, and transportation, along with new means of reducing the environmental impacts asso-
OCR for page 105
Surface Transportation Environmental Research: A Long-Term Strategy - Special Report 268
ciated with increases in that demand. These issues are addressed below for the two categories of technology advances noted earlier: fuels and propulsion technologies, and information, communication, and control technologies.
Fuels and Propulsion Technologies
Technologies are now being developed that could further reduce pollution from internal combustion engines in the near term, and new energy-efficient hybrid-electric propulsion technologies are being introduced. More efficient fuel-cell electric technologies also appear to be imminent. Fossil fuels will continue to be available for transport uses throughout the 21st century, mainly as a result of large supplies of natural gas being discovered around the world and increasing use of unconventional sources of petroleum, such as heavy oils and tar and oil sands. Natural gas is attractive because it has lower carbon content than petroleum and is cleaner burning; it also has the advantage that it can be converted to clean-burning liquid fuels at modest cost. However, use of these fuels will increase U.S. trade imports, and after energy losses from conversion and long-distance transport are taken into account, these fuels will tend to generate greenhouse gas emissions at levels similar to those produced by petroleum fuels.
Industry is spending billions of dollars annually to develop and commercialize environmentally enhanced fuels and vehicles. A major debate is under way, however, in both public and industry circles over which vehicle technologies are most attractive, which fuels should be used, and which policy instruments are most appropriate. Policymakers today are concerned primarily with reducing air pollutant emissions from diesel engines and with improving fuel economy. Vast sums of R&D funding are directed at these goals, primarily by the automotive and energy industries, but also by government. International, national, and some state governments spend millions of dollars addressing the health effects of diesel emissions; the automotive industry spends billions on reducing emissions from both gasoline (spark ignition) and diesel (compression ignition) engines; and the oil industry is spending billions on reducing sulfur levels, reformulating petroleum fuels, and designing new processes for converting natural gas to clean transport fuels. Consequently, internal combustion engines operating on cleaner petroleum fuels will continue to dominate the automotive market for many years, with natural gas–based fuels and next-generation electric-drive propulsion technologies gradually entering the market.
OCR for page 105
Surface Transportation Environmental Research: A Long-Term Strategy - Special Report 268
It is largely accepted that the conventional internal combustion engines and drive trains of passenger and freight vehicles will eventually be replaced by electric-drive technologies; that is, vehicles will be propelled at least in part by electric motors (Box 5-1 provides a brief overview of these vehicles). Less certain is which technologies are most attractive to society, and when and how these changes will occur and what the strategy for transition will be. Related technological issues include recycling of vehicles and the design and manufacture of vehicles using lightweight materials (technologies that are not addressed in this chapter).
The overall question is how R&D, public policy, regulatory controls, and public investments can be directed so as to accelerate the development, commercialization, and use of environmentally beneficial technologies in the most cost-effective manner. What publicly funded R&D is needed, and what public and public–private R&D processes need to be put in place to ensure continuity in these public efforts? The huge size of the automotive and energy
Box 5-1
ELECTRIC-DRIVE VEHICLES
Electric-drive vehicle technologies may be divided into four generic types:
Pure battery electric vehicles that store wall-plug or charging-station electricity on board in batteries, ultracapacitors, and flywheels;
Pure electric vehicles that obtain their electricity as needed from a rail, wire, or other off-board source;
Hybrid electric vehicles that generate some or all of their electricity on board using a combustion engine; and
Fuel-cell electric vehicles that convert chemical energy into electricity on board using a fuel-cell system.
Common to all four is an efficient and reliable electric motor that drives the wheels, the use of batteries (or other devices) to store energy captured during braking (known technically as regenerative braking), and the advantageous use of electronic technologies for a variety of vehicle control and auxiliary functions.
OCR for page 105
Surface Transportation Environmental Research: A Long-Term Strategy - Special Report 268
companies and the cyclical nature of public attention to energy issues have seriously undermined independent R&D capabilities in energy-related transport technologies. At present, major automotive companies, most of which are abandoning plans to build and market conventional-sized battery electric vehicles, are on the verge of deciding whether to make substantial investments in fuel-cell electric vehicles and are beginning to invest in hybrid electric vehicle production.
Automotive and energy companies are motivated to develop and commercialize these technologies by a variety of considerations. During the past three decades, the principal motivation for developing and introducing more environmentally benign vehicles in the United States and most other countries has been the desire for clean air and the resulting Clean Air Act regulations. The result has been an extraordinary reduction in vehicle pollutant emissions: average emissions from cars in real-world conditions declined by about 60 to 80 percent per VMT between the mid-1960s and mid-1990s (Pickrell 1999). As suggested above, continuing reductions are certain during the next decade as a result of even more stringent regulations scheduled to take effect in the next few years for both cars and trucks. These emission reductions have been the central focus of automotive research since the early 1970s. The improvements have centered on in-cylinder combustion and treatment of exhaust gases. This high level of R&D attention has generated many important side benefits, including the introduction of computer controls, first deployed to better control the mix of fuel and air entering cylinders. Other strong motivations have been reducing noise, and decreasing the costs and increasing the availability of energy. Much of the motivation for more environmentally friendly vehicles has derived from government through a mix of incentives and technology-spurring regulations.
While clean air will continue to be a strong motivation for enhancing vehicles and fuel, climate change is anticipated to play an increasingly important role. Mounting concerns about climate change are strengthening the resolve of governments and automakers to develop cleaner and more efficient vehicles. The European Union signed a voluntary agreement with automakers to reduce CO2 emissions per VMT by 25 percent between 1995 and 2008, and Japan adopted significantly tighter fuel-economy standards in 1999 (Plotkin 2001). The United States has not increased fuel-economy standards for many years, but pressure is mounting for more stringent car and light-truck standards (currently at 27.5 and 20.7 mpg, respectively) and for abandonment of the distinctions between cars and light trucks (NRC 2001a; NRC 2001b).
OCR for page 105
Surface Transportation Environmental Research: A Long-Term Strategy - Special Report 268
Information, Communication, and Control Technologies
Innovation and change in the transport sector have tended to be slow and incremental. In part, this pattern reflects the institutional complexity of transport systems: a large proportion of transportation activities is in the public sector (e.g., building, operating, financing, and regulating facilities and vehicles); companies in a multitude of industries participate in a variety of ways; and an enormous number of individuals and companies operate vehicles. Nonetheless, system-transforming innovations have occurred that have led to dramatic advances in productivity and societal benefits. We now appear to be on the verge of another such transformation.
In the past two centuries, only a few major system innovations have transformed surface transportation. They include interurban railroads in the mid-1800s; electric urban rail, introduced a few decades later; and automobiles in the early 1900s. Railroads transformed the nature of business; electric rail changed patterns of neighborhood development and contributed to the emergence of metropolitan regions; and the automobile altered the locus and variety of human activities. By increasing the speed of travel, these innovations transformed not only transportation, but also much of society. The catalysts for these earlier transformations in transportation were (respectively) the steam engine, electric traction, and the internal combustion engine, together with the associated fuel supply infrastructures.
The next era of transformation in transportation will reflect the integration of information and communication technologies into lifestyles and modal choices. The catalyst for this era of “smart transportation” will be electronic and wireless communication systems.2 The major thrust of research in the area of ITS has been advanced transportation management and information systems, which serve to provide a new class of information to drivers, fleet operators, and traffic managers. One of the public goals for these systems is to maximize the throughput and usage of existing roadways. The private goal is to create markets for new products and services, such as navigation devices
2
The one notable exception to the incremental advances in this area is the aborted automated highway program, funded by the Intermodal Surface Transportation Efficiency Act with substantial industry partnerships. This program was not continued under the Transportation Equity Act for the 21st Century, largely because of weak interest by industry (due in part to liability concerns) and opposition from the environmental public-interest community, which feared accelerated urban sprawl. The automated highway R&D program was converted into the Intelligent Vehicle Initiative, a program aimed at near-term safety innovations.
OCR for page 105
Surface Transportation Environmental Research: A Long-Term Strategy - Special Report 268
and information services for drivers. Attention and resources are directed primarily at using that information to improve safety and the efficiency of travel and goods movement. Tens of billions of dollars are being invested, mainly by the private sector. The net result of these initiatives will clearly be to improve the current system. At the same time, it is important to note that, as in the past, most innovations and initiatives are aimed at enhancing existing services and patterns. However, lifestyles are also evolving. A broader vision and more systems-level initiatives would likely result in a wider choice of access to activities, services, and products, and in shifts in patterns of consumption that could generate far greater benefits through reductions in congestion and environmental impacts.
The potential for a major break from the past is highlighted by the following trends and relationships. Light-duty vehicles account for 95 percent of all person-miles of surface travel in the United States; these vehicles are typically unused 23 hours per day, and all are designed to operate with roughly the same speed performance. Since World War II, transit has progressively lost overall market share, although transit ridership has grown in absolute terms in most major urban regions.3 Personal-vehicle occupancy rates declined until fairly recently and remain low. Vehicle ownership has steadily increased, and more than 60 percent of U.S. households own more than one private vehicle. The overall effect is unprecedented mobility and accessibility. But the situation also leads to massive consumption of resources and the generation of many adverse environmental impacts, while contributing to various social ills.
The opportunity may now exist to enhance access to goods, services, and activities while reducing the need for motorized transportation and mitigating its adverse impacts. In the past 50 years, vehicles and roads have been standardized and privately operated vehicles more widely embraced because no alternative could compete with the personal (and often single-occupant) vehicle except in specialized circumstances, such as dense downtowns. However, the widespread availability of low-cost communication and information tech-
3
Although transit has progressively lost market share since World War II, investments in public transportation in recent decades have resulted in dramatic increases in its use in some areas. That being said, in the United States, transit still accounts for only 2 percent of all person-miles traveled in vehicles. To evaluate the effectiveness of public transportation, however, one must consider where it is provided. Only about half of the communities in the United States have public transportation systems, and even in those communities, proper evaluation of public transportation requires route-by-route comparisons of places where people have a choice between their private vehicle and public transportation.
OCR for page 105
Surface Transportation Environmental Research: A Long-Term Strategy - Special Report 268
nologies, including the Internet, may allow vehicles to be used in a far more specialized and efficient manner. This could come about directly from a better match between personal travel needs and the system of private vehicles (e.g., access to a variety of vehicle types through car sharing), or indirectly from user adaptations (discussed in the next section). However, there is no consensus on the probable size and direction of these benefits of communication and information technologies, and the distributional impacts are largely unknown.
Analogous observations about vehicle information systems can be made for the freight sector, which has led in the application of these technologies to improve logistics and exploit new forms of supply-chain management. Again, however, resulting shifts in the distribution of benefits and undesirable environmental consequences are poorly understood, notably in the area of urban trucking.
Role of Publicly Funded Research
New and improved technologies play a central role in the evolution of the transportation sector. Huge investments have been made in R&D, especially by the private sector, to enhance transportation technologies and improve their environmental performance. For example, the global automotive industry spends about $50 billion on R&D per year (5 percent of revenue) (GAO 2000); about a third of that total is spent by U.S.-based companies, with a large proportion of those expenditures going to energy and emissions research. Government-funded research is a small fraction of that amount.
New industrial R&D is increasingly being directed at hybrid and fuel-cell electric vehicles and at applications of information, communication, and control technologies. In all of these cases, rapid innovation is taking place. Rapid innovation, however, does not necessarily translate into environmental improvements, primarily because the innovations are generally introduced as technology fixes; that is, they are designed to enhance existing technologies without disrupting current patterns, investments, or lifestyles. Arguably, much greater improvements in environmental quality, resource utilization, productivity, and quality of life would be possible if these technology solutions were incorporated into system innovations that led to a transformation of transportation, energy, and information systems, including the market mechanisms that enable these systems to function.
In any case, government can and does play an important role through a variety of means in directing industrial R&D toward those innovations that
OCR for page 105
Surface Transportation Environmental Research: A Long-Term Strategy - Special Report 268
Improvements in energy efficiency have not been exploited in the United States to achieve greater fuel economy. The technical energy efficiency of vehicles has increased about 30 percent in 15 years, but fuel consumption rates have increased because vehicles being sold are, on average, larger and more powerful.
New technologies such as fuel cells, information technologies, wireless communication, and advanced vehicle control technologies tend to be used first as substitutes and as a means of enhancing existing patterns and only much later as a way to transform overall patterns. This evolution can be accelerated.
In many ways, the United States is out of step with the rest of world in terms of the size and use of vehicles. Better understanding of how this situation evolved could be a first step in developing effective policies for managing the energy and environmental policy consequences of new technologies.
A majority of households have access to more than one vehicle and are tending to move toward ownership of specialized vehicles (and perhaps new ownership patterns and mobility services).
The potential social benefits of information and telecommunication technologies and telesubstitution are great, but their realization will require innovative, system-level thinking and designs.
RECOMMENDATIONS
The recommendations that follow address five topics: (a) fuel and propulsion technologies and their impacts; (b) intelligent transportation technologies and their impacts; (c) user behavior and consumer choice and demand; (d) policy instruments related to evolving technologies; and (e) institutional arrangements for R&D. For each topic, examples of the kinds of research envisioned by the Advisory Board are given.
Recommendation 4-1.
Analyze transition pathways to environmentally beneficial fuels and vehicle propulsion technologies.
The United States is seriously considering a transition away from petroleum fuels and internal combustion engines. With intensifying calls for more environmentally
OCR for page 105
Surface Transportation Environmental Research: A Long-Term Strategy - Special Report 268
benign vehicles and fuels and rapid innovation in propulsion technologies, major changes are about to take place. Better understanding is needed of the choices and pathways of those changes. An improved knowledge of the new technologies and their impacts would inform the policy and R&D processes with respect to pollution, energy use, energy supply, and climate change.
Government and the public need to be well informed to ensure that environmental factors are adequately considered in the development, evolution, and use of vehicles and fuels. The petroleum and automotive industries are among the largest in the world, are global in their operations, and spend billions of dollars every year on product development and market research. The challenge is to complement, leverage, and influence industrial R&D, not duplicate it.
Example: Toward a hydrogen economy. It is widely believed that hydrogen will be the dominant energy carrier at some point in the future. But how will hydrogen be produced and distributed? How will it be used in vehicles? What is the desirability of introducing an interim fuel such as methanol? How should emissions and energy rules be modified and when? Are new standards and codes needed for storage tanks, pipelines, and fuel handling? Should investments for converting remote natural gas into liquids be encouraged (through basic R&D at national laboratories and universities, R&D tax incentives, and fuel quality and vehicle emission standards)? Any actions that are or are not taken can influence billions of dollars in industrial investments and can have far-reaching implications for the environmental impacts of the transportation system.
Example: Handling and distribution of alternative fuels. The recent reversal of California regulations concerning methyl tertiary butyl ether (MTBE), a chemical made from natural gas and added to gasoline to reduce air pollutant emissions, highlights the need for better scientific and policy research. MTBE is being banned in California because leakage from storage tanks has polluted groundwater, even though oil refiners had been required by regulators just a few years earlier to invest billions of dollars in MTBE’s production and distribution. Every fuel has a different set of safety and environmental impacts, and more research is necessary to understand and measure the full spectrum of those impacts. Research is needed on the costs and safety implications of infrastructure for new fuels (e.g., where hydrogen fuel stations might be located and at what cost), on issues of industry competitiveness associated with introducing new fuels, and on strategies for sequestration of carbon from new fuels (e.g., from natural gas converted into hydrogen).
OCR for page 105
Surface Transportation Environmental Research: A Long-Term Strategy - Special Report 268
Example: New propulsion technology and fuels in heavy-duty vehicles. Even though medium- and heavy-duty trucks are a principal source of air pollutants (responsible for about one-third of nitrogen oxide emissions from vehicles) and greenhouse gases, they have received little scrutiny from regulators and policymakers until recently. Emission regulations and emission control technology on large diesel engines lag perhaps a decade behind those for light-duty gasoline engines. Data and knowledge about freight transport and its energy and environmental impacts are sparse. Research is needed on truck usage patterns (including idling), emissions and energy-use characteristics, policy instruments that can reduce energy use and emissions, development of infrastructure for new truck fuels, and vehicle and fuel tax policy.
Example: System-transforming transport-energy opportunities. Research is needed on new transport and energy system designs that have the potential to yield dramatic improvements in energy consumption and other environmental attributes. These might include designs incorporating not only non-fossil-based hydrogen, but also CO2 sequestration, entirely new forms of hydrogen and electricity storage, and new energy-serving vehicle guideways. In the latter case, for instance, electricity could be supplied easily and cheaply to battery-powered vehicles along a guideway. The vehicles would have small (inexpensive) battery packs for short access and egress trips off the electrically powered guideway at either end of the line-haul portion of the trip. Other related system designs are possible, with the potential for large reductions in energy use and emissions.
Recommendation 4-2.
Design and analyze the application of intelligent transportation technologies to achieve environmental benefits.
R&D on ITS technologies is dividing into two groups. One is dominated by the transportation departments of the state and federal governments and is focused on better management of the road infrastructure. The other group involves automotive, telematics, and other information technology companies that are working to develop profitable products and services for vehicle buyers and travelers. In each case, beneficial research and product development are taking place. However, the resulting changes are of an incremental nature and may or may not have environmental benefit. For instance, providing better traffic information to drivers may smooth traffic flows but also encourage more driving.
OCR for page 105
Surface Transportation Environmental Research: A Long-Term Strategy - Special Report 268
Little effort is being devoted to investigating technology-based strategies, designs, and services—for example, use of ITS technology to facilitate the use of public transportation—with the potential to generate a transformation of transportation patterns that could greatly reduce environmental impacts. These new options and services might include smart car sharing, smart paratransit, dynamic ridesharing, and teleservices, as well as a variety of other innovative new mobility services. Currently, none of these options can compete effectively with the private motor vehicle. However, combined with each other and with other innovations, such as neighborhood cars, they could lead to a basic change in transportation patterns with attendant environmental, economic, and social benefits. The challenge of research is to determine how wireless technologies can be used to connect the various modes and services seamlessly in a way that will be attractive to consumers and service providers and yield major societal benefits. It is also important to understand that particular services and products are likely to evolve over time and may develop differently in different communities and institutional settings.
Example: Demonstrations and pilot tests of innovative transportation services. Standardized software and hardware technologies now being developed are key to the successful emergence of the above new services and products; in many cases, they are a necessary precondition. But the key challenge, again, relates to market and institutional issues, many of which are situational and specific to local settings. There is a need to experiment with means of developing effective market strategies, creating local partnerships, and educating local communities about the possibilities for innovative transportation. Demonstrations need to be launched with the idea that they are pilot tests expected to evolve into full-fledged businesses and services.
Example: Economic, financial, environmental, and social equity analyses of innovative transportation businesses, services, and products. New transportation services and businesses will usually build on partnerships and have multiple revenue streams. They may evolve within entirely new mobility companies that own and maintain passenger vehicles. These companies may spring from car rental firms, car-sharing organizations, local affinity groups, automotive companies, large business parks, or any number of other organizations. They may have links to transit operators, fleet managers, and large employers. Unfortunately, limited experience is available on which to build. A research initiative is needed to explore various economic and business models; to determine whether these models might better meet the needs of particular user groups, such as the elderly and mobility-disadvantaged; and to examine envi-
OCR for page 105
Surface Transportation Environmental Research: A Long-Term Strategy - Special Report 268
ronmental impacts. The overall effects on the amount of travel and the types of vehicles used could be great. The research would address vested interests of taxi and transit operators and the organizational behavior of prospective service providers, whether traditional businesses or wholly new types of mobility enterprises. Existing travel demand, energy, and emission models need to be extended to handle these new applications, modes of travel, and services, including delivery of packaged goods.
Recommendation 4-3.
Analyze user response to and future demand for environmentally beneficial vehicles, fuels, and mobility services.
Public policy addresses the continuing tension between the desires of the individual and the interests of society. If travel were free and involved no delay, individuals would travel more frequently. Travel, however, is not free, and many of the associated costs are not borne by the traveler. Relative to other countries, the United States has been less restrictive regarding the travel desires of its citizens. Fuel prices are relatively low, vehicles are lightly taxed, and road capacity and quality have been expanded rapidly.
To provide a better knowledge base for public policy, research is needed on the demand for and use of environmentally beneficial vehicles, fuels, and mobility services. Under what conditions and with what incentives would individuals and organizations embrace environmentally friendly products and services? What might be the anticipated and unanticipated consumer responses to different packages of innovations? What would be the aggregate consequences for the environmental balance sheet of the ready availability of such products and services on a large scale? Do we even have suitable analytical tools to address these questions?
Example: Demand for and use of new environmentally beneficial vehicles and fuels. With the proliferation of vehicles (overall, more than one per licensed driver) and the introduction of new fuels and propulsion technologies, the opportunity arises to match specialized vehicles with appropriate applications. However, U.S. vehicle users are familiar with only a narrow range of vehicle attributes. The nation’s population of private automobiles and light trucks tends to be more homogeneous than those of other countries, with fewer small vehicles and almost all vehicles operating on gasoline and diesel fuel. Nonetheless, multivehicle households (about two-thirds of all U.S. households) increasingly own a mix of vehicle types, suggesting increasing specialization of use. In this
OCR for page 105
Surface Transportation Environmental Research: A Long-Term Strategy - Special Report 268
context, little is known about the demand for home recharging and refueling, the driving “feel” of electric motor propulsion, the perceived safety aspects of new fuels, the use of smaller vehicles in various settings, or the attraction of new auxiliary services made possible by on-board high-power electrical systems.
A number of other questions also arise. Are companies following the market? Under what conditions might consumers shift buying patterns toward “green” vehicles? Does the development of new technologies, even without mass commercialization, lead to a restructuring of demand patterns? How might more environmentally benign vehicle technologies be introduced to the marketplace? How might the market be segmented differently? What is the role for social marketing? What additional research is needed to understand the demand for new attributes unfamiliar to consumers, especially those associated with fewer environmental impacts?
Example: Demand for and use of new packages of communication, ITS, and vehicle technologies. Many of the above research priorities for vehicles and fuels also apply to new modes of transport and mobility services now being created, including smart car sharing, smart paratransit, and dynamic ridesharing; they apply as well to information services that can permit the spatial and temporal reorganization of activities, notably work and shopping. Under what conditions will individuals and organizations pay for and use new mobility and information service packages? To what extent will purely electronic services complement or replace physical movement? People are already using telecommunications spontaneously to become more mobile and more flexible. In the work domain, this trend appears to have influenced travel behavior more than organized telecommuting, but will the penetration of flexible work become more substantial if it is coupled with smart car sharing and other innovations? In any case, patterns of travel and access could be transformed in ways that would lead to radically different life and work styles. A particular case of interest is the role of integrated transportation and information services in meeting the mobility needs of the growing elderly segment of the population; for this segment, these services may also be packaged with housing. What will be the effect of these technologies on total travel, and what will be the energy and environmental impacts? Again, would environmental benefits be greater if governments actively promoted these transformations?
Example: New methods for estimating demand and simulating adoption paths. In addition to research on the demand for environmentally beneficial vehicles, fuels, and mobility services, research is needed on methods for estimating the penetration of these technologies and alternative paths for their adoption.
OCR for page 105
Surface Transportation Environmental Research: A Long-Term Strategy - Special Report 268
Conventional models and other methods of projecting private-vehicle and travel demand are likely to be increasingly less helpful in answering these complex questions about emerging technologies, individually or in combination.
The challenge is to estimate a sufficiently broad set of interacting outcomes in a future that may, in some respects, be unfamiliar. Most survey methods that address stated preferences for particular attributes of new products and services do not provide stable results except for questions that are highly limited in scope and frame. Research is needed on how to improve the design of simulations of consumer responses, such as those used for conducting some premarket surveys of new vehicle types or for exploring responses to unusual circumstances, such as fuel shortages. The focus of these methods should be on understanding decision processes as much as on forecasting outcomes. Understanding demand for technologically advanced packages of mobility, access, and information services will also require new urban modeling tools that can take into account interactions with land use (as discussed in Chapter 6).
Recommendation 4-4.
Develop policy instruments to encourage environmentally beneficial vehicles, fuels, and mobility services.
To a large extent, public policy is predicated on previous and current circumstances—environmental, political, economic, and technological. The advent of new system-transforming technologies means that many of the central premises of existing policies and policy instruments may no longer be relevant or appropriate. For example, emission and fuel economy standards are based on the use of internal combustion engines and petroleum fuels. Road standards and traffic rules are premised on all vehicles using all roads. Road financing is based on vehicles consuming petroleum fuels roughly in proportion to their use. Rules limiting jitney services are grounded in the ubiquity and effectiveness of conventional bus and rail services. All of these fundamental understandings and conditions are likely to become anachronistic with the introduction of new fuels and propulsion technologies and the widespread availability of inexpensive wireless communications. And new understandings of environmental threats— largely with respect to climate change and particulate matter—necessitate even further overhaul of policy instruments. New policy research is also needed on how to maximize environmental and social justice benefits, with explicit attention to opportunities and problems created by new technologies (see also Chapter 4).
OCR for page 105
Surface Transportation Environmental Research: A Long-Term Strategy - Special Report 268
Example: Reform of policy instruments for reducing energy and environmental impacts of technologies. Today’s policy instruments are rapidly becoming anachronistic and inefficient and have a distorting effect on innovation, new technology, and fuel investments. What type of policy structure might be used to reduce greenhouse gas emissions from transportation? Might it replace or be added to the existing air quality regulatory structure? How might emissions trading be employed to reduce greenhouse gases? What is the role of voluntary instruments? How might policy instruments be crafted to integrate behavioral and technological strategies? What are the potential advantages and problems associated with introducing passive vehicle monitoring, such as onboard diagnostics linked to a pollution pricing system? How can instruments be devised that would allow for trade-offs between different goals (such as diesel’s lower greenhouse gas emissions but higher particulate emissions)? How should fuel taxes evolve given that they are now calculated on a volumetric basis and provide most of the funding for U.S. roads? As vehicles become more energy-efficient and use different fuels with differing units of measurement, energy characteristics, and greenhouse gas emissions (from the vehicle and upstream), the current fuel tax system becomes not just inadequate, but grossly distorted. And beyond this empirical research is a need for fundamental social science research on associated political processes and public attitudes.
Example: An equitable regulatory environment for emerging transportation systems. Minimal research has been devoted to analyzing the policy implications of new transportation system configurations. The more specialized nature of future fuels and vehicles, coupled with the potential to reduce the transaction costs for intermodal travel (with low-cost information and communication technologies), creates the opportunity to link vehicles to applications in a more efficient and socially and environmentally desirable manner. Instead of buying and using conventional-sized personal vehicles for all trips, travelers could choose readily available alternatives, for example, shared-lease arrangements (e.g., for an everyday vehicle for exclusive use, plus an allotment of time on a vehicle with a larger carrying capacity or some other attribute, such as four-wheel drive); shared-use vehicles; smart paratransit services that would promptly pick one up at home or elsewhere; and small neighborhood vehicles powered by batteries. All of these concepts require policy research on regulatory structures that would maximize the associated environmental and social justice benefits, with due regard for the opportunities and problems created by enabling technologies, such as electronic toll collection, integrated smart cards for parking, and vehicle positioning technology. Research is also needed with respect to standards and codes,
OCR for page 105
Surface Transportation Environmental Research: A Long-Term Strategy - Special Report 268
insurance requirements, and taxi and jitney regulation, as well as the best ways to address safety concerns, such as the operating limits of neighborhood vehicles.
Example: Conception of environmental life-cycle policy approaches. Over time, efforts to reduce environmental degradation have shifted toward prevention through better product design and more efficient use of resources. In the future, the emphasis is likely to proceed one step further toward the use of materials and resources that are fully regenerative, rather than depletive, and that are fully biodegradable or reusable (McDonough and Braungart 1998; Hawken et al. 2000). Research is needed to determine what role government can play in encouraging new and existing companies to design and produce transport technologies that are more environmentally sustainable. A knowledge base needs to be developed to better understand the opportunities, costs, and benefits involved. Possibilities range from the use of more recyclable and less toxic materials to technologies that leave a smaller environmental footprint. A strategy needs to be developed for determining the types of products and companies that merit support, the nature of that support, and the economic and environmental benefits of those investments.
Recommendation 4-5.
Design an independent institutional arrangement for transportation technology R&D.
Technology development is principally an industrial activity. However, transport technologies have large environmental externalities and major societal impacts, and many transport facilities and services are owned, managed, or regulated by government. The public sector plays an important role in encouraging the development of technologies that are more environmentally and societally beneficial. The R&D resources of industry, especially in the automotive, energy, and information technology sectors, dwarf those of government. The challenge is to devise a cohesive public-sector R&D strategy that can leverage and stimulate industrial investments in environmentally beneficial technologies, and provide a knowledge base for designing and implementing efficient and effective public policy regarding transportation technologies. A stable and independent institutional arrangement is needed to oversee public R&D investments associated with transport-related technologies and to ensure the continuity of the knowledge base.
Example: R&D on vehicles and fuels. Considerable government funds are invested in cutting-edge research aimed at developing cleaner-burning and
OCR for page 105
Surface Transportation Environmental Research: A Long-Term Strategy - Special Report 268
more efficient vehicles and fuels (as well as increasing the global competitiveness of domestic companies). In recent years in the United States, much of this R&D has been conducted under the rubric of PNGV. Substantial R&D funds are also spent in this area by the military and under various other programs. Historically, little of this research has been directed through the Department of Transportation (DOT), even though DOT administers fuel economy standards. Better R&D strategies and more effective R&D programs are needed in the area of vehicles and fuels. The question of what strategies and R&D activities would be most effective needs to be considered, as well as what relative priority should be given to safety, greenhouse gas emissions, particulate matter and other pollutants, acid precipitation, basic science research, and the role of Original Equipment Manufacturers (OEM).
Example: Improving the effectiveness of public R&D and public–private R&D partnerships. Challenges and problems increasingly cut across many institutional jurisdictions, political and national borders, and disciplines. More and more transportation and energy companies are mounting joint R&D ventures, within and across industries. What is the most appropriate and effective role for public R&D?
Public–private research partnerships for transport technologies launched in the 1990s include PNGV, the U.S. Advanced Battery Consortium, the Intelligent Vehicle Initiative, and the Future Truck Initiative. While PNGV is often cited as a model (Chapman 1998), and a series of National Research Council reports have evaluated its progress, no evaluation has been performed of the overall benefits of the program or of its effectiveness and efficiency in meeting the goal of developing affordable advanced technology (Sperling 2001; NRC 2001b).
From the public-sector perspective, a better understanding is needed of the opportunities and challenges presented by partnerships between federal agencies, and even more so by those among federal agencies, universities, state and local governments, small companies, other countries, energy companies, and automaker OEMs. Intra- and interindustry partnerships (for instance, between automakers and major suppliers to develop new technologies, and between automakers and oil companies to develop new fuels), are becoming more common and also need to be understood. Such research should thus be aimed at evaluating the processes of partnership. It should shed light on the types of companies and partnerships that are most likely to bring environmentally beneficial products to market and help identify the best methods for leveraging public R&D funds.
Bookmark this page
Important Notice
As of 2013, the National Science Education Standards have been replaced by the Next Generation Science Standards (NGSS), available as a print book, free PDF download, and online with our OpenBook platform. |
In this article, you will learn how to consume cognitive services for recognizing a celebrity in Xamarin.Android by using a mobile camera. I hope you will learn some cool stuff in Xamarin using cognitive services.
Prerequisites
Computer Vision API Key
Microsoft.Net.Http
Newtonsoft.Json
Computer Vision API keys
Computer vision services require special subscription keys. Every call to the Computer Vision API requires a subscription key. This key needs to be either passed through a query string parameter or specified in the request header.
To sign up for subscription keys, see Subscriptions. It's free to sign up. Pricing for these services is subject to change.
If you sign up using the Computer Vision free trial, your subscription keys are valid for the west-central region (https://westcentralus.api.cognitive.microsoft.com).
The steps given below are required to be followed in order to create a Celebrities Recognize app in Xamarin.Android, using Visual Studio.
Step 1 - Create an Android Project
Create your Android solution in Visual Studio or Xamarin Studio. Select Android and from the list, choose Android Blank App. Give it a name, like RecognizeCelebritiesbyCamera.
(ProjectName: RecognizeCelebritiesbyCamera)
Step 2 - Add References of Nuget Packages
First of all, in References, add the reference of Microsoft.Net.Http and Newtonsoft.Json using NuGet Package Manager, as shown below.
Step 3 - User Interface
Open Solution Explorer-> Project Name-> Resources-> Layout-> Main.axml and add the following code. The layout will have an ImageView in order to display the preview of Celebrities image. I also added a TextView to display the contents of the Celebrities and two buttons. |
Impact of concentration self-quenching on the charge generation yield of fullerene based donor-bridge-acceptor compounds in the solid state.
A fullerene based Donor-Bridge-Acceptor (DBA) compound, incorporating a π-extended tetrathiafulvalene electron donor, is investigated with respect to its photophysics in solution versus solid state. Solid films of neat DBA are compared with blend films where the DBA compound is diluted in the inert, low dielectric, polymer poly(styrene). It is found that the moderate intermolecular electronic coupling and donor-acceptor separation (22 Å) in this case leads to the generation of more dissociated, intermolecular charges than a mixture of the donor and acceptor reference compounds. However, the increased intermolecular interactions in the solid state lead to the excited state of the fullerene suffering from concentration self-quenching. This is found to severely affect the charge generation yield in solid films. The impact of competing intra and intermolecular interactions in the solid state upon the film photophysics is analysed in terms of a kinetic model which includes both the effects of concentration self-quenching and the impact of film composition upon the dielectric stabilisation of charge separated states. We conclude that both concentration self-quenching and dielectric stabilisation are critical in determining the photophysics of the blend films, and discuss strategies based upon our observations to enhance the charge photogeneration properties of organic films and photovoltaic devices based upon DBA compounds. |
Filed 11/12/13 In re C.C. CA2/8
NOT TO BE PUBLISHED IN THE OFFICIAL REPORTS
California Rules of Court, rule 8.1115(a), prohibits courts and parties from citing or relying on opinions not certified for
publication or ordered published, except as specified by rule 8.1115(b). This opinion has not been certified for publication
or ordered published for purposes of rule 8.1115.
IN THE COURT OF APPEAL OF THE STATE OF CALIFORNIA
SECOND APPELLATE DISTRICT
DIVISION EIGHT
In re C.C., A Person Coming Under the B247060
Juvenile Court Law.
LOS ANGELES COUNTY DEPARTMENT (Los Angeles County
OF CHILDREN AND FAMILY SERVICES, Super. Ct. No. CK60431)
Plaintiff and Respondent,
v.
SHERRY E.,
Defendant and Appellant.
APPEAL from orders of the Superior Court of Los Angeles County.
D. Zeke Zeidler, Judge. Affirmed.
Suzanne Davidson, under appointment by the Court of Appeal, for Appellant.
John F. Krattli, County Counsel, James M. Owen, Assistant County Counsel,
William D. Thetford, Deputy County Counsel, for Respondent.
__________________________
Appellant Sherry E. (mother) appeals from juvenile court orders removing her
four-month-old daughter, C.C., from her custody and denying mother reunification
services. We conclude substantial evidence supports the removal order, and under both
the substantial evidence and abuse of discretion standards, the trial court did not err in
denying reunification services. Accordingly, we affirm.
FACTS AND PROCEEDINGS
A. Referral and Preliminary Matters
Mother has had a lengthy history of DCFS referrals for her two older daughters.
Her parenting of C.C. came to the department’s attention on September 24, 2012, when a
referral was made to the DCFS that C.C. was exposed to second-hand methamphetamine
smoke. The report to DCFS stated that one of mother’s roommates had tested positive
for amphetamine, other tenants who lived in the residence had been smoking
methamphetamine for several months, and C.C. had been exposed to the smoke.
A social worker accompanied by police officers went to the location. The
manager of the complex said too many people were living in the apartment and there
were lots of comings-and-goings. Tenant Ray said that he did not use illegal drugs and
there was no reason for DCFS’s concern for the baby. But police officers watching the
unit saw a man on a balcony who appeared to be under the influence. Tenant Robert told
police he stayed at the location several nights during the week. Robert was on parole for
weapons charges.
The social worker described the residence as disorganized and smelling of smoke.
Various computers and peripherals were found in the unit and the place appeared
cluttered. A pitbull lay asleep on the floor. C.C., however, appeared healthy. Mother
denied methamphetamine use but she had heard that someone had smoked the drug in the
bathroom. Mother said she would drug test but wanted to wait for three days because she
did not want to take C.C. out in the heat.
2
The police officers then entered the home, found two baggies of
methamphetamine, two marijuana pipes and a scale. Officers reported that the residence
was known to the department as a drug house, and arrests had been made there in the
past. Both male tenants were arrested, one for being a felon in possession of ammunition,
apparently based on a shotgun shell or bullet found in the home.
On September 24, 2012, the court detained C.C., finding sufficient cause to
remove her from parents’ custody. Monitored visits were ordered. Prior to the
adjudication hearing on November 9, 2012, DCFS interviewed both father and mother
and filed its report with the court. DCFS advised that mother and father had agreed to
drug test in the interim. Mother had two negative tests and four missed tests. Father had
two positives, one negative and four missed tests. DCFS recommended that reunification
be denied for mother because mother had failed to reunify with two other children, one of
whom had been adopted. The department recommended reunification services for father
with participation in drug and other programs.
B. Adjudication and Disposition Hearing
Mother testified at the November 9, 2012 adjudication hearing. The
methamphetamine, drug pipes and scale were found in the living room but mother said
she did not usually go into that room. She testified that, in conjunction with 2006
dependency proceedings for her eldest daughter, mother had begun an out-patient drug
program and completed four and one-half months before the court terminated
reunification services. She started another program and then quit after her parental rights
were terminated. She explained the cluttered state of the residence as a product of
remodeling; the several computers were there because her boyfriend repaired computers.
Mother’s landlord, who lived in the same residence, also testified. The landlord
was a recovering methamphetamine addict and had recently tested positively. Mother
told her she had seen methamphetamine crystals in the bathroom, and that mother had
experimented with methamphetamine for 3 months some 10 years ago. The landlord also
said that mother had told her she last used methamphetamines 8 years ago. Mother
3
testified she saw little granules in the bathroom. “So I swept them up and I put them on
the side.” Generally, mother denied any drug problem.
The court also reviewed reports that showed that mother had failed to reunify with
daughter S.E. and that on June 28, 2007, the court had terminated mother’s parental rights
to S.E., who had been adopted by her paternal grandmother. Reunification services had
also been terminated for mother’s middle daughter, K.M. who was under legal
guardianship with her paternal grandmother. (S.E. and K.M. have different fathers.)1
The court sustained an amended petition that mother had a history of substance
abuse, had failed to complete a previously ordered drug program as part of S.E.’s
proceedings, allowed methamphetamine and drug paraphernalia to be in plain sight at her
residence, and failed to address the problems that brought half-siblings into the
dependency system, all such that there was a risk to the physical health and safety of C.C.
The petition was sustained on the additional grounds that father was unable to provide
ongoing care and supervision. The court set a disposition hearing for January 23, 2013.
Prior to the disposition hearing, DCFS reported that mother had failed to keep an
appointment with a substance abuse counselor and refused to respond to follow-up
telephone calls. She had missed four drug tests and tested negatively seven times.
Mother did attend a parenting class although it was not on the DCFS list. Mother also
discussed other programs she had attended. Mother explained that the fathers of her two
older children both had drug problems. Dr. Alfred Crespo interviewed mother and
concluded that mother’s drug problem was likely the result of chronic substance abuse as
to which she was in denial. He believed reunification services would not resolve her drug
problem. Amy Castro of Social Model Recovery Systems testified at the disposition
hearing that, based on several assessment tools applied in her interview with mother, she
did not believe that mother had a substance abuse problem at this time. Mother did not
tell Ms. Castro that she had two children removed from her custody because of a drug
1 We upheld termination of parental rights as to S.E. in a 2008 unpublished opinion
(B200290). Mother had failed to appear at the dispositive 366.26 hearing in the juvenile
court.
4
problem. Although mother mentioned methamphetamines had been found, she did not
tell Ms. Castro that two baggies of methamphetamine and drug paraphernalia had been
found in plain sight at her residence. Nurse Cheryl Clifford testified that when she
observed C.C., the baby looked healthy.
The court expressed serious concern about mother’s credibility. Reunification
services were provided for father but denied for mother. The court found by clear and
convincing evidence that reunification services had been denied and parental rights had
been terminated, respectively, for two half siblings and that mother had not made a
reasonable effort to treat the problems that led to removal and termination. (Welf. & Inst.
Code, § 361.5, subd. (b)(10), (11).)2 Monitored visits were ordered for mother with
DCFS discretion to liberalize if mother were in therapy.
DISCUSSION
Mother makes two arguments on appeal. She first contends there was insufficient
evidence to remove C.C. from mother’s custody, and second, the trial court erred in
denying mother reunification services. We find no merit in either argument.
1. Substantial Evidence Supported the Trial Court’s Removal Order
Before a child may be removed from a parent’s custody, section 361,
subdivision (c)(1) requires a showing by clear and convincing evidence that there is
substantial danger to the child absent removal and there are no alternative methods of
protecting the child. A juvenile court’s determination of removal is reviewed for
substantial evidence. (In re T.V. (2013) 217 Cal.App.4th 126, 135-136.) Although the
2 The record is unclear whether the court was denying reunification services
because parental rights were terminated as to S.E. alone, or also based on denial of
reunification services as to K.M. as well. DCFS reported both of the prior dispositions.
The parties’ appellate briefs state the trial court’s denial of reunification services was
based on both subdivision (10) [denial of reunification services] and subdivision (11)
[termination of parental rights] of section 361.5 so we accept that services for mother
were denied based on the rulings as to both of mother’s other daughters.
All future undesignated code references are to the Welfare & Institutions Code.
5
standard required for the juvenile court is clear and convincing evidence, on appeal that
test disappears and we apply the traditional substantial evidence review. (Sheila S. v.
Superior Court (2000) 84 Cal.App.4th 872, 881.) Mother challenges the court’s findings
based on her evidence that she did not abuse drugs, drugs found at the residence were not
mother’s, she tested clean on several occasions, mother’s visitations were consistent, no
apparent physical injury was noted on C.C., and Ms. Castro testified that her assessment
was that mother was not a drug user. Any problems could have been addressed by less
onerous means than removal; for example, by on-demand drug tests and unannounced
visits.
To accept mother’s argument would require us to reweigh testimony and ignore
respondent’s countervailing evidence, something we may not do. (Sheila S. v. Superior
Court, supra, 84 Cal.App.4th at p. 881.) We start with the trial court’s finding that
mother was not credible. That finding undermines the major part of mother’s case which
was through her own testimony. The court was entitled to discredit mother’s testimony
that methamphetamine had been found on a toothpaste tube based on usage by others,
that she was unaware that others were smoking methamphetamine in the house and that
she did not observe methamphetamine or drug paraphernalia that were found by police in
plain sight. There was evidence that the residence was a known drug location and that an
unusual number of people went in and out of the residence. Two children were removed
from mother’s care due to her substance abuse. By mother’s own testimony, both of the
girls’ fathers were drug users. Although mother tested negatively on several occasions,
she also missed a number of tests which the juvenile court was free to consider as
positive tests. She refused to test on demand. Given this evidence, the trial court was
justified in concluding that C.C. was at risk and that means other than removal would be
insufficient to protect C.C.
2. The Trial Court Reasonably Denied Reunification Services.
Mother contends the trial court prejudicially erred when it denied mother
reunification services.
6
Section 361.5, subdivision (b) (10), (11) provides:
“(b) Reunification services need not be provided to a parent or guardian described
in this subdivision when the court finds, by clear and convincing evidence, any of the
following:
....
“(10) That the court ordered termination of reunification services for any siblings
or half siblings of the child because the parent or guardian failed to reunify with the
sibling or half sibling after the sibling or half sibling had been removed from that parent
or guardian pursuant to Section 361 and that parent or guardian is the same parent or
guardian described in subdivision (a) and that, according to the findings of the court, this
parent or guardian has not subsequently made a reasonable effort to treat the problems
that led to removal of the sibling or half sibling of that child from that parent or guardian.
“(11) That the parental rights of a parent over any sibling or half sibling of the
child had been permanently severed, and this parent is the same parent described in
subdivision (a), and that, according to the findings of the court, this parent has not
subsequently made a reasonable effort to treat the problems that led to removal of the
sibling or half sibling of that child from the parent.”
A parent whose child is subject to juvenile court jurisdiction is presumed to be
entitled to reunification services. (Cheryl P. v. Superior Court (2006) 139 Cal.App.4th
87, 95.) Section 361.5 lists 16 different grounds, however, for the juvenile court to deny
reunification. The court must find that at least one of the disqualifying circumstances
exists by clear and convincing evidence. (§ 361.5, subd. (b).) Two of those grounds are
that reunification services were previously denied or parental rights terminated for
reasons that have not been subsequently addressed by the parent.
It is undisputed that mother’s parental rights were terminated as to S.E. and
reunification services were denied as to K.M. Mother argues that, notwithstanding the
dispositions in the cases involving C.C.’s older sisters, it was in C.C.’s best interests to
grant mother reunification services under section 361.5, subdivision (c).
Ordinarily an appellate court reviews an order denying reunification services for
substantial evidence. (Cheryl P., supra, 139 Cal.App.4th at p. 96.) When the point on
appeal does not involve the facts underlying the finding of failure to reunify or
termination of parental rights, or failure to make reasonable efforts, but instead that it is
nonetheless in the child’s best interests to offer reunification services, there is authority
7
that review is under the abuse of discretion standard. (In re Albert T. (2006)
144 Cal.App.4th 207, 218, fn. 5.)
Under either standard, we find no error. Mother lost custody of two children, she
exposed C.C. to drugs and drug paraphernalia, she has consistently denied any substance
abuse problem notwithstanding strong evidence to the contrary, and at least one expert
doubted reunification services would adequately address the problem. Although mother
had visited C.C. as regularly as permitted and appears to have a bond with her daughter,
and even though father was given reunification services, the trial court reasonably could
have found that reunification would prove unsuccessful and therefore was not in C.C’s
best interests.
DISPOSITION
The juvenile court’s orders are affirmed.
RUBIN, J.
WE CONCUR:
BIGELOW, P. J.
FLIER, J.
8
|
I am looking to program a simple game. My level of programming ability is very limited (one month of Java in college and half a book on python so far), but I am willing to learn so long as I am starting with the right tools. I would appreciate a more knowledgeable user’s comments as to whether or not Crystal Space is the right tool for me to use. The game I would like to make would be as simple as an old Mega Man game, with the following features:
Level Design:-Specify a background image of 13120x640 pixels-Specify up to three more image layers for parallax scrolling-Specify which parts of the layer are solid and which are not
Character Design:-Have all characters, enemies, explosions, etc. based on sprites ranging from 128 to 256 pixels in size-Have simple collision detection that includes the ability to use simple projectiles-Be able to jump and climb ladders-Be able to cycle through the characters weapons and associated sprites on the fly
Other:-Have a timer
Some other things I would like to include are a rudimentary title screen, the ability to save progress, and perhaps the ability to display QuickTime (or whatever) cut-scenes between levels.
If you have a minute please leave your opinion on the feasibility/logic of using Crystal Space for this project. I know Crystal Space CAN do these things (or I assume it can); my question is whether or not it is the MOST appropriate choice for a simple 2d side scrolling game. I am very excited about the concept and story (my degree was in English and I have worked hard on it), and I could potentially have the character design done by a comic book artist who has done work for D.C. Comics (if the engine is good enough and once he is not so busy).
P.S. If you are interested in collaboration please contact me! I write video game reviews for Animerica here in San Francisco and have some (tenuous) connections in the game industry. Who knows what could happen?
Thank you for reading such a long post! Hopefully I have not violated any forum rules through ignorance – I wasn’t sure exactly where to post this. |
A major barrier to HIV eradication is the existence of a small pool of long-lived latently-infected, resting memory CD4[+] T cells carrying an integrated form of the viral genome. Memory T cells encompass a variety of cell subsets all endowed with specific survival and differentiation properties. We have recently demonstrated that the privileged cell type where HIV establishes its resen/oir is the central memory T cell (T{CM}) and its immediate progeny, the transitional memory T cell (T{TM})- IL-7 is one of the cytokines that is responsible for sustaining low levels of proliferation in T{CM} and T{TM}. Harnessing IL-7 interactions with its receptor on TCM could provide a strategy to prevent the survival and proliferation of these cells, and to prevent the persistence of the HIV reservoir. Another cytokine known to play a major role in memory T cell survival is IL-15. We have recently demonstrated that IL-15 engagement with its receptor on resting CD4[+] T{CM} that harbor latent virus will induce their differentiation into short-lived effector memory T cells (T{EM}) that can proliferate and produce virus. We propose to exploit this capacity of IL-15 so that the pool of resting, infected T{CM} cells can be depleted in vitro and in vivo. We will first determine the relative impact of IL-7 and IL-15 on HIV persistence in vivo and in vitro by measuring the contribution of these cytokines to the maintenance of the pool of latently infected cells in blood and tissues obtained from subjects receiving suppressive ART and by evaluating their capacity to induce viral reactivation (Specific Aim 1). We will then test the hypothesis that blocking the IL-7 pathway or, conversely, administrating IL-15 to optimally-treated macaques could be used as strategies to deplete the latent viral reservoir (Specific Aim 2). Our proposed interventions target the major cellular source of persistent virus during treatment, and although they may not work alone in eradicating HIV, they could complement other interventions by transiently reversing the host factors that are critical in maintaining latently infected cells. |
The appearance of a readable, inexpensive translation of this crucial work will be of great benefit to any student or scholar working on medieval marriage law but unable to read Latin sources. Pierre Payer has already shown himself extremely able in the compilation and translation of medieval penitential and canonical sources. Many of us have made wide use of The Bridling of Desire. Views of Sex in the Later Middle Ages(University of Toronto Press, 1993) and Sex and the Penitentials: the Development of a Sexual Code 550-1150(University of Toronto Press, 1985). Unfortunately, as Payer wrote "readers cannot assess the skill and care of the editor [or translator] without the relevant manuscripts to hand . . ." (7). I have every confidence, nevertheless, in Payer's translation.
Penyafort (ca.1180-1275) entered the Dominican Order early in its existence, about 1223, after studying and teaching in Bologna. He was master general of the order for only two years, 1238-40 (2) His Summa de paenitentia, which did not include the topic of marriage, was highly significant until the end of the thirteenth century (1). A second edition appeared in 1241. He may have written his compilation to update Tancred's Summa de matrimonio,also based on Gratian's Decretum (2). He was an "excellent Catalan canonist" according to James Brundage, Law, Sex and Christian Society, (327). See pages 397-99 in that work for an excellent brief comparison of aspects of Penyafort's writing compared to that of other canonists.
As Payer points out "the Summa on Marriage offers contemporary readers a reliable picture of the basic medieval conception of marriage and the conditions required for its validity" (5-6). It is divided by Payer into six broad topics: engagement, marriage, impediments to marriage, legal procedure in marriage cases, legitimacy of children, dowries and gifts in view of marriage (4). Penyafort himself listed twenty-five topics or titles as subdivisions of the work. Copious footnotes (which had been included within the text by Penyafort) appear here at the foot of the page directing the reader to the place of the original Latin text within in the Summa and also to Gratian or other canonists used by the author.
The writing in this translation is blessedly clear: "Engagements are contracted in four ways: sometimes by a mere promise; sometimes by giving an engagement pledge; sometimes with the addition of an engagement ring; sometimes with the addition of an oath" (13). Much of Penyafort's writing will be familiar to anyone who has read Michael Sheehan or James Brundage on medieval marriage.
Some assertions will surprise students, as in the statement that engagements may be entered into by boys and girls at the age of seven since the children by then "are said to have discretion, and engagements are usually attractive to them then." (14) The children may not marry, nevertheless, until the girl is twelve and the boy at least fourteen. It is clearly explained that if the children were less than seven years of age, and upon arriving at puberty, one or both of the engaged couple do not wish to continue with the promise to marry, the Church may, but does not have to, dispense the person or the couple from marriage to one another (17). He reiterates the vital importance of consent in marriage.
Similar to comments by many government leaders today: Marriage can only be the union of one man with one woman (19). Marriage is forever, even if one of the couple becomes a heretic (23). If one dismisses the other because of fornication, both remain married, though apart, and cannot remarry while the other lives (23). While marriage is not a sacrament, sacrament is one of the "goods" of marriage, one mirroring the union of Christ with the Church, thus it cannot be dissolved (24- 25).
The section on impediments is bewildering to those unfamiliar with the Middle Ages. If a woman married a man she believed to be free, or vice versa, and finds out later that the allegedly free person is a slave, the marriage is deemed to be illicit and does not exist because of the deception (32).
The section on vows may surprise some readers. Penyafort makes the important distinction that neither husband nor wife may make a vow of chastity, or enter religious life, without the consent of the spouse (35). Vows made below the age of consent, 12 or 14, are not valid (35). Unfortunately for some, not all popes adhered to this point of view. On vows and their validity, see James Brundage, "The Votive Obligations of Crusaders," Traditio (22, 1966), 22-118, reprinted in Brundage, The Crusades, Holy War and Canon Law(Variorum, Aldershot, 1991).
A highly complex section (39-42) explains what degree of consanguinity or blood relationship between individuals bars them from marrying, and sets out the way in which these regulations have been lightened to permit those not related in the first-fourth (rather than first-sixth) degree to marry. The next section on spiritual relationship is comparatively simpler explaining that not only may god-parents not marry their god-children, but the god-child may not marry a child of the god-parent, or the god-parent's spouse, because they now have a spiritual though not blood relationship. Similar constraints apply between adopted and natural children (47-8).
The section on marriage between believers, Jews, Christians, Muslims (Saracens in the text), pagans, and heretics is illuminating regarding prevailing opinions of these four groups and their religion or lack of it. A Christian may only marry an unbeliever if he or she promises to convert (51). Jews or Muslims can contract legal marriages with others of their own faith. If the unbeliever in a similar marriage converts to Christianity, while the partner remains non-Christian, the marriage can be dissolved permitting the new Christian to marry another Christian (51). Consanguinity is not an issue in marriages between Jews or between Muslims unless they have breached the laws of their own faith (51). Male converts married to more than one wife must repudiate all but the first wife (52).
One doubts whether this regulation was universally applied, but at least theoretically when fear or violence impelled a woman to marry, the marriage should be considered invalid unless the female remained with her husband for at least 18 months or consented to carnal intercourse. In the second instance, the marriage stands (54-55).
Interestingly, inability to cohabit is a reason to declare a marriage invalid provided the problem cannot be overcome within three years. Male frigidity, castration before the marriage, some female genital abnormalities, and long-lasting bewitchment all qualify in this instance (64-68).
Title XIX explains under what conditions an individual can bring a suit against his or her spouse either to dissolve the marriage or to receive him or her back from some other person (71-74). If both partners have committed adultery, the spouse should be restored to the original partner.
Title XX illustrates the care and thoughtfulness with which this treatise was written. It explains who may, or may not, bring an accusation against a couple which could result in the dissolution of the marriage (75-77). Penyafort explains that in cases in which one set of parents "is superior in riches, nobility, power, or honour" they are to be rejected as witnesses "because parents are seen to love the honour and advancement of their children" (76).
Another case of sympathetic reasoning occurs in the section on dismissal of the wife or husband for adultery or fornication (80-83). An evidently "adulterous wife cannot be accused by her husband . . . if he himself was convicted of fornicating . . . if he offered her in prostitution" of if the wife married another since she sincerely believed that her husband was dead; if she thought the man with whom she had carnal relations was actually her husband; if the act was the result of force; if the husband had taken her back after the act; or finally, if both were unbelievers and later converted they must return to one another (81-2).
The last title, XXV, discusses what a dowry is and how it is to be treated (87-9).
An unnumbered page compares Penyafort's statements with those of Thomas Aquinas with references to each. Pages 92-95 give complete references to Roman law and to other collections of canon law found within this summa. An index to subjects completes the book (96- 8).
This short book (98 pages including addenda) is extraordinarily rich both in the thought and work of Penyafort and on ways in which previous canonists, and Roman law, treated the subjects of engagement, marriage, impediments to marriage, legitimacy of offspring, and dowries. It contains enough material to keep undergraduate or graduate students busy for an entire semester, or a year for those who read Latin and who can consult the original sources. It need not be used only for information on ecclesiastical or canon law and how it was treated at the middle of the thirteenth century, but as a great source of medieval mentalité. We can learn, for example, both that educated churchmen believed in bewitchment, and that great attention was paid to the fundamental quality determining a valid marriage: consent.
Anyone wanting further information on this short book will find 24 pages on the WWW at www.pims.ca/pdf/inst41.pdf. You will find the table of contents, introduction in full, notes on the edition, and pp. 11-18 of the translated text complete with notes. |
CHRISTOPHERSEN, KEITH ALLEN
Name: Keith Allen Christophersen
Rank/Branch: O2/US Navy
Unit: Tactical Electronics Squadron 130, Detachment 4, USS RANGER (CVA 61)
Date of Birth: 22 October 1946
Home City of Record: South St. Paul MN
Loss Date: 21 January 1973
Country of Loss: North Vietnam/Over Water
Loss Coordinates: 183906N 1070959E
Status (in 1973): Died/Body Not Recovered
Category: 4
Acft/Vehicle/Ground: EKA3B
Refno: 1980
Other Personnel In Incident: Charles L. Parker; Richard D. Wiehr (missing)
Source: Compiled by Homecoming II Project 01 April 1990 from one or more of
the following: raw data from U.S. Government agency sources, correspondence
with POW/MIA families, published sources, interviews. Updated by the P.O.W.
NETWORK 1998.
REMARKS: OVERBOARD CVA61 SEARCH NEG -J
SYNOPSIS: The USS RANGER was a seasoned combat veteran, having been deployed
to Vietnam for Flaming Dart I operations. The carrier played a steady role
for the remainder of American involvement in the war. The first fighter jets
to bomb Haiphong in Operation Rolling Thunder came from her decks.
On January 21, 1973, the USS RANGER was conducting flight operations in the
Gulf of Tonkin about 100 miles off the shore of North Vietnam (approximately
east of the city of Vinh). As it happened, this was the final week of the
war.
One of the generally unheralded aircraft carried onboard the RANGER was the
tanker ship. The tanker was adapted from various aircraft with room to carry
jet fuel. This plane was the oasis for the fighter jets - the tanker which
circled in safe areas outside their combat areas to be available for
refueling. The presence of the tanker meant extra flight time for the jets
and sometimes meant their survival.
Flying from an aircraft carrier is a special science. The limited takeoff
and landing area leaves little room for error. Occasionally, tragic
accidents occur, claiming lives.
LtCDR Charles L. Parker was a pilot assigned to Tactical Electronic Squadron
130, Detachment 4, onboard the carrier USS RANGER. He was the pilot of an
EKA3B tanker.
At 11:46 p.m. on January 21, 1973, the EKA3B carrying Parker, the pilot;
LTJG Keith A. Christophersen, the copilot/navigator; and Petty Officer
Second Class Richard D. Wiehr, the electronic technician; was preparing to
launch on a night catapult launch. After having made a normal catapult
attachment and pre-launch inspection, the catapult stroke appeared to start
off normally. After about 1/3 of the launch stroke, a loud explosion was
heard and the aircraft was seen to pitch nose down and sparks started to
come from the right engine. The aircraft began to decelerate and run off the
end of the angle deck at a very low speed and fell over the side of the ship
into the Gulf of Tonkin.
An immediate search and rescue effort was begun, but the aircraft sank very
quickly and none of the crew could be recovered. The three Americans were
classified Killed/Body Not Recovered.
The crew of the EKA3B lost on January 21, 1973 are listed with honor among
the nearly 2300 still prisoner, missing or otherwise unaccounted for from
the Vietnam war because their bodied were never found. Some of the missing,
like the crew of the EKA3B, may never be recovered. It may not be possible
to find their bodies. A high percentage of those missing, however, could be
found.
Tragically, thousands of reports have been received that indicate Americans
are still being held captive in Southeast Asia. While the EKA3 crew may not
be among them, the evidence suggests that hundreds of their comrades are
alive, waiting for their country to free them. One can imagine that Parker,
Christophersen and Wiehr would be there if they could, circling and waiting
to help them to freedom. |
H\ :sub:`2`\ O Performance Datasheet
=====================================
.. raw:: html
<div style="margin-top:10px;">
<iframe width=900 height=900 src="../bits/h2o_datasheet.pdf" frameborder="0" allowfullscreen></iframe>
</div>
|
Q:
T-SQL Grouping Rows into Columns
I have a set of address used for printing labels and I would like to group them.
What I have:
UID CustName LocName State Zip Comments1 Comments2
=========================================================
1 John R1 NC 158631 Foo Bar
2 Smith R2 SC 126543 Bla Bla Bla
What I'm looking for:
Col_1 Col_2 Col_3
=============================
John R1 NC
158631 Foo Bar
Smith R2 SC
126543 Bla Bla Bla
I hope this makes sense.
A:
You need to unpivot the columns of data in the sets of 3 each. If you are using SQL Server 2005+, then you can use CROSS APPLY to get the result:
select col_1, col_2, col3
from yourtable
cross apply
(
select custname, locname, state union all
select zip, comments1, comments2
) c (col_1, col_2, col3)
order by uid;
Note, the datatype must be the same on the columns you are placing together, for example if zip was an int, then you would have to convert it to a varchar so you could place the data in the same column as custname.
|
Analysis of illicit cocaine and heroin samples seized in Luxembourg from 2005-2010.
This article discusses drug purity, frequency of appearance and concentration ranges of adulterants of 471 illicit cocaine and 962 illicit heroin samples seized in Luxembourg from January 2005 to December 2010. For cocaine samples the mean concentration was lowest in 2009 (43.2%) and highest in 2005 (54.7%) but no clear trend could be observed during the last 6 years. 14 different adulterants have been detected in cocaine samples, from which phenacetin has been the most abundant in terms of frequency of appearance and concentration until 2009. In 2010 the veterinary antihelminthic drug levamisole has become the most abundant adulterant detected in cocaine samples, its concentrations however remained low (1.5-4.1%). The mean heroin concentration was 26.6% in 2005, a decline has been observed in 2006 and the concentrations have been relatively stable since then (15.8-17.4%). Paracetamol and caffeine were by far the most abundant adulterants detected in heroin samples. |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.