text
stringlengths 8
5.77M
|
---|
This invention relates to particle emission control techniques for use in the control of airborne particles separated from a two component powder which has been agitated in a partially open container as, for example, the development system of an electrostatographic processor.
In a conventional electrostatographic printing process of the type described in Carlson's U.S. Pat. No. 2,297,691 on "Electrophotography", a uniformly charged imaging surface is selectively discharged in an image configuration, thereby forming a latent electrostatic image. That image is then developed by applying a finely divided, electroscopic coloring material, called "toner", to the imaging surface.
Sometimes the process is carried out in a "non-transfer mode", meaning that the imaging surface serves as the ultimate substrate for the toned or developed image. Favored, however, is a "transfer mode" in which the developed image is transferred to a separate substrate, such as plain paper, so that the imaging surface may be reused after any residual toner has been removed therefrom. Indeed electrostatographic printing has enjoyed outstanding commercial success, especially in plain paper xerographic copiers and duplicators.
One of the common characteristics of the electrostatographic printing process is the development step. Modern processors generally carry out that step on the fly -- viz. as the imaging surface moves through a development zone. To accomplish that, they normally include a cascade or a magnetic brush development system for circulating a two component developer material along a path running from a sump, through the development zone, and then back to the sump.
Briefly, the developer used in such a development system is basically a dry mixture of toner particles with or without fine additives and larger, so-called "carrier" particles as described, for example, in U.S. Pat. Nos. 3,590,000, 3,819,367 and 3,900,588. In practice, the materials for the toner and carrier (or sometimes, carrier coating) components of the mixture are selected from different positions in the triboelectric series so that electrical charges of opposite polarities tend to be imparted to the toner and carrier particles when the developer components are blended together. Moreover, in making those selections, consideration is given to the relative triboelectric ranking of the materials to the end that the polarity of the normal charge for the toner particles opposes the polarity of the latent images which are to be developed. Consequently, in operation, there are competing electrostatic forces acting on the toner particles. Specifically, one set of forces tend to attract them to the carrier particles while another set of forces tends to electrostatically strip them from that portion of the developer which is brought into the immediate proximity of or actuate contact with the image bearing surface.
An electrostatographic processor configured to operate in the transfer mode additionally includes a cleaning system for removing residual toner from the imaging surface after the developed image has been transferred to, say, plain paper. Again, modern processors usually carry out the step on the fly -- viz, as the imaging surface moves through a cleaning zone. For that reason, such processors typically include a cleaning blade, brush or web for mechanically removing any residual toner which may tend to adhere to the imaging surface despite the transfer step.
Experience with toner handling subsystems of the aforementioned type has deomonstrated that such systems often are sources of uncontrolled and undesired emissions of toner. It is known that the principal cause of that problem is the free toner which is captured in a suspended state and blown about by the air currents to which those systems are subjected. Prior attempts in solving this problem by a controlled air flow as described for example in U.S. Pat. Nos. 3,685,485 and 3,909,864 have not been entirely successful due to the poor prefiltration through baffles and the necessity to change filters frequently. The instant invention utilizes an improved toner emissioner control system and is specifically an improvement over copending application Ser. No. 597,129 filed on July 18, 1975, now abandoned, and commonly assigned herewith.
Accordingly, a primary object of the present invention is to provide an improved system for suppressing undesired emissions of airborne particles from agitated two component powders in a partially open container.
Another object of the invention is to provide a simple and reliable toner emission control technique for recombining airborne toner particles with a two component developer material composed of toner and carrier particles.
Still another object of the invention is to ensure continuous prefiltering of moving airborne particles by flowing powder with which the airborne particles are recombined. |
Paul Sauvé
Joseph-Mignault-Paul Sauvé (March 24, 1907 – January 2, 1960) was a Quebec lawyer, World War II veteran and politician. He was Premier of Quebec in 1959 and 1960.
Life
Paul Sauvé was born in Saint-Benoit, Quebec, Canada to journalist and parliamentarian Arthur Sauvé and Marie-Louise Lachaîne. By 1923, his family moved to Saint-Eustache and he began his studies at the Séminaire de Ste-Thérèse and transferred to the Collège Sainte-Marie de Montréal where he graduated in 1927. Sauvé would go on to study law at the Université de Montréal, being called to the bar on July 8, 1930. In 1936, he married Luce Pelland, with whom he had three children: Luce-Paule (1937), Pierre (1938) and Ginette (1944).
Political Career
Arthur Sauvé, his father, had been leader of the Conservative Party during the Premiership of Liberal Louis-Alexandre Taschereau. He transferred to federal politics in 1930 and became Postmaster General in the R. B. Bennett government. Paul Sauvé then ran as a Conservative for his father's former riding of the comté des Deux-Montagnes in the Quebec legislature in 1930, to become to the youngest elected member at the age of 23. He would be defeated in the 1935 election but re-elected in 1936 as a member of the newly formed Union Nationale. He was then elected as Speaker to become, at the age of 29, the youngest person elected to that position.
When Canada entered the Second World War in 1939, Paul Sauvé reported to Les Fusiliers Mont-Royal, the regiment to which he belonged as a reserve officer, and served overseas in the Canadian military for the duration of the Second World War, taking part in the Battle of Normandy and in the South Beveland Campaign. In 1945, he returned from Europe and resumed his official duties with the Quebec legislature. In 1946, he became Quebec's first Minister of Social Welfare and Youth.
Sauvé is viewed as having upheld his convictions and had not succumbed to fear of demotion by "The Chief" (Duplessis). Some say that he stood alone in a cabinet of "yes men".
Sauvé succeeded Maurice Duplessis as leader of the Union Nationale and Premier of Quebec following Duplessis's death on September 7, 1959; he continued to serve as his own Social Welfare and Youth Minister. However, Sauvé's tenure would be short-lived, as he himself would shortly die in office on January 2, 1960 in Saint-Eustache of a heart attack. His 117-day tenure as premier is the shortest non-interim stint in the province's history.
By the time he became Premier, Sauvé was well aware that he had, at most, two years before the next election. Realizing the need to modernize one of the most conservative provincial governments in Canada, he announced radical changes in the ways Quebec would be run. His resolve was conveyed in the motto he adopted: "Désormais" (from now on). During those "100 Days Of Change," Sauvé undertook a wide-ranging review of issues facing the Quebec government, including many that had been ignored during the Duplessis era.
As educational reform was seen as a means to social change and national development, Sauvé begun negotiations to recover the money Ottawa set aside for higher education, while government grants would increase towards educational institutions, no longer distributed at the government's discretion.
Regarding Canadian federalism, the Sauvé provincial government considered that federal grants to universities encroached an area reserved exclusively for the provinces under the British North America Act, 1867 (since renamed the Constitution Act, 1867). Demands were also made in respect that the provincial university education tax be deductible.
The Sauvé government also wanted to undertake an in depth study of the federal legislation regarding the federal hospital insurance system and the means for adapting it for Québec.
He died prematurely in office on January 2, 1960, leaving the Union Nationale government in disarray and regarded by many as likely 'founder' of the Quiet Revolution. Less than a year later, the Union Nationale was defeated under his successor, Antonio Barrette.
Legacy
Paul Sauvé Arena in Montreal was named after him, and was used by the Parti Québécois for their election night rally in 1976 where they celebrated victory in the provincial election.
References
External links
Extensive biography of Paul Sauvé from Marianopolis College
Category:1907 births
Category:1960 deaths
Category:Canadian military personnel of World War II
Category:Recipients of the Croix de Guerre 1939–1945 (France)
Category:Premiers of Quebec
Category:Presidents of the National Assembly of Quebec
Category:Conservative Party of Quebec MNAs
Category:Union Nationale (Quebec) MNAs
Category:Université de Montréal alumni
Category:Leaders of the Union Nationale (Quebec)
Category:People from Laurentides |
Hey Alicia,isn't cold and dark the right winter experience? I think subtropical weather is overrated...How many bikes are you shipping? I see you're taking the Brompton and the Kona.I think you should take along a box of bike bells. In my experience Americans find bike bells very amusing.Is the Brompton in a Brompton case, or did you find some other case that fits?Well, if it fit in your hand luggage you could cycle down the aisles =)Anyway, I hope things will go as planned.And I will soon be reading about lycra-less cycling in California.Veel geluk und guten Flug!
I shipped the Kona via sea freight in a giant box, only taking the front wheel off. It arrived a few days ago- My vintage Koga-miyata was fully disassembled and I took it in a smaller box on a flight over christmas to Iowa. From there, it is being shipped to California... and I hope to find a good mechanic to help me put it back together again! I have a large suitcase that just fits the Brompton. It's not a special suitcase or specially made for the Brompton. Once inside, the whole thing is just under the weight limit. I'm paying for it as a second bag, rather than as a bicycle (56 euros vs. 100 euros). Thanks for the wishes! Cycling without lycra indeed. :)
Ah, that's interesting. So the American Kona has sailed back home. Must have been a strange feeling, thinking of your bike going over the Atlantic somewhere.I would like to see pictures of your Koga-Miyata jigsaw puzzle. In various degrees of assembledness. |
package scalaprops
import scalaz.std.anyVal._
import ScalapropsScalaz._
object NeedTest extends Scalaprops {
val test = Properties.list(
scalazlaws.traverse1.all[scalaz.Need],
scalazlaws.monad.all[scalaz.Need],
scalazlaws.bindRec.all[scalaz.Need],
scalazlaws.zip.all[scalaz.Need],
scalazlaws.align.all[scalaz.Need],
scalazlaws.comonad.all[scalaz.Need]
)
}
|
Permanent magnet cylinder elements (e.g. cylinders and sections of cylinders) having radial polarization patterns, are used extensively in electrostatographic imaging apparatus. In one use, such cylinders function as magnetic brushes that transport magnetic developer (e.g. magnetic carrier particles with electrostatically attracted toner particles) into contact with the electrostatic images on a photoconductor. In another use such magnetic cylinders elements are used in scavenger rollers to remove any carrier particles that were erroneously deposited on the photoconductor along with the desired toner transfer.
In both the developer roller and scavenger roller systems, device constructions vary greatly. Magnetic brush devices can be constructed with a rotating magnetic cylindrical core within a stationary non-magnetic cylindrical shell or with a stationary magnetic core within a rotating non-magnetic shell, or both the magnetic core and the outer shell can be constructed to rotate, see e.g. U.S. Pat. No. 4,473,029. Scavenger roller devices also vary considerably in design approach.
Beyond the general design approach, the magnetic brush and scavenger devices will have design details that depend significantly on the characteristics of the overall electrostatographic system, e.g. its particular developer composition, the photoconductor speed, the strength of the electrostatic image pattern, etc. One of the very important design details of such devices is the magnetization pattern of their permanent magnet cylinder element(s), so that each different electrostatographic apparatus design benefits from a "custom designed" magnetization pattern for its developing and scavenging devices.
In one prior art approach, elongated strip magnets are attached at predetermined positions around the periphery of a cylindrical iron core to construct desired magnetization patterns. In another, a plurality of magnet elements are adhered together to form a cylinder with the desired magnetization pattern. In a more recent design approach, a cylinder formed of permanent magnet material such as molded ferrite is placed in a custom magnetizing fixture and impressed with the desired polarization pattern.
The last-noted approach is desirable from the viewpoint of material and assembly costs, once the appropriate fixture has been developed. However, the design and fabrication of the fixture is not an insignificant endeavor. For example, such prior art fixtures can comprise a block of phenolic or other suitable dielectric material, centrally bored to allow the magnet element to be magnetized to fit with a small clearance. A heavy gauge wire conductor is threaded through groups of holes drilled longitudinally through the block, adjacent to the central bore, in predetermined locations based upon the desired magnetization pattern to be achieved. The element to be magnetized is inserted in the bore and the wire ends are coupled to a capacitor discharge magnetizer. The entire assembly is then inserted into a water cooled shell and a high current pulse is directed through the wires to produce magnetic fields that magnetize the inserted element in the proper polarization pattern.
The magnetizing fixture described above is expensive to construct. Moreover, the interactions of the various instrumentalities make calculating the predesign of a fixture that will provide a precise polarization pattern, virtually impossible. Thus repeated fixtures designs are calculated and constructed in attempts to develop approximately the desired field by trial and error. At some stage a compromise is attained between the preciseness of the polarization patterns formed by a given fixture design and the cost of continuing to refine the design by constructing new fixtures. Whenever the overall machine design changes to necessitate a different preferred polarization pattern, it is necessary to repeat the process of fixture design as described above.
Considering the foregoing, one can appreciate that it would be highly desirable to improve the apparatus, systems and processes for impressing precise polarization patterns upon cylindrical permanent magnet elements. |
<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE pkgmetadata SYSTEM "http://www.gentoo.org/dtd/metadata.dtd">
<pkgmetadata>
<maintainer type="project">
<email>[email protected]</email>
<name>Gentoo Haskell</name>
</maintainer>
<longdescription>
Native Haskell TLS and SSL protocol implementation for server and client.
This provides a high-level implementation of a sensitive security protocol,
eliminating a common set of security issues through the use of the advanced
type system, high level constructions and common Haskell features.
Currently implement the SSL3.0, TLS1.0, TLS1.1 and TLS1.2 protocol,
with only RSA supported for Key Exchange.
Only core protocol available here, have a look at the
<http://hackage.haskell.org/package/tls-extra/> package for default
ciphers, compressions and certificates functions.
</longdescription>
<use>
<flag name="compat">Accept SSLv2 compatible handshake.</flag>
<flag name="network">Use the base network library.</flag>
</use>
</pkgmetadata>
|
Joe Brockmeier created CLOUDSTACK-3138:
------------------------------------------
Summary: Flaws in upgrade documentation from 3.0.2 -> 4.1.0
Key: CLOUDSTACK-3138
URL: https://issues.apache.org/jira/browse/CLOUDSTACK-3138
Project: CloudStack
Issue Type: Bug
Security Level: Public (Anyone can view this level - this is the default.)
Components: Doc
Affects Versions: 4.1.0
Reporter: Joe Brockmeier
Priority: Critical
Fix For: 4.1.1
Reported on the mailing list (http://markmail.org/message/ussthbb6sx6kjm2j)
there are many errors in release notes for upgrade form CS 3.0.2 to 4.0.1.
Here are just a few, from the top of my head. I suggest you correct them.
1. Location of config files is not at /etc/cloud/ but rather at
/etc/cloudstack now.
2. components.xml is nowhere to be found in /etc/cloudstack
3. server.xml generation failed, because i had enabled ssl in it. It
required me to generate them from scratch.
4. There were no instructions for enabling https, anywhere. I had to fix
server.xml and tomcat6.xml to use my certificate.
5. cloud-sysvmadm is nonexistent. I think there is cloudstack-sys.. Also
switches are wrong.
6. Python and bash scripts are now located
/usr/share/cloudstack-common/scripts/vm/hypervisor/xenserver/xenserver60/ instead
of /usr/lib64/cloud/common/ scripts/vm/hypervisor/
xenserver/xenserver60/ as documentation would tell you.
7. for pbd in `xe pbd-list currently-attached=false| grep ^uuid | awk
'{print $NF}'`; do xe pbd-plug uuid=$pbd ; doesn't work:
[root@x1 ~]# for pbd in `xe pbd-list currently-attached=false| grep
^uuid | awk '{print $NF}'`; do xe pbd-plug uuid=$pbd
>
...
--
This message is automatically generated by JIRA.
If you think it was sent incorrectly, please contact your JIRA administrators
For more information on JIRA, see: http://www.atlassian.com/software/jira |
FOXSports.com News for West Virginiahttp://feeds.foxsports.com/west_virginia
FOXSports.com Top Ranked Headlines Syndication Feeden-usFOXSports.com News for West Virginiahttp://www.foxsports.com/fe/img/foxsports_logo_52x39.jpg5239102015-03-03T19:37:47.289Z2015-03-03T19:37:47.289ZClay leads No. 16 Oklahoma by WVUhttp://www.foxsports.com/cfb/story/oklahoma-gets-past-west-virginia-090713
http://www.foxsports.com/cfb/story/oklahoma-gets-past-west-virginia-090713HomeBrennan Clay helped Oklahoma overcome its spotty passing
game.Sun, 08 Sep 2013 03:15:49 GMTWest Virginia edges William & Maryhttp://www.foxsports.com/cfb/story/west-virginia-edges-william-mary-with-late-touchdown-083113
http://www.foxsports.com/cfb/story/west-virginia-edges-william-mary-with-late-touchdown-083113HomeWendell Smallwood scored on a 2-yard run with 3:22 left to lift
West Virginia to a 24-17 win over William & Mary 24-17 on
Saturday.Sat, 31 Aug 2013 19:47:52 GMTWho'll win Week 12's biggest games?http://www.foxsports.com/cfb/story/predictions-week-12-georgia-auburn-stanford-usc-oklahoma-state-texas-texas-tech-baylor-michigan-state-nebraska-111413
http://www.foxsports.com/cfb/story/predictions-week-12-georgia-auburn-stanford-usc-oklahoma-state-texas-texas-tech-baylor-michigan-state-nebraska-111413HomeGus Malzahn has Auburn fans beginning to dream of an SEC and
national title. Unfortunately, the Bulldogs will end that this
week. Plus, Stanford-USC and more picks.
Thu, 14 Nov 2013 02:40:08 GMTIowa St beats West Virginia 52-44 in 3 OTshttp://www.foxsports.com/cfb/story/Iowa-St-beats-West-Virginia-5244-in-3-OTs-04593768
http://www.foxsports.com/cfb/story/Iowa-St-beats-West-Virginia-5244-in-3-OTs-04593768HomeRedshirt freshman Grant Rohach threw a 25-yard touchdown pass to
Justin Coleman in the third overtime and Iowa State came from 24
points down to beat West Virginia 52-44 on Saturday night.Sun, 01 Dec 2013 01:53:27 GMT2013 AP All-Big 12 Teamhttp://www.foxsports.com/cfb/story/2013-AP-AllBig-12-Team-49703400
http://www.foxsports.com/cfb/story/2013-AP-AllBig-12-Team-49703400HomeThe 2013 Associated Press All-Big 12 team, as selected by a
panel of 20 sports writers who regularly cover the league for
newspapers throughout the league's five states. Players at all
positions are listed alphabetically with name, school, height,
weight, class and hometown; ''u-'' denotes unanimous
selections.Mon, 09 Dec 2013 13:43:10 GMTTulsa loses 51-20 to Oklahomahttp://www.foxsports.com/cfb/story/Tulsa-loses-5120-to-Oklahoma-53685998
http://www.foxsports.com/cfb/story/Tulsa-loses-5120-to-Oklahoma-53685998HomeAnother Watts had a chance to shine on Owen Field, albeit in a
losing effort for Tulsa on Saturday.Sat, 14 Sep 2013 17:07:06 GMTWVU upsets No. 11 Oklahoma Statehttp://www.foxsports.com/cfb/story/west-virginia-upsets-oklahoma-state-dana-holgorsen-breaks-headset-092813
http://www.foxsports.com/cfb/story/west-virginia-upsets-oklahoma-state-dana-holgorsen-breaks-headset-092813HomeIn a major upset, the Mountaineers took down Oklahoma State. It was
far from a pretty victory for WVU, though, and even Dana Holgorsen
let off some steam.
Sat, 28 Sep 2013 20:50:27 GMTBig play can't save Iowa Statehttp://www.foxsports.com/cfb/story/Big-play-cant-save-Iowa-State-51270931
http://www.foxsports.com/cfb/story/Big-play-cant-save-Iowa-State-51270931HomeNot even Sam Richardson's career night and the longest pass play
in school history could keep Iowa State from another loss in a Big
12 opener.Fri, 04 Oct 2013 00:45:05 GMTNo. 17 Baylor has 864 yards in 73-42 win over WVUhttp://www.foxsports.com/cfb/story/No-17-Baylor-has-864-yards-in-7342-win-over-WVU-83925754
http://www.foxsports.com/cfb/story/No-17-Baylor-has-864-yards-in-7342-win-over-WVU-83925754HomeBryce Petty and No. 17 Baylor needed only 40 seconds to score
their first touchdown in the Big 12 opener.Sun, 06 Oct 2013 05:11:27 GMTS Lynn leading the Sooners' defensehttp://www.foxsports.com/cfb/story/S-Lynn-leading-the-Sooners-defense-16641220
http://www.foxsports.com/cfb/story/S-Lynn-leading-the-Sooners-defense-16641220Home
(Eds: Updates.) By MURRAY EVANS Associated Press After years of searching, Gabe Lynn has finally found a home in Oklahoma's secondary.Thu, 12 Sep 2013 20:19:24 GMT |
650 S.W.2d 408 (1983)
Daniel E. OLVEDA, Appellant,
v.
The STATE of Texas, Appellee.
No. 015-81.
Court of Criminal Appeals of Texas.
March 16, 1983.
Antonio G. Cantu, court appointed, David K. Chapman, San Antonio, Janet S. Morrow, Houston, for appellant.
Bill M. White, Dist. Atty., E. Dickenson Ryman, Anton Paul Hajek, III and Alan E. Battaglia, Asst. Dist. Attys., San Antonio, Robert Huttash, State's Atty., and Alfred Walker, Asst. State's Atty., Austin, for the State.
Before the court en banc.
ON STATE'S PETITION FOR DISCRETIONARY REVIEW
ODOM, Judge.
Appellant was convicted of robbery and punishment was assessed at ten years. The Court of Appeals reversed the conviction in published opinion, 625 S.W.2d 13, that sustained appellant's only ground of error. The court held fundamental error was presented because the jury charge failed to include the statutory definition of the phrase "in the course of committing theft." V.T.C.A., Penal Code Sec. 29.01(1).
The Court of Appeals relied on Rohlfing v. State, 612 S.W.2d 598, in reaching its decision. In that case a panel of this Court held that omission of a definition of "in the *409 course of committing theft" did not constitute fundamental error. The Court of Appeals attempted to distinguish Rohlfing on the theory that the assaultive conduct there was made during the commission of theft, while the conduct here was committed in immediate flight from the theft. We find the distinction unpersuasive.
As noted in Rohlfing, when the statutory definition is not included in the charge, it is assumed the jury would consider the commonly understood meaning in its deliberations. Although error could result where the common meaning is more expansive than the statutory definition, such is not the case with the phrase "in the course of committing theft." Any possible misunderstanding of the phrase would have been more restrictive than the statutory definition, and could only have been to appellant's benefit. No reversible error is shown.
The judgment of the Court of Appeals is reversed and the judgment of the trial court is affirmed.
CLINTON, Judge, concurring.
The majority opinion, as well as others in this cause and Rohlfing v. State, 612 S.W.2d 598 (Tex.Cr.App.1981), seems to have divined a "commonly understood meaning" of the statutory phrase "in the course of committing theft." The majority says it is "more restrictive than the statutory definition" in V.T.C.A. Penal Code, § 29.01(1), viz: "conduct that occurs in an attempt to commit, during the commission, or in immediate flight after the attempt or commission of theft."
I am prepared to accept that "the definition of robbery under the 1974 Penal Code is broader than the one contained in Article 1408, [P.C.1925]," Lightner v. State, 535 S.W.2d 176, 177 (Tex.Cr.App.1976), but I cannot confidently say that there was or is any "common meaning" among laymen about either, nor declare with certainty what it is. But though there be one and whatever it is, Article 36.14, V.A.C.C.P. contemplates that jurors will be instructed as to the meaning of such applicable legal definitions which, being statutorily prescribed, are considered by the Code Construction Act, Article 5429b-2, § 2.01, to have acquired technical or particular meaning, Article 3.01, V.A.C.C.P., to the end that "the determination of the meaning of [legislative] enactments" is not relegated "to the publishers of dictionaries." Milligan v. State, 554 S.W.2d 192, 196 (Tex.Cr.App. 1977); Watson v. State, 548 S.W.2d 676, 679, n. 3 (Tex.Cr.App.1977).
Therefore, an appellate court reviewing a claim that a charge is defective for failure to instruct the jury on a specially prescribed definition that is, by statute, an essential element of the offense offends, or comes perilously close to offending, notions of due process and due course of law by assuming a jury would consider in its deliberations whatever the appellate court says is the commonly understood meaning of the term when that understanding is believed to be other than the legislative definition. The danger is demonstrated in this very cause: The San Antonio Court of Appeals made that assumption and found error; the majority makes that same assumption and finds no reversible error. Both draw on language in Rohlfing v. State, supra, at 602-603 a panel opinion that was not tested on rehearing. The Court of Appeals concludes "there is a substantial likelihood that the jury could have been misled into convicting appellant for robbery by finding him guilty of the elements of the offense of theft;" the majority opines that "[a]ny possible misunderstanding of the phrase ... could only have been to appellant's benefit." If Rohlfing can be read by reasonable judges to reach diametrically opposing results, that language should be reexamined rather than relied upon.
For my part, invoking rudimentary principles of law that the charge should instruct the jury to resolve issues tendered by the pleadings and raised by the evidence, I find that the application paragraph authorizes a conviction upon findings that are consonant with the indictment and evidence.
The indictment was cast in terms of V.T.C.A. Penal Code, § 29.02(a)(2) "if, in the *410 course of committing theft ... and with intent to obtain or maintain control of the property, he intentionally or knowingly threatens or places another in fear of imminent bodily injury or death." The application paragraph authorized the jury to convict if inter alia it believed that appellant
in the course of committing theft from the said Dolores Rossel, and with intent to obtain and maintain control of the said property without the consent of Dolores Rossel, intentionally and knowingly threatened and placed Andrew Dominquez in fear of imminent bodily injury and death you will find the defendant guilty."
The proof adduced by the State showed that appellant shoplifted two necklaces; Dolores Rossel attempted to stop him from leaving the store but, failing to do so, called for help; Andrew Dominquez, a stockboy, ran out after appellant; appellant stopped in an alley and turned on Dominguez with a knife; Dominguez retreated and returned to the store.
Faithful to the indictment and comporting with the evidence the application paragraph presented to the jury the law applicable to the facts of the matter. The jury, without regard to speculation concerning what its members commonly understood "in the course of committing theft" to mean, was asked to and could find every factual element of the offense alleged, including the only threat by assault shown to have been made by appellant upon Dominquez after stealthily taking property from the store managed by Rossel. There was no fundamental error in any of that. Hill v. State, 640 S.W.2d 879, 884-886 (Tex.Cr.App. 1982) (Dissenting opinion).
For the reasons given then, I join in the judgment of the Court.
MILLER, J., joins.
McCORMICK, Judge, concurring.
I concur in the holding of the majority that the failure of the trial court to include an instruction on the statutory definition of "in the course of committing theft" does not constitute fundamental error. However, the majority goes further and, via dicta, says that "[a]lthough error could result where the common meaning is more expansive than the statutory definition, such is not the case with the phrase `in the course of committing theft.'" The exclusion of abstract definitions in the court's charge has not been recognized as one of the "fundamental errors" which can arise from the charge of the court. See Cumbie v. State, 578 S.W.2d 732 (Tex.Cr.App.1979). Absent an objection, such an omission is not reversible error.
CAMPBELL, J., joins in this concurrence.
TEAGUE, Judge, dissenting.
The majority, in its holding that "Any possible misunderstanding of the phrase [in the course of committing theft] would have been more restrictive than the statutory definition, and could only have been to appellant's benefit," has not properly considered the facts of this cause.
The undisputed facts in this cause reflect that the appellant, while in an S.H. Kress Company store in San Antonio, was seen by Delores Rossel, an employee of the store, shoplifting merchandise. Realizing that he had been seen, appellant fled the premises, but was pursued by Andre Dominquez, a fellow employee of Rossel, into an alley near the store. Appellant made no threats while inside the store. However, Dominquez testified that in the alley appellant "flashed" a knife toward him, causing Dominquez to return to the inside of the store. Appellant in his testimony denied "flashing" a knife toward Dominquez in the alley. Appellant was subsequently arrested at a location away from the store. The arresting officers returned him to the store for identification purposes. After appellant was returned to the store, he made threatening remarks to both Rossel and Dominquez.
Appellant was charged with the offense of robbery, with one element alleging that he intentionally and knowingly threatened and placed Dominquez in fear of bodily injury and death while in the course of *411 committing theft of property from Rossel. The statutory phrase, "in the course of committing theft," was not defined in the jury charge. Thus, although the jury was instructed that they had to find that the threat to Dominquez occurred in the course of committing theft, it was not informed what the phrase, "in the course of committing theft," legally means.
The San Antonio Court of Appeals correctly ruled that such omission was so prejudicial to the appellant that it was error calculated to injure the rights of the appellant, and ordered the conviction reversed. That Court stated the following: "It is not a matter of common understanding that the meaning of `in the course of committing theft' may encompass conduct that occurs, as it did here, after the theft already had been completed. As a result, the jurors were instructed to decide whether appellant's threats occurred `in the course of committing theft,' but were not apprised that this element could be satisfied by evidence that appellant was in flight from completed theft. Without an awareness of the fact that such circumstances could constitute robbery, there is a substantial likelihood that the jury could have been misled into convicting appellant for robbery by finding him guilty of the elements of the offense of theft." The San Antonio Court, in reaching its holding, used this Court's panel decision of Rohlfing v. State, 612 S.W.2d 598 (Tex.Cr.App.1981), as its linchpin.
Rohlfing, Id., held that such omission was not fundamental error because, of the three statutory meanings of the phrase, "in the course of committing theft," only the second meaning, "during the commission of theft," could have been applied to the facts of that cause. However, the facts here reflect that the jury could have found that the appellant committed the offense of theft from Rossel during which time appellant made no threats, but could have believed appellant's testimony that no threats were made in the alley, and also believed that appellant made threats after he was returned to the store by the arresting police officers.
I will now return to the parable mentioned in Rohlfing, Id.[*] Here, the jury was told they had to find it [in the course of committing theft] in order to convict appellant, but were not told what it [in the course of committing theft] looked like. I believe that it is reasonable that the twelve jurors in this cause, being without sufficient guidance in the form of an instruction defining the phrase, "in the course of committing theft," may very well have done in their deliberations what the six blind men of Nepal eventually did. However, they also may have arrived at their own definition of the phrase. Regardless, it would be *412 presumptious for members of this Court to say what definition, if any, they used.
The majority by its opinion appears to imply that a reasonable interpretation or definition of the phrase, "in the course of committing theft," would be limited to "the commonly understood meaning" of the phrase. The majority, however, does not explain what the "commonly understood meaning" of the phrase might be as distinguished from the statutory definition; merely concluding that the "commonly understood meaning" does not clash with the statutory definition. It also concludes, without any explanation, that "Any possible misunderstanding of the phrase would have been more restrictive than the statutory definition, and could only have been to appellant's benefit."
Without benefit of any discussion by the majority in its opinion, I must conclude that it is holding that a reasonable definition of the phrase comports with the statutory phrase and the jury, being composed of reasonable persons, used the reasonable definition of the phrase. This, of course, clashes with the fact that as I interpret the opinion of the Court of Appeals, that Court also applied a reasonable or "common understanding" meaning to the phrase, and concluded that "It is not a matter of common understanding that the meaning of `in the course of committing theft' may encompass conduct that occurs, as it did here, after the theft already had been completed."
What all of this means to me is that like the twelve justices involved in the California decisions of People v. Carroll, 1 Cal.3d 581, 83 Cal.Rptr. 176, 463 P.2d 400 (Sup.Ct. Cal.1970), also see People v. Carroll, 80 Cal. Reptr. 807 (Cal.Ct.App., Second Dis., Division 4, 1969), where they were concerned with the meaning of the phrase "during the commission of a robbery," but could not unanimously agree upon a definition or meaning for that phrase, I believe it is unfair to the lay persons who served as the jury in this cause to attribute to them a particular definition of the phrase, "in the course of committing robbery." On the other hand, the collective majority, composed of wise and astute individuals, may only be holding that the three justices of the San Antonio Court of Appeals, who composed the panel that wrote its opinion, were not, as they are, more reasonable thinking men.
In any event, I respectfully dissent to the majority opinion and its holding, whatever that may be.
NOTES
[*] The parable found in Rohlfing comes to us from Edmund C. Berkeley's "The Six Blind Men of Nepal," which is contained in his work Ride the East Wind. The parable concerned six blind men, each of whom had heard conflicting stories about a great beast, which trumpeted and was called the elephant. The elephant roamed the jungles of the lowlands of Nepal. The six blind men decided to make an investigation of just what the elephant looked like and the six thereafter ventured forth into the jungle. They subsequently found an elephant, which was asleep but soon awakened. Before the elephant awakened, each managed to touch the elephant. However, when the elephant awakened, the six blind men fled to safety. After they had returned to safety, they continued to argue over what they had come into contact with, with each making a conclusion, to-wit: one believed the elephant was like a tree trunk because he had felt the elephant's leg; one believed the elephant was like a string because he had felt the tail; one believed the elephant was like paper because he had felt the ear; one believed the elephant was like bone because he had felt the tusk; one believed the elephant was like a pig because he had felt the body; and one believed the elephant was like a snake because he had felt the trunk. The six blind men finally agreed upon six propositions: 1) By straining their imagination, they could imagine an animal that had two, or perhaps three, of these properties; 2) But they could not possibly conceive of an animal that had all six of these properties; 3) Therefore, as a beast, the elephant was impossible; 4) Certainly, it was as legendary as the unicorn or the griffin; 5) The trumpeting they had heard was undoubtedly a jungle illusion, that happened from time to time in the jungles of the lowlands of Nepal; and 6) Henceforth, they would forbid all discussion of the elephant to avoid arguments, friction, and the waste of time.
|
Neural engineering (also known as neuroengineering) is a discipline within biomedical engineering that uses engineering techniques to understand, repair, replace, enhance, or otherwise exploit the properties of neural systems. Neural engineers are uniquely qualified to solve design problems at the interface of living neural tissue and non-living constructs.
Prominent goals in the field include restoration and augmentation of human function via direct interactions between the nervous system and artificial devices.
Much current research is focused on understanding the coding and processing of information in the sensory and motor systems, quantifying how this processing is altered in the pathological state, and how it can be manipulated through interactions with artificial devices including brain-computer interfaces and neuroprosthetics.
Other research concentrates more on investigation by experimentation, including the use of neural implants connected with external technology.
The fundamentals behind neuroengineering involve the relationship of neurons, neural networks, and nervous system functions to quantifiable models to aid the development of devices that could interpret and control signals and produce purposeful responses.
Messages that the body uses to influence thoughts, senses, movements, and survival are directed by nerve impulses transmitted across brain tissue and to the rest of the body. Neurons are the basic functional unit of the nervous system and are highly specialized cells that are capable of sending these signals that operate high and low level functions needed for survival and quality of life. Neurons have special electro-chemical properties that allow them to process information and then transmit that information to other cells. Neuronal activity is dependent upon neural membrane potential and the changes that occur along and across it. A constant voltage, known as the Membrane potential, is normally maintained by certain concentrations of specific ions across neuronal membranes. Disruptions or variations in this voltage create an imbalance, or polarization, across the membrane. Depolarization of the membrane past its Threshold potential generates an action potential, which is the main source of signal transmission, known as Neurotransmission of the nervous system. An action potential results in a cascade of ion flux down and across an axonal membrane, creating an effective voltage spike train or "electrical signal" which can transmit further electrical changes in other cells. Signals can be generated by electrical, chemical, magnetic, optical, and other forms of stimuli that influence the flow of charges, and thus voltage levels across neural membranes(He 2005).
Engineers employ quantitative tools that can be used for understanding and interacting with complex neural systems. Methods of studying and generating chemical, electrical, magnetic, and optical signals responsible for extracellular field potentials and synaptic transmission in neural tissue aid researchers in the modulation of neural system activity(Babb et al. 2008). To understand properties of neural system activity, engineers use signal processing techniques and computational modeling(Eliasmith & Anderson 2003). To process these signals, neural engineers must translate the voltages across neural membranes into corresponding code, a process known as neural coding. Neural coding uses studies on how the brain encodes simple commands in the form of central pattern generators (CPGs), movement vectors, the cerebellar internal model, and somatotopic maps to understand movement and sensory phenomena. Decoding of these signals in the realm of neuroscience is the process by which neurons understand the voltages that have been transmitted to them. Transformations involve the mechanisms that signals of a certain form get interpreted and then translated into another form. Engineers look to mathematically model these transformations(Eliasmith & Anderson 2003). There are a variety of methods being used to record these voltage signals. These can be intracellular or extracellular. Extracellular methods involve single-unit recordings, extracellular field potentials, amperometry, or more recently, Multielectrode arrays which have been used to record and mimic signals.
Neuromechanics is the coupling of neurobiology, biomechanics, sensation and perception, and robotics (Edwards 2010). Researchers are using advanced techniques and models to study the mechanical properties of neural tissues and their effects on the tissues' ability to withstand and generate force and movements as well as their vulnerability to traumatic loading.(Laplaca & Prado 2010) This area of research focuses on translating the transformations of information among the neuromuscular and skeletal systems to develop functions and governing rules relating to operation and organization of these systems (Nishikawa et al. 2007). Neuromechanics can be simulated by connecting computational models of neural circuits to models of animal bodies situated in virtual physical worlds(Edwards 2010). Experimental analysis of biomechanics including the kinematics and dynamics of movements, the process and patterns of motor and sensory feedback during movement processes, and the circuit and synaptic organization of the brain responsible for motor control are all currently being researched to understand the complexity of animal movement. Dr. Michelle LaPlaca's lab at Georgia Institute of Technology is involved in the study of mechanical stretch of cell cultures, shear deformation of planar cell cultures, and shear deformation of 3D cell containing matrices. Understanding of these processes is followed by development of functioning models capable of characterizing these systems under closed loop conditions with specially defined parameters. The study of neuromechanics is aimed at improving treatments for physiological health problems which includes optimization of prostheses design, restoration of movement post injury, and design and control of mobile robots. By studying structures in 3D hydrogels, researchers can identify new models of nerve cell mechanoproperties. For example, LaPlaca et al. developed a new model showing that strain may play a role in cell culture. (LaPlaca et al. 2005)
Neuromodulation aims to treat disease or injury by employing medical device technologies that would enhance or suppress activity of the nervous system with the delivery of pharmaceutical agents, electrical signals, or other forms of energy stimulus to re-establish balance in impaired regions of the brain. Researchers in this field face the challenge of linking advances in understanding neural signals to advancements in technologies delivering and analyzing these signals with increased sensitivity, biocompatibility, and viability in closed loops schemes in the brain such that new treatments and clinical applications can be created to treat those suffering from neural damage of various kinds(Potter 2012). Neuromodulator devices can correct nervous system dysfunction related to Parkinson's disease, dystonia, tremor, Tourette's, chronic pain, OCD, severe depression, and eventually epilepsy. (Potter 2012) Neuromodulation is appealing as treatment for varying defects because it focuses in on treating highly specific regions of the brain only, contrasting that of systemic treatments that can have side effects on the body. Neuromodulator stimulators such as microelectrode arrays can stimulate and record brain function and with further improvements are meant to become adjustable and responsive delivery devices for drugs and other stimuli. (2012a)
Neural engineering and rehabilitation applies neuroscience and engineering to investigating peripheral and central nervous system function and to finding clinical solutions to problems created by brain damage or malfunction. Engineering applied to Neuroregeneration focuses on engineering devices and materials that facilitate the growth of neurons for specific applications such as the regeneration of peripheral nerve injury, the regeneration of the spinal cord tissue for spinal cord injury, and the regeneration of retinal tissue. Genetic engineering and Tissue engineering are areas developing scaffolds for spinal cord to regrow across thus helping neurological problems. (Potter 2012, Schmidt & Leach 2003)
Neuroimaging techniques are used to investigate the activity of neural networks, as well as the structure and function of the brain. Neuroimaging technologies include functional magnetic resonance imaging (fMRI), magnetic resonance imaging (MRI), positron emission tomography (PET) and computed axial tomography (CAT) scans. Functional neuroimaging studies are interested in which areas of the brain perform specific tasks. fMRI measures hemodynamic activity that is closely linked to neural activity. It probes the brain by tuning the brain scanner to a certain wavelength to see which part of the brain are activated doing different tasks by seeing what lights up doing different things. PET, CT scanners, and electroencephalography (EEG) are currently being improved and used for similar purposes(Potter 2012).
Scientists can use experimental observations of neuronal systems and theoretical and computational models of these systems to create Neural networks with the hopes of modeling neural systems in as realistic a manner as possible. Neural networks can be used for analyses to help design further neurotechnology devices. Specifically, researchers handle analytical or finite element modeling to determine nervous system control of movements and apply these techniques to help patients with brain injuries or disorders. Artificial neural networks can be built from theoretical and computational models and implemented on computers from theoretically devices equations or experimental results of observed behavior of neuronal systems. Models might represent ion concentration dynamics, channel kinetics, synaptic transmission, single neuron computation, oxygen metabolism, or application of dynamic system theory. (LaPlaca et al. 2005) Liquid-Based template assembly was used to engineer 3D neural networks from neuron-seeded microcarrier beads.[1]
Neural interfaces are a major element used for studying neural systems and enhancing or replacing neuronal function with engineered devices. Engineers are challenged with developing electrodes than can selectively record from associated electronic circuits to collect information about the nervous system activity and to stimulate specified regions of neural tissue to restore function or sensation of that tissue.(Cullen et al. 2011) The materials used for these devices must match the mechanical properties of neural tissue in which they are placed and the damage must be assessed. Neural interfacing involves temporary regeneration of biomaterial scaffolds or chronic electrodes and must manage the body's response to foreign materials. Microelectrode arrays are recent advances that can be used to study neural networks(Cullen & Pfister 2011). Optical neural interfaces involve optical recordings and optogenetics stimulation that makes brain cells light sensitive. Fiber optics can be implanted in the brain to stimulate and record this photon activity instead of electrodes. Two-photon excitation microscopy can study living neuronal networks and the communicatory events among neurons (Potter 2012).
Brain computer interfaces seek to directly communicate with human nervous system to monitor and stimulate neural circuits as well as diagnose and treat intrinsic neurological dysfunction. Deep brain stimulation is a significant advance in this field that is especially effective in treating movement disorders such as Parkinson's disease with high frequency stimulation of neural tissue to suppress tremors(Lega et al. 2011).
Neural microsystems can be developed to interpret and deliver electrical, chemical, magnetic, and optical signals to neural tissue. They can detect variations in membrane potential and measure electrical properties such as spike population, amplitude, or rate by using electrodes, or by assessment of chemical concentrations, fluorescence light intensity, or magnetic field potential. The goal of these systems is to deliver signals that would influence neuronal tissue potential and thus stimulate the brain tissue to evoke a desired response(He 2005).[citation needed]
Microelectrode arrays are specific tools used to detect the sharp changes in voltage in the extracellular environments that occur from propagation of an action potential down an axon. Dr. Mark Allen and Dr. LaPlaca have microfabricated 3D electrodes out of cytocompatible materials such as SU-8 and SLA polymers which have led to the development of in vitro and in vivo microelectrode systems with the characteristics of high compliance and flexibility to minimize tissue disruption.
Neuroprosthetics are devices capable of supplementing or replacing missing functions of the nervous system by stimulating the nervous system and recording its activity. Electrodes that measure firing of nerves can integrate with prosthetic devices and signal them to perform the function intended by the transmitted signal. Sensory prostheses use artificial sensors to replace neural input that might be missing from biological sources(He 2005). Engineers researching these devices are charged with providing a chronic, safe, artificial interface with neuronal tissue. Perhaps the most successful of these sensory prostheses is the cochlear implant which has restored hearing abilities to the deaf. Visual prosthesis for restoring visual capabilities of blind persons is still in more elementary stages of development. Motor prosthesics are devices involved with electrical stimulation of biological neural muscular system that can substitute for control mechanisms of the brain or spinal cord. Smart prostheses can be designed to replace missing limbs controlled by neural signals by transplanting nerves from the stump of an amputee to muscles. Electrodes placed on the skin can interpret signals and then control the prosthetic limb. These prosthetics have been very successful. Functional electrical stimulation (FES) is a system aimed at restoring motor processes such as standing, walking, and hand grasp(Potter 2012).
Neurorobotics is the study of how neural systems can be embodied and movements emulated in mechanical machines. Neurorobots are typically used to study motor control and locomotion, learning and memory selection, and value systems and action selection. By studying neurorobots in real-world environments, they are more easily observed and assessed to describe heuristics of robot function in terms of its embedded neural systems and the reactions of these systems to its environment(Krichmar 2008).
Neural tissue regeneration, or neuroregeneration looks to restore function to those neurons that have been damaged in small injuries and larger injuries like those caused by traumatic brain injury. Functional restoration of damaged nerves involves re-establishment of a continuous pathway for regenerating axons to the site of innervation. Researchers like Dr. LaPlaca at Georgia Institute of Technology are looking to help find treatment for repair and regeneration after traumatic brain injury and spinal cord injuries by applying tissue engineering strategies . Dr. LaPlaca is looking into methods combining neural stem cells with an extracellular matrix protein based scaffold for minimally invasive delivery into the irregular shaped lesions that form after a traumatic insult. By studying the neural stem cells in vitro and exploring alternative cell sources, engineering novel biopolymers that could be utilized in a scaffold, and investigating cell or tissue engineered construct transplants in vivo in models of traumatic brain and spinal cord injury, Dr. LaPlaca's lab aims to identify optimal strategies for nerve regeneration post injury.
End to end surgical suture of damaged nerve ends can repair small gaps with autologous nerve grafts. For larger injuries, an autologous nerve graft that has been harvested from another site in the body might be used, though this process is time consuming, costly and requires two surgeries. (Schmidt & Leach 2003) Clinical treatment for CNS is minimally available and focuses mostly on reducing collateral damage caused by bone fragments near the site of injury or inflammation. After swelling surrounding injury lessens, patients undergo rehabilitation so that remaining nerves can be trained to compensate for the lack of nerve function in injured nerves. No treatment currently exists to restore nerve function of CNS nerves that have been damaged(Schmidt & Leach 2003).
Engineering strategies for the repair of spinal cord injury are focused on creating a friendly environment for nerve regeneration. Only PNS nerve damage has been clinically possible so far, but advances in research of genetic techniques and biomaterials demonstrate the potential for SC nerves to regenerate in permissible environments.
Advantages of autologous tissue grafts are that they come from natural materials which have a high likelihood of biocompatibility while providing structural support to nerves that encourage cell adhesion and migration. (Schmidt & Leach 2003) Nonautologous tissue, acellular grafts, and extracellular matrix based materials are all options that may also provide ideal scaffolding for nerve regeneration. Some come from allogenic or xenogenic tissues that must be combined with immunosuppressants. while others include small intestinal submucosa and amniotic tissue grafts.(Schmidt & Leach 2003) Synthetic materials are attractive options because their physical and chemical properties can typically be controlled. A challenge that remains with synthetic materials is biocompatibility. (Schmidt & Leach 2003) Methylcellulose based constructs have be shown to be a biocompatible option serving this purpose.(Tate et al. 2001) AxoGen uses a cell graft technology AVANCE to mimic a human nerve. It has been shown to achieve meaningful recovery in 87 percent of patients with peripheral nerve injuries(2012b).
Nerve guidance channels, Nerve guidance conduit are innovative strategies focusing on larger defects that provide a conduit for sprouting axons directing growth and reducing growth inhibition from scar tissue. Nerve guidance channels must be readily formed into a conduit with the desired dimensions, sterilizable, tear resistant, and easy to handle and suture. (Schmidt & Leach 2003) Ideally they would degrade over time with nerve regeneration, be pliable, semipermeable, maintain their shape, and have a smooth inner wall that mimics that of a real nerve. (Schmidt & Leach 2003)
Delivery devices must be biocompatible and stable in vivo. Some examples include osmotic pumps, silicone reservoirs, polymer matrices, and microspheres. Gene therapy techniques have also been studied to provide long-term production of growth factors and could be delivered with viral or non-viral vectors such as lipoplexes. Cells are also effective delivery vehicles for ECM components, neurotrophic factors and cell adhesion molecules. Olfactory ensheathing cells (OECs) and stem cells as well as genetically modified cells have been used as transplants to support nerve regeneration. (LaPlaca et al. 2005, Schmidt & Leach 2003, Tate et al. 2002)
Augmentation of human neural systems, or human enhancement using engineering techniques is another inevitable application of neuroengineering believed to develop within the next few decades. Deep brain stimulation has already been shown to enhance memory recall as noted by patients currently using this treatment for neurological disorders. Brain stimulation techniques are postulated to be able to sculpt emotions and personalities as well as enhance motivation, reduce inhibitions, etc. as requested by the individual. Ethical issues with this sort of human augmentation are a new set of questions that neural engineers have to grapple with as these studies develop(Potter 2012). |
/* -- translated by f2c (version 19940927).
You must link the resulting object file with the libraries:
-lf2c -lm (in that order)
*/
#include "f2c.h"
real snrm2_(integer *n, real *x, integer *incx)
{
/* System generated locals */
integer i__1, i__2;
real ret_val, r__1;
/* Builtin functions */
double sqrt(doublereal);
/* Local variables */
static real norm, scale, absxi;
static integer ix;
static real ssq;
/* SNRM2 returns the euclidean norm of a vector via the function
name, so that
SNRM2 := sqrt( x'*x )
-- This version written on 25-October-1982.
Modified on 14-October-1993 to inline the call to SLASSQ.
Sven Hammarling, Nag Ltd.
Parameter adjustments
Function Body */
#define X(I) x[(I)-1]
if (*n < 1 || *incx < 1) {
norm = 0.f;
} else if (*n == 1) {
norm = dabs(X(1));
} else {
scale = 0.f;
ssq = 1.f;
/* The following loop is equivalent to this call to the LAPACK
auxiliary routine:
CALL SLASSQ( N, X, INCX, SCALE, SSQ ) */
i__1 = (*n - 1) * *incx + 1;
i__2 = *incx;
for (ix = 1; *incx < 0 ? ix >= (*n-1)**incx+1 : ix <= (*n-1)**incx+1; ix += *incx) {
if (X(ix) != 0.f) {
absxi = (r__1 = X(ix), dabs(r__1));
if (scale < absxi) {
/* Computing 2nd power */
r__1 = scale / absxi;
ssq = ssq * (r__1 * r__1) + 1.f;
scale = absxi;
} else {
/* Computing 2nd power */
r__1 = absxi / scale;
ssq += r__1 * r__1;
}
}
/* L10: */
}
norm = scale * sqrt(ssq);
}
ret_val = norm;
return ret_val;
/* End of SNRM2. */
} /* snrm2_ */
|
This notable memoir via a number one Russian scientist who labored for many years on the nerve middle of the top-secret "Biopreparat" bargains a chilling investigate the organic guns application of the previous Soviet Union, vestiges of which nonetheless exist this day within the Russian Federal Republic. Igor Domaradskij calls himself an "inconvenient man": a committed scientist yet a nonconformist who was once usually in clash with govt and army apparatchiks. during this ebook he unearths the lethal nature of the study he participated in for nearly fifteen years.
Domaradskij is going into nice element in regards to the secrecy, intrigue, and the bureaucratic maze that enveloped the Biopreparat scientists, making them suppose like helpless pawns. What stands proud in his account is the hasty, patchwork nature of the Soviet attempt in bioweaponry. faraway from being a smooth-running, terrifying monolith, this used to be an company cobbled jointly out of the conflicts and contretemps of squabbling get together bureaucrats, army know-nothings, and stressed, formidable scientists. In many ways the inefficiency and shortage of responsibility during this method make all of it the extra scary as a global probability. For at the present time its dimensions are nonetheless now not totally recognized, neither is it yes that anybody team is totally accountable for the proliferation of this deadly weaponry.
Biowarrior is annoying yet beneficial examining for a person wishing to appreciate the character and dimensions of the organic risk in an period of overseas terrorism.
What can human bones let us know of a person’s existence, or perhaps loss of life? How can info from bones resolve mysteries either glossy and historical? And what makes the examine of skeletonised human is still so critical in southern Africa? The solutions to those and different questions are contained in lacking & Murdered, which lays naked the attention-grabbing global of forensic anthropology.
Major paleontologist David Archibald explores the wealthy background of visible metaphors for organic order from precedent days to the current and their impact on people' belief in their position in nature. in particular, Archibald makes a speciality of ladders and bushes, and the 1st visual appeal of timber to symbolize seasonal existence cycles. |
Field of the Invention
The present invention relates to a measurement apparatus for measuring the shape of an object to be measured, a calculation method, a system, and a method of manufacturing an article.
Description of the Related Art
There is a known measurement apparatus which projects line pattern light such as that of a space coding method onto an object to be measured via a projecting unit such as a projector, and obtains three-dimensional coordinates from the principle of triangulation based on the position of reflected light obtained by an imaging unit. In this measurement apparatus, the measurement result is readily influenced by the material of an object to be measured.
For example, a resin is sometimes handled as an object to be measured in the field of industrial production. When an object to be measured is a resin, light projected onto the object to be measured enters the interior of the object and is scattered in it, that is, so-called internal scattering occurs. If this internal scattering occurs, the reflected light from the object to be measured contains internal scattered light from the interior of the object, in addition to surface scattered light from the surface of the object. Since the internal scattered light contains scattered light at a distance different from that of the surface scattered light, the measurement apparatus calculates a measurement value different from that of the surface position of the object. Therefore, the internal scattered light appears as a systematic error in the measurement apparatus, and decreases the measurement accuracy.
Accordingly, a technique for reducing the influence of internal scattering is proposed in “S. K. Nayer et al. Fast Separation of Direct and Global Components of a Scene Using High Frequency Illumination. SIGGRAPH July, 2006.” (literature 1). In this technique, pattern light including bright and dark portions and having a spatially high frequency is projected onto a resin as an object to be measured, and the intensity distribution in the dark portion containing an internal scattering component is subtracted from the intensity distribution in the bright portion containing a surface scattering component and the internal scattering component. As described above, literature 1 describes that reducing the internal scattering component from the intensity distribution in the bright portion makes it possible to reduce an error (systematic error) by which three-dimensional coordinates obtained by the measurement apparatus systematically shift in the direction of the interior of an object to be measured.
Unfortunately, literature 1 has no practical disclosure concerning the relationship between the spatial frequency of the pattern light and the internal scattering or surface scattering. For example, when the spatial frequency of the pattern light is low, the intensity distribution in the dark portion contains no internal scattering component, so the internal scattering component contained in the intensity distribution in the bright portion cannot properly be removed. On the other hand, when the spatial frequency of the pattern light is high, the bright portion spatially expands when an optical point image intensity distribution containing defocusing is taken into account, so the intensity distribution in the dark portion contains the surface scattering component. If the intensity distribution in the dark portion is subtracted from that in the bright portion, therefore, the surface scattering component is also subtracted from the intensity distribution in the bright portion, so the internal scattering component cannot properly be removed. As described above, literature 1 cannot always optimally reduce the influence of internal scattering in an object to be measured, that is, the systematic error which decreases the measurement accuracy of the measurement apparatus. |
If you eat, sleep and breathe soccer, these pants are for you! Great soccer ball design and comfortable fleece make it easy to lounge, or whatever else you like, while rocking your passion for the game. 100% polyester microfiber fleece. Made in USA. |
Course Details
Designed to improve students' skill, confidence and judgment in use of science in policy applications. Using case studies, real-world examples, and in-class exercises, in the areas of atmospheric and energy policy, the emphasis is on preparing both non-scientists and scientists to use, understand, and critique science in environmental policy applications. Exercises are scaled to the student's background.
Other Requirements:
Open to Graduate Students Only.
Other information:
This class will meet from 2/3/2014 to 3/15/2014. For more information on WWS Graduate Course, please see our WWS website: http://wws.princeton.edu/grad/course_offerings/. |
import store from '../'
export function onRobots (robots) {
store.commit('updateRobots', robots)
}
|
The analysis seems to depend heavily on Nokia customers moving from Symbian phones to Windows devices, rather than to Androids, iPhones or BlackBerrys. The iPhone won't lose any significant market share -- it just won't gain any because Android is poised to rise even further and Microsoft's Nokia deal will fuel growth in WP7, IDC says.
"Up until the launch of Windows Phone 7 last year, Microsoft has steadily lost market share while other operating systems have brought forth new and appealing experiences," IDC analyst Ramon Llamas said in a press release. "The new alliance brings together Nokia's hardware capabilities and Windows Phone's differentiated platform. We expect the first devices to launch in 2012. By 2015, IDC expects Windows Phone to be [the] number 2 operating system worldwide behind Android."
How will this happen? IDC's analysis shows projected market share for 2011 and 2015. Nokia's Symbian mobile OS will drop from its 2011 share of 20.9% to only 0.2% by 2015, IDC said. Windows Phone 7 and Windows Mobile will rise from 5.5% in 2011 to 20.9% in 2015.
The iPhone, meanwhile, will drop from 15.7% to 15.3% over the next four years, and BlackBerry will decline from 14.9% to 13.7%. The Android boom will continue, moving from 39.5% market share in 2011 to 45.4% in 2015. iPhone and Android should both see significant revenue boosts because the smartphone market is growing so rapidly, with 450 million smartphones expected to ship in 2011 compared to 303 million in 2010.
IDC places a lot of faith in Nokia's power to tilt the market in Microsoft's favor, saying, "Nokia's recent announcement to shift from Symbian to Windows Phone will have significant implications for the smartphone market going forward."
But Microsoft may need help from more than just Nokia in order to turn things around, if the rise of Android is any indicator. Google's Android replicated the functionality of the iPhone, but instead of getting lost in the shuffle it soared past Apple by offering a wide variety of phones from various hardware manufacturers on all major carrier networks. But Android just had to beat the iPhone -- Windows Phone 7 will have to beat the iPhone while dozens of Android devices also call out to consumers.
Microsoft finds itself in the underdog role several years after CEO Steve Ballmer scoffed at the iPhone, saying, "There's no chance that the iPhone is going to get any significant market share." Last year, Ballmer was forced to admit, "We were ahead of this game and now we find ourselves No. 5 in the market ... We missed a whole cycle."
For what it's worth, IDC's numbers aren't the only ones available for measuring smartphone market share. Some even show greater progress for Windows than IDC is finding. The Nielsen Company says Windows already has 10% of the smartphone market, and also shows a different picture for Android, iPhone and BlackBerry. According to Nielsen, Android has 29% share followed by 27% each for Apple iOS and BlackBerry.
IDC predicts immediate growth for Android, saying that Android was in second place in 2010 (apparently behind Symbian) but will have twice as much market share as any competitor in 2011. |
Q:
load_model and Lamda layer in Keras
How to load model that have lambda layer?
Here is the code to reproduce behaviour:
MEAN_LANDMARKS = np.load('data/mean_shape_68.npy')
def add_mean_landmarks(x):
mean_landmarks = np.array(MEAN_LANDMARKS, np.float32)
mean_landmarks = mean_landmarks.flatten()
mean_landmarks_tf = tf.convert_to_tensor(mean_landmarks)
x = x + mean_landmarks_tf
return x
def get_model():
inputs = Input(shape=(8, 128, 128, 3))
cnn = VGG16(include_top=False, weights='imagenet', input_shape=(128, 128, 3))
x = TimeDistributed(cnn)(inputs)
x = TimeDistributed(Flatten())(x)
x = LSTM(256)(x)
x = Dense(68 * 2, activation='linear')(x)
x = Lambda(add_mean_landmarks)(x)
model = Model(inputs=inputs, outputs=x)
optimizer = Adadelta()
model.compile(optimizer=optimizer, loss='mae')
return model
Model compiles and I can save it, but when I tried to load it with load_model function I get an error:
in add_mean_landmarks
mean_landmarks = np.array(MEAN_LANDMARKS, np.float32)
NameError: name 'MEAN_LANDMARKS' is not defined
Аs I understand MEAN_LANDMARKS is not incorporated in graph as constant tensor. Also it's related to this question: How to add constant tensor in Keras?
A:
You need to pass custom_objects argument to load_model function:
model = load_model('model_file_name.h5', custom_objects={'MEAN_LANDMARKS': MEAN_LANDMARKS})
Look for more info in Keras docs: Handling custom layers (or other custom objects) in saved models
.
|
Q:
Exact sequence of groups: proof of injectivity
There must be a duplicate being the question very introductory, but I was not able to find it.
We have the following diagram
$$\begin{array}{ccccccccc}
1&\to& H &\to & G &\overset{\pi}{\to} & G/H &\to & 1\\
&& \downarrow & & \downarrow f && \downarrow g & & \\
1&\to& H' &\to & G'& \overset{\pi'}{\to} & G'/H' &\to & 1\\
\end{array}$$
Suppose that
$f$ is homomorphism
$H'\triangleleft G'$
$H=f^{-1}(H')$
$H\triangleleft G$
$f$ is surjective
Prove that $g$ is an isomorphism.
Since $g\circ\pi=\pi'\circ f$ and $\pi,\pi',f$ are surjective, then $g$ is surjective.
The problem is with injectivity. (A) From $g(aH)=g(bH)$ I should derive $aH=bH$. Or (B) prove that $\operatorname{ker} g=\{H\}$.
(A) Working backwards I get
$$
aH=bH
\iff
a^{-1}b\in H
\iff
f(a^{-1}b)\in H'\\
\iff
(f(a))^{-1}f(b)\in H'
\iff
f(a)H'=f(b)H'
$$
Now, if $g(aH)=g(bH)$ how do I get $f(a)H'=f(b)H'$?
Method (B) would probably be nicer, but no idea how to start.
A:
To prove directly that $\DeclareMathOperator\Ker{Ker}\Ker g$ is trivial, note that
\begin{align}
\pi^{-1}\Ker g
&=\Ker(g\circ\pi)\\
&=\Ker(\pi'\circ f)\\
&=f^{-1}\Ker\pi'\\
&=f^{-1}H'\\
&=H
\end{align}
Since $\pi$ is surjective, we get
$\Ker g=\pi[\pi^{-1}\Ker g]=\pi[H]=\{1\}$.
|
From 69682de06816de9b9014441d23bda1918ee2e2fb Mon Sep 17 00:00:00 2001
From: Mike Gilbert <[email protected]>
Date: Sun, 19 Jan 2020 16:57:45 -0500
Subject: [PATCH] Avoid multiple-definiton with gcc -fno-common
GCC 10 enables -fno-common by default.
Bug: https://bugs.gentoo.org/705896
---
src/rpc_com.h | 3 +--
src/svc.c | 3 +++
2 files changed, 4 insertions(+), 2 deletions(-)
diff --git a/src/rpc_com.h b/src/rpc_com.h
index 10bec79..76badef 100644
--- a/src/rpc_com.h
+++ b/src/rpc_com.h
@@ -61,8 +61,7 @@ void __xprt_unregister_unlocked(SVCXPRT *);
void __xprt_set_raddr(SVCXPRT *, const struct sockaddr_storage *);
-SVCXPRT **__svc_xports;
-int __svc_maxrec;
+extern int __svc_maxrec;
#ifdef __cplusplus
}
diff --git a/src/svc.c b/src/svc.c
index b59467b..6db164b 100644
--- a/src/svc.c
+++ b/src/svc.c
@@ -57,6 +57,9 @@
#define max(a, b) (a > b ? a : b)
+static SVCXPRT **__svc_xports;
+int __svc_maxrec;
+
/*
* The services list
* Each entry represents a set of procedures (an rpc program).
--
2.25.0
|
Q:
how to disable a tag not having any class?
I have a problem with the following codes. I want to disable third span that display posts counter that have been viewed by users. How can i fix it?
span i.mdi.mdi-eye:display:none;
<div class="post-meta">
<span></span>
<span></span>
<span><i class="mdi mdi-eye"></i></span>
</div>
A:
You can select every third element with the nth-child() selector. Since you don't have more elements in there it works like intended. Better would be to use the i class selector though and hide the i.
div.post-meta :nth-child(3) {
display: none;
}
<div class="post-meta">
<span></span>
<span></span>
<span><i class="mdi mdi-eye">10</i></span>
</div>
|
New naming rights sponsor for Hampton Downs 500
With a new format and a new naming rights sponsor the return of the Australian GT Championship to Hampton Downs looks set to be one of the big events of this year’s motorsport calendar.
Laser Plumbing & Electrical has been confirmed as the naming rights sponsor for the Hampton Downs 500 on October 28-29.
The event doubles as the penultimate round of the Australian Endurance Championship and will feature some of the finest GT production cars in the world including Audi, Aston Martin, BMW, Ferrari, Lamborghini, Porsche, Nissan, McLaren and Mercedes.
Last year’s Hampton Downs 101 marked the first time the Australian GTs raced at the Waikato track and the event proved to be a big hit with teams, drivers and fans alike.
Scott Carr, the General Manager of the Laser Group in New Zealand says they were impressed with last year’s event and with the facilities at Hampton Downs. In Australia, the Laser Group has sponsored four times Bathurst winner Steven Richards in his BMW GT for the last few years but this is their first time sponsoring a motorsport event in New Zealand.
“There were a lot of sports we considered but this opportunity was very well crafted by the team at Hampton Downs,” says Carr. “We jumped at the chance to be associated with such an exciting event.”
“For us it’s a different channel to market and a great way to get our brand out there. We do a lot of radio advertising and this gives us a different dimension including TV exposure in New Zealand and Australia. It’s something new for us and we’re looking forward to a great weekend of racing.”
Tony Quinn, the owner of Hampton Downs and the Australian GT Championship, said the commitment from the Laser Group is a good reflection on the event.
“It shows that we delivered last year and we’re planning an even bigger and better event this year,” says Quinn. “They’ve committed to us so now we have to deliver and give them value for money.”
The naming rights deal coincides with a new format for the Hampton Downs event. Last year the cars raced over 101 laps. This year an extra 20 laps have been added to create a five hundred kilometre race, the Laser Plumbing & Electrical Hampton Downs 500.
“That may not sound a lot but it means there will be a third pit stop and two driver changes which will mean a change in strategy for the teams,” explains Quinn. “It will also have implications for tyres and fuel. We’re also getting rid of the compulsory timed pit stops which were used to handicap the faster drivers which means it will be a true endurance test.”
The Hampton Downs 500 will be the first leg of the New Zealand 1001. The second leg will be the Highlands 501 at Highlands Motorsport Park from November 11-12 which also doubles as the final round of the Australian Endurance Championship.
“The Bathurst 1000 has always been a special race for me and I liked the idea of going one better, hence the New Zealand 1001,” explains Quinn. |
Curious Collections: A Borne Botfly
As he hiked out of his field site in French Guiana in August 1999, Curator Rob Voss was heedlessly unaware of freeloaders hitched to his back. But soon after returning to New York, he felt pinpricks and noticed that two red spots were widening. He sought help.
“The dermatologist promptly said that I had myiasis, a fly larva burrowing in my skin, rapidly shot me full of lidocaine, and pulled out a chunk of my back,” says Voss. “He even kept the maggot! I decided to bring the second one to term.”
So hatched a unique plan to add a specimen of Dermatobia hominis to the Museum’s collection. Restricted to the American tropics, adult botflies hijack a mosquito mid-air to carry their eggs for them. The larvae enter their hosts—typically monkeys or kinkajous rather than humans—through the mosquito’s puncture.
Over two months, Voss bonded with the botfly. “It’s the closest that I’ve come to gestating,” he says. “It has a daily rhythm. There were moments of excruciating pain, especially at 2 or 3 in the morning when it seemed to be moving.”
By mid-October, the pain ceased. His wife, Curator Nancy Simmons, and their son Nick could see the pinky-sized larva, ringed with hooks, hanging out near the surface of his back. Fortuitously, they also saw the maggot heave itself out of the hole before collecting it in a jar and placing it next to a warm flue until, just after Thanksgiving, an adult fly emerged.
In the wild, botfly larvae burrow into warm soil before pupating and emerging as a fly. Voss donated the fly and its pupal case to the collections of the Division of Invertebrate Zoology, where the “pristine specimen” is stored with other flies of the Cuterebridae. The wound healed rapidly. “Within a few weeks, you could not see where it had been,” he says. “But I have a scar from the first one.”
This story originally appeared in the Summer issue of Rotunda, the Member magazine. |
227 F.2d 330
Franklin Santos BOHOL and Henry Torres Dias, Appellants,v.UNITED STATES of America, Appellee.
No. 14725.
United States Court of Appeals Ninth Circuit.
November 18, 1955.
George Y. Kobayashi, Honolulu, Hawaii, for appellants.
Louis B. Blissard, U. S. Atty., Charles B. Dwight, III, Asst. U. S. Atty., Honolulu, Hawaii, Lloyd H. Burke, U. S. Atty., San Francisco, Cal., for appellee.
Before BONE and LEMMON, Circuit Judges, and HARRISON, District Judge.
PER CURIAM.
1
Appellants appeal from convictions for the sale of narcotics in four counts.
2
Bohol submitted himself as a witness. To sustain him as such his counsel inquired as to whether he had been "convicted once for possession of marijuana". He stated that he had on one occasion. Appellants complain of the cross-examination which follows and which is set forth in the footnote.1 They claim that the prosecutor knew that the conviction in the District Court of the Territory had been appealed to the Territorial Circuit Court where Bohol was entitled to a trial de novo and that in that court a nolle prosequi was entered. There are four ready answers to this: (1) No proper objection was made. Counsel for appellants merely stated "I object" without stating any grounds for his objection. (2) Defendant opened up the matter of prior conviction and the prosecutor was well within his rights in inquiring further into the matter. (3) Bohol admitted a second conviction and is here in no position to ask for a reversal because of his own failure to bring out the fact of the nolle prosequi. (4) For the purpose of impeachment it was proper to inquire into the prior conviction in the territorial district court. Wigmore on Evidence, 3d ed., volume 4, Sec. 1270, pages 538-539, and cases there cited. As to reversal of judgment, op. cit., volume 2, Sec. 523, page 616. Cf. op. cit., volume 2, Sec. 521, note 2, page 614.
3
The judgment is affirmed.
Notes:
1
"Q. (By Mr. Blissard): Mr. Bohol, when were you convicted of marijuana? A. It was '51
"Q. 1951? A. 1951.
"Q. Is that the only time you have been convicted of a marijuana or narcotic offense? A. Yes, sir.
"Q. Weren't you convicted in the District Court in Honolulu in 1953 again for possession of marijuana? A. You mean since? Marijuana seeds?
"Q. Were you convicted in 1953 for the possession of marijuana seeds? Is that what you are saying?
"Mr. Kobayashi: Your Honor, I object. If counsel knows anything about these convictions — I don't know about these convictions.
"The Court: I assume that Mr. Blissard knows what he is doing, Mr. Kobayashi.
"Q. (By Mr. Blissard): Were you or were you not convicted in July, 1953, for possession of marijuana? A. Yes.
"Q. So you had been convicted twice? A. But I didn't go to jail for it.
"Q. You didn't go to jail for it?"
|
Q:
What is the ORM for Android with support @Inheritance(strategy = InheritanceType.SINGLE_TABLE)?
I am developing an android chat application, I have several types of messages inherited from a single abstract class. I want to get a list of different types of chat messages. I think I need an ORM with inheritance support with a SINGLE_TABLE strategy. Is there an ORM for Android with support for this functionality? Or, perhaps, you will advise how to solve this problem using the ORM without SINGLE_TABLE support?
Examples:
public abstract class AbstractMessage implements MessageListContent, Serializable, Comparable<AbstractMessage> {
public enum Status {
DELIVERED,
SENDING_AND_VALIDATION,
NOT_SENDED,
INVALIDATED
}
private SupportedMessageListContentType supportedType = SupportedMessageListContentType.UNDEFINED;
private boolean iSay;
private long timestamp;
private Status status = Status.SENDING_AND_VALIDATION;
private String transactionId;
private String companionId;
// getters and setters
//...
}
public class BasicMessage extends AbstractMessage {
private String text;
private transient Spanned htmlText;
// getters and setters
//...
}
public class TransferMessage extends AbstractMessage {
private BigDecimal amount;
// getters and setters
//...
}
A:
I don't know if you know a lot about ORM's in android, but, two of the most famous ORM's for Android are Room and Realm. And these two could achieve what you want. But, don't take my word on realm, as I am only going to state what my friend told me about realm.
For starters, Room runs in SQLite and Realm in NoSQL. Now, I assume that you know greatly about inheritance and polymorphism, this concept could also be applied to SQL. This is, taking in account that you choose SQLite. Now for realm, it is a different story tho. My friend told me that the polymorphism of your models answers to the polymorphism of the database. Though, I highly doubt that, but I don't like realm, so don't take my word for it.
For choosing your database, I will be frank to tell you to choose SQLite and to help you decide, here is a simple site that currated reasons on which is better, SQL or NoSQL: http://www.nosql-vs-sql.com/
|
If you ride the 501 Queen streetcar, chances are you've endured spotty service along its route that extends from the Beach to the border of Etobicoke.
The TTC has heard your complaints loud and clear and says it will be making significant changes to the legendary route to "make it more reliable and more frequent."
The 501 Queen is the longest streetcar route in the city and one of the longest in North America. But it is also a continuing source of rider complaints, with overcrowding, short-turning and irregular service topping the list. In fact, the TTC admits on its website that "the 501 Queen streetcar has long had problems maintaining reliable service."
"Service will be added at busy off-peak times to reduce crowding, and service over the entire route — from Neville Park to Long Branch — will operate every 10 minutes-or-better, all day, every day," the TTC says on its site.
Here are the upcoming changes:
From 5 a.m. to 10 p.m., the route will be temporarily split into two sections, operating between Long Branch Loop and Humber Loop, and between Neville Park and Humber Loop. Customers will transfer between the two routes at Humber Loop.
And from 10 p.m. to 2 a.m., some trips will be scheduled to operate from Neville Park to Long Branch, while some trips turn back at Humber Loop.
From 2 a.m. to 5 a.m., t he 301 Queen Blue Night service will operate between Neville Park and Long Branch. |
Q:
Guice @Provides Methods vs Provider Classes
I'm working on a fairly large project that has a lot of injections. We're currently using a class that implements Provider for each injection that needs one, and they mostly have one line get methods.
It's starting to get annoying to create a new class every time I need a new provider. Is there any benefit to using provider classes over @Provides methods in my Module or vice-a-versa?
A:
As far as I know, they're exactly equivalent for most simple cases.
/**
* Class-style provider.
* In module: bind(Foo.class).annotatedWith(Quux.class).toProvider(MyProvider.class);
*/
class MyProvider implements Provider<Foo> {
@Inject Dep dep; // All sorts of injection work, including constructor injection.
@Override public Foo get() {
return dep.provisionFoo("bar", "baz");
}
}
/**
* Method-style provider. configure() can be empty, but doesn't have to be.
*/
class MyModule extends AbstractModule {
/** Name doesn't matter. Dep is injected automatically. */
@Provides @Quux public Foo createFoo(Dep dep) {
return dep.provisionFoo("bar", "baz");
}
@Override public void configure() { /* nothing needed in here */ }
}
In either style, Guice lets you inject Foo and Provider<Foo>, even if the key is bound to a class or instance. Guice automatically calls get if getting an instance directly and creates an implicit Provider<Foo> if one doesn't exist. Binding annotations work in both styles.
The main advantage of @Provides is compactness, especially in comparison to anonymous inner Provider implementations. Note, however, that there might be a few cases where you'd want to favor Provider classes:
You can create your own long-lived Provider instances, possibly with constructor parameters, and bind keys to those instances instead of to class literals.
bind(Foo.class).toProvider(new FooProvisioner("bar", "baz"));
If you're using a framework compatible with JSR 330 (javax.inject), you can easily bind to javax.inject.Provider classes or instances. com.google.inject.Provider extends that interface.
bind(Foo.class).toProvider(SomeProviderThatDoesntKnowAboutGuice.class);
Your Provider may be complex enough to factor into its own class. Depending on how you've structured your tests, it may be easier to test your Provider this way.
Providers can extend abstract classes. It may not be easy or intuitive to do this with @Provides methods.
You can bind several keys to the same Provider directly. Each @Provides method produces exactly one binding, though you could bind other keys to the key (@Quux Foo here) and let Guice do a second lookup.
Providers are easy to decorate or wrap, if you wanted to (for instance) cache or memoize instances without using Guice scopes or bindings.
bind(Foo.class).toProvider(new Cache(new FooProvisioner("bar", "baz")));
IMPORTANT: Though this is a good strategy for classes that Guice can't create, bear in mind that Guice can automatically create and inject a Provider<T> for any T that you bind in any way, including to a class name, key, or instance. No need to create an explicit provider unless there's actual logic of your own involved.
|
//========= Copyright Valve Corporation, All rights reserved. ============//
//
// Purpose: provide client-side access to the new particle system, with similar
// usage to CSimpleEmitter
//
// $NoKeywords: $
//===========================================================================//
#ifndef PARTICLES_NEW_H
#define PARTICLES_NEW_H
#ifdef _WIN32
#pragma once
#endif
#include "particlemgr.h"
#include "particles/particles.h"
#include "particlesphererenderer.h"
#include "smartptr.h"
#include "particles_simple.h"
#include "tier1/utlobjectreference.h"
//-----------------------------------------------------------------------------
// Particle effect
//-----------------------------------------------------------------------------
class CNewParticleEffect : public IParticleEffect, public CParticleCollection, public CDefaultClientRenderable
{
public:
DECLARE_CLASS_NOBASE( CNewParticleEffect );
DECLARE_REFERENCED_CLASS( CNewParticleEffect );
public:
friend class CRefCountAccessor;
// list management
CNewParticleEffect *m_pNext;
CNewParticleEffect *m_pPrev;
// Call this before adding a bunch of particles to give it a rough estimate of where
// your particles are for sorting amongst other translucent entities.
void SetSortOrigin( const Vector &vSortOrigin );
bool ShouldDraw( void );
virtual bool IsTransparent( void );
virtual bool IsTwoPass( void );
virtual bool UsesPowerOfTwoFrameBufferTexture( void );
virtual bool UsesFullFrameBufferTexture( void );
const QAngle& GetRenderAngles( void );
const matrix3x4_t& RenderableToWorldTransform();
void GetRenderBounds( Vector& mins, Vector& maxs );
// check if the new bounds of the particle system needs its client-leaf info needs to be updated
void DetectChanges( void );
const Vector &GetRenderOrigin( void );
PMaterialHandle GetPMaterial( const char *name );
bool RecalculateBoundingBox();
Particle* AddParticle( unsigned int particleSize, PMaterialHandle material, const Vector &origin );
const char *GetEffectName();
void SetDontRemove( bool bSet );
void SetDrawn( bool bDrawn );
void SetFirstFrameFlag( bool bFirst );
void SetNeedsBBoxUpdate( bool bNeedsUpdate );
void SetAutoUpdateBBox( bool bNeedsUpdate );
void SetRemoveFlag( void );
bool GetRemoveFlag( void );
bool GetFirstFrameFlag( void );
bool GetNeedsBBoxUpdate( void );
bool GetAutoUpdateBBox( void );
bool ShouldPerformCullCheck() const;
void MarkShouldPerformCullCheck( bool bEnable );
CBaseEntity *GetOwner( void ) { return m_hOwner; }
void SetOwner( CBaseEntity *pOwner ) { m_hOwner = pOwner; }
CNewParticleEffect* ReplaceWith( const char *pParticleSystemName );
static CSmartPtr<CNewParticleEffect> Create( CBaseEntity *pOwner, const char *pParticleSystemName,
const char *pDebugName = NULL );
static CSmartPtr<CNewParticleEffect> Create( CBaseEntity *pOwner, CParticleSystemDefinition *pDef,
const char *pDebugName = NULL );
virtual int DrawModel( int flags );
void DebugDrawBbox ( bool bCulled );
// CParticleCollection overrides
public:
void StopEmission( bool bInfiniteOnly = false, bool bRemoveAllParticles = false, bool bWakeOnStop = false );
void SetDormant( bool bDormant );
void SetControlPoint( int nWhichPoint, const Vector &v );
void SetControlPointEntity( int nWhichPoint, CBaseEntity *pEntity );
void SetControlPointOrientation( int nWhichPoint, const Quaternion &q );
void SetControlPointOrientation( int nWhichPoint, const Vector &forward, const Vector &right, const Vector &up );
void SetControlPointForwardVector( int nWhichPoint, const Vector &v );
void SetControlPointUpVector( int nWhichPoint, const Vector &v );
void SetControlPointRightVector( int nWhichPoint, const Vector &v );
FORCEINLINE EHANDLE const &GetControlPointEntity( int nWhichPoint )
{
return m_hControlPointOwners[ nWhichPoint ];
}
// IParticleEffect overrides
public:
virtual void SimulateParticles( CParticleSimulateIterator *pIterator )
{
}
virtual void RenderParticles( CParticleRenderIterator *pIterator )
{
}
virtual void SetParticleCullRadius( float radius );
virtual void NotifyRemove( void );
virtual const Vector & GetSortOrigin( void );
// virtual void NotifyDestroyParticle( Particle* pParticle );
virtual void Update( float flTimeDelta );
// All Create() functions should call this so the effect deletes itself
// when it is removed from the particle manager.
void SetDynamicallyAllocated( bool bDynamic = true );
virtual bool ShouldSimulate() const { return m_bSimulate; }
virtual void SetShouldSimulate( bool bSim ) { m_bSimulate = bSim; }
int AllocateToolParticleEffectId();
int GetToolParticleEffectId() const;
CNewParticleEffect( CBaseEntity *pOwner, const char *pEffectName );
CNewParticleEffect( CBaseEntity *pOwner, CParticleSystemDefinition *pEffect );
virtual ~CNewParticleEffect();
protected:
// Returns nonzero if Release() has been called.
int IsReleased();
// Used to track down bugs.
const char *m_pDebugName;
bool m_bDontRemove : 1;
bool m_bRemove : 1;
bool m_bDrawn : 1;
bool m_bNeedsBBoxUpdate : 1;
bool m_bIsFirstFrame : 1;
bool m_bAutoUpdateBBox : 1;
bool m_bAllocated : 1;
bool m_bSimulate : 1;
bool m_bShouldPerformCullCheck : 1;
int m_nToolParticleEffectId;
Vector m_vSortOrigin;
EHANDLE m_hOwner;
EHANDLE m_hControlPointOwners[MAX_PARTICLE_CONTROL_POINTS];
// holds the min/max bounds used to manage this thing in the client leaf system
Vector m_LastMin;
Vector m_LastMax;
private:
// Update the reference count.
void AddRef();
void Release();
void RecordControlPointOrientation( int nWhichPoint );
void Construct();
int m_RefCount; // When this goes to zero and the effect has no more active
// particles, (and it's dynamically allocated), it will delete itself.
CNewParticleEffect( const CNewParticleEffect & ); // not defined, not accessible
};
//-----------------------------------------------------------------------------
// Inline methods
//-----------------------------------------------------------------------------
inline int CNewParticleEffect::GetToolParticleEffectId() const
{
return m_nToolParticleEffectId;
}
inline int CNewParticleEffect::AllocateToolParticleEffectId()
{
m_nToolParticleEffectId = ParticleMgr()->AllocateToolParticleEffectId();
return m_nToolParticleEffectId;
}
// Call this before adding a bunch of particles to give it a rough estimate of where
// your particles are for sorting amongst other translucent entities.
inline void CNewParticleEffect::SetSortOrigin( const Vector &vSortOrigin )
{
m_vSortOrigin = vSortOrigin;
}
inline const Vector &CNewParticleEffect::GetSortOrigin( void )
{
return m_vSortOrigin;
}
inline bool CNewParticleEffect::ShouldDraw( void )
{
return true;
}
inline bool CNewParticleEffect::IsTransparent( void )
{
return CParticleCollection::IsTranslucent();
}
inline const QAngle& CNewParticleEffect::GetRenderAngles( void )
{
return vec3_angle;
}
inline const matrix3x4_t & CNewParticleEffect::RenderableToWorldTransform()
{
static matrix3x4_t mat;
SetIdentityMatrix( mat );
PositionMatrix( GetRenderOrigin(), mat );
return mat;
}
inline Vector const &CNewParticleEffect::GetRenderOrigin( void )
{
return m_vSortOrigin;
}
inline PMaterialHandle CNewParticleEffect::GetPMaterial(const char *name)
{
//!!
Assert( 0 );
return NULL;
}
inline Particle* CNewParticleEffect::AddParticle( unsigned int particleSize, PMaterialHandle material, const Vector &origin )
{
//!!
Assert( 0 );
return NULL;
}
inline const char *CNewParticleEffect::GetEffectName()
{
return GetName();
}
inline void CNewParticleEffect::SetDontRemove( bool bSet )
{
m_bDontRemove = bSet;
}
inline void CNewParticleEffect::SetDrawn( bool bDrawn )
{
m_bDrawn = bDrawn;
}
inline void CNewParticleEffect::SetFirstFrameFlag( bool bFirst )
{
m_bIsFirstFrame = bFirst;
}
inline void CNewParticleEffect::SetDynamicallyAllocated( bool bDynamic )
{
m_bAllocated = bDynamic;
}
inline void CNewParticleEffect::SetNeedsBBoxUpdate( bool bNeedsUpdate )
{
m_bNeedsBBoxUpdate = bNeedsUpdate;
}
inline void CNewParticleEffect::SetAutoUpdateBBox( bool bNeedsUpdate )
{
m_bAutoUpdateBBox = bNeedsUpdate;
}
inline void CNewParticleEffect::SetRemoveFlag( void )
{
m_bRemove = true;
}
inline bool CNewParticleEffect::GetRemoveFlag( void )
{
return m_bRemove;
}
inline bool CNewParticleEffect::GetFirstFrameFlag( void )
{
return m_bIsFirstFrame;
}
inline bool CNewParticleEffect::GetNeedsBBoxUpdate( void )
{
return m_bNeedsBBoxUpdate;
}
inline bool CNewParticleEffect::GetAutoUpdateBBox( void )
{
return m_bAutoUpdateBBox;
}
inline bool CNewParticleEffect::ShouldPerformCullCheck() const
{
return m_bShouldPerformCullCheck;
}
inline void CNewParticleEffect::MarkShouldPerformCullCheck( bool bEnable )
{
m_bShouldPerformCullCheck = bEnable;
}
inline CSmartPtr<CNewParticleEffect> CNewParticleEffect::Create( CBaseEntity *pOwner, const char *pParticleSystemName, const char *pDebugName )
{
CNewParticleEffect *pRet = new CNewParticleEffect( pOwner, pParticleSystemName );
pRet->m_pDebugName = pDebugName;
pRet->SetDynamicallyAllocated( true );
return pRet;
}
inline CSmartPtr<CNewParticleEffect> CNewParticleEffect::Create( CBaseEntity *pOwner, CParticleSystemDefinition *pDef, const char *pDebugName )
{
CNewParticleEffect *pRet = new CNewParticleEffect( pOwner, pDef );
pRet->m_pDebugName = pDebugName;
pRet->SetDynamicallyAllocated( true );
return pRet;
}
//--------------------------------------------------------------------------------
// If you use an HPARTICLEFFECT instead of a cnewparticleeffect *, you get a pointer
// which will go to null when the effect is deleted
//--------------------------------------------------------------------------------
typedef CUtlReference<CNewParticleEffect> HPARTICLEFFECT;
#endif // PARTICLES_NEW_H
|
Rúben Dias , Gedson e Pizzi estão na lista de Fernando Santos para os encontros marcados, para este mês de outubro, diante da Polónia (2.ª jornada da Liga das Nações) e da Escócia (preparação). O Benfica é, a par do Wolverhampton, o clube mais representado neste elenco.
Depois da chamada de 31 de agosto – altura em que se estreou na convocatória da Seleção Nacional A – Gedson, médio do Benfica, volta a merecer a confiança de Fernando Santos. Com apenas 19 anos, fez a estreia com a camisola das Quinas no dia 6 de setembro, ao entrar aos 89’ no jogo de carácter particular com a Croácia (1-1), no Estádio Algarve.
Como consequência de uma época 2017/18 de sonho, Rúben Dias foi incluído, em março, pelo selecionador nacional Fernando Santos no lote de 23 jogadores escolhidos para representar Portugal no Mundial 2018. Sete meses depois, o defesa-central de 20 anos, agora com três internacionalizações A, volta a ser opção do selecionador nacional.
Também Pizzi torna a ser opção para o meio-campo. O camisola 21 do Benfica que já conta com seis golos marcados esta época (dois para a Liga dos Campeões e quatro para a Liga NOS) voltou a merecer a confiança de Fernando Santos, naquela que poderá ser a sua 12.ª internacionalização pela Seleção A.
Na lista de 25 jogadores são, ao todo, nove aqueles que tiveram passagem pelo Caixa Futebol Campus. A Gedson e Rúben Dias juntam-se Cancelo, Mário Rui, Renato Sanches, Bernardo Silva, Gonçalo Guedes, Danilo e Hélder Costa.
A Seleção Nacional A defronta a Polónia em Chorzow no dia 11, para a 2.ª jornada da Liga das Nações (19h45 portuguesas), deslocando-se depois à Escócia, onde no dia 14 jogará frente à equipa da casa, em Glasgow (17h00).
Lista de convocados
GUARDA-REDES | Beto (Goztepe), Cláudio Ramos (Tondela) e Rui Patrício (Wolverhampton);
DEFESAS | Cédric Soares (Southampton), João Cancelo (Juventus), Kevin Rodrigues (Real Sociedad), Luís Neto (Zenit), Mário Rui (Nápoles), Pedro Mendes (Montpellier), Pepe (Besiktas) e Rúben Dias (Benfica);
MÉDIOS | Bruno Fernandes (Sporting), Danilo Pereira (FC Porto), Gedson (Benfica), Pizzi (BENFICA), Renato Sanches (Bayern), Rúben Neves (Wolverhampton), Sérgio Oliveira (FC Porto) e William Carvalho (Bétis);
AVANÇADOS | André Silva (Sevilha), Bernardo Silva (Manchester City), Bruma (RB Leipzig), Éder (Lokomotiv Moscovo), Gonçalo Guedes (Valência) e Hélder Costa (Wolverhampton).
Texto: Filipa Fernandes Garcia
Fotos: SL Benfica / FPF |
Corpus Christi Man Gets 27 Years for Producing Child Pornography
CORPUS CHRISTI, Texas – A 29-year-old man has been ordered to federal prison following his conviction of sexual exploitation of a child, announced U.S. Attorney Kenneth Magidson. Edward Lopez Jr. pleaded guilty Oct. 17, 2016.
Today, Senior U.S. District Judge John D. Rainey took into consideration the testimony of a psychologist and the nature of the crime committed against the most vulnerable, an eight-year-old child, and handed Lopez a sentence of 326 months in federal prison. Additional information was also presented today, including a letter the victim had written to Lopez which was read in open court. In handing down the sentence, Judge Rainey stated that the crime Lopez committed was, indeed, a heinous crime. Lopez was further ordered to serve the rest of his life on supervised release following completion of his prison term, during which time he will have to comply with numerous sex offender prohibitions designed to restrict his access to children. He will also be ordered to register as a sex offender.
Lopez came to the attention of law enforcement after authorities learned of the sexual assault of a minor female child. The child was identified and confirmed the abuse and Lopez was identified as the perpetrator.
Authorities executed a search warrant at Lopez’s residence and seized several electronic media storage devices. Forensic examination of his cellular telephone resulted in the discovery of a video of the minor female child involved in sexually explicit conduct with the Lopez. Photographs of a minor female child involved in sexually explicit conduct were also found on his cellular telephone.
Lopez was arrested on the federal charges in February 2016 and has been in federal custody since that time where he will remain pending
transfer to a U.S. Bureau of Prisons facility to be determined in the near future.
The FBI and Corpus Christi Police Department’s Internet Crimes Against Children Task Force conducted the investigation.
This case, prosecuted by Assistant U.S. Attorneys Elsa Salinas and Brittany Jensen, was brought as part of Project Safe Childhood, a nationwide initiative launched in May 2006 by the Department of Justice to combat the growing epidemic of child sexual exploitation and abuse. Led by the United States Attorneys' Offices and the Criminal Division's Child Exploitation and Obscenity Section, Project Safe Childhood marshals federal, state and local resources to locate, apprehend and prosecute individuals who sexually exploit children, and to identify and rescue victims. For more information about Project Safe Childhood, please visitwww.usdoj.gov/psc. For more information about internet safety education, please visitwww.usdoj.gov/pscand click on the tab "resources." |
Popular Kitchen Designs
Popular Kitchen Designs
Most homes offer a gathering place for family and friends to get together. In most cases its the kitchen. In order to have the design of your dreams you must consider the necessities for the perfect kitchen. Here are some helpful tips on popular kitchen designs.
With the number of kitchen design ideas it could be challenging to select the right design for you. There are many free resources that can help you such as visiting a showroom, reading magazines, or feel free to contact Tanen Homes. When it comes to home design the kitchen can add value to your home if it is done right. So lets explore a few custom kitchen designs that might be right for you.
A country kitchen with pot racks, wood cabinetry and open shelves. Country kitchens offer a warm inviting feeling and is also called early american or colonial kitchens.
A contemparary style has clean simple lines. Usually cabinets are stylish for today’s modern family and folks. Contemporary kitchen offers practical sophgistication and style.
French Country – offers plenty of wood and soft colors. Natural materials are used as the same as large furniture with ornate carvings. A french country kitchen offers elegance and style.
As you can see these are just a few of the options you have when building your custom kitchen and creating a kitchen design. You should consider the style of the rest of the home. Colors, materials and quality craftmanship are important when designing homes. For more information on a custom kitchen design or to have your dream home built contact Tanen Homes today.
Tanen Homes creates the finest in custom built homes, luxury homes, estates, and horse properties located in West Palm Beach and surrounding areas. |
public int UpdateProductsWithTransaction(Northwind.ProductsDataTable products)
{
// Mark each product as Modified
products.AcceptChanges();
foreach (Northwind.ProductsRow product in products)
product.SetModified();
// Update the data via a transaction
return UpdateWithTransaction(products);
} |
Q:
PHP - Use pdo fetch multiple times
I have below query:
//Get the data
$stmt = $dbh->prepare("
SELECT t1.*, t2.*
FROM softbox_bookings_data t1
LEFT JOIN softbox_bookings t2 ON t1.booking_id = t2.id
WHERE t2.id=:id
GROUP BY t1.model
ORDER BY t2.time ASC");
$stmt->bindParam(":id", $_GET["id"]);
$stmt->execute();
$data = $stmt->fetchAll();
Now I want to be able to use above query multiple times.
First I want to just echo out a variable:
echo $data["name"]; //Returns nothing
Then further down the page, I want to loop the data:
foreach($data as $row){
echo $row["name"]; //Successfully echoes out the name from the database.
}
How come I can't use the echo $data["name"] variable and the foreach() statement to run through the data?
A:
Turn on error reporting and always use var_dump instead of echo when checking variable values. The latter will only print strings, but data is a two-dimensional array. Just check the var_dump output.
BTW: Of course echo "returns" nothing, its return type is void.
|
D.C. Elections Board: Results Slow Because We're Cautious
The D.C. Board of Elections and Ethics had not released any election results as of 10 p.m., two hours after polls closed in the District.
At board headquarters in Judiciary Square, officials had fed an initial batch of cartridges into machines to be tabulated at about 9:30 p.m., said D.C. Council member Mary Cheh (D-Ward 3), who was on the scene. A printout of those partial results was made, Cheh added, but they were not released to the public.
Cheh speculated that the board was trying to double-check results after the debacle in the September primary elections, when thousands of phantom write-in votes were tabulated. Officials blamed a faulty cartridge from a single voting precinct for the problem.
Though an internal investigation could not confirm why the malfunction occurred, a panel concluded that workers were reading computer memory card cartridges too quickly. The panel also chided the board for releasing the results without reviewing them.
"I was told by the board out of caution they're vetting it and vetting it and vetting it," Cheh said. "I've told them it's turning out to be an embarrassment. Every jurisdiction across the country is releasing results."
Cheh said she was told by the board that results were imminent. Board spokesman Daniel Murphy said, "They are checking and rechecking everything. We want to make sure what we're putting out is accurate and correct."
Murphy said officials are loading the cartridges with great care.
"At this point, we are trying to be slow and deliberate," he said.
A dozen people, including candidates for the State Board of Education and for Advisory Neighborhood Commission positions, sat around waiting. Tempers flared when officials refused to allow about a dozen ballot observers to watch the tabulating process at the same time, citing a lack of space. Instead, they were rotated through the room.
"This is ridiculous," said Shelore C. Williams, a Ward 1 school board candidate. "Obama will be president by the time we get our results." |
Q:
Seleium/Ruby - NoSuchElement when trying to access an item in a modal popup
What I'm attempting:
Click on a the profile picture of a user that I previously created: http://screencast.com/t/AJCFI3XA
Click on and make a selection from a drop down in the pop up modal:
http://screencast.com/t/AHGOHlG05
The selenium IDE picks up the steps as:
click > id=patientPhoto
selectWindow > name=modal3 (NOTE that the modal number changes and increases exponentially, if i run these steps again the next time around it's modal4)
click > id=ext-gen115 click > //div[@id='ext-gen179']/div[2]
This playback in the ide works without issue.
My code:
@driver.find_element(:id, "patientPhoto").click
wait_for { displayed?(:id, "ext-gen31") }
@driver.find_element(:id, "ext-gen31").click
@driver.find_element(:xpath, "//div[@id='ext-gen179']/div[2]").click
In other places/workflows I have to do the switch to default content then switch to frame trick:
@driver.switch_to.default_content
@driver.switch_to.frame('chartFrame')
but no combination of that is working here.
Other things I've tried:
1. Switch to the last window like this: @driver.switch_to.window(@driver.window_handles.last) # this doesn't fail but the step after this (finding the drop down) fails
2. @driver.switch_to.frame('modal4') then attempt to access the items in the modal # this fails i think because the modal number keeps changing
Here's the page coding - http://screencast.com/t/OSIIgjxDbLk
The selenium errors I get vary based on what I'm attempting but it's either timeout or cannot find element.
A:
If there is an iframe with dynamic id, try to use following line of code to switch to it:
@driver.switch_to.frame(@driver.find_element(:xpath, "//iframe[contains(@id, 'modal')]"))
|
Your first Zombie Film
No one here can deny that they don't enjoy zombie films, the zombie lore as a whole affects us at a personal level. I know every time I watch a zombie movie, I always talk about how I would have survived in that situation with my friends. We decide if what they did was smart, if the characters would have actually survived or not, what we would have done differently from the situation given, etcetera, etcetera.
Now, I remember even before I began watching zombie films, my friend and I wanted to make our own movie, so we wanted to know how the pros did it, the only film including zombies I had watched before Dawn of the Dead (2004) was Scooby-Doo on Zombie Island. It scared me as a kid, and I couldn't watch it, even though the zombies didn't even do anything other than walk around and be dead.
The original Dawn of the Dead when I was 14 =P it got me over my initial fear of zombies, which in turn helped me pluck up the courage to play Resident Evil 2 and the rest is history. At the time though the movie taught me that holding out in a shopping mall of all things is suicide, trying to do stupid acrobatics will get you bit, oh and of course aim for the head when shooting.
Another thing it did was make me realize my fear of zombie kids....Yeah I wouldn't be able to put a zombie kid down I'd have to run/sneak away and hope i'm not followed. On the subject of Day of the Dead that movie always makes me look away because some deaths are just that grotesque not in a i'm about to blow chunks way but jesus christ he's got his head torn off kind of way despite that I love Day especially Bub =P
@DXP Yeah, I basically had the same experience, I was scared of zombies, Resident Evil 0 was frightening for me, then I saw both Dawn of the Dead's and I felt pretty comfortable with zombies and decided to take on Resident Evil 0 & 4. If it hasn't been for that I wouldn't be here.
The 1990 remake of Night of the living dead. Its fantastic and better than the original imo. I was only 7 or 8 when I watched it and it literally scared the shit outta me. Next would have been the original Day of the dead, my second favorite zombie film btw, scared the shit out of my and my friends when we were kids. Good times.
I heard that Romero and his friends didn't know much about copywriting so the film was reproduced by different filmmakers using the same title. I never saw any of them, but I don't doubt that they were good. But even George A's famous promotional poster belonged to someone else, and the woman sued him for a ton of cash.
And I will never have low regards for the original Day of the Dead. It was the first film that made me think that Zombie movies can actually get psychological. Both Dawn of the Dead's seemed rather mindless, and Night of the Living Dead just seemed like a downward spiral of crap that would never progress.
I honestly had a bit of trouble finding my first zombie movie. I only remembered the Finnish title, "Zombien suudelma" (Zombie's Kiss) but neither of those names gave me any results on google. After going through a list of zombie movies made in the 90s I finally found it:
My Boyfriend's Back. It's a 1993 movie about a guy who comes back from the dead to see his love interest. I saw it back when I was in elementary school (no idea what age) and what I remember best from it is when a guy tries to kill the zombie he manages to chuck the axe he was swinging to his own head, thus killing himself. Then there was the kiss at the end, of course.
What made finding this even more confusing was that its original title in the theatres was Johnny Zombie.
Wow, everyone saw zombie films at such a young age… what made you keep watching the film? I know if I saw Dawn of the Dead at that age I would probably walk out.
I saw Scooby Doo on Zombie Island when it first came out and I was terrified by it, the scene where Scooby and Shaggy are messing around with the first zombie and they pop his he's off cause they think its a mask scared the crap out of me. But I honestly can't consider that my first Zombie film. They were never trying to survive and bunker down while killing flesh eating zombies, there's no hypothetical when the zombies don't even attack you. By the end of the movie I even forgot that they were apart of it, it took a sequence to remind me that there were zombies in the movie.
I think if the movie revolves around the idea of zombies/zombification, it is a zombie movie by default.
I was a wimpy kid and couldn't watch anything horror, though it still drew me to it. My Boyfriend's Back is just such a silly movie that it never got scary. I don't think there's even blood at any point, not even when the guy hacked himself with an axe. The zombie does lose parts when he starts decomposing but he doesn't bleed either.
He did crave for human flesh, though. I remember seeing a couple of dead bodies.
I suppose I just don't want to admit thy Scooby Doo was my first zombie film. I mean its that and I don't really feel that it counts. It's a cartoon with corny fart jokes and stuff. It had more to do with Ghosts than zombies in the end.
My Boyfriend's Back actually sounds like a weird concept for a movie but it could be done well, like Fido, a boy and his pet zombie sounds bad on paper, I've never watched it, but my friend tells me it's one of his favorite zombie flicks. But I'm assuming if the main zombie kills himself that just means its hilariously bad. |
[Tumor vaccines and peptide-loaded dendritic cells (DCs)].
Vaccines are usually intended to prevent the spread of infectious diseases. Due to increasing knowledge about the immune system and its role in malignant disease, the development of therapeutic vaccines, which are intended to treat established tumors, has begun. For the induction of therapeutic immunity towards tumors, either tumor-specific or overexpressed antigens can be used. Tumor-specific antigens are mainly or exclusively expressed in tumors. It is assumed that they can thus be more easily recognized by the immune system than overexpressed antigens. Overexpressed antigens are expressed in both tumors and healthy tissues and therefore bear the risk of autoimmunity. In this review article, we discuss different approaches of therapeutic cancer vaccinations based on cells and on other drug substances. Moreover, we address the possibilities of authorizing cancer vaccines in the EU and in Germany. |
Power-supply circuits, such as for example AC-to-DC or DC-to-DC switching power supplies, are well known in the art.
FIG. 1 shows an architecture of a power-supply circuit that supplies at output a supply signal for a load LD.
In the example considered, the power-supply circuit comprises an input stage 10, a switching stage 20, an output stage 30, and a control circuit 40.
For instance, the input stage 10 may comprise a rectifier, such as for example a diode bridge, and/or one or more input filters. For instance, frequently the input stage 10 is configured to receive an input AC or DC voltage, for example via the electrical line M, and supplying at output a DC voltage Vin. In general, in particular when the input voltage M is already a DC voltage, the above filters may also be superfluous, and consequently the input stage 10 is purely optional.
The switching stage 20 consists of an electronic converter comprising at least one electronic switch. There exist many types of electronic converters that are divided mainly into insulated converters and non-insulated converters. For instance, non-insulated electronic converters are converters of the “buck”, “boost”, “buck-boost”, “Cuk”, “SEPIC” and “ZETA” type. Instead, insulated converters are, for example, converters of the “flyback”, “forward”, “half-bridge”, and “full-bridge” type. These types of converters are well known to the person skilled in the art.
Finally, the output stage 30 may comprise filters that stabilize the signal Vout at output from the switching stage 20. In general, these filters may also be included already in the stage 20, and consequently the output stage 30 is purely optional.
In the above architecture, switching of the switch or switches of the switching stage 20 is usually controlled via a control circuit 40, which opens and closes via at least one driving signal DRV for driving the switch or switches of the switching stage 20 as a function of at least one control signal. In general, there may be used:
a) an open-loop control (or forward, or predictive, or feed-forward control) via a control signal FF picked up, for example, on the input of block 10 or block 20; and/or
b) a closed-loop control (or feedback, or backward, control) via a control signal FB picked up, for example, on the output of block 20 or block 30.
For instance, illustrated in FIG. 1 is a feedback of the supply signal at output from block 20, such as for example the output voltage or current. Consequently, in this case, the control circuit 40 can drive the switch or switches of the switching stage 20 in such a way as to reach a desired output voltage or current.
For instance, FIG. 2 illustrates the circuit diagram of a flyback converter that can be used in the stage 20.
As is well known, a flyback converter comprises a transformer T with a primary winding T1 and a secondary winding T2, an electronic switch 204, such as for example an n-channel MOSFET (Metal-Oxide-Semiconductor Field-Effect Transistor) or a bipolar transistor or an IGBT (Insulated-Gate Bipolar Transistor), an output diode Dout, and an output capacitor Cout.
In particular, the transformer T can be modelled as an inductor Lm connected in parallel with the primary winding T1, which represents the magnetization inductance of the transformer T, an inductor Lr connected in series with the secondary winding T2, which represents the dispersion inductance of the transformer T, and an ideal transformer with a given turns ratio 1:n.
In the example considered, the converter 20 receives at input, through two input terminals 202 and GND1, a voltage Vin and supplies at output, through two output terminals 206 and GND2, a voltage Vout and a current iout.
As mentioned previously, the voltage Vin can be obtained also from an alternating current at input, for example via the input stage 10, which comprises a rectifier, such as for example a diode or a diode bridge and possibly one or more filters, such as for example capacitors.
In particular, the first input terminal 202 is connected to the first terminal of the primary winding T1 of the transformer T, and the second input terminal GND1 represents a first ground. Instead, the second terminal of the primary winding T1 of the transformer T is connected through the switch 204 to ground GND1. Consequently, the switch 204 can be used for selectively activating the flow of current through the primary winding T1 of the transformer T.
Instead, the first terminal of the secondary winding T2 of the transformer T is connected through a diode Dout to the first output terminal 208, and the second terminal of the secondary winding T2 of the transformer T is directly connected to a second output terminal GND2 that represents a second ground, which, on account of the insulating effect of the transformer T, is preferably different from the ground GND1 and is consequently represented by a different ground symbol. In general, it is sufficient for the secondary winding T2 and the diode Dout to be connected in series between the terminal 206 and the ground GND2.
Finally, an output capacitor Cout is connected in parallel with the output, i.e., between the terminals 206 and GND2.
Consequently, when the switch 204 is closed, the primary winding T1 of the transformer T is directly connected to the input voltage Vin. This results in an increase in the magnetic flux in the transformer T. Consequently, the voltage across the secondary winding T2 is negative, and the diode Dout is reverse biased. In this condition, the output capacitor Cout supplies the energy required by the load.
Instead, when the switch 204 is open, the energy stored in the transformer T is transferred as flyback current to the load.
As mentioned previously, the control may be in current or in voltage. For this purpose, a control unit 40 is typically used, which drives the switch 204 in such a way that the output voltage Vout or the output current iout is regulated on a desired value. For this purpose, a sensor configured for detecting the current iout or the voltage Vout may be used in a way in itself known.
Typically, the control unit 40 drives the switch 204 with a modulation of a PWM (Pulse-Width Modulation) type, in which the switch 204 is closed during a first operating interval, and the switch 204 is opened during a second operating interval. The person skilled in the art will appreciate that this PWM driving and control of the duration of the operating intervals are well known and may be obtained, for example, via a feedback of the voltage or of the current at output through an error amplifier. For instance, in the case of a current control, the duration of the first interval is increased until the (mean) current at output reaches a predetermined threshold.
With a PWM driving of this sort, there typically exist three operating modes. In particular, if the current in the magnetization inductance Lm never reaches zero during a switching cycle, the converter is said to be operating in CCM (Continuous-Current Mode). Instead, when the current in the magnetization inductance Lm reaches zero during the period, the converter is said to be operating in DCM (Discontinuous-Current Mode). Typically, the converter operates in discontinuous-current mode when the load absorbs a low current, and in continuous-current mode at higher levels of current absorption. The limit between CCM and DCM is reached when the current reaches zero exactly at the end of the switching cycle. This limit case is referred to as “TM” (Transition Mode). Furthermore, there exists the possibility of driving the switch also with a variable switching frequency, such as for example a resonant or quasi-resonant driving, where the switch 204 is switched when the voltage across the electronic switch 204 is zero or reaches a local minimum. Typically, the switching frequency, i.e., the sum of the durations of the operating periods, is fixed for CCM or DCM driving and variable for quasi-resonant driving.
A problem of these switching power-supply circuits is linked to the electronic consumption of the various components.
For instance, typically the control circuit 40 must always remain turned on for detecting the control signals FF and/or FB and for driving the switching stage 20.
However, at low loads, for example in the absence of loads connected to the converter, the feedback signal or signals FB may change even slowly. For this reason, the energy consumption of the control circuit 40 (and of the entire converter) can be reduced by activating and deactivating the control circuit 40 for certain periods. For instance, the control circuit 40 can be set in an energy-saving mode, the so-called “stand-by mode”, and the control circuit 40 can be reactivated periodically and/or as a function of a control signal. Consequently, in this operating mode, the switching stage 20 is not always driven, but switching of the switch or switches of the switching stage 20 is intermittent, and consequently this mode is typically referred to as “burst mode”.
For instance, in the sector of switching power supplies with galvanic insulation between the output voltage and the input voltage, the control feedback is usually obtained by means of an optocoupler device, which, in addition to closing the control loop, enables precisely galvanic insulation to be obtained. The advantage of this solution lies in the fact that the frequency of activation of the control circuit 40 and of the stage 20 depends upon the load of the system. However, frequently this solution is inefficient from the standpoint of consumption in stand-by conditions since the consumption of the feedback network of the optocoupler cannot be eliminated.
Other techniques enable execution of the feedback of the output voltage directly from the primary winding, without the aid of an optocoupler. In these systems, in conditions of zero load, the minimum frequency of the burst mode is typically fixed by the device and is a fixed frequency. In these systems, the switch or switches of the stage 20 must be turned back on periodically in order to transfer to the primary winding the information regarding the value of output voltage.
In particular, when the system is turned back on, it supplies at output a fixed energy that has to be dissipated in order to prevent the system from going out of regulation in the case of very low or zero loads. In order to overcome this problem, frequently a dummy load is inserted at output. The energy to be dissipated mainly depends upon the turning-on frequency, which should not be chosen low at will since between one reactivation of switching and the next the system is “blind”; i.e., there is no information on the state of the output. Once switching has taken place, the system can recognize a variation of the load and respond by supplying the necessary energy. In the worst case, i.e., variation of load from zero to the maximum value, the current absorbed by the load is sustained by the output capacitance, and the voltage drop Vout depends upon the value of this capacitance (the higher it is, the lower the voltage drop), upon the turning-on frequency (low frequencies result in high voltage drops), and upon the maximum current that can be applied at output.
For this reason, it is necessary to establish, in the design stage, a trade-off between consumption in stand-by conditions and the value of the output capacitance. For instance, to achieve dissipation of powers lower 5 mW there is usually required a turning-on period longer than 4 ms, which results in the use of output capacitances of the order of microfarads.
An example of implementation of this control technique from the primary is described, for instance, in the U.S. Pat. No. 6,590,789 (incorporated by reference).
Like classic insulated switching converters with feedback control obtained by means of an optocoupler, also those with feedback obtained by means of a primary winding consequently present considerable limits as regards obtaining high performance in terms of consumption levels in stand-by or zero-load conditions.
A way to overcome the above problem is to provide a system on the secondary, which, in the burst phase, monitors the output voltage Vout and, when this drops below a certain threshold, “wakes up”, by means of an appropriate communication mechanism and wake-up signal, the primary device. In this way, it is possible to obtain low dissipation without the use of high output capacitances.
Since the controller on the secondary is supplied by the output voltage of the converter, it cannot be fully enabled if the output voltage Vout does not reach a given value. In this step, then, since the circuits of the system on the secondary are not driven properly, they could give rise to energy dissipation as well as to the risk of malfunctioning. |
Obama Has Given America Four Years Of Relative Peace. Neo Cons Would Unleash Hell.
Obama Has Given America Four Years Of Relative Peace. Neo Cons Would Unleash Hell.
Who would be so stupid as to elect Mitt Romney and the Neo Cons?
I don't think anyone is that stupid. Sorry.
Obama has wound down Wars signed withdrawal agreements and tried to create a homegrown manufacturing base in Clean Energy.
Romney offers more fealty to Oil companies to dig hole in National parks where we know there is no oil, to keep Americans buying their Saudi Oil. No one stops to think about what will happen if Oil prices sky rocket because of a Gulf War and America has o Alternative energy apparatus set up.
Re: Obama Has Given America Four Years Of Relative Peace. Neo Cons Would Unleash Hell.
Who would be so stupid as to elect Mitt Romney and the Neo Cons?
I don't think anyone is that stupid. Sorry.
Obama has wound down Wars signed withdrawal agreements and tried to create a homegrown manufacturing base in Clean Energy.
Romney offers more fealty to Oil companies to dig hole in National parks where we know there is no oil, to keep Americans buying their Saudi Oil. No one stops to think about what will happen if Oil prices sky rocket because of a Gulf War and America has o Alternative energy apparatus set up.
Re: Obama Has Given America Four Years Of Relative Peace. Neo Cons Would Unleash Hell.
Who would be so stupid as to elect Mitt Romney and the Neo Cons?
I don't think anyone is that stupid. Sorry.
Obama has wound down Wars signed withdrawal agreements and tried to create a homegrown manufacturing base in Clean Energy.
Romney offers more fealty to Oil companies to dig hole in National parks where we know there is no oil, to keep Americans buying their Saudi Oil. No one stops to think about what will happen if Oil prices sky rocket because of a Gulf War and America has o Alternative energy apparatus set up.
Re: Obama Has Given America Four Years Of Relative Peace. Neo Cons Would Unleash Hell.
and the Italian actor, pretending to be Native American, sheds a tear.
it's all fake.
I'm a Libertarian Constitutionalist.
I don't give a shit what you do with your own life, whether you make it a success or a failure, that is the outcome of the choices you make, but please take responsibility for yourself and don't make ME pay for YOUR choices and we're all good.
Re: Obama Has Given America Four Years Of Relative Peace. Neo Cons Would Unleash Hell.
Yep, he sure brought all those troops home in 6 months like he said he would didn't he. He sure shut down Guantanamo. His skilled leadership has also produced heretofore unseen peace throughout the Middle East with the advent of strong democracies taking hold in Egypt, Tunisia, Libya, and Syria. Yep, those countries are now havens of tranquility with pro-USA governments. Thankfully he is also on the way to eradicating our strategic deterrent just as good man of peace like him should. Russia and China will both appreciate it immensely. Keep it up Obama !
Re: Obama Has Given America Four Years Of Relative Peace. Neo Cons Would Unleash Hell.
Who would be so stupid as to elect Mitt Romney and the Neo Cons?
I don't think anyone is that stupid. Sorry.
Obama has wound down Wars signed withdrawal agreements and tried to create a homegrown manufacturing base in Clean Energy.
Romney offers more fealty to Oil companies to dig hole in National parks where we know there is no oil, to keep Americans buying their Saudi Oil. No one stops to think about what will happen if Oil prices sky rocket because of a Gulf War and America has o Alternative energy apparatus set up.
Re: Obama Has Given America Four Years Of Relative Peace. Neo Cons Would Unleash Hell.
You racist anto Obama tards can't turn back the clock. You think by letting the Neo Cons into power to saddle you with taxes to fight wars for corporations that somehow "White power" will reestablish itself but you are wrong. all you wil be doing is alienating the planet from you and sending Americas youth into a buzz saw.
When gas prices go through the roof the American military will have to quit any war that they are in and come home immediately, except for a few atomic subs the whole American military will have to shut down and those subs will have to come home to protect Americas borders.
How short sighted and ignorant could you be to even THINK of letting the Neo Cons back into power.
Oil can't travel through the Gulf if there is a War going on there America has no Alternative Energy because you tards keep fighting Obama.
It doesn't take a genius to see what will happen at home if Oil prices go through the roof because of a War in the Gulf.
Re: Obama Has Given America Four Years Of Relative Peace. Neo Cons Would Unleash Hell.
Yep, he sure brought all those troops home in 6 months like he said he would didn't he. He sure shut down Guantanamo. His skilled leadership has also produced heretofore unseen peace throughout the Middle East with the advent of strong democracies taking hold in Egypt, Tunisia, Libya, and Syria. Yep, those countries are now havens of tranquility with pro-USA governments. Thankfully he is also on the way to eradicating our strategic deterrent just as good man of peace like him should. Russia and China will both appreciate it immensely. Keep it up Obama !
Quoting: Anonymous Coward 12108080
Oh pray tell kind sir, what would the good fortunes of our country be had the almighty Romney taken his throne?
Re: Obama Has Given America Four Years Of Relative Peace. Neo Cons Would Unleash Hell.
You racist anto Obama tards can't turn back the clock. You think by letting the Neo Cons into power to saddle you with taxes to fight wars for corporations that somehow "White power" will reestablish itself but you are wrong. all you wil be doing is alienating the planet from you and sending Americas youth into a buzz saw.
When gas prices go through the roof the American military will have to quit any war that they are in and come home immediately, except for a few atomic subs the whole American military will have to shut down and those subs will have to come home to protect Americas borders.
How short sighted and ignorant could you be to even THINK of letting the Neo Cons back into power.
Oil can't travel through the Gulf if there is a War going on there America has no Alternative Energy because you tards keep fighting Obama.
It doesn't take a genius to see what will happen at home if Oil prices go through the roof because of a War in the Gulf.
Quoting: Anonymous Coward 12672103
Why do parents let their silly children onto GLP to post such ignorant BS. I love O s black ass but I hate his white brain and all the problems it has caused. Racism has never been more prevalent in the past 40 years as Obahmah has stirred up much hate against the average white male.
Obahmah has done perfectly to cause the next World War and thus he will be responsible for millions upon millions of deaths.
Thanks a liberal, thank Obahmah, they are responsible for the blood to come!
Re: Obama Has Given America Four Years Of Relative Peace. Neo Cons Would Unleash Hell.
Tell your "Relative Peace" story to the Afghans (Since he more than tripled the amount of troops there), tell it to the Libyans...who he waged an illegal and unconstitutional war on without the consent of our congress. Tell the Syrians, who he has unleashed Al Queda on (Just when you thought you knew who the enemy was)...
I'm sure all of these people would be very interested in your theories on the relativity of peace...
"And how can a man die better than facing fearful odds, for the ashes of his fathers, and the temples of his Gods..." ~ Horatius
"Because he told the truth, and once you've heard the truth, everything else is just cheap whiskey..."
Re: Obama Has Given America Four Years Of Relative Peace. Neo Cons Would Unleash Hell.
You racist anto Obama tards can't turn back the clock. You think by letting the Neo Cons into power to saddle you with taxes to fight wars for corporations that somehow "White power" will reestablish itself but you are wrong.
Quoting: Anonymous Coward 12672103
And you stupid liberals will saddle us with even more overpaid government employees, with all their vacation time and padded pensions. Obummer already is giving the fucking IRS over half a billion more bucks to manage his shitty healthcare program.
Re: Obama Has Given America Four Years Of Relative Peace. Neo Cons Would Unleash Hell.
Tell your "Relative Peace" story to the Afghans (Since he more than tripled the amount of troops there), tell it to the Libyans...who he waged an illegal and unconstitutional war on without the consent of our congress. Tell the Syrians, who he has unleashed Al Queda on (Just when you thought you knew who the enemy was)...
I'm sure all of these people would be very interested in your theories on the relativity of peace...
Quoting: Saddletramp
1)America has signed a treaty with Afghanistan and Obama i ending Bushs war there, trying to.
2)Obama didn't wage war on Libya America provided logistics to NATO when france jumped the gun in a gold grab to save their sinking nation from debt and to get out of all the money France owed Kaddafi.
3)Al Qaeda is rouge CIA everyone knows that another hold over from Bush and the Neo Cons.
So you got two problems started by the Neo Cons and Bush and NATO that thinks it owns America military. |
Digester Cleaning
A wastewater digester can function at a small percentage of its designed capacity, or even not at all, due to overloading, lack of adequate oxidation time, loss of gas recovery, or invasion of crustacea, grit and trash. When this occurs, immediate and thorough digester cleaning is required.
Our experienced personnel are trained on all the necessary flushing, pumping, venting and safety equipment to quickly and safely remove all organic and inorganic materials that interfere with the operation of the digester. Using pressurized water, they remove, transport and dispose of residual solids. The remaining material is then slurried into a semi-liquid form and easily discharged using pumps that operate at up to 4,500 gpm.
We also have the capabilities and equipment to dewater the removed sludge or other material, allowing for proper landfill disposal. |
‘Chuck’ – ‘Chuck vs. the Baby’: The mother and child reunion
A review of tonight’s “Chuck” coming up just as soon as we actively waste our babysitter…
“I’m not alone.” -Sarah
Fan response to last season’s “Chuck vs. Phase Three” was so strong that another Sarah-centric episode was inevitable in the final season. Yvonne Strahovski hadn’t had a whole lot to do in this final season, but the show finally made up for that with the terrific “Chuck vs. the Baby.” Sarah got to righteously kick some ass again, we got a few more pieces of her origin story, and her larger journey of the series seemed to reach the finish line in the same way Chuck’s did last week.
Early in “Baby,” Morgan reminds Chuck that virtually any time he’s had a disagreement with Sarah on something, Sarah has been right. Well, in this case, she’s not. She’s too accustomed to flying solo, even after all these years as part of Operation Bartowski, and in many ways the climax to this episode isn’t Sarah killing her old handler and reuniting with her mom and adopted sister, but Sarah simply acknowledging that she should have looped Chuck and Casey in sooner. Everything after is just confirmation of how Sarah has gone from being a loner to a person with roots, and friends and family who have her back whether she needs someone to punch out a few goons or someone to babysit little Molly. It’s such a 180 from the person she was when she walked into the Buy More in the pilot that I didn’t even mind the show again revisiting (as we did at the end of season 3’s “Chuck vs. the Nacho Sampler”) the time right before she had to go out to Burbank.(*) That’s who Sarah was then, and this is who she is now, and she’s much happier – and yet still capable of kicking ass, taking names and doing all the things that made her a spy in the first place.
(*) Though the chronology of Sarah’s career, as always, is iffy. She tells Graham that she’s done with handlers, but what happened to her time as Bryce Larkin’s partner? Given the events of the pilot, if Graham is about to send Sarah off to find Chuck, shouldn’t they be spending most of that scene discussing how Bryce went rogue and got killed for his trouble?
The one thing I wonder is the same thing I talked about in last week’s review, which is that we have five episodes to go and it feels like everything has wrapped up fairly neatly. Chuck took out Shaw and proved once and for all that he doesn’t need the Intersect. Sarah has accepted that she can lean on her loved ones in times of need. Alex is taking Morgan back. Chuck and Sarah have decided to stay civilians (though we’ll see whether Casey chooses to stick with them). Jeff’s brain damage has been magically cured. Everyone got their happy ending here. Should I be worrying that these final five episodes are going to undo some or all of the recent bliss? That doesn’t seem very “Chuck,” does it?(**)
(**) As always, I watched this episode with my wife, and when she started worrying about the baby in one early scene, I told her, “This is ‘Chuck.’ Everything will turn out okay,” and she nodded and agreed.
But as for “Chuck vs. the Baby” itself, it was another great hour on the heels of “Santa Suit.” Sarah got to kick ass to an absurd degree in both the past (with lots of action movie flips and two-gun engagements, along with a little homage to “Shoot ‘Em Up” when she began blasting away at the bad guys with the baby strapped to her chest) and the present (where the kitchen fight with Ryker was among the more brutal Sarah’s ever been involved in). But Strahovski also got to show off the vulnerability that’s always made the character into more than just the Giant Blonde She-Male of Thailand. Lots of good work from her here, whether nervously trying to soothe the baby in the past or being overwhelmed with joy at seeing her mom after never expecting to for the rest of her life. In fact, that entire sequence at Chuck and Sarah’s apartment was as infectiously happy as any I can think of in the show’s run. “Chuck” can do a lot of things well, but like another of my favorite shows, “Parks and Recreation,” maybe its most powerful weapon is the ability to put an enormous smile on my face.
We’ll see what Fedak and company have planned for these final five hours, but if it’s going to be an extended victory lap, these two most recent episodes suggest that could be a lot of fun.
Some other thoughts:
* So Chuck is still struggling to scrape together the money to buy their dream house? What happened to the last remnants of the Volkoff fortune? Shouldn’t they have gotten that back once Decker died, and/or when that whole conspiracy was shut down? Or is Beckman taking a “finders keepers” policy on all of this? Either way, that “signing bonus” better have been really big.
* Chuck’s newfound fighting skills weren’t just a one-time thing for the Christmas episode, as he both tackles the runaway waiter and helps Casey take out Ryker’s henchmen. But I appreciated the gag on the sidewalk where he boasts about not needing the Intersect right before the Intersect’s language skills would come in really handy.
* Glad to see that Ellie and Awesome’s spy role playing has continued, but even though the Castle is now property of Carmichael Industries and not the CIA, it still seems weird that Morgan would be hosting a double date there with them and Alex. Will they eventually turn one of the cells into a playroom for Clara?
* This week in “Chuck” music: “The Black Block (Original Mix)” by Modeselektor (Sarah kills a whole lot of dudes on her way to rescuing the baby), “Clowin’ Around” by Deer Tick (Ellie & Awesome try to convince Alex to take Morgan back, and then Sarah waking up in the apartment and telling Chuck the truth); “Life, Oh Life” by Dads (Sarah gives the baby to her mother, and then Sarah reunites with her mom and Molly at the apartment) and “We Are Young” by Fun., featuring Janelle Monae (everyone celebrates at the apartment and Sarah’s mom thanks Chuck for giving her a good life).
* This week in “Chuck” guest stars: Cheryl Ladd is a very appropriate choice to play Sarah’s mom, as she was one of the longest-tenured stars of the original “Charlie’s Angels,” arriving in the second season to replace Farrah Fawcett. As Ryker, Tim DeKay comes with his own “Chuck” connection, as he’s currently co-starring with Matthew Bomer on USA’s “White Collar.”
* This week in “Chuck” plot holes: why would Sarah fall for the tape recording gimmick, given that A)The baby wouldn’t be a baby anymore, and B)She pulled the exact same stunt on Ryker when the baby was actually a baby?
* This week in “Chuck” typos: The LED display on the gizmo in Molly’s room says “RECIEVING COORDINATES.”
Join The Discussion: Log In With
The “baby on tape” moment was among one of the dumbest they’ve ever done. That said, I have no idea who’s been doing the fight choreography this season (has it been the guy who won the Emmy throughout?) but Strahovski’s work was great as always and I’m really impressed by how good Levi has gotten as well.
Always happy to see Tim DeKay in anything, and I thought he was good here.
Great Sarah/Chuck chemistry in this. No silliness, no stupidity, just stuff that made sense. And I’m happy to see any spotlight on Josh Gomez, period.
If the quality level stays here or gets better, then we’re going to have a great series finish.
By: Andrei
01.01.2012 @ 7:07 AM
I thought that too at first, then realized that it was actually a clever move on Ryker’s part – first you hear the baby, then you get confused thinking “why would a 5-year old cry like that?”. Meanwhie, you’re too distracted to see the goon behind you with the club – POW!!
At least, that’s how I’m choosing to look at it…
By: Jonny
12.31.2011 @ 2:10 AM
Sarah beaten up again and looking lovely again. The camera work made me feel like I was watching a Bourne movie too.
By: Build A Better Fan
12.31.2011 @ 2:11 AM
That scene with Graham makes negative sense. In the pilot, Graham tells her that Chuck isn’t a good guy because good guys don’t steal secrets (IIRC). She’s not so sure. Only after it’s revealed that Chuck has the Intersect in his head do they get around to the idea of having to be his handlers.
By: Lev
12.31.2011 @ 6:10 AM
Yeah, it would not have taken much to make it work with the history. Just have Graham allude to the “Bryce” business and that she has to go to Burbank. Everyone watching would no that is road to Chuck. I hate it when a show just can’t bother to make it work when it can work.
By: Charrob58
12.31.2011 @ 2:12 AM
Great episode. But I wondered why Sarah’s mom would call her Sarah instead of her real name, Sam.
By: pamelajaye
12.31.2011 @ 2:17 AM
thank you!
By: Jay Jay
12.31.2011 @ 2:35 AM
If you listen when Sarah’s mom introduces Sarah to her “sister,” she is hesitant to say Sarah as she knows her by her real name, but is not used to actually calling Sarah “Sarah”
By: Hwat
12.31.2011 @ 5:45 AM
Sam can’t be her real name, its too stupid. She must have been lying when she claimed it was!
By: Stan
12.31.2011 @ 2:13 AM
It seems odd that Sarah’s mom would call her Sarah if her real name is Sam, but maybe the creators just abandoned that plot point from the Shaw season.
Also, as much fun as it is to see Sarah kick butt and be heavily featured, I could do without Yvonne getting kicked and punched as much. Just too pretty to take that many hits to the face.
By: Bekah
12.31.2011 @ 2:13 AM
So is the kid Sarah’s? I’m still kind of confused
By: daveminnj
12.31.2011 @ 2:28 AM
no, no, no. she’s the orphaned child of the family
that was killed by the tableful of thugs that she killed.
By: Pug
12.31.2011 @ 2:15 AM
Love Yvonne S. and love Sarah centric episodes but I was a little let down by tonight’s episode. I think the main thing that bothered me was that there wasn’t one part of that story that Sarah couldn’t have told Chuck. Her excuse of “not wanting to put anyone else in danger” wasn’t a very good one. I wasn’t expecting the ‘baby reveal’ to be some huge revelation but this was a pretty big disappointment. Plus, this happened two weeks after Sarah got mad at Chuck for not trusting her when it came to rescuing Ellie and Awesome.
By: Diane
12.31.2011 @ 2:23 AM
I was disappointed, too. I totally agree that she should have told Chuck from the start. There was no reason that she shouldn’t have other than to keep artificial tension in the episode. I also didn’t understand why Shaw would know about the baby or how Sarah’s ex-handler would know where to find Sarah’s mother.
By: pamelajaye
12.31.2011 @ 2:16 AM
What is Sarah’s NAME????
By: valoi
12.31.2011 @ 3:30 AM
sam is her name
By: Jake Collin
12.31.2011 @ 2:25 AM
Outside of a few plot screw-ups (the meeting with Graham that you mentioned being the major one, and what happened to the money that Decker froze?) and Sarah falling for the crying baby bit, I liked “Baby” a hell of a lot more than “Santa Suit”.
Glad Chuck called out Sarah for being stupid. Glad that Sarah is turning down Beckman’s offer to re-join the CIA. Glad they had Sarah actually kill someone.
Tim DeKay was great as the villian, but the whole talk about handlers was annoying. Full blown field operatives, like Sarah was in Budapest, don’t have handlers. Annoying that Fedak won’t do that minimal research.
Strahovski knocked this episode out of the park. She has done some good work on some episodes that has really written Sarah poorly, so it’s good to see her be able to show how good she is when the character is written well.
By: klg19
12.31.2011 @ 2:29 AM
A really good hour, and i have to say the room got very, very dusty at the mother and child reunion.
I’ve chosen to ignore the weirdness of Sarah falling for the crying baby recording (maybe her maternal cluelessness extends to what a crying 5-year-old sounds like??) and I’ve also decided that Sarah told her Mom her name was Sarah back when she dropped off Molly. Because thinking too much on those two glaring oddities will only detract from how lovely this episode was.
By: Scott
12.31.2011 @ 2:34 AM
Anyone else notice that they got through the entire episode without mentioning the name of Sarah’s mom, or revealing Sarah’s full real name?
By: ARF
12.31.2011 @ 2:48 AM
Did anybody else notice the fight scene Sarah had in the beginning was shot like the one the late Brandon Lee did in ‘The Crow’? Seriously, no mention of that?
By: CoolHand719
12.31.2011 @ 2:54 AM
You beat me to it!
By: CoolHand719
12.31.2011 @ 2:53 AM
Besides the homage to Shoot Em Up, it totally felt like the table scene at the beginning was an homage to The Crow, even down to some of Yvonne’s motions being the same as Brandon Lee.
By: Anthony Foglia
12.31.2011 @ 3:10 AM
The plot hole of the week is something much bigger than the tape recorded baby noise–Sarah could have paused if there was another baby in there that she didn’t want to leave like the package was–it’s how the heck did Ryker know where Sarah’s mom was? The mom we had just seen Sarah say was unknown to even the CIA, the mom Sarah had not talked to in five years, must have just popped into Ryker’s rolodex, given how fast he got there.
By: Diane
12.31.2011 @ 3:47 AM
I mentioned that above as well. It really was not explained.
By: maria
01.01.2012 @ 4:29 AM
The only explanation I could come up with is that she included way too many details in her conversation with Chuck, while she was bugged.
By: Ray
01.03.2012 @ 3:56 PM
What I thought was worse was that they went from Hungary to Burbank and somehow Ryker stays in range to listen to the bug.
By: Pamela
12.31.2011 @ 3:25 AM
Enjoyed Tim DeKay’s as Ryker. Great performance as usual. Looking forward to seeing him in the return of White Collar!
By: MrVickiVale
12.31.2011 @ 3:26 AM
To be fair to Sarah, the baby wasn’t in danger…until she mentioned her to Chuck. So maybe she was justified in keeping her secret?
I really enjoyed this episode. When the final season started, I was kind of hoping they would not get too bogged down in plot and instead coast in with, as Alan calls it, a victory lap. I hope the final five episodes continue along this path.
By: Lisa
12.31.2011 @ 4:11 AM
I wonder if the final five episodes will involve the reveal of another working Intersect and Chuck coming to the decision that he has to take it on again. It would bring everything full circle, only this time, everyone important to Chuck would know about the Intersect. Because right now, it’s looking like the show isn’t so much wrapping up, as… I hate to say “petering out,” but they’ve ended seemingly every episode with the friends-and-family gathering under a warm, flattering lighting scheme. Which I love, but I can’t help wanting something a little meatier to end the series. [/full-on crazy mode]
By: Peter
12.31.2011 @ 4:30 AM
Sorry if this was brought up but wasn’t there hints of Sarah having a sister in Season 1? Not sure if the name Molly ever came up though.
By: Audrey
12.31.2011 @ 5:00 AM
Yea, in season one Sarah mentioned a sister while playing a board game, but it wasn’t clear to anyone whether it was just a cover story.
By: Juan
12.31.2011 @ 5:21 AM
Sarah did tell Chuck’s family that she and her sister got sunburned as children. Don’t know if that was just supposed to be a lie or bad continuity or if we’ll meet her finally (doubtful)
By: Lev
12.31.2011 @ 6:13 AM
Its pretty apparent that that sister was just a cover story. Very early in the series, so why not lie before she was truly invested in Chuck.
By: Scott Rosenberg
01.02.2012 @ 7:27 PM
Sarah could have an adult sister, entirely aside from Molly, who just had no bearing on the episode. If the other real sister stayed with Mom when Sarah chose to go on the road with dad, it’s possible they aren’t close. Could have been a cover story, too, but it has nothing to do with Molly.
By: ARF
12.31.2011 @ 4:47 AM
So, eh, no one acknowledged Sarah’s fight scene with those gangsters at the table to be a nod to the late Brandon Lee’s table fight scene in ‘The Crow’? Seriously? No one picked up on that?
By: albatross
12.31.2011 @ 4:59 AM
Not relevant to the episode, but I never fail to laugh out loud whenever I read “Giant Blonde She-Male of Thailand.”
By: steve
12.31.2011 @ 5:19 AM
There’s always been a lot of (relatively minor) plot holes or inconsistencies with Chuck, but I’ve never thought it was a Lost-type production that felt it had to be 100% accurate.
To me, it’s always been a fun and light-hearted hour of action and comedy with occasional drama. Maybe I haven’t focused on the drama because as Alan said, it’s Chuck, everything always works out.
All of that to say that this was one of my favorite episodes. Thought the Devin/Ellie & Alex/Morgan story was perfect and for the first time ever, seeing the evolution of Sarah and the near-ending family scene where her mom sees how she turned out, actually made me a little emotional. I thought it was great.
By: GLT13
12.31.2011 @ 5:46 AM
Hahahaha loved the episode, but just like you, was instantly like “Sooo… Anyone want to tell Sarah her partner is dead?” Still, I was laughing/smiling too much to care.
By: GLT13
12.31.2011 @ 5:48 AM
Hahahahaha Loved the episode, but just like you, was instantly like “Soooo… Anyone want to tell Sarah her partner is dead?” But had laughed and smiled too much by that point to care.
By: Exit8A
12.31.2011 @ 6:22 AM
Um, did anyone else notice the caller id on Sarah’s mother’s cell phone said “Sarah”? If Sarah had already read her mother in, she would probably tell her the name she is currently using (although that might be a stretch). I was really hoping that they would reveal her full name on this episode, though.
Also, has this show really forgotten Bryce Larkin? It just really seems like this show is throwing continuity out the window in favor of ending this show with a bang.
Once again, this shows how underrated Strahovski really is as an actress, and how Fedak and Schwartz hit the lottery by signing this unknown Aussie for this show, you would never think Strahovski is Australian if you only knew her from this show. Personally, I hope Bays and Thomas hire her as The Mother.
Finally, loved Tim DeKay’s appearance on this show, although I was hoping for a Matthew Bomer cameo as the afformentioned Bryce. Hmm, put Levi, Strahovski or Baldwin as a recurring guest on White Collar, doesn’t seem like a bad idea.
By: Lev
12.31.2011 @ 6:51 AM
The producers should just be grateful that the cast is so great across the board – they cover for so many of the clunkier spy/story elements that the producers screw up.
And personally, Strahovski just needs to be a movie star all-ready – she’s way to good to be the mother. I will miss seeing her so often on TV though.
By: Scott Rosenberg
01.02.2012 @ 7:47 PM
She was born Sam, used various pseudonyms, the last of which was Jenny Burton, through her youth, then was given the name Sarah Walker when Graham first recruited her (final scene of CV the Cougars). She would have been going by that name for 5 or 6 years prior to dropping Molly on Mom
By: Miguel
12.31.2011 @ 6:33 AM
Forget the Bartowski curse, the real curse is on Sarah, whose every CIA contact eventually goes rogue.
By: Miguel
12.31.2011 @ 6:33 AM
Forget the Bartowski curse; the real curse is on Sarah, whose every CIA contact goes rogue.
By: gco211
12.31.2011 @ 7:26 AM
Great job by Jenkins and LeFranc to continue turning out high quality episodes with great allusions to past Chuck episodes, despite not being on the show at the beginning. Here, the most brilliant part is the reveal that Sarah did not coin “Don’t freak out,” the phrase she used on Chuck in the pilot and has since been used by just about every character, including Chuck to both Awesome and Morgan when they learned he is a spy. Turns out, Sarah’s mom told her that phrase!
By: troopermsu
12.31.2011 @ 7:37 AM
Chuck’s expression with that little grin at the end while carving on the trim had to be very similar to the look that Fedak and Co. must have had each time NBC ordered more episodes. Kind of, “This is really happening and I can’t believe how lucky I am.”
By: gco211
12.31.2011 @ 8:14 AM
Also, Dawn was the name of Molly’s stuffed animal. Any chance that’s a reference to Buffy the Vampire Slayer, where a sister was also suddenly introduced to the series, or just a weird coincidence, or a funny Zachary Levi ad-lib.
By: klg19
12.31.2011 @ 1:21 PM
Rex was the name of Molly’s stuffed animal. And then Sarah responded with the news that she had a toy dog named Bunny.
By: Tim
12.31.2011 @ 11:51 AM
at the last scene when sarah was given the file about chuck, what was that grey looking box kinda thing? does it have something to do with the next episodes?
By: blingbling
12.31.2011 @ 1:39 PM
The first thing that popped into my mind was the hard drive that Bryce used to transmit the Intersect to Chuck through his computer. But that doesn’t make sense, because at that point Bryce had already done the transmission and that gizmo was destroyed. So you may be on to something.
Just once again, I’d like to say how mean either Warner Brothers or NBC are being not letting us review episodes online this season.
By: Siemon
12.31.2011 @ 4:33 PM
This was the device Bryce used. It was damaged and if you remember Casey brought the damaged device to Graham, before we met Sarah.
By: blingbling
12.31.2011 @ 9:17 PM
Forgot about that!
By: Andre
12.31.2011 @ 12:42 PM
I had much higher expectations for the ‘mother’ episode. I find this quite disappointing, as it barely reveals anything new about Sarah. Maybe the first episode with Jack Burton set the bar too high
By: blingbling
12.31.2011 @ 1:44 PM
Actually, I think Cheryl Ladd and Strahovski had great chemistry throughout the ep. The writers came up with an understandable reason why Sarah couldn’t connect with her or mention her to Chuck, so it was relatively plot-hole free. Believe me, because of the horrible way it was handled (no evidence of a funeral and a widow who’s never expressed realistic grief for him), they still have me wondering if Steve Bartowski is still alive.
At least Sarah’s family situation seems clear to me now.
By: maven 66
12.31.2011 @ 1:48 PM
I can’t believe that a season that started so unpromisingly has gotten this good. I’ve always wanted to see Graham’s loose cannon Agent Walker in action. But the way they introduce new characters and connect them to events in the first season is pure genius. Sarah’s decision to protect the baby Molly helps her transition to the kind of person who could connect with Chuck.
After this episode I’m starting to think that the Chuck finale will be one of the best in TV history easily eclipsing the last episodes of heavyweights like the Sopranos and Lost.
By: the old proofreader
12.31.2011 @ 1:57 PM
“these two most recent episodes suggest that cold be a lot of fun.” You sure you want to point out Chuck typos?
By: Liz
12.31.2011 @ 4:11 PM
The scene with Awesome and Ellie role-playing made me laugh right out loud. Had to rewind a bit so I could hear what I’d missed!
There were some definite plot holes with this one, I agree, but then the ending had me smiling AND sniffling, so as usual I forgave the inconsistencies.
Tim DeKay did a nice job.
I am going to miss this show when it’s gone. So much fun.
By: aloysius
12.31.2011 @ 5:12 PM
I enjoyed the episode overall, but the last scene bothered me. Romantic gestures should not involve damaging other people’s property.
By: Blake
12.31.2011 @ 5:30 PM
A very good episode, much better than last week, because it almost hung together. I’ll overlook the 5-year-old “baby crying” bit. But that ending — I was sure Sarah was going to reveal she had already made a down payment. And maybe she has.
Alan is right that many of these episodes feel like series finales, none more than this. I don’t know where the show goes from here.
It is interesting that they’ve now gone several weeks not only without an Intersect, but barely mentioning it. Is that the goal of this season? I’m sure I’m not the only one who expects Chuck to get it back at some point. Will that be the finale? Or maybe Chuck has to choose to take it or not, and he chooses not?
By: consideract
12.31.2011 @ 9:28 PM
I’m with you about the baby gimmick. It read like a cute writing moment, to bookend the whole thing (he pulls the same trick on her).
With the typo, though, that was clearly a spy thing, the typo was *clearly* manually input by Sarah to prove it was actually her. Not really. ;-}
By: Don
12.31.2011 @ 10:36 PM
If Ryker had no idea where in the world the baby was, it seems kind of convenient that he would happen to be a short driving distance away from Sarah’s mother’s house when he found out. Also, how did he know Sarah’s real identity and where her mother lived?
If it was easy to find out who Sarah’s mother was, you think he might have checked out that avenue at some point in the past five years, if only to take the mother hostage to force Sarah to give up the location of the baby.
But I guess it doesn’t really make sense to get overly logical.
By: Anna
01.01.2012 @ 7:57 AM
I also enjoyed the reappearance of A Question and an Answer for the very ‘Charah’ moment at the end. I feel like we haven’t heard it in a while.
By: SpyTV
01.02.2012 @ 4:56 AM
This is my favorite episode of the season so far.
Regarding some of the mentioned “plot holes”, and I’m just playing Devil’s advocate here, just because she was on a mission with Bryce, how can you conclude that she didn’t have a handler at that time…or that Ryker wasn’t behind the scenes on that mission? I think that’s open to interpretation. I think the last scene, where she is assigned to be Chuck’s handler is probably a plot hole. At that point, her mission was just to retrieve the intersect (and no one knew Chuck had downloaded it at that point). However, I liked way too much about the episode as a whole to let nitpicks like that diminish my enjoyment.
Also, for the record, “receiving” was correctly spelled in the episode. Either that, or my DVR has an autocorrect feature of which I was unaware.
Nice review.
By: Scott Rosenberg
01.02.2012 @ 6:35 PM
Incredibly good episode, on both kick-ass and feel-good planes, but you rightly point out the relative abundance of plot holes and unintentional retconning. More broadly than those concrete examples, it seemed a little late in the game to give Sarah a teachable moment about trust. We’ve seen Sarah learn this lesson both generally and concretely over the years, and while it was certainly plausible for handler to view Sarah as a perpetual loner, I strain to imagine that she wouldn’t feel comfortable telling Chuck what had happened at this point, without even pointing out that surely spies must learn to trust their partners implicitly, because, as proved here, their lives can depend on it.
It felt to me like the writers started with the theme and just made the mistake of keeping it too general, too simplistic. There could have been a more nuanced, developed emotional arc for Sarah and her past, where she does tell Chuck and Casey up front but struggles with the implications. Strahovsky has the acting chops to pull it off, and, given the hot streak the writers have been on with three of the past four episodes, so could they. It’s hard to really feel badly, though, when the episode just feels that damn satisfying.
By: Scott Rosenberg
01.02.2012 @ 6:39 PM
Also, great guest casting, with Cheryl Ladd and especially Tim DeKay
By: Ken
01.08.2012 @ 2:16 AM
OK I know this is late (I’m just catching up on DVR on my Chuck episodes) and kind of geeky and obscure but did anybody notice that they threw a “Wilhelm Scream” ([www.youtube.com]) in the scene where one of the bad guys gets pushed down the stairs? I love those geeky shoutouts the show does. |
Hogson River
The Hogson River is a tributary of the Roper River Between Roper bar and Ngukurr, Northern Territory.
The river is in the Limmen National Park and the traditional owners of the River are the Yukul Australian Aboriginal people.
The river flowed through the now defunct Hundred of Fasque.
References
Category:Rivers of the Northern Territory |
---
abstract: |
Little is known about the global topology of the Fatou set $U(f)$ for holomorphic endomorphisms $f: \mathbb{CP}^k \rightarrow \mathbb{CP}^k$, when $k
>1$. Classical theory describes $U(f)$ as the complement in $ \mathbb{CP}^k$ of the support of a dynamically-defined closed positive $(1,1)$ current. Given any closed positive $(1,1)$ current $S$ on $ \mathbb{CP}^k$, we give a definition of linking number between closed loops in $\mathbb{CP}^k \setminus
{{\rm supp}}S$ and the current $S$. It has the property that if $lk(\gamma,S) \neq
0$, then $\gamma$ represents a non-trivial homology element in $H_1(
\mathbb{CP}^k \setminus {{\rm supp}}S)$.
As an application, we use these linking numbers to establish that many classes of endomorphisms of $\mathbb{CP}^2$ have Fatou components with infinitely generated first homology. For example, we prove that the Fatou set has infinitely generated first homology for any polynomial endomorphism of $\mathbb{CP}^2$ for which the restriction to the line at infinity is hyperbolic and has disconnected Julia set. In addition we show that a polynomial skew product of $\mathbb{CP}^2$ has Fatou set with infinitely generated first homology if some vertical Julia set is disconnected. We then conclude with a section of concrete examples and questions for further study.
address:
- |
Department of Mathematical Sciences\
University of Wisconsin Milwaukee\
PO Box 413\
Milwaukee, WI 53201\
USA
- |
IUPUI Department of Mathematical Sciences\
LD Building, Room 270\
402 North Blackford Street\
Indianapolis, Indiana 46202-3216\
USA
author:
- Suzanne Lynch Hruska$^1$
- 'Roland K. W. Roeder$^2$'
bibliography:
- 'newton.bib'
title: 'Topology of Fatou Components for Endomorphisms of $\mathbb{CP}^k$: linking with the Green’s Current'
---
Introduction
============
Our primary interest in this paper is the topology of the Fatou set for holomorphic endomorphisms of $\mathbb{CP}^k$ (written as ${\ensuremath{{\mathbb{P}}^k}}$ in the remainder of the paper). We develop a type of linking number that in many cases allows one to conclude that a given loop in the Fatou set is homologically non-trivial. One motivation is to find a generalization of the fundamental dichotomy for polynomial (or rational) maps of the Riemann sphere: the Julia set is either connected, or has infinitely many connected components. Further, this type of result paves the way to an exploration of a potentially rich algebraic structure to the dynamics on the Fatou set.
Given a holomorphic endomorphism $f:{\ensuremath{{\mathbb{P}}^k}}\rightarrow {\ensuremath{{\mathbb{P}}^k}}$, the [*Fatou set*]{} $U(f)$ is the maximal open set on which the iterates $\{f^n\}$ form a normal family. The [*Julia set*]{} $J(f)$ is the complement, $J(f) = {\ensuremath{{\mathbb{P}}^k}}\setminus
U(f)$. The standard theory [@FS2; @HP2; @Ueda] gives a convenient description of these sets in terms the [*Green’s current*]{} $T$. Specifically, $T$ is a dynamically defined closed positive $(1,1)$ current with the property that $J(f) = {{\rm supp}}(T)$. We provide relevant background about the Green’s current in Section \[SEC:GREENS\_CURRENT\]. Throughout this paper we assume the degree of $f$ is at least two (i.e. that the components of a lift of $f$ to ${\ensuremath{{\mathbb{C}}}}^{k+1}$, with no common factors, have degree at least two).
Motivated by this description of the Fatou set, in Section \[SEC:LINKING\] we define a linking number $lk(\gamma,S)$ between a closed loop $\gamma \subset
{\ensuremath{{\mathbb{P}}^k}}\setminus {{\rm supp}}\ S$ and a closed positive $(1,1)$ current $S$. In Proposition \[PROP:LINKING\_DEPENDS\_ON\_HOMOLOGY\] we will show that it depends only on the homology class of $\gamma$, and that it defines a homomorphism $$\begin{aligned}
lk(\cdot,S): H_1({\ensuremath{{\mathbb{P}}^k}}\setminus {{\rm supp}}\ S) \rightarrow {\ensuremath{{\mathbb{R}}}}/{\ensuremath{{\mathbb{Z}}}}.\end{aligned}$$ In particular, a non-trivial linking number in ${\ensuremath{{\mathbb{R}}}}/{\ensuremath{{\mathbb{Z}}}}$ proves that the homology class of $\gamma$ is non-trivial. The techniques are based on a somewhat similar theory in [@ROE_NEWTON].
This linking number can also be restricted to loops within any open $\Omega
\subset {\ensuremath{{\mathbb{P}}^k}}\setminus {{\rm supp}}S$, giving a homomorphism $lk(\cdot,S): H_1(\Omega)
\rightarrow {\ensuremath{{\mathbb{R}}}}/{\ensuremath{{\mathbb{Z}}}}.$ If $\Omega$ is the basin of attraction for an attracting periodic point of a holomorphic endomorphism $f:{\ensuremath{{\mathbb{P}}^k}}\rightarrow {\ensuremath{{\mathbb{P}}^k}}$ and $S$ is the Green’s current, we will show in Proposition \[PROP:RATIONAL\_LINKING\] that the image of this homomorphism is contained in ${\ensuremath{{\mathbb{Q}}}}/{\ensuremath{{\mathbb{Z}}}}$. This provides a natural setting to show that, under certain hypotheses, the Fatou set $U(f)$ has infinitely generated first homology:
\[THM:GENERAL\_TECHNIQUE\] Suppose that $f:{\ensuremath{{\mathbb{P}}^k}}\rightarrow {\ensuremath{{\mathbb{P}}^k}}$ is a holomorphic endomorphism and $\Omega
\subset U(f)$ is a union of basins of attraction of attracting periodic points for $f$. If there are $c \in H_1(\Omega)$ with linking number $lk(c,T) \neq 0$ arbitrarily close to $0$ in ${\ensuremath{{\mathbb{Q}}}}/{\ensuremath{{\mathbb{Z}}}}$, then $H_1(\Omega)$ is infinitely generated.
(We prove Theorem \[THM:GENERAL\_TECHNIQUE\] in Section \[SEC:LINKING\].) Note that the hypotheses of Theorem \[THM:GENERAL\_TECHNIQUE\] are satisfied if there are piecewise smooth loops $\gamma \subset \Omega$ with $lk(\gamma,T)
\neq 0$ arbitrarily close to $0$ in ${\ensuremath{{\mathbb{Q}}}}/{\ensuremath{{\mathbb{Z}}}}$. In our applications, we often find a loop $\gamma_0$ with nontrivial linking number, and then take an appropriate sequence of iterated preimages $\gamma_n$ under $f^n$ so that $lk(\gamma_n,T) \rightarrow 0$ in ${\ensuremath{{\mathbb{Q}}}}/{\ensuremath{{\mathbb{Z}}}}$.
In order to apply this theory to specific examples, one needs a detailed knowledge of the geometry of the Green’s Current $T$. In the second half of the paper we consider two situations in which it can be readily applied to provide examples of endomorphism $f$ of ${\ensuremath{{\mathbb{P}}^2}}$ having Fatou set $U(f)$ with infinitely generated homology.
The first situation is for polynomial endomorphisms of ${\ensuremath{{\mathbb{P}}^2}}$, that is, holomorphic maps of ${\ensuremath{{\mathbb{P}}^2}}$ that are obtained as the extension a polynomial map $f(z,w) = (p(z,w),q(z,w))$ on ${\ensuremath{{\mathbb{C}}}}^2$. Such mappings (and their generalizations to ${\ensuremath{{\mathbb{P}}^k}}$) were studied in [@BEDFORD_JONSSON]. Given a polynomial endomorphism $f:{\ensuremath{{\mathbb{P}}^2}}\rightarrow {\ensuremath{{\mathbb{P}}^2}}$, the line at infinity, denoted by $\Pi$, is totally invariant and superattracting. Therefore the restriction of $T$ to $\Pi$ can be understood using the dynamics of the resulting rational map of $f_{|\Pi}$ and its Julia set $J_\Pi$. In Section \[SEC:ENDO\] we prove the following theorem.
\[THM:JPI\_DISCONN\] Suppose that $f$ is a polynomial endomorphism of ${\ensuremath{{\mathbb{P}}^2}}$ with restriction $f_{|\Pi}$ to the line at infinity $\Pi$. If $f_{|\Pi}$ is hyperbolic and $J_\Pi$ is disconnected, then the Fatou set $U(f)$ has infinitely generated first homology.
This theorem provides for many examples of polynomial endomorphisms $f$ of ${\ensuremath{{\mathbb{P}}^2}}$ with interesting homology of $U(f)$. We present one concrete family in Example \[EXAMPLE:RABBITS\].
We then consider the special family of polynomial endomorphisms known as polynomial skew products. While Theorem 1.2 applies to certain polynomial skew products, we develop additional sufficient criteria for $U(f)$ to have interesting homology.
A polynomial skew product is a polynomial endomorphism having the form $f(z,w) = (p(z),
q(z,w))$, where $p$ and $q$ are polynomials. We assume that ${\rm deg}(p) =
{\rm deg} (q) = d$ and $p(z) = z^d + O(z^{d-1})$ and $q(z) = w^d
+O_z(w^{d-1})$, where we have normalized leading coefficients. Since $f$ preserves the family of vertical lines $\{z \} \times {\ensuremath{{\mathbb{C}}}}$, one can analyze $f$ via the collection of one variable fiber maps $q_z(w) = q(z,w)$, for each $z
\in {\ensuremath{{\mathbb{C}}}}$. In particular, one can define fiber-wise filled Julia sets $K_z$ and Julia sets $J_z :=\partial K_z$ with the property that $w \in {\ensuremath{{\mathbb{C}}}}\setminus K_z$ if and only if the orbit of $(z,w)$ escapes vertically to a superattracting fixed point $[0:1:0]$ at infinity.
For this reason, polynomial skew products provide an accessible generalization of one variable dynamics to two variables and have been previously studied by many authors, including Jonsson in [@JON_SKEW] and DeMarco, together with the first author of this paper, in [@S]. In Section \[SEC:SKEW\] we provide the basic background on polynomial skew products and prove:
\[THM:MAIN\] Suppose $f(z,w) = (p(z),q(z,w))$ is a polynomial skew product.
- If $J_{z_0}$ is disconnected for any $z_0 \in J_p$, then $W^s([0:1:0])$ has infinitely generated first homology.
- Otherwise, $W^s([0:1:0])$ is homeomorphic to an open ball.
The first statement is obtained by using Theorem \[THM:GENERAL\_TECHNIQUE\], while the second is obtained using Morse Theory.
For any endomorphism there is also the measure of maximal entropy $\mu = T \wedge T$. Thus another candidate for the name “Julia set” is $J_2 := \text{supp}(\mu)$. The Julia set that is defined as the complement of the Fatou set is sometimes denoted by $J_1$, to distinguish it from $J_2$.
The condition from Theorem \[THM:MAIN\] that for some $z_0 \in {\ensuremath{{\mathbb{C}}}}$, $J_{z_0}$ is disconnected might seem somewhat unnatural. A seemingly more natural condition might be that $J_2$ is disconnected, since for polynomial skew products it is known (see [@JON_SKEW]) that $J_2 = \overline{\bigcup_{z \in J_p} J_z}$. However, in Example \[EXAMPLE:J1DISCONNJ2CONN\] we present certain polynomial skew products with $J_2$ connected, but with the Fatou set having infinitely generated first homology. (These examples are obtained by applying Theorem \[THM:MAIN\] to examples from [@JON_SKEW] and [@S].) In fact, some of these examples persist over an open set within a one-variable holomorphic family of polynomial skew products. Therefore, for polynomial skew products, connectivity of the fiber Julia sets $J_z$ is at least as important as the connectivity of $J_2$ to understanding the homology of the Fatou set.
In Section \[SEC:QUADRATIC\_FAMILY\] we provide an example of a family of polynomial skew products $f_a$ depending on a single complex parameter $a$ with the following property: if $a$ is in the Mandelbrot set $\mathcal{M}$, then the Fatou set $U(f_a)$ is homeomorphic to the union of three open balls, while if $a$ is outside of $\mathcal{M}$ then $H_1(U(f_a))$ is infinitely generated.
Since neither of the sufficient conditions from Theorems \[THM:JPI\_DISCONN\] and \[THM:MAIN\] extend naturally to general endomorphisms of ${\ensuremath{{\mathbb{P}}^k}}$, it remains a mystery what is an appropriate condition for endomorphism to have non-simply connected Fatou set. We conclude Section \[SEC:FURTHER\_APPS\], and this paper, with a discussion of a few potential further applications of the techniques of this paper to holomorphic endomorphisms of ${\ensuremath{{\mathbb{P}}^k}}$.
Acknowledgments {#acknowledgments .unnumbered}
---------------
We thank John H. Hubbard for bringing us and some central ideas together at the start of this project. We have benefited greatly from discussions with many people, including Eric Bedford, Greg Buzzard, Laura DeMarco, Mattias Jonsson, Sarah Koch, Lex Oversteegen, Rodrigo Perez, Han Peters, Enrique Pujals and Nessim Sibony. The second author thanks Mikhail Lyubich and Ilia Binder for their mathematical guidance and financial support while he was a postdoctoral fellow.
We thank the anonymous referee for many helpful comments, particularly those encouraging us to prove stronger statements in Theorems \[THM:MAIN\] and \[THM:QUADRATIC\_FAMILY\].
The Green’s current $T$ {#SEC:GREENS_CURRENT}
=======================
We provide a brief reminder of the properties of the Green’s current that will be needed later in this paper. We refer the reader who would like to see more details to [@FS2; @HP2; @Ueda]. While the following construction works more generally for generic (algebraically stable) rational maps having points of indeterminacy, we restrict our attention to globally holomorphic maps of ${\ensuremath{{\mathbb{P}}^k}}$.
Suppose that $f:{\ensuremath{{\mathbb{P}}^k}}\rightarrow {\ensuremath{{\mathbb{P}}^k}}$ is holomorphic and that the Jacobian of $f$ does not identically vanish on ${\ensuremath{{\mathbb{P}}^k}}$. Then $f$ lifts to a polynomial map $F:{\ensuremath{{\mathbb{C}}}}^{k+1} \rightarrow {\ensuremath{{\mathbb{C}}}}^{k+1}$ each of whose coordinates is a homogeneous polynomial of degree $d$ and so that the coordinates do not have a common factor. It is a theorem that $$\begin{aligned}
\label{EQN:GREEN1}
G(z) = \lim_{n\rightarrow \infty} \frac{1}{d^n} \log ||F^n(z)||\end{aligned}$$ converges to a plurisubharmonic[^1] function $G:{\ensuremath{{\mathbb{C}}}}^{k+1} \rightarrow [-\infty,\infty)$ called the [*Green’s function associated to $f$*]{}. Since $f$ is globally well-defined on ${\ensuremath{{\mathbb{P}}^k}}$ we have that $F^{-1}(0) = 0$. It has been established that $G$ is Holder continuous and locally bounded on ${\ensuremath{{\mathbb{C}}}}^{k+1} \setminus
\{0\}$.
If $\pi:{\ensuremath{{\mathbb{C}}}}^{k+1} \setminus \{0\} \rightarrow {\ensuremath{{\mathbb{P}}^k}}$ is the canonical projection, there is a unique positive closed $(1,1)$ current $T$ on ${\ensuremath{{\mathbb{P}}^k}}$ satisfying $\pi^{*} T = \frac{1}{2\pi} dd^c G$. (This normalization is not uniform–many authors do not divide by $2\pi$.) More explicitly, consider any open set $V
\subset {\ensuremath{{\mathbb{P}}^k}}$ that is “small enough” so that a holomorphic section $\sigma : V
\rightarrow {\ensuremath{{\mathbb{C}}}}^{k+1}$ of $\pi$ exists. Then, on $V$ we have that $T$ is given by $T = \frac{1}{2\pi} dd^c (G \circ \sigma)$. Choosing appropriate open sets covering ${\ensuremath{{\mathbb{P}}^k}}$ and sections of $\pi$ on each of them, the result extends to all of ${\ensuremath{{\mathbb{P}}^k}}$ producing a single closed positive $(1,1)$ current on ${\ensuremath{{\mathbb{P}}^k}}$ independent of the choice of open sets and sections used. See [@SI1 Appendix A.4]. By construction, the Green’s current satisfies the invariance $f^*T = d\cdot T$. (See Section \[SUBSECTION:INVARIANCE\_AND\_RESTRICTION\] for the definition of the pull-back $f^*T$.)
Recall that the Fatou set $U(f)$ is the maximal open set in ${\ensuremath{{\mathbb{P}}^k}}$ where the family of iterates $\{f^n\}$ form a normal family and that the Julia set of $f$ is given by $J(f) = {\ensuremath{{\mathbb{P}}^k}}\setminus U(f)$. A major motivation for studying the Green’s current is the following.
Let $f:{\ensuremath{{\mathbb{P}}^k}}\rightarrow {\ensuremath{{\mathbb{P}}^k}}$ be a holomorphic endomorphism and let $T$ be the Green’s current corresponding to $f$. Then, $J(f) = {{\rm supp}}\ T$.
See, for example, [@FS2 Proposition 4.5] or [@Ueda Theorem 2.2].
\[RMK:AFFINE\_GREENS\_FUNCTION\] If $f$ is a polynomial endomorphism, another form of Green’s function, given by $$\begin{aligned}
\label{EQN:GREEN2}
G_{\rm affine}(z) = \lim \frac{1}{d^n} \log_+ ||f^n(z)||\end{aligned}$$ is often considered in the literature. (Here $\log_+ = \max\{\log,0\}$.) The result is again a PSH function $G:{\ensuremath{{\mathbb{C}}}}^k \rightarrow [0,\infty)$.
We can relate $G_{\rm affine}$ to $G$ in the following way. Consider the open set $V={\ensuremath{{\mathbb{C}}}}^k \subset {\ensuremath{{\mathbb{P}}^k}}$. Using the section $\sigma(z_1,\cdots,z_k) = (z_1,\cdots,z_k,1)$, we find $G_{\rm
affine}(z_1,\cdots,z_k) = G \circ \sigma(z_1,\cdots,z_k)$ because $||F^k \circ
\sigma||$ only differs from $||f^k||$ by a bounded amount for each iterate $k$.
Therefore, if $f$ is a polynomial endomorphism of ${\ensuremath{{\mathbb{P}}^k}}$, one can compute $T$ on ${\ensuremath{{\mathbb{C}}}}^k$ using the formula $T = \frac{1}{2\pi} dd^c G_{\rm affine}$.
Note that formulae (\[EQN:GREEN1\]) and (\[EQN:GREEN2\]) are independent of the norm $\|\cdot \|$ that is used since any two norms are equivalent up to a multiplicative constant.
\[RMK:GREEN\_1D\] When $k = 1$, the resulting Green’s current is precisely the measure of maximal entropy $\mu_f$ whose support is the Julia set $J(f) \subset {\ensuremath{{\mathbb{P}}^1}}$. If $f$ is a polynomial, then $\mu_f$ also coincides with the harmonic measure on $K(f)$, taken with respect to the point at infinity.
Linking with a closed positive $(1,1)$ current in ${\ensuremath{{\mathbb{P}}^k}}$. {#SEC:LINKING}
==================================================================================
Suppose that $S$ is an (appropriately normalized) closed positive $(1,1)$ current on ${\ensuremath{{\mathbb{P}}^k}}$ and $\gamma \subset {\ensuremath{{\mathbb{P}}^k}}\setminus {{\rm supp}}(S)$ is a piecewise smooth closed loop. We will define a linking number $lk(\gamma,S) \in {\ensuremath{{\mathbb{R}}}}/
{\ensuremath{{\mathbb{Z}}}}$, depending only on the homology class $[\gamma] \in H_1({\ensuremath{{\mathbb{P}}^k}}\setminus
{{\rm supp}}(S))$.
Classical linking numbers in $\mathbb{S}^3$ {#SUBSEC:CLASSICAL_DEF}
-------------------------------------------
Classically one considers the linking number of two oriented loops $c$ and $d$ in $\mathbb{S}^3$. The linking number $lk(c,d) \in \mathbb{Z}$ is found by taking any oriented surface $\Gamma$ with oriented boundary $c$ and defining $lk(c,d)$ to be the signed intersection number of $\Gamma$ with $d$ as in Figure \[LINK\]. For this and many equivalent definitions of linking number in $\mathbb{S}^3$ see [@ROLF pp. 132-133], [@BO_TU pp. 229-239], and [@MILNOR_TOP Problems 13 and 14].
\[LINK\]
(0,0)
\#1\#2\#3\#4\#5[ @font ]{}
(1577,1103)(1519,-966) (2690,-393)[(0,0)\[lb\]]{} (2912,-170)[(0,0)\[lb\]]{} (1724, 53)[(0,0)\[lb\]]{}
To see that this linking number is well-defined notice that assigning $lk(c,d) = [\Gamma]
\cdot [d]$, where $\cdot$ indicates the intersection product on $H_*(\mathbb{S}^3,c)$, coincides with the classical definition. (For background on the intersection product on homology, see [@BREDON pages 366-372].) If $\Gamma'$ is any other 2-chain with $\partial \Gamma ' = c$ then $\partial (\Gamma -
\Gamma') = [c]- [c] = 0$ and $(\Gamma - \Gamma')$ represents a homology class in $H_2(\mathbb{S}^3)$. Since $H_2(\mathbb{S}^3) = 0$, $[\Gamma - \Gamma'] = 0$ forcing $[\Gamma - \Gamma'] \cdot [d] = 0$. Therefore: $[\Gamma] \cdot [d] =
[\Gamma'] \cdot [d]$, so that $lk(c,d)$ is well defined.
Generalization
--------------
Given any closed positive $(1,1)$ current $S$ on ${\ensuremath{{\mathbb{P}}^k}}$ and any piecewise smooth two chain $\sigma$ in ${\ensuremath{{\mathbb{P}}^k}}$ with $\partial \sigma$ disjoint from ${{\rm supp}}\ S$, we can define $$\begin{aligned}
\left<
\sigma,S \right> = \int_\sigma \eta_S\end{aligned}$$ where $\eta_S$ is a smooth approximation of $S$ within it’s cohomology class in ${\ensuremath{{\mathbb{P}}^k}}-\partial \sigma$, see [@GH pages 382-385]. The resulting number $\left< \sigma,S \right>$ will depend only on the cohomology class of $S$ and the homology class of $\sigma$ within $H_2({\ensuremath{{\mathbb{P}}^k}},\partial \sigma)$. (Note that if $S$ is already a smooth form, one need not require that $\partial \sigma$ be disjoint from ${{\rm supp}}\ S$.)
Notice that $H_2({\ensuremath{{\mathbb{P}}^k}})$ is generated by the class of any complex projective line $L \subset {\ensuremath{{\mathbb{P}}^k}}$. Since $S$ is non-trivial, $\left<L,S\right> \neq 0$, so that after an appropriate rescaling we can assume that $\left<L,S\right> =1$. In the remainder of the section we assume this normalization. (It is satisfied by the Green’s Current from Section \[SEC:GREENS\_CURRENT\].)
What made the linking numbers in $\mathbb{S}^3$ well-defined, independent of the choice of $\Gamma$, is that $H_2(\mathbb{S}^3) = 0$. One cannot make the immediately analogous definition that $lk(\gamma,S) = \left<
\Gamma,S \right>$ in ${\ensuremath{{\mathbb{P}}^k}}$, since $H_2({\ensuremath{{\mathbb{P}}^k}}) \neq 0$ implies that $\left< \Gamma,S
\right>$ can depend on the choice of $\Gamma$. For example, given $\Gamma$ with $\partial \Gamma = \gamma$ then $\partial \Gamma' = \gamma$ for $\Gamma' =
\Gamma + L$, however $\left< \Gamma',S \right> - \left< \Gamma,S \right> =
\left<L,S \right> = 1 \neq 0$.
There is a simple modification: Given any $\Gamma$ and $\Gamma'$ both having boundary $\gamma$, $[\Gamma' - \Gamma] \in H_2({\ensuremath{{\mathbb{P}}^k}})$ so that $[\Gamma' -
\Gamma] \sim k\cdot [L]$ for some $k \in {\ensuremath{{\mathbb{Z}}}}$. Since $S$ is normalized, this gives that $\left< \Gamma',S \right> = \left< \Gamma,S \right> \ (\text{mod} \
1)$.
\[DEFN:LK\] Let $S$ be a normalized closed positive $(1,1)$ current on ${\ensuremath{{\mathbb{P}}^k}}$ and let $\gamma$ be a piecewise smooth closed curve in ${\ensuremath{{\mathbb{P}}^k}}\setminus {{\rm supp}}(S)$. We define the [*linking number*]{} $lk(\gamma,S)$ by $$\begin{aligned}
lk(\gamma,S) := \left< \Gamma,S \right> \ (\text{mod} \ 1)\end{aligned}$$ where $\Gamma$ is any piecewise smooth two chain with $\partial \Gamma =
\gamma$.
Unlike linking numbers between closed loops in $\mathbb{S}^3$, it is often the case that that $\left< \Gamma,S \right> \not \in {\ensuremath{{\mathbb{Z}}}}$, resulting in non-zero linking numbers $(\text{mod} \ 1)$. See Subsection \[SUBSEC:EXAMPLE\_LK\] for an explicit example.
\[PROP:LINKING\_DEPENDS\_ON\_HOMOLOGY\] If $\gamma_1$ and $\gamma_2$ are homologous in $H_1({\ensuremath{{\mathbb{P}}^k}}\setminus {{\rm supp}}\ S)$, then $lk(\gamma_1,S) = lk(\gamma_2,S)$.
Let $\Gamma$ be any piecewise smooth two chain contained in ${\ensuremath{{\mathbb{P}}^k}}\setminus {{\rm supp}}\ S$ with $\partial \Gamma = \gamma_1 - \gamma_2$. Then, since ${\ensuremath{{\mathbb{P}}^k}}\setminus {{\rm supp}}\ S$ is open and $\Gamma$ is compact subset, $\Gamma$ is bounded away from the support of $S$. Consequently for any smooth approximation $\eta_S$ of $S$ supported in a sufficiently small neighborhood of $S$, we have $lk(\gamma_1,S) - lk(\gamma_2,S) = \int_\Gamma \eta_T = 0$.
\[COR:NONZERO\_LINK\]If $\gamma \in {\ensuremath{{\mathbb{P}}^k}}\setminus {{\rm supp}}\ S$ with $lk(\gamma,S) \neq 0$, then $\gamma$ is a homologically non-trivial loop in ${\ensuremath{{\mathbb{P}}^k}}\setminus {{\rm supp}}\ S$.
Since $lk(\gamma,S)$ depends only on the homology class of $\gamma$ and the pairing $\left<\cdot,S\right>$ is linear in the space of chains $\sigma$ (having $\partial \sigma$ disjoint from ${{\rm supp}}\ S$), the linking number descends to a homomorphism: $$\begin{aligned}
lk(\cdot,S): H_1({\ensuremath{{\mathbb{P}}^k}}\setminus {{\rm supp}}\ S) \rightarrow {\ensuremath{{\mathbb{R}}}}/{\ensuremath{{\mathbb{Z}}}}.\end{aligned}$$ Similarly $lk(\cdot,S) :H_1(\Omega) \rightarrow {\ensuremath{{\mathbb{R}}}}/{\ensuremath{{\mathbb{Z}}}}$ for any open $\Omega \subset {\ensuremath{{\mathbb{P}}^k}}\setminus {{\rm supp}}\ S$.
[**(Topological versus Geometric linking numbers.)**]{}\[RMK:GEOMETRIC\_VS\_TOPOLOICAL\_LK\] The classical linking number, and also Definition \[DEFN:LK\], depend only on the homology class of the loop $\gamma$ (in the complement of some other loop of the support of some current, respectively.)
A linking number depending on the geometry of $\gamma$ is given by $$\begin{aligned}
\label{EQN:ALT_LINK_DEF}
\widehat{lk}(\gamma,T) := \left<\Gamma,S - \Omega \right> \in \mathbb{R},\end{aligned}$$ where $\partial \Gamma = \gamma$ and $\Omega$ is (normalization of) the Kähler form defining the Fubini-Study metric on ${\ensuremath{{\mathbb{P}}^k}}$. Given any $\Gamma$ and $\Gamma'$ both having boundary $\gamma$ we have that $\left<\Gamma-\Gamma',T - \Omega \right> = 0$, since $S$ and $\Omega$ are cohomologous. (In the language of [@ROE_NEWTON p. 132], we say that $T - \Omega$ is in the “linking kernel of ${\ensuremath{{\mathbb{P}}^k}}$”.)
Because ${{\rm supp}}\ \Omega = {\ensuremath{{\mathbb{P}}^k}}$, the statement of Proposition \[PROP:LINKING\_DEPENDS\_ON\_HOMOLOGY\] does not apply. Rather, $\widehat{lk}(\gamma,S)$ depends on the geometry of $\gamma \subset
{\ensuremath{{\mathbb{P}}^k}}\setminus {{\rm supp}}\ S$. In fact, similar linking numbers were used in [@HL1; @HL2] to determine if a given real-analytic $\gamma$ has the appropriate geometry to be the boundary of a positive holomorphic $1$-chain (with bounded mass).
\[RMK:GENERAL\_MANIFOLDS\][**(Other manifolds.)**]{} Suppose that $M$ is some other compact complex manifold with $H_2(M)$ of rank $k$, generated by $\sigma_1,\ldots,\sigma_k$. If $\left<\sigma_1,S\right>,\ldots,\left<\sigma_k,S\right>$ are rationally related, then $S$ can be appropriately rescaled so that Definition \[DEFN:LK\] provides a well-defined linking number between any piecewise smooth closed curve $\gamma \in M \setminus {{\rm supp}}S$ and $S$. If $H_2(M)$ has rank $k > 1$, this provides a rather restrictive cohomological condition on $S$. (It is similar to the restriction of being in the “linking kernel” described in [@ROE_NEWTON].)
Invariance and restriction properties of $\langle \cdot , \cdot \rangle$ {#SUBSECTION:INVARIANCE_AND_RESTRICTION}
------------------------------------------------------------------------
Suppose that $\Omega, \Lambda$ are open subsets of ${\ensuremath{{\mathbb{C}}}}^j$ and ${\ensuremath{{\mathbb{C}}}}^k$, and $f:
\Omega \rightarrow \Lambda$ is a (possibly ramified) analytic mapping. Let $S$ be a closed positive $(1,1)$ current given on $\Lambda$ by $S = dd^c u$ for some PSH function $u$. If $f(\Omega)$ is not contained in the polar locus of $u$, then the [*pull-back of $S$ under*]{} $f$ is defined by pulling back the potential: $f^*(S) := dd^c (u \circ f)$. Since $u \circ f$ is not identically equal to $-\infty$, it is also a PSH function, and $f^*(S)$ is a well-defined closed positive $(1,1)$ current.
Suppose that $M$ and $N$ are complex manifolds and that $S$ is a closed positive $(1,1)$ current on $N$. If $f:M \rightarrow N$ is a holomorphic map with $f(M)$ not entirely contained in the polar locus of $S$, then the pull-back $f^*S$ can be defined by taking local charts and local potentials for $S$. See [@SI1 Appendix A.7] and [@HP2 p. 330-331] for further details.
\[PROP:PAIRING\_INV\] Suppose that $S$ is a closed positive $(1,1)$ current on $N$ and $f:M
\rightarrow N$, with $f(M)$ not contained in the polar locus of $S$. If $\sigma$ is a piecewise smooth two chain in $M$ with $\partial \sigma$ disjoint from ${{\rm supp}}\ f^* S$, then $\left< f_* \sigma, S \right> = \left< \sigma, f^*S \right>$.
Since $f(M)$ is not contained in the polar locus of $S$, $f^*S$ is well-defined. Since $\partial \sigma$ is disjoint from ${{\rm supp}}f^* S$, $\partial f(\sigma)$ is disjoint from ${{\rm supp}}S$. Let $\eta_S$ be a smooth approximation of $S$ in the same cohomology class as $S$ and having support disjoint from $\partial f(\sigma)$. Then, $\left< f_* \sigma, S \right> = \int_{f_* \sigma} \eta_S = \int_\sigma f^* \eta_S
= \left< \sigma, f^*S \right>$, since $f^* \eta_S$ is a smooth approximation of $f^*S$.
In the case that $M$ is an analytic submanifold of $N$ not entirely contained in the polar locus of $S$, the restriction of $S$ to $M$ is defined by $S\vert_M := \iota^*S$, where $\iota:M \rightarrow N$ is the inclusion. When computing linking numbers, we will often choose $\Gamma$ within some one-complex dimensional curve $M$ in $N$, with $M$ not contained in the polar locus of $S$. In that case $S|_M$ is a positive measure on $M$ and we can use the following:
\[COR:RESTRICT\_THEN\_INTEGRATE\] Let $S$ be a positive closed $(1,1)$ current on $N$ and $M$ be an analytic curve in $N$ that is not entirely contained in the polar locus of $S$. If $\Gamma$ is a piecewise smooth two chain in $M$ with $\iota(\partial \Gamma)$ disjoint from ${{\rm supp}}\ S$, then $$\begin{aligned}
\left<\iota(\Gamma),S \right> =\int_\Gamma S \vert_M.\end{aligned}$$
Proposition \[PROP:PAIRING\_INV\] gives $\left< \iota(\Gamma),S \right> \equiv \left<\iota_* \Gamma,S\right> = \left<\Gamma,\iota^* S\right> = \left< \Gamma, S
\vert_M \right>.$ Any positive $(1,1)$ current on $M$ is a positive measure. Thus, $\int_\Gamma S \vert_M$ is defined, and coincides with the result obtained by first choosing a smooth approximation to $S \vert_M$. Thus $\left< \Gamma, S \vert_M \right> = \int_\Gamma S|_M$.
In the remainder of the paper, we will not typically distinguish between $\Gamma$ and $\iota(\Gamma)$.
Linking with the Green’s Current {#SUBSEC:EXAMPLE_LK}
--------------------------------
We conclude the section with some observations specific to the Green’s current $T$, including the proof of Theorem \[THM:GENERAL\_TECHNIQUE\], as well as an example illustrating the definitions given above. It is worth noting that the Green’s current has empty polar locus, since $G$ is locally bounded on ${\ensuremath{{\mathbb{C}}}}^{k+1} \setminus \{0\}$, so that the hypotheses of Proposition \[PROP:PAIRING\_INV\] and Corollary \[COR:RESTRICT\_THEN\_INTEGRATE\] are easy to check.
\[PROP:RATIONAL\_LINKING\] Suppose that $f: {\ensuremath{{\mathbb{P}}^k}}\rightarrow {\ensuremath{{\mathbb{P}}^k}}$, $W^s(\zeta) \subset U(f)$ is the basin of attraction of some attracting periodic cycle $\zeta$, and $T$ is the Green’s Current of $f$. Then $$\begin{aligned}
lk(\cdot,T) :H_1(W^s(\zeta)) \rightarrow {\ensuremath{{\mathbb{Z}}}}[1/d]/{\ensuremath{{\mathbb{Z}}}}\subset {\ensuremath{{\mathbb{Q}}}}/{\ensuremath{{\mathbb{Z}}}}.\end{aligned}$$
Suppose that $\zeta$ is of period $N$. Then, the basin of attraction $W^s(\zeta)$ contains a union of small open balls $B_0,\ldots,B_{N-1}$ centered at each point $\zeta,\ldots,f^{N-1}(\zeta)$ of the orbit $\zeta$. Since $H_1(W^s(\zeta))$ is generated by the classes of piecewise smooth loops, it is sufficient to consider a single such loop $\gamma$. Since $\gamma$ is a compact subset of $W^s(\zeta)$, there is some $n$ so that $f^n(\gamma)$ is contained in $\cup B_i$, giving that $f^n(\gamma)$ has trivial homology class in $H_1(W^s(\zeta))$. In particular, $lk(f^n(\gamma),T) = 0 \ (\text{mod} \
1)$, so that for any $\Gamma$ with $\partial \Gamma = \gamma$ we have $\left<f^n(\Gamma),T \right> = k$ for some integer $k$.
Recall that $f^* T = d T$, where $d$ is the algebraic degree of $f$. Proposition \[PROP:PAIRING\_INV\] gives that $k = \left<f^n(\Gamma),T \right> =
\left<\Gamma,(f^*)^n T\right> = d^n \left<\Gamma,T\right>$. In particular, $lk(\gamma,T) \equiv k/d^n \ (\text{mod} \ 1)$.
Using Proposition \[PROP:RATIONAL\_LINKING\], Theorem \[THM:GENERAL\_TECHNIQUE\] presents a general strategy for showing that $H_1(U(f))$ is infinitely generated.
Since $\Omega$ is a union of basins of attraction for attracting periodic points of $f$, Proposition \[PROP:RATIONAL\_LINKING\] gives that $lk(\cdot,T): H_1(\Omega) \rightarrow {\ensuremath{{\mathbb{Q}}}}/{\ensuremath{{\mathbb{Z}}}}$. There are homology classes $c \in H_1(\Omega)$ with $lk(c,T) \neq 0$ arbitrarily close to zero, so, since $lk(\cdot,T)$ is a homomorphism, the image of $lk(\cdot,T): H_1(\Omega) \rightarrow {\ensuremath{{\mathbb{Q}}}}/{\ensuremath{{\mathbb{Z}}}}$ is dense in ${\ensuremath{{\mathbb{Q}}}}/{\ensuremath{{\mathbb{Z}}}}$. Because any dense subgroup of ${\ensuremath{{\mathbb{Q}}}}/{\ensuremath{{\mathbb{Z}}}}$ is infinitely generated, the image of $lk(\cdot,T)$ is infinitely generated, hence $H_1(\Omega)$ is, as well.
\[EXAMPLE:DEFN\_LINK\] Consider the polynomial skew product $(z,w) \mapsto (z^2,w^2+0.3z)$, for which the Fatou set consists of the union of basins of attraction for three super-attracting fixed points: $[0:1:0]$, $[0:0:1]$, and $[1:0:0]$. In Figure \[FIG\_LINK\_IN\_LINE\] we show a computer generated image of the intersection of $W^s([0:1:0])$ (lighter grey) and $W^s([0:0:1])$ (dark grey) with the vertical line $z=z_0=0.99999$. In terms of the fiber-wise Julia sets that were mentioned in the introduction, $K_{z_0}$ is precisely the closure of the dark grey region and $J_{z_0}$ is its boundary.
We will see in Proposition \[PROP:HAMONIC\_MEASURE\_ON\_VERTICALS\] that $T
\vert_{z=z_0}$ is precisely the harmonic measure on $K_{z_0}$. Using this knowledge, and supposing that the computer image is accurate, we illustrate how the above definitions can be used to show that the smooth loop $\gamma$ shown in the figure represents a non-trivial homology class in $H_1(W^s([0:1:0]))$.
Suppose that we use the two chain $\Gamma_1$ that is depicted in the figure to compute $lk(\gamma,T)$. The harmonic measure on $K_{z_0}$ is supported in $J_{z_0}$ and equally distributed between the four symmetric pieces with total measure of $K_{z_0}$ is $1$. Therefore (using Corollary \[COR:RESTRICT\_THEN\_INTEGRATE\]) we see that $lk(\gamma,T) = \int_{\Gamma_1} T
\vert_{z=z_0} = \frac{1}{4} \ (\text{mod} \ 1)$, because $\Gamma_1$ covers exactly $1$ these $4$ pieces of $K_{z_0}.$
If instead we use $\Gamma_2$, the disc “outside of $\gamma$” within the projective line $z=z_0$ with the orientation chosen so that $\partial \Gamma_2 = c$ as depicted, then $lk(\gamma,T) = \int_{\Gamma_2} T \vert_{z=z_0} = -\frac{3}{4} \
(\text{mod} \ 1)$ (because $\Gamma_2$ covers $3$ of the $4$ symmetric pieces of $K_{z_0},$ but with the opposite orientation than that of $\Gamma_1$). However, $-\frac{3}{4} \ (\text{mod} \ 1) = \frac{1}{4} \ (\text{mod} \ 1)$, so we see that the computed linking number does come out the same.
Since $lk(\gamma,T) \neq 0 \ (\text{mod} \ 1)$, Corollary \[COR:NONZERO\_LINK\] gives that it is impossible to have any $2$-chain $\Lambda$ within $W^s([0:1:0])$ (even outside of the vertical line $z=z_0$) so that $\partial
\Lambda = c$. Thus $[\gamma] \neq 0 \in H_1(W^s([0:1:0]))$.
(0,0)
\#1\#2\#3\#4\#5[ @font ]{}
(4607,4607)(1201,-4968) (1801,-2536)[(0,0)\[lb\]]{} (2026,-3811)[(0,0)\[lb\]]{} (2546,-3912)[(0,0)\[lb\]]{}
Application to Polynomial Endomorphisms of ${\ensuremath{{\mathbb{P}}^2}}$ {#SEC:ENDO}
==========================================================================
Having developed the linking numbers in Section \[SEC:LINKING\], Theorem \[THM:JPI\_DISCONN\] will be a consequence of the following well-known result:
\[THM:J\_DISCONN\_RS\][@BEAR Thm. 5.7.1] Let $g:{\ensuremath{{\mathbb{P}}^1}}\rightarrow {\ensuremath{{\mathbb{P}}^1}}$ be a rational map. Then, if $J(g)$ is disconnected, it contains uncountably many components, and each point of $J(g)$ is an accumulation point of infinitely many distinct components of $J(g)$.
Let us begin by studying the Fatou set of one-dimensional maps:
\[PROP:1VAR\_FATOU\] If $g:{\ensuremath{{\mathbb{P}}^1}}\rightarrow {\ensuremath{{\mathbb{P}}^1}}$ is a hyperbolic rational map with disconnected Julia set $J(g)$, then the Fatou set $U(g)$ has infinitely generated first homology.
\[EG:ONE\_VARIABLE\_EXAMPLES\] When reading the proof of Proposition \[PROP:1VAR\_FATOU\], it is helpful to keep in mind two examples. The first is the polynomial $r(z) = z^3-0.48z+(0.706260+0.502896i)$ for which one of the critical points escapes to infinity, while the other is in the basin of attraction for a cycle of period $3$. The result is a filled Julia set with infinitely many non-trivial connected components, each of which is homeomorphic to the Douady’s rabbit. (See [@MILNOR].)
The second example are maps of the form $f(z) = z^n + \lambda/z^h$, which were considered in [@MCMULLEN]. For suitable $n, h$, and $\lambda$ the Julia set is a Cantor set of nested simple closed curves.
Since $g$ is hyperbolic, $U(g)$ consists of the basins of attraction of finitely many attracting periodic points. Therefore, according to Theorem \[THM:GENERAL\_TECHNIQUE\], it is sufficient to find elements of $H_1(U(g))$ having non-zero linking numbers with $T=\mu_g$ that are arbitrarily close to $0$.
Theorem \[THM:J\_DISCONN\_RS\] will allow us to find a sequence of piecewise smooth two chains $\Gamma_1, \Gamma_2,\ldots$ so that $0 <
\left<\Gamma_{n-1},\mu_G\right> < \left<\Gamma_{n},\mu_G\right> < 1$ and $\partial \Gamma_n \subset U(g)$, as follows.
For each $n$, $\Gamma_n$ will be a union of disjoint positively-oriented closed discs in ${\ensuremath{{\mathbb{P}}^1}}$, each counted with weight one. Since $J(g)$ is disconnected, we can find a piecewise smooth oriented loop $\gamma_1 \subset U(g)$ that separates $J(g)$. Let $\Gamma_1$ be the positively-oriented disc in ${\ensuremath{{\mathbb{P}}^1}}$ having $\gamma_1$ as its oriented boundary. Since $\mu_g$ is normalized and $\gamma_1$ separates $J(g) = {{\rm supp}}(\mu_g)$, we have $0 <
\left<\Gamma_1,\mu_g\right> < 1$. Now suppose that $\Gamma_1,\ldots,\Gamma_{n-1}$ have been chosen. Since $\left<\Gamma_{n-1},\mu_g\right> < 1$, we have $J(g) \cap ({\ensuremath{{\mathbb{P}}^1}}\setminus
\Gamma_{n-1}) \neq \emptyset$. Then, according to Theorem \[THM:J\_DISCONN\_RS\], there is more than one component of $J(g) \cap ({\ensuremath{{\mathbb{P}}^1}}\setminus \Gamma_{n-1})$, so we can choose an oriented loop $\gamma_n \subset
U(g) \cap ({\ensuremath{{\mathbb{P}}^1}}\setminus \Gamma_{n-1})$ so that at least one component of $J(g)
\cap ({\ensuremath{{\mathbb{P}}^1}}\setminus \Gamma_{n-1})$ is on each side of $\gamma_n$. Then, we let $\Gamma_n$ be the union of oriented discs in ${\ensuremath{{\mathbb{P}}^1}}$ consisting of the points inside of $\gamma_n$ and any discs from $\Gamma_{n-1}$ that are not inside of $\gamma_n$.
Considering the homology class $[\partial \Gamma_n - \partial \Gamma_{n-1}] \in H_1(U(g))$ we have that $$\begin{aligned}
lk([\partial \Gamma_n - \partial \Gamma_{n-1}],\mu_g) = \left<\Gamma_{n},\mu_G\right> - \left<\Gamma_{n-1},\mu_G\right> \ (\text{mod} \ 1)\end{aligned}$$ is non-zero for each $n$. However, since $$\begin{aligned}
\sum_n \left<\Gamma_{n},\mu_G\right> - \left<\Gamma_{n-1},\mu_G\right>\end{aligned}$$ is bounded by $1$, we have that $lk([\partial \Gamma_n - \partial
\Gamma_{n-1}],\mu_g) \rightarrow 0$ in ${\ensuremath{{\mathbb{Q}}}}/{\ensuremath{{\mathbb{Z}}}}$. Theorem \[THM:GENERAL\_TECHNIQUE\] then gives that $H_1(U(g))$ is infinitely generated.
Let $f:{\ensuremath{{\mathbb{P}}^2}}\rightarrow {\ensuremath{{\mathbb{P}}^2}}$ be a polynomial endomorphism given in projective coordinates by $$\begin{aligned}
\label{EQN:LIFT_F}
f([Z:W:T]) = [P(Z,W,T):Q(Z,W,T):T^d].\end{aligned}$$ Since $f:{\ensuremath{{\mathbb{P}}^2}}\rightarrow {\ensuremath{{\mathbb{P}}^2}}$ is assumed globally holomorphic, $P(Z,W,T), Q(Z,W,T),$ and $T^d$ have no common zeros other than $(0,0,0)$.
The (projective) line at infinity $\Pi:=\{T=0\}$ is uniformly super-attracting and the restriction $f_\Pi$ is given in homogeneous coordinates by $$\begin{aligned}
\label{EQN:LIFT_F_PI}
f_\Pi:([Z:W]) \rightarrow [P_0(Z,W):Q_0(Z,W)].\end{aligned}$$ where $P_0 := P(Z,W,0)$ and $Q_0 :=Q(Z,W,0)$.
Let $U(f)$ be the Fatou set for $f$ and $U({f_\Pi})$ the Fatou set for $f_\Pi$. The former is an open set in ${\ensuremath{{\mathbb{P}}^2}}$, while the latter is an open set in the line at infinity $\Pi$.
\[LEM:FAT\_PI\]If $f_\Pi$ is hyperbolic then $U({f_\Pi}) \subset U(f)$.
Since $f_\Pi$ is hyperbolic, $U({f_\Pi})$ is in the union of the basins of attraction $W^s_\Pi(\zeta_i)$ of a finite number of periodic attracting points $\zeta_1,\ldots,\zeta_k$. The line at infinity $\Pi$ is transversally superattracting, so each $\zeta_i$ is superattracting in the transverse direction to $\Pi$ and (at least) geometrically attracting within $\Pi$. Let $W^s(\zeta_i) \subset {\ensuremath{{\mathbb{P}}^2}}$ be the basin of attraction for $\zeta_i$ under $f$. Then, $W^s_\Pi(\zeta_i) \subset W^s(\zeta_i)$, giving $U({f_\Pi}) \subset U(f)$.
Let $T$ be the Green’s current for $f$ and let $\mu_\Pi$ be the measure of maximal entropy for the restriction $f_{|\Pi}$.
\[LEM:PI\_RESTRICTION\] The restriction $T_{| \Pi}$ coincides with $\mu_\Pi$.
Consider the lift $F_\Pi:{\ensuremath{{\mathbb{C}}}}^2 \rightarrow {\ensuremath{{\mathbb{C}}}}^2$ of the rational map $f_\Pi :{\ensuremath{{\mathbb{P}}^1}}\rightarrow {\ensuremath{{\mathbb{P}}^1}}$. As observed in Remark \[RMK:GREEN\_1D\], $$\begin{aligned}
G_\Pi(Z,W) = \lim \frac{1}{d^n} \log ||F_\Pi^n(Z,W)||\end{aligned}$$ is the potential for $\mu_\Pi$, meaning that $\pi^* \mu_\Pi = \frac{1}{2\pi} dd^c G_\Pi$.
The restriction $T_{| \Pi}$ is obtained by restricting of the potential $G$ to $\pi^{-1}(\Pi) = \{(Z,W,0) \in {\ensuremath{{\mathbb{C}}}}^3\}$. Specifically, it is defined by $\pi^* (T_{|\Pi}) = \frac{1}{2\pi} dd^c(G(Z,W,0))$. Therefore, it suffices to show that $G(Z,W,0) = G_\Pi(Z,W)$. However, this follows directly from the fact that $F(Z,W,0) = F_\Pi(Z,W)$. (Here $F$ is the lift of $f$ to ${\ensuremath{{\mathbb{C}}}}^3$, as given by (\[EQN:LIFT\_F\]) when considered in non-projective coordinates $[Z,W,T]$.)
As in the proof of Proposition \[PROP:1VAR\_FATOU\], we can find a sequence of $1$-cycles $c_n$ in $U(f_\Pi)$ having linking numbers with $\mu_\Pi$ arbitrarily close to $0$ in ${\ensuremath{{\mathbb{Q}}}}/{\ensuremath{{\mathbb{Z}}}}$. Since $f_{|\Pi}$ is hyperbolic, Lemma \[LEM:FAT\_PI\] gives that each $c_n$ is in the union of basins of attraction for finitely many attracting periodic points of $f$. In particular, $lk(c_i,T)$ is well-defined for each $n$. Lemma \[LEM:PI\_RESTRICTION\] gives that $T_{|\Pi} = \mu_\Pi$, so that $lk(c_n,T)$ (considering $c_n$ in ${\ensuremath{{\mathbb{P}}^2}}$) coincides with $lk(c_n,\mu_\Pi)$ (considering $c_n$ in the projective line $\Pi$). Therefore, $lk(c_n,T) \neq 0$ and $lk(c_n,T) \rightarrow 0$ in ${\ensuremath{{\mathbb{Q}}}}/{\ensuremath{{\mathbb{Z}}}}$. Theorem \[THM:GENERAL\_TECHNIQUE\] gives that the union of these basins has infinitely generated first homology, and hence $U(f)$ does as well.
\[EXAMPLE:RABBITS\] We embed the polynomial dynamics of $r(z)$ from Remark \[EG:ONE\_VARIABLE\_EXAMPLES\] as the dynamics on the line at infinity $\Pi$ for a polynomial endomorphism of ${\ensuremath{{\mathbb{P}}^2}}$. Let $R(Z,W) =
Z^3-0.48ZW^2+(0.706260+0.502896i)W^3$ be the homogeneous form of $r$, and let $P(Z,W,T)$ and $Q(Z,W,T)$ be any homogeneous polynomials of degree $2$. Then $$\begin{aligned}
f([Z:W:T]) = [R(Z,W)+T\cdot P(Z,W,T):W^3+T \cdot Q(Z,W,T):T^3]\end{aligned}$$
is a polynomial endomorphism with $f_\Pi = r$. In this case, Theorem \[THM:JPI\_DISCONN\] gives that the basin of attraction of $[1:0:0]$ for $f$ has infinitely generated first homology.
Suppose that $f: {\ensuremath{{\mathbb{P}}^k}}\rightarrow {\ensuremath{{\mathbb{P}}^k}}$ is a holomorphic endomorphism having an invariant projective line $\Pi$. Lemma \[LEM:PI\_RESTRICTION\] can be extended to give that $T_{|\Pi} = \mu_\Pi$, where $\mu_\Pi$ is the measure of maximal entropy for the one-dimensional map $f_{|\Pi}$. If $\Pi$ is at least geometrically attracting transversally, $f_{|\Pi}$ is hyperbolic, and $J(f_{|\Pi})$ is disconnected, then essentially the same proof as that of Theorem \[THM:JPI\_DISCONN\] gives that the Fatou set $U(f)$ has infinitely generated first homology.
Using this observation, one can inductively create sequences of polynomial endomorphisms $f_k: {\ensuremath{{\mathbb{P}}^k}}\rightarrow {\ensuremath{{\mathbb{P}}^k}}$, for every $k$, each having Fatou set with infinitely generated first homology. One begins with a hyperbolic polynomial endomorphism $f_1$ of the Riemann sphere $\mathbb{P}^1$ having disconnected Julia set. Then, for each $k$, one can let $f_{k}:{\ensuremath{{\mathbb{P}}^k}}\rightarrow {\ensuremath{{\mathbb{P}}^k}}$ be any polynomial endomorphism whose dynamics on the hypersurface $\mathbb{P}^{k-1}$ at infinity is given by $f_{k-1}$. (When $k=2$, the construction of $f_2:{\ensuremath{{\mathbb{P}}^2}}\rightarrow {\ensuremath{{\mathbb{P}}^2}}$ is similar to that from Example \[EXAMPLE:RABBITS\].) The resulting maps each have a totally-invariant projective line $\Pi$ that is transversally superattracting with ${f_k}_{|\Pi}
= f_1$ hyperbolic with disconnected Julia set. Thus, the Fatou set $U(f_k)$ has infinitely generated first homology.
Application to Polynomial skew products {#SEC:SKEW}
=======================================
A [*polynomial skew product*]{} is a polynomial endomorphism of the form $$\begin{aligned}
f(z,w) = (p(z),q(z,w))\end{aligned}$$ with $p$ and $q$ polynomials of degree $d$ where $p(z) = z^d +
O(z^{d-1})$ and $q(z) = w^d +O_z(w^{d-1})$. (See Jonsson [@JON_SKEW].) Theorem \[THM:JPI\_DISCONN\] can by applied to many polynomial skew products $f$ to show that that $H_1(U(f))$ is infinitely generated; for example, $f(z,w)
= (z^2,w^2+10z^2)$, which has $J_{\Pi}$ a Cantor set. Next we will find alternative sufficient conditions under which a polynomial skew product has Fatou set with infinitely generated first homology, proving Theorem \[THM:MAIN\]. This theorem will apply to many maps to which Theorem \[THM:JPI\_DISCONN\] does not apply; for example, $f(z,w) = (z^2,w^2-3z)$, for which $J_{\Pi}$ is equal to the unit circle.
Preliminary background on polynomial skew products {#SUBSEC:BACKGROUND_SKEW}
--------------------------------------------------
The Green’s current for any polynomial endomorphism can be computed in the affine coordinates on ${\ensuremath{{\mathbb{C}}}}^2$ as $T :=
\frac{1}{2\pi} dd^{c} G_{\rm affine}$, where $G_{\rm affine}$ is the (affine) Green’s function defined in Remark \[RMK:AFFINE\_GREENS\_FUNCTION\]. The “base map” $p(z)$ has a Julia set $J_p \subset \mathbb{C}$ and, similarly, a Green’s function $G_p(z):= \lim_{n \to \infty} \frac{1}{d^n} \log_+
||p^n(z)||$. Furthermore, one can define a fiber-wise Green’s function[^2] by: $$\begin{aligned}
G_z(w) := G_{\rm affine}(z,w) - G_p(z).\end{aligned}$$ For each fixed $z$, $G_z(w)$ is a subharmonic function of $w$ and one defines the fiber-wise Julia sets by $K_z := \{G_z(w) = 0\}$ and $J_z := \partial K_z$.
The extension of $f$ to ${\ensuremath{{\mathbb{P}}^2}}$ is given by $$\begin{aligned}
\label{EQN:SKEW_HOMOG}
f([Z:W:T]) = [P(Z,T):Q(Z,W,T):T^d],\end{aligned}$$ where $P(Z,T)$ and $Q(Z,W,T)$ are the homogeneous versions of $p$ and $q$. The point\
$[0:1:0]$ that is “vertically at infinity” with respect to the affine coordinates $(z,w)$ is a totally-invariant super-attracting fixed point and $(z,w) \in W^s([0:1:0])$ if and only if $w \in {\ensuremath{{\mathbb{C}}}}\setminus K_z$.
Suppose that $(z,w) \in W^s([0:1:0])$ and $(z_n,w_n) := f^n(z,w)$. Then, $$\begin{aligned}
G_{\rm affine}(z,w) &=& \lim \frac{1}{d^n} \log_+ \|f^n(z,w)\|_\infty = \lim \frac{1}{d^n} \log_+ |w_n| \,\, \mbox{and} \\
G_z(w) &=& G_{\rm affine}(z,w) - G_p(z) = \lim \frac{1}{d^n} \log_+ |w_n| - \lim \frac{1}{d^n} \log_+|z_n|. \label{EQN:VERTICAL_GREEN}\end{aligned}$$ since $|w_n| > |z_n|$ for all $n$ sufficiently large.
As mentioned in Section \[SUBSECTION:INVARIANCE\_AND\_RESTRICTION\], we can restrict the current $T$ to any analytic curve obtaining a measure on that curve. Of particular interest for skew products is the restriction $\mu_{z_0}$ of $T$ to a vertical line $\{z_0\} \times \mathbb{P}$. The following appears as Jonsson [@JON_SKEW] Proposition 2.1 (i), we repeat it here for completeness:
\[PROP:HAMONIC\_MEASURE\_ON\_VERTICALS\] The restriction $T _{| {z=z_0}}$ of the Green’s current $T$ to a vertical line $(\{z_0\} \times \mathbb{P})$ coincides with the harmonic measure $\mu_{z_0}$ on $K_{z_0}$.
Notice that $$\begin{aligned}
T_{| {z=z_0}} &=& \frac{1}{2\pi} dd^c G_{{\rm affine}|{z=z_0}} =
\frac{1}{2\pi} dd^c G_{\rm affine}(z_0,w)\\ &=& \frac{1}{2\pi} dd^c \left(G_{\rm affine}(z_0,w) -
G_p(z_0)\right) = \frac{1}{2\pi} dd^c G_{z_0}(w). \end{aligned}$$
According to [@JON_SKEW Thm 2.1], $G_{z_0}$ is the Green’s function for $K_z$ with pole at infinity. We have thus obtained that $\mu_{z_0}$ is exactly the harmonic measure $\mu_{z_0}$ on $K_{z_0}$.
Topology of the basin of attraction $W^s([0:1:0])$ {#SEC:MAIN_RESULT}
--------------------------------------------------
\[W\_PATH\_CONNECTED\] If $\zeta$ is a totally-invariant (super)-attracting fixed point for a holomorphic $f:{\mathbb{CP}^k}\rightarrow {\mathbb{CP}^k}$, then $W^s(\zeta)$ is path-connected.
A nearly identical statement is proven for ${\mathbb{CP}^2}$ in Theorem 1.5.9 from [@HP]. We refer the reader to their proof since it is nearly identical for ${\mathbb{CP}^k}$. In particular, for any skew product $W^s([0:1:0])$ is path connected.
Although $G_z(w)$ is subharmonic in $w$ for any fixed $z$, it does not form a PSH function of both $z$ and $w$. Consider the points $(z,w) \in W^s([0:1:0])$ for which $z \in J_p$. At these points $G_{\rm affine}$ is pluriharmonic, i.e. $dd^c
G_{\rm affine} = 0$, but $G_p(z)$ is not pluriharmonic, i.e. $dd^c G_p(z) > 0$. Therefore, at these points $dd^c G_z(w) < 0$, so $G_z(w)$ is not PSH.
\[LEM:MINUS\_G\_Z\_PSH\] The function $-G_z(w)$ is PSH at all points $(z,w) \in W^s([0:1:0]) \cap {\ensuremath{{\mathbb{C}}}}^2$ and it extends to a PSH function on all of $W^s([0:1:0])$. The resulting function is pluriharmonic on $W^s([0:1:0])$ except at points for which $Z/T \in J_p$.
Since $-G_z(w) = G_p(z) - G_{\rm affine}(z,w)$, with $G_{\rm affine}(z,w)$ pluriharmonic in $W^s([0:1:0])$ and $G_p(z)$ PSH everywhere, the result is PSH in $W^s([0:1:0]) \cap {\ensuremath{{\mathbb{C}}}}^2$.
Jonsson proves in [@JON_SKEW Lemma 6.3] that $G_z(w)$ extends as a PSH function in a suitable neighborhood of $\Pi \setminus \{[0:1:0]\}$ and his proof immediately gives that the result is pluriharmonic in a (possibly smaller) neighborhood within $W^s([0:1:0])$ of $\Pi \setminus \{[0:1:0]\}$. Therefore, $-G_z(w)$ is also pluriharmonic in the same neighborhood.
Thus, $-G_z(w)$ extends to a PSH on $W^s([0:1:0]) \setminus \{[0:1:0]\}$ and, assigning $-\infty$ to $[0:1:0]$, gives the desired extension to all of $W^s([0:1:0])$. The result will be pluriharmonic except at $[0:1:0]$ and at the points in $W^s([0:1:0]) \cap {\ensuremath{{\mathbb{C}}}}^2$ where $dd^c(-G_z(w)) > 0$, that is the points where $Z/T \in J_p$.
We first suppose that $J_{z_0}$ is disconnected for some $z_0 \in J_p$. Let $z_1,z_2,\ldots$ be any sequence of iterated preimages of $z_0$ so that $p^n(z_n) = z_0$.
Consider the vertical line $\{z_0\} \times {\ensuremath{{\mathbb{C}}}}$. Since $J_{z_0}$ is disconnected, so is $K_{z_0}$, and we can choose two disjoint positively-oriented piecewise smooth loops $\eta_1, \eta_2 \subset \{z_0\}
\times \left({\ensuremath{{\mathbb{C}}}}\setminus K_{z_0}\right)$ each enclosing a proper subset of $K_{z_0}$.
Perturbing $\eta_1, \eta_2$ within $\{z_0\} \times ({\ensuremath{{\mathbb{C}}}}\setminus K_{z_0})$, if necessary, we can suppose that none of the $d-1$ critical values of $f|_{\{z_1\}\times {\ensuremath{{\mathbb{C}}}}}: \{z_1\} \times {\ensuremath{{\mathbb{C}}}}\rightarrow \{z_0\} \times {\ensuremath{{\mathbb{C}}}}$ (counted with multiplicity) are on $\eta_1$ or $\eta_2$. Since the regions enclosed by $\eta_1$ and $\eta_2$ are disjoint, at least one of them contains at most $d-2$ of these critical values. Let $\gamma_0$ be this curve.
Since $\gamma_0 \subset \{z_0\} \times ({\ensuremath{{\mathbb{C}}}}\setminus K_{z_0})$, $\gamma_0
\subset W^s([0:1:0])$. Because $\gamma_0$ is compact, it is bounded away from ${{\rm supp}}(T)$, and the linking number $lk(\gamma_0,T)$ is a well defined invariant of the homology class $[\gamma]$ within $H_1(W^s([0:1:0]))$. We let $\Gamma_0$ be the closed disc in $\left(\{z_0\} \times \mathbb{C}\right)$ having $\gamma_0$ as its oriented boundary. Since $\Gamma_0$ contains some proper subset of $K_{z_0}$ (and hence of $J_{z_0}$) with ${{\rm supp}}(\mu_{z_0}) = J_{z_0}$, we have that $$\begin{aligned}
0 < \left<\Gamma_0,T\right> = \int_{\Gamma_0} \mu_{z_0} < 1.\end{aligned}$$ Therefore, $lk(\gamma_0,T) = \left<\Gamma_0,T\right>(\text{mod} \ 1) \neq 0 \
(\text{mod} \ 1)$, giving that $[\gamma_0]$ is non-trivial.
Consider the preimages $D_1,\ldots,D_j$ of $\Gamma_0$ under $f|_{\{z_1\} \times
{\ensuremath{{\mathbb{C}}}}} : \{z_1\} \times {\ensuremath{{\mathbb{C}}}}\rightarrow \{z_0\} \times {\ensuremath{{\mathbb{C}}}}$. Since at most $d-2$ critical values of the degree $d$ ramified cover $f|_{\{z_1\} \times \cup D_i}$ are contained in $\Gamma_0$, it is a consequence of the Riemann-Hurwitz Theorem that the Euler characteristic of $\cup D_i$ is greater than or equal to $2$. Because each $D_i$ is a domain in ${\ensuremath{{\mathbb{C}}}}$, at least two components $D_1$ and $D_2$ are discs.
The total degree of $f|_{\{z_1\}\times {\ensuremath{{\mathbb{C}}}}}: \cup D_i \rightarrow \Gamma_0$ is $d$, so $f|_{\{z_1\} \times {\ensuremath{{\mathbb{C}}}}}: D_i \rightarrow \Gamma_0$ a ramified covering of degree $k_i \leq d-1$ for each $i$. Proposition \[PROP:PAIRING\_INV\] and the basic invariance $f^*T = d\cdot T$ for the Green’s current give that $$\begin{aligned}
\label{EQN:SMALLER_PAIRING}
\left<D_i,T\right> = \frac{1}{d}\left<D_i,f^*T\right> = \frac{1}{d} \left<f_* D_i,T\right> = \frac{1}{d} \left<k_i \Gamma_0,T\right> \leq \frac{d-1}{d}\left<\Gamma_0,T\right>\end{aligned}$$ for each $i$.
As before, we can perturb the boundaries of $D_1$ and $D_2$ within $\{z_1\}
\times ({\ensuremath{{\mathbb{C}}}}\setminus K_{z_1})$ so that none of the critical values of $f|_{\{z_2\} \times {\ensuremath{{\mathbb{C}}}}}$ lie on their boundaries and so that $D_1$ and $D_2$ remain disjoint. (It will not affect the pairings given by (\[EQN:SMALLER\_PAIRING\])). At least one of the discs $D_1, D_2$ contains at most $d-2$ critical values of $f|_{\{z_2\} \times C}$. We let $\Gamma_1$ be that disc and $\gamma_1 = \partial \Gamma_1$. Then $$\begin{aligned}
0 < \left<\Gamma_1,T\right> \leq \frac{d-1}{d} \left<\Gamma_0,T\right> \leq \frac{d-1}{d}. \end{aligned}$$
Continuing in the same way, we can find a sequence of discs $\Gamma_0,\Gamma_1,\ldots$ so that
- $\Gamma_n \subset \{z_n\} \times {\ensuremath{{\mathbb{C}}}}$,
- $\gamma_n = \partial \Gamma_n \subset W^s([0:1:0])$,
- $\Gamma_n$ contains at most $d-2$ critical values of $f|_{\{z_{n+1\}}\times {\ensuremath{{\mathbb{C}}}}}$ (counted with multiplicity), and
- $\left<\Gamma_n,T\right> \leq \frac{d-1}{d} \left<\Gamma_{n-1},T\right>$.
Consequently, $$\begin{aligned}
0 < \left<\Gamma_n,T\right> \leq \left(\frac{d-1}{d}\right)^n,\end{aligned}$$ giving that $lk(\gamma_n,T) \rightarrow 0$ in ${\ensuremath{{\mathbb{Q}}}}/{\ensuremath{{\mathbb{Z}}}}$. Therefore, Theorem \[THM:GENERAL\_TECHNIQUE\] gives that $H_1(W^s([0:1:0]))$ is infinitely generated.
We will now show that if $J_z$ is connected for every $z \in J_p$, then $W^s([0:1:0])$ is homeomorphic to an open ball. Consider the local coordinates $z' = Z/W$, $t' = T/W$, chosen so that $(z',t')
= (0,0)$ corresponds to $[0:1:0]$. In these coordinates $$\begin{aligned}
f(z',t') = \left(\frac{P(z',t')}{Q(z',1,t')},\frac{t'^d}{Q(z',1,t')}\right),\end{aligned}$$ where $P$ and $Q$ are the homogeneous versions of $p$ and $q$ appearing in Equation (\[EQN:SKEW\_HOMOG\]). The assumption that $q(z) = w^d + O_z(w^{d-1})$ and $p(z) = z^d+O(z^{d-1})$ imply that we have the expansion $$\begin{aligned}
f(z',t') = (P(z',t'),t'^d) + g(t',z'),\end{aligned}$$ with $(P(z',t'),t'^d)$ non-degenerate of degree $d$ and $g(t',z')$ consisting of terms of degree $d+1$ and larger.
Therefore, we can construct a potential function[^3] for the superattracting point $(0,0)$: $$\begin{aligned}
\label{EQN:GREEN_FOR_POINT}
h(z',t') := \lim_{n \rightarrow \infty} \frac{1}{d^n} \log \|f^n(z',t')\|_\infty.\end{aligned}$$ The result is a continuous pluri-subharmonic function [@HP] with logarithmic singularity at $(z',t') = (0,0)$ having the property that $(z',t') \in
W^s([0:1:0])\setminus \{[0:1:0]\}$ if and only if $h(z',t') < 0$. In particular, $$\begin{aligned}
h: W^s([0:1:0]) \setminus \{[0:1:0]\} \longrightarrow (-\infty,0)\end{aligned}$$ is proper.
If we let $(z'_n,t'_n) = f^n(z',t')$, then Equation (\[EQN:GREEN\_FOR\_POINT\]) simplifies to $$\begin{aligned}
h(z',t') =
\begin{cases}
\lim \frac{1}{d^n} \log |t'_n| & \text{if $z'/t' \in K_p$ and}\\
\lim \frac{1}{d^n} \log |z'_n| & \text{if $z'/t' \not \in K_p$.}
\end{cases}\end{aligned}$$ since $z'_{n+1}/t'_{n+1} = p(z'_n/t'_n)$. Equation (\[EQN:VERTICAL\_GREEN\]) gives that in the original affine coordinates $(z,w)$ we have $$\begin{aligned}
\label{EQN:EQUALITY_FOR_POTENTIAL}
h(z,w) =
\begin{cases}
\lim \frac{1}{d^n} \log |t'_n| = - \lim \frac{1}{d^n} \log |w_n| = -G_z(w) & \text{if $z \in K_p$ and},\\
\lim \frac{1}{d^n} \log |z'_n| = \log|z| - \lim \frac{1}{d^n} \log |w_n| = - G_z(w) & \text{if $z \not \in K_p$},
\end{cases}\end{aligned}$$ which is harmonic on the intersection of any vertical line $\{z\} \times {\ensuremath{{\mathbb{C}}}}$ with $W^s([0:1:0])$ and pluriharmonic except when $z \in J_p$; see Lemma \[LEM:MINUS\_G\_Z\_PSH\]. A similar calculation shows that $h$ coincides with the extension of $-G_z(w)$ described in Lemma \[LEM:MINUS\_G\_Z\_PSH\] and that the restriction of $h$ to $\Pi$ is $-G_\Pi$. (Here, $G_\Pi$ is the Green’s function for the action $f_\Pi$ of $f$ on the line at infinity.)
Therefore, $h(z',t')$ is pluriharmonic on $W^s([0:1:0]) \setminus \{(z',w') \,:\,z'/w' \in
J_p\}$ and the restriction of $h(z',t')$ to any line through $(0,0)$ is harmonic on $W^s([0:1:0]) \setminus \{[0:1:0]\}$, with a logarithmic singularity at $(0,0)$.
Since $J_{z_0}$ is connected for every $z_0 \in J_p$, Proposition 6.3 from [@JON_SKEW] gives that $J_z$ is connected for every $z \in {\ensuremath{{\mathbb{C}}}}$ and also $J_\Pi$ is connected, or, equivalently, that $G_z(w)$ (for any $z$) and $G_\Pi$ have no (escaping) critical points. Therefore, the restriction of $h$ to any complex line through $(0,0)$ has no critical points in $W^s([0:1:0])$.
The sublevel set $W_a := h^{-1}([-\infty,a))$ is open for any $a \in
(-\infty,0)$ since $h: W^s([0:1:0]) \setminus \{[0:1:0]\} \rightarrow
(-\infty,0)$ is continuous with $h(z',t') \rightarrow -\infty$ if and only if $(z',t') \rightarrow (0,0)$. Equation 2.2 from [@JON_SKEW] implies that $$\begin{aligned}
h(z',t') &=& \log|t'| + G_p\left(\frac{z'}{t'}\right) + \eta(z',t') \,\, \mbox{if $t' \neq 0$, and}\\
h(z',t') &=& \log|z'| + G^\#_p\left(\frac{t'}{z'}\right) + \eta(z',t') \,\, \mbox{if $z' \neq 0$,}\end{aligned}$$ with $\eta(z',t')$ becoming arbitrarily small for $(z',t')$ sufficiently small and $G^\#_p(x)$ obtained by extending $G_p(1/x) - \log(1/x)$ continuously through $x=0$. Therefore, for $a$ sufficiently negative, the intersection of $W_a$ with any complex line through $(0,0)$ will be convex. In particular, $W_a$ is an star-convex open subset in ${\ensuremath{{\mathbb{C}}}}^2$, implying that it is homeomorphic to an open ball. (See [@BERGER Theorem 11.3.6.1].)
We define a new function $\widetilde{h}$ which agrees with $h$ except in the interior of $W_a$, where we make a $C^\infty$ modification (assigning values less than $a$) in order to remove the logarithmic singularity at $[0:1:0]$.
We will use $\widetilde{h}$ as Morse function to show that $W_b :=
h^{-1}([-\infty,b))$ is diffeomorphic to $W_a$ for any $b \in (a,0)$. The classical technique from Theorem 3.1 of [@MILNOR_MORSE] would use the normalization of $-\nabla \widetilde{h}$ to generate a flow whose time $(b-a)$ map gives the desired diffeomorphism. This will not work in our situation, since $\widetilde{h}$ is not differentiable at points for which $z'/w' \in J_p$. However, essentially the same proof works if we replace $-\nabla
\widetilde h$ with any $C^1$ vector field $V$ on $W^s([0:1:0])$ having no singularities in $\widetilde{h}^{-1}([a,b])$ and along which $\widetilde h$ is decreasing. Note that, as in [@MILNOR_MORSE], we need that $\widetilde{h}^{-1}([a,b])$ is compact, which follows from $h$ being proper.
Let $V$ be the the vector field parallel to each line through $(z',t') =
(0,0)$, obtained within each line as minus the gradient of the restriction of $\widetilde{h}$ to that line. The restriction of $\widetilde{h}$ to each complex line through $(0,0)$ has no critical points in $\widetilde{h}^{-1}([a,b])$, so it is decreasing along $V$. Since $h$ is pluriharmonic for points with $z'/t' \not \in J_p$, it follows immediately that $V$ is smooth there. To see that $V$ is smooth in a neighborhood of points where $z'/t' \in J_p$, notice that $$\begin{aligned}
\nabla_w G_z(w) = \nabla_w G(z,w) - G_p(z) = \nabla_w G(z,w), \end{aligned}$$ with $G(z,w)$ pluriharmonic on $W^s([0:1:0]) \cap {\ensuremath{{\mathbb{C}}}}^2$.
Therefore, for any $b \in (a,0)$, $W_b$ is homeomorphic to $W_a$ and thus to an open ball. One can then make a relatively standard construction, using these homeomorphisms for $b$ increasing to $0$, in order to show that $W^s([0:1:0]) =
\cup_{b < 0} W_b$ is homeomorphic to an open ball.
Further applications {#SEC:FURTHER_APPS}
====================
In this final section we discuss a few examples of maps to which we have applied the results of this paper, and then a few types of maps which we feel would be fruitful to study further with techniques similar to those of this paper.
Relationship between connectivity of $J_2$ and the topology of the Fatou set for polynomial skew products {#SEC:RELATIONSHIP_TO_MU}
----------------------------------------------------------------------------------------------------------
For polynomial skew products, $J_2 = {{\rm supp}}(\mu) = {{\rm supp}}(T \wedge T) = \overline{\bigcup_{z \in J_p} J_z}$, which by [@JON_SKEW] is also the closure of the set of repelling periodic points. Here we examine to what extent connectivity of $J_2$ affects the homology of the Fatou set $U$.
The following example shows that there are many polynomial skew products $f$ with $J_2$ connected for which $H_1(U(f))$ is non-trivial (in fact infinitely generated.)
\[EXAMPLE:J1DISCONNJ2CONN\] Consider $f(z,w) = (z^2-2,w^2+2(2-z))$ which has $J_2$ connected and has $J_z$ disconnected over $z=-2 \in J_p$, as shown in [@JON_SKEW Example 9.7]. Theorem \[THM:MAIN\] immediately applies, giving that $H_1(U(f))$ is infinitely generated.
In fact, examples of this phenomenon can appear “stably” within a one parameter family. Let $p_n(z) = z^2 + c_n$ be the unique quadratic polynomial with periodic critical point of least period $n$ and $c_n$ real. Then, [@S Theorem 6.1] yields that for $n$ sufficiently large, $$\begin{aligned}
f_n(z,w) = (p_n(z),w^2+2(2-z))\end{aligned}$$ is Axiom A with $J_z$ disconnected for most $z\in J_{p_n}$ and with $J_2$ connected. Suppose that $f_n$ is embedded within any holomorphic one-parameter family $f_{n,\lambda}$ of polynomial skew products. Then, Theorems 4.1 and 4.2 from [@S] (see also, [@JON_MOTION Thm C]) give that all maps $f_{n,\lambda}$ within the same hyperbolic component as $f_n$ also have $J_2$ connected, but $J_z$ disconnected over most $z$ in $J_{p_{n,\lambda}}$. (Here, $p_{n,\lambda}$ is the first component of $f_{n,\lambda}$.) An immediate application of Theorem \[THM:MAIN\] yields that $H_1(U(f_{n,\lambda}))$ is infinitely generated for all $f_{n,\lambda}$ within this hyperbolic component.
Next we consider the possibility of $J_2$ being disconnected, but $f$ not satisfying the hypotheses of our Theorem \[THM:MAIN\].
Is there a polynomial skew product $f$ with $J_2$ disconnected, but all $J_z$’s connected for all $z \in {\ensuremath{{\mathbb{C}}}}$, such that $H_1(U(f))$ is trivial? More generally, is there any endomorphism of ${\ensuremath{{\mathbb{P}}^2}}$ with $J_2$ disconnected, but with all Fatou components having trivial homology?
By [@JON_SKEW Proposition 6.6], in order for $f$ to satisfy the hypotheses of this question, $J_p$ would have to be disconnected. However, a simple product like $(z,w) \mapsto (z^2-100, w^2)$ does not suffice; note for this map, the basin of attraction of $[1:0:0]$, hence the Fatou set, has nontrivial homology. Not many examples of non-product polynomial skew products are understood, and the current list of understood examples contains no maps which satisfy the hypotheses of this question.
A quadratic family of polynomial skew products {#SEC:QUADRATIC_FAMILY}
----------------------------------------------
We now consider the family of examples $f_a(z,w) = (z^2,w^2+az)$, which are skew products over $p(z) = z^2$.
The geometry and dynamics in $J_p \times {\ensuremath{{\mathbb{C}}}}$ were explored in [@S]. For example, there it is established that:
1. [@S Theorem 5.1]: $f_a$ is Axiom A if and only if $g_a(w) := w^2+a$ is hyperbolic; and
2. [@S Lemma 5.5]: $J_2$ can be described geometrically in the following manner: $J_{e^{it}}$ is a rotation of angle $t/2$ of $J_{\{z = 1\}}$. That is, start with $J(g_a)$ in the fiber $J_{\{z = 1\}}$, then as the base point $z=e^{it}$ moves around the unit circle $J_p = S^1$, the corresponding $J_z$’s are rotations of $J(g_a)$ of angle $t/2$, hence the $J_z$’s complete a half turn as $z$ moves once around the base circle.
Due to the structure of $J_2$, the difference between $f_a$ and the product $h_a(z,w) = (z^2, w^2+a)$ is one “twist” in $J_2$. In [@S] it is shown that $f_a$ and $h_a$ are in the same hyperbolic component if and only if $a$ is in the main cardiod of the Mandelbrot set, $\mathcal{M}$.
Note that the extension of $f_a$ to ${\ensuremath{{\mathbb{P}}^2}}$, given by $f_a([Z:W:T]) =
[Z^2,W^2+aZT:T^2]$, is symmetric under the involution $\mathcal{S}([Z:W:T]) = [T:W:Z]$.
\[THM:QUADRATIC\_FAMILY\] The Fatou set of $f_a$ is the union of the basins of attraction of three superattracting fixed points: $[0:0:1], [0:1:0]$, and $[1:0:0]$, each of which is path-connected.
Moreover:
- If $a \not \in \mathcal{M}$, then $W^s([0:1:0])$ has infinitely generated first homology.
- If $a \in \mathcal{M}$, then each of the three basins of attraction $W^s([0:1:0]), W^s([0:0:1])$ and $W^s([1:0:0])$ is homeomorphic to an open ball.
For any $a$, the fiberwise Julia set $J_0$ is the unit circle $|z| = 1$. Proposition 4.2 from [@ROE_NEWTON] can be modified to show that there is a local super-stable manifold $W^s_{\rm loc}(J_0)$ that is obtained as the image of a holomorphic motion of $J_0$ that is parameterized over ${\ensuremath{{\mathbb{D}}}}_{\epsilon}= \{|z| <
{\epsilon}\}$, for ${\epsilon}> 0$ sufficiently small. The motion of $(0,w) \in
J_0$ is precisely the connected component of local super-stable manifold of $(0,w)$ that contains $(0,w)$, which we will call the [*superstable leaf of $w$*]{} and denote by $W^s_{\rm loc}(w)$. By construction, $f_a$ will map the superstable leaf of $(0,w)$ into the superstable leaf of $(0,w^2) = f_a(0,w)$. Moreover, the proof of Proposition 4.4 from [@ROE_NEWTON] can also be adapted to show that $W^s_{\rm loc}(J_0)$ is the zero locus of a pluri-harmonic (hence real-analytic) function.
Pulling back $W^s_{\rm loc}(J_0)$ under iterates of $f_a$, we obtain a global separatrix $W^s(J_0)$ over the entire unit disc ${\ensuremath{{\mathbb{D}}}}= \{|z| = 1\}$. Note that $W^s(J_0)$ may not be a manifold, since ramification may occur at points where it intersects the critical locus of $f_a$. For $|z| < 1$, $J_z$ is the intersection of $W^s(J_0)$ with $\{z\} \times {\ensuremath{{\mathbb{C}}}}$ and that $K_z$ is the intersection of $W^s([0:0:1])\cup W^s(J_0)$ with $\{z\} \times {\ensuremath{{\mathbb{C}}}}$. Thus, any point $(z,w)$ with $|z| < 1$ is in $W^s([0:0:1]) \cup W^s(J_0) \cup W^s([0:1:0])$.
Under the symmetry $\mathcal{S}$, each of the above statements about the super-stable manifold of $J_0$ corresponds immediately to a statement about the unit circle $J_\Pi = \{|Z/W| = 1\}$ in the line at infinity $\Pi = \{T=0\}$. Moreover, any point in ${\ensuremath{{\mathbb{P}}^2}}$ with $|T| < |Z|$ is in $W^s([1:0:0]) \cup W^s(J_\Pi) \cup
W^s([0:1:0])$. Therefore, the Fatou set of $f_a$ is the union of basins of attraction for three superattracting fixed points $[1:0:0]$, $[0:1:0]$, and $[0:0:1]$. Since each of these fixed points is totally invariant, Proposition \[W\_PATH\_CONNECTED\] gives that each of their basins of attraction is path connected.
The vertical Julia $J_1$ set over the fixed fiber $z=1$ is precisely the Julia set of $w \mapsto w^2+a$, which is connected if and only if $a \in
\mathcal{M}$. In particular, if $a \not \in \mathcal{M}$, it follows from Theorem \[THM:MAIN\] that $W^s([0:1:0])$ has infinitely generated first homology.
If $a \in \mathcal{M}$, then, for each $z \in J_p$, $J_z$ is a rotation of the connected set $J_1$ and Theorem \[THM:MAIN\] gives that $W^s([0:1:0])$ is homeomorphic to an open ball. We will now use Slodkowski’s Theorem on holomorphic motions [@SLOD] (see also [@HUBB Section 5.2]) to show that $W^s([0:0:1])$ and $W^s([1:0:0]) =
\mathcal{S}(W^s([0:0:1]))$ are homeomorphic to the open bidisc.
We will extend (in the parameter $z$) the holomorphic motion whose image is $W^s_{\rm loc}(J_0)$ to a holomorphic motion of $J_0$ parameterized by $z \in
{\ensuremath{{\mathbb{D}}}}$, having the entire separatrix $W^s(J_0)$ as its image. Then, by Slodkowski’s Theorem, this holomorphic motion extends (in the fiber $w$) from $J_0$ to a holomorphic motion of the entire Riemann sphere $\mathbb{P}^1$ that is also parameterized by $z \in {\ensuremath{{\mathbb{D}}}}$. Consequently, $W^s([0:0:1])$ will be the image of a holomorphic motion of the open disc $\{z=0, |w| < 1\}$, parameterized by $z \in {\ensuremath{{\mathbb{D}}}}$.
Since $a \in \mathcal{M}$, it also follows from [@JON_SKEW Proposition 6.4] that for each $z \in {\ensuremath{{\mathbb{C}}}}$ the fiber-wise critical points $$\begin{aligned}
C_z := \{w \in {\ensuremath{{\mathbb{C}}}}\,:\,q_z'(w) = 0\}\end{aligned}$$ are in $K_z$. We now check that they are disjoint from $W^s(J_0)$.
The union of these fiber-wise critical points is just the horizontal line $w=0$ that stays on one side of $W^s(J_0)$, possibly touching at many points. Note, however that they are disjoint at $z=0$. Consider the point $z_0$ (with $|z_0|
< 1$) of smallest modulus where $w=0$ and $W^s(J_0)$ touch. Then, there is a neighborhood of $U$ of $z_0$ in ${\ensuremath{{\mathbb{C}}}}^2$ in which $W^s(J_0)$ is given by the zero set of a PSH function $\Psi$. Changing the sign of $\Psi$ (if necessary) we can assume that $\Psi \leq 0$ for points in $K_z \cap U$. The restriction $\psi(z) =\Psi|_{w=0}$ is a non-positive harmonic function in a neighborhood of $z_0$ having $\psi(z_0) = 0$, but $\psi(z) < 0$ for $z$ with $|z|< |z_0|$. This violates the maximum principle. Therefore, the fiber-wise critical points $C_z$ are disjoint from $W^s(J_0)$ for every $z$.
Suppose that $\mathcal{D} \subset W^s(J_0)$ is the graph of a holomorphic function $\nu(z)$ defined on $\{|z| < r\}$, for some $0 < r < 1$. Then, since $W^s(J_0)$ is disjoint from the horizontal critical locus $w = 0$, the Implicit Function Theorem gives that $f_a^{-1}(\mathcal{D})$ is the union of two discs through the pre-images of $\nu(0)$, each given as the graph of a holomorphic function over $\{|z| < \sqrt{r}\}$.
Let $(0,w) \in J_0$ with preimages $(w_1,0)$ and $(w_2,0)$. Since $f_a(W^s_{\rm loc}(w_{1,2})) \subset W^s_{\rm loc}(w)$, the two discs from $f_a^{-1}(W^s_{\rm loc}(w))$ form extensions of $W^s_{\rm loc}(w_{1})$ and $W^s_{\rm loc}(w_{2})$, as graphs of holomorphic functions of $|z| <
\sqrt{{\epsilon}}$.
Therefore, by taking the preimages under $f_a$, the family of local stable discs can be extended, each as the graph of a holomorphic function over $|z| <
\sqrt{{\epsilon}}$. Applied iteratively, we can extend them as the graphs of holomorphic functions over discs $|z| < r$ for any $r < 1$. In the limit we obtain global stable curves $W^s(w_0)$ through every $w_0 \in J_0$, each of which is the graph if a holomorphic function of $z \in {\ensuremath{{\mathbb{D}}}}$. Since the global stable curves of distinct points in $J_0$ are disjoint, their union gives $W^s(J_0)$ as the image of a holomorphic motion of $J_0$ parameterized by $z
\in {\ensuremath{{\mathbb{D}}}}$.
Postcritically Finite Holomorphic Endomorphisms
-----------------------------------------------
Until presenting the conjecture of the previous subsection, this paper has been about endomorphisms with complicated Fatou topology. The opposite extreme is that the Fatou topology may also be trivial in many cases. We suspect one simple case in which Fatou topology is trivial is when the map is postcritically finite (PCF).
Does the Fatou set of a postcritically finite holomorphic endomorphism of ${\ensuremath{{\mathbb{P}}^2}}$ always have trivial homology?
A starting point for investigation into this question could be to attempt to establish it for the postcritically finite examples constructed by Sarah Koch [@KochFRphd; @KochUSphd]. Heuristic evidence supports that the homology is trivial for Koch’s maps. Her construction provides a class of PCF endomorphisms, containing an infinite number of maps, including the previously studied examples of [@FSpcf] and [@CrassPCF].
Other holomorphic endomorphisms of ${\ensuremath{{\mathbb{P}}^k}}$
------------------------------------------------------------------
As we have demonstrated in Sections \[SEC:ENDO\] and \[SEC:SKEW\], given some information about the geometry of the support of $T$, we can apply the techniques of Sections \[SEC:LINKING\] to study the Fatou set of a holomorphic endomorphism of ${\ensuremath{{\mathbb{P}}^2}}$. We would like to be able to apply this theorem to other holomorphic endomorphisms of ${\ensuremath{{\mathbb{P}}^k}}$. However, specific examples of holomorphic endomorphisms that are amenable to analytic study are notoriously difficult to generate.
One family of endomorphisms which seem a potentially vast area of study are the Hénon-like endomorphisms. Introduced by Hubbard and Papadapol in [@HP2], and studied a bit further by Forn[æ]{}ss and Sibony in [@FSexamples], these are holomorphic endomorphisms arising from a certain perturbation of the [Hénon ]{}diffeomorphisms. The [Hénon ]{}diffeomorphisms have been deeply studied (e.g., by Bedford Lyubich, and Smillie, [@BLS1; @BS4], Bedford and Smillie [@BS6; @BS9], Hubbard and Oberste-Vorth [@HO1; @HO2], and Forn[æ]{}ss and Sibony [@FSHenon]). A natural question which is thus far quite wide open is: how does the dynamics of a [Hénon ]{}diffeomorphism relate to the dynamics of the perturbed [Hénon ]{}endomorphism? Computer evidence suggests the dynamics of Hénon-like endomorphisms is rich and varied.
Specifically concerning the topology of the Fatou set, the main result of [@BS6] is that connectivity of the Julia set is determined by connectivity of a slice Julia set in a certain unstable manifold. We ask whether this result would have implications for the related [Hénon ]{}endomorphism, which would allow us to use linking numbers to establish some analog of Theorem \[THM:MAIN\] for [Hénon ]{}endomorphisms.
[^1]: We will often use the abbreviation PSH in place of plurisubharmonic and we use the convention that PSH functions cannot be identically equal to $-\infty$.
[^2]: For the purist: the Green’s functions $G_p$ and $G_z$ should also have the subscript “affine”, but it is dropped here for ease of notation. See Section \[SEC:GREENS\_CURRENT\] for the distinction.
[^3]: The potential function $h$ is sometimes also be called the Green’s function of the point $(0,0)$.
|
minerals and rocks in nigeria
Lead ore minerals are rocks containing lead, which is a heavy metal that is denser than most common materials. Minerals And Rocks In Nigeria greenrevolution. Minerals And Rocks In Nigeria mineral processing system Machine for sale. We are the top world …
Granite Mineral Deposits in Nigeria, West Africa with Information on their locations Of all the igneous rocks, granite is mostly known and is commonly found on Survey of Solid Minerals in Rocks of Ditera and Waltadi, Song, Nigeria
Listed below are chapters from the Minerals Yearbook Volume III: Area Reports-International-Africa and the Middle East. These annual reviews are designed to provide timely statistical data on mineral commodities in various countries.
Rocks and Minerals - Ontario Geosciences Resource Network . Rocks and Minerals The Basic "Stuff" of Minerals and Rocks. At the base of all minerals and rocks are the earth's elements. Elements are fundamental forms of …
As you see, Nigeria is rich in various minerals. Ancient crystalline rocks contain nonferrous and rare metal ores: tin, niobium, molybdenum, zirconium, tantalum, uranium, gold and silver. In sedimentary rocks, there are deposits of coal, oil, gas, limestone etc. Main wealth of the country – is oil. Its importance for the economy grows every year.
and rocks in Nigeria have been carried out by Akpokodje and Hudec 1991, and understanding of the physical, structural, mineralogical and strength constituent minerals of the rocks, their arrangement, texture and their role on the. Identifying Rocks and Minerals/Types of Rocks Wikibooks, open
Mining regulation is handled by the Ministry of Solid Minerals Development, which oversees the management of all mineral resources. Mining law is codified in the Federal Minerals and Mining Act of 1999. Historically, Nigeria's mining industry was monopolized by state-owned public corporations.
This is a list of minerals for which there are articles on Wikipedia.. Minerals are distinguished by various chemical and physical properties. Differences in chemical composition and crystal structure distinguish the various species.Within a mineral species there may be variation in physical properties or minor amounts of impurities that are recognized by mineralogists or wider society as a ...
Mineral ResourcesTulane University . concept of minerals and rocks in nigeria A mineral resource is a volume of rock enriched in one or more useful materials. Read More the concept of minerals and rocks in nigeria
The Concept Of Minerals And Rocks In Nigeria, process crusher .... The Concept Of Minerals And Rocks In Nigeria 51 Views. The Zenith is the professional mining equipments manufacturer in the world, located in China,India, along with ...
Muscovite Mica Mineral export is the export of Mica rocks/stones or Mica sheets/flakes from Nigeria to various countries around the world. In its purest form, it is exported as rocks, but can be further broken down into sheets, which would enable the exporter even earn far more money.
GEOLOGY AND STRUCTURE OF THE PRECAMBRIAN ROCKS IN IWOROKO, ARE AND AFAO AREA, SOUTHWESTERN NIGERIA. ... within the rest of the Precambrian rocks in Nigeria, he grouped the rocks in this region as migmatite – ... feldspar and mica with some accessory minerals such as Myrmikite. The rock also displayed varieties of structural elements such as ...
An Overview of Mineral Resources Development in Nigeria, The Nigeria minerals and mining act ... Paper presented at the Second ASESEDA'NUC National Workshop on Solid minerals Development in Nigeria. 2010.C. (nd). Rock view. Go to Product Center. minerals and rocks in nigeria, process crusher, minerals and rocks in nigeria 184 Views.
Rock and Mineral Kits. Rock and Mineral Kits The most effective way to learn about rocks and minerals. Calcite. Calcite is a carbonate mineral with industrial, agricultural, medical and many other uses. Vanadinite. Vanadinite is an important ore of vanadium and a minor source of lead.
In Nigeria, we have two types of rocks, the basement complex rocks which comprise both metamorphic and igneous rocks and secondly the sedimentary rocks. A mineral resource cannot be useful as well as contribute to the wealth of a nation unless exploited and
The Nigeria basement complex have been conformed to comprise of three major rock units of which are; migmatite, gneiss, migmatite gneiss, the schist belt and older granite and younger granite complexes and all of these are seen in different location of the studied area. From this description of rocks units and also the younger granite intrusion.
Geology and Mineral Resources of Nigeria. Authors ... This book provides a detailed description of Nigeria's geology and mineral resources with the aim of promoting sustainable economic development of Nigeria's mineral and petroleum sectors. ... Part 1 discusses the geology of the crystalline rocks and their regional distribution while the ...
The migmatite gneiss complex is the oldest basement rock, and is believed to be of sedimentary origin but was later profoundly altered into metamorphic and granite conditions. The older metasediments were also among the earliest rocks to form on the Nigerian Basement Complex.
List of Mineral Resources in Nigeria and Their Location Below is the list of Mineral and Natural Resources in Nigeria and the States that they can be found Note this list does not consist of everything that can be found in each state just the major resources.
Nigeria is a vast country with considerable wealth in natural resources and understanding Nigeria's geology is critical for efficient exploration and exploitation of these resources. This book provides a detailed description of Nigeria's geology and mineral resources with the aim of promoting sustainable economic development of Nigeria's ... |
Agricultural and horticultural pesticides fatal poisoning; the Jordanian experience 1999-2002.
A prospective autopsy study addressing fatal poisoning with agricultural and horticultural pesticides was undertaken in Jordan over a 4 year period. A total number of 140 deaths occurred during 1999-2002. The mean fatality rate was 0.68 case per 100,000 population and the age range was 2-55 years; mean 28.3 years with male to female ratio 1.03. The largest number of cases occurred in those 20-29 years (n=69, 49.3%) followed by the age group 30-39 years (n=34, 24.3%) and 40-49 years (n=17, 12.1%). Less than 3.0% of the total fatal poisoning was noticed in both children younger than 9 years of age and those in the age group 50-59 years, with no fatal poisoning in adults at the age 60 years and above. At least 64.3% of all pesticide fatalities were due to suicide with male: female ratio (1.37:1). Accidental and homicide poisoning resulted in 24.3% and 7.9% of the total fatalities, respectively; however, only five cases 3.6% of fatal poisoning were due to unknown pesticides. The main pesticide used was carbamates with 110 cases 78.6% followed by organophosphorus 23 cases 16.4%. The study showed that the present legislation on pesticides availability in Jordan failed to reduce the number of fatal pesticides poisoning since the number of fatal pesticides poisoning was increased from 25.3 to 35 cases per year over a 20 years period. Enforcement of a new legislation addressing the availability of agricultural and horticultural pesticides for self-harm, especially carbamates and organophosphorus, is the most important strategy in the long term to prevent fatal pesticides poisoning in Jordan. |
Advertisement
East Coast rail franchise brought back under public control
Rail services on the East Coast line through Peterborough and Stevenage are being brought under public control for the second time. Credit: ITV News Anglia
Rail services on the East Coast Main Line through Peterborough and Stevenage will be brought back under public control following the termination of the franchise agreement with Virgin Trains East Coast (VTEC).
Stagecoach, which owns 90% of VTEC, said it was "surprised and disappointed" that the Government chose not to award it a new deal to continue runningservices on the London to Edinburgh route.<
Trains will be run by the Department for Transport (DfT) through an operator of last resort (OLR).<
Transport Secretary Chris Grayling told the Commons in February that the
franchise would only be able to continue in its current form for a "very small
number of months" as Stagecoach had "got its numbers wrong" and "overbid".
In a stock market statement, Stagecoach chief executive Martin Griffiths, said: "We are surprised and disappointed that the Department for Transport has chosen not to proceed with our proposals.
"We believe our plans offered a positive, value-for-money way forward for passengers, taxpayers and local communities, ensuring the continuation of the exciting transformation already under way on East Coast and a smooth transition to the Government's new East Coast Partnership.
"We respect the Government's decision.
"We will work constructively with the DfT and the OLR in the weeks ahead to ensure a professional transfer to the new arrangements, supporting our employees and maintaining the same clear focus on our customers as we have over the past three years." |
Q:
What goes into the context parameter of YouTubeStandalonePlayer.createVideoIntent (*context*, YTapiKey, videoID)?
I'm writing an app, and want the app to play a YouTube video using the YouTube API. What do I put in the context parameter of YouTubeStandalonePlayer.createVideoIntent (context, YTapiKey, videoID)?
The documentation says that the context should be an activity. I've tried MainActivity, and activity_main, and findViewById<>(R.layout.activity_main). None of them works.
the MainActivity.kt file:
class MainActivity : AppCompatActivity() {
override fun onCreate(savedInstanceState: Bundle?) {
super.onCreate(savedInstanceState)
setContentView(R.layout.activity_main)
val intent = YouTubeStandalonePlayer.createVideoIntent(context, YTapiKey, videoID)
startActivity(intent)
}
}
the activity_main.xml file:
<?xml version="1.0" encoding="utf-8"?>
<LinearLayout xmlns:android="http://schemas.android.com/apk/res/android"
xmlns:app="http://schemas.android.com/apk/res-auto"
xmlns:tools="http://schemas.android.com/tools"
android:layout_width="match_parent"
android:layout_height="match_parent"
android:orientation="vertical"
tools:context="com.vcsw.explicacao.MainActivity">
<com.google.android.youtube.player.YouTubePlayerView
android:id="@+id/youtubePlayerView"
android:layout_width="match_parent"
android:layout_height="wrap_content" />
</LinearLayout>
I expected that simply placing the name of the activity in the context parameter of the intent YouTubeStandalonePlayer.createVideoIntent(context, YTapiKey, videoID) would work, but it doesn't.
A:
Your code is in an activity. To refer to the activity instance, use this keyword for an activity context.
|
Toxoplasma gondii: Bradyzoite Differentiation In Vitro and In Vivo.
Toxoplasma gondii, a member of the Apicomplexa, is known for its ability to infect an impressive range of host species. It is a common human infection that causes significant morbidity in congenitally infected children and immunocompromised patients. This parasite can be transmitted by bradyzoites, a slowly replicating life stage found within intracellular tissue cysts, and oocysts, the sexual life cycle stage that develops in domestic cats and other Felidae. T. gondii bradyzoites retain the capacity to revert back to the quickly replicating tachyzoite life stage, and when the host is immune compromised unrestricted replication can lead to significant tissue destruction. Bradyzoites are refractory to currently available Toxoplasma treatments. Improving our understanding of bradyzoite biology is critical for the development of therapeutic strategies to eliminate latent infection. This chapter describes a commonly used protocol for the differentiation of T. gondii tachyzoites into bradyzoites using human foreskin fibroblast cultures and a CO2-limited alkaline cell media, which results in a high proportion of differentiated bradyzoites for further study. Also described are methods for purifying tissue cysts from chronically infected mouse brain using isopycnic centrifugation and a recently developed approach for measuring bradyzoite viability. |
MORC3 Is a Target of the Influenza A Viral Protein NS1.
Microrchidia 3 (MORC3), a human ATPase linked to several autoimmune disorders, has been characterized both as a negative and positive regulator of influenza A virus. Here, we report that the CW domain of MORC3 (MORC3-CW) is targeted by the C-terminal tail of the influenza H3N2 protein NS1. The crystal structure of the MORC3-CW:NS1 complex shows that NS1 occupies the same binding site in CW that is normally occupied by histone H3, a physiological ligand of MORC3-CW. Comparable binding affinities of MORC3-CW to H3 and NS1 peptides and to the adjacent catalytic ATPase domain suggest that the viral protein can compete with the host histone for the association with CW, releasing MORC3 autoinhibition and activating the catalytic function of MORC3. Our structural, biochemical, and cellular analyses suggest that MORC3 might affect the infectivity of influenza virus and therefore has a role in cell immune response. |
Introduction
============
Several low-molecular-weight compounds, such as N-nitrosamines, vinyl chloride, benzene, and ethanol are metabolized by the cytochrome P4502E1 (CYP2E1). This enzyme is a member of the cytochrome P450 superfamily ([@ref-2]; [@ref-9]). CYP2E1 produces more reactive oxygen species compared to many other CYP enzymes because of high redox potential ([@ref-6]; [@ref-12]; [@ref-20]). Therefore, in alcohol-induced liver injury, CYP2E1 is thought to be an important source of free radicals ([@ref-6]). Among the many drugs metabolized partially or completely by CYP2E1 include halothane, enflurane, isoflurane, paracetamol, ethanol, theophylline, chlorzoxazone, zopiclone, eszopiclone and verapamil ([@ref-1]; [@ref-8]). In addition to metabolizing many pharmaceutical drugs, *CYP2E1* gene itself is regulated by many exogenous and endogenous substances and may substantially enhance the risk posed by many industrial and environmental chemicals ([@ref-4]).
Selected polymorphisms in this gene are associated with a higher risk of certain diseases such as cancer ([@ref-3]; [@ref-18]). For example, single nucleotide polymorphisms, *CYP2E1\*7C*, NC_000010.10:g.135340548A\>G (rs2070672) and *CYP2E1*, NC_000010.10:g.135339244G\>C (rs3813865), are significantly associated with high altitude polycythemia risk ([@ref-17]), with nasopharyngeal carcinoma risk in Cantonese ([@ref-13]), with poorer cancer-specific survival in head & neck cancer ([@ref-10]). These polymorphisms are also associated with inter-individual differences in drug response and adverse effects, especially the liver injury with ethanol, and the frequency of these polymorphisms varies in different ethnic groups around the world ([@ref-5]; [@ref-11]; [@ref-14]). As the frequencies of genetic polymorphisms are associated with interethnic differences in drug response and add significant risk for certain diseases, it is an extremely important subject to investigate. That is why frequencies of these polymorphisms in *CYP2E1* have been described for various populations.
Pakistan is a culturally diverse country, but little is known about the distribution of *CYP2E1* genetic polymorphism in this country of over 200 million people. Various parts of the country possess a unique lifestyle, diverse genetic background, dietary habits, culture, and geographical environment. There are more than 100 single nucleotide polymorphisms found in *CYP2E1* in addition to some copy number variants. Among them, rs2031920, rs3813867, rs6413432, rs6413420, rs72559710, rs55897648, rs2070673, rs3813865 and rs2070672 are well known. However, only a few might alter the enzyme activity or associated with certain diseases. Therefore, we specifically investigated samples drawn from six of Pakistan's most populous ethnic groups located in distinct geographical locations and found out frequencies of two important polymorphisms (rs3813865 and rs2070672) and then compared them with previous findings in other populations.
Materials and Methods
=====================
Sample collection and DNA extraction
------------------------------------
This study was approved by the Institutional Review Board and Ethics Committee of Shifa Tameer-e-Millat University, Islamabad, Pakistan (ref: IRB\# 990-265-2018). Written informed consent forms were obtained from all participating individuals. The study cohort comprised of 636 healthy human individuals from six major ethnicities of Pakistan including Punjabis, Pathan, Sindhi, Balochi, Seraiki, and Urdu Speaking. Ethnicity was self-reported. Five ml of venous blood drawn into sterile tubes containing EDTA as an anti-coagulant was stored at 4 °C. The whole-genome DNA was isolated using Gene Jet Genomic DNA extraction Kit (Thermo Fischer, Waltham, MA, USA) and was quantified using 1% agarose gel electrophoresis. Isolated genomic DNA was stored at −20 °C until further processing.
Genotyping
----------
*CYP2E1* (rs3813865, G\>C; rs2070672, A\>G) were genotyped using Allele Refractory Mutation System-Polymerase Chain Reaction (ARMS-PCR) using a pair of outer primers and a pair of inner primers as shown in [Table 1](#table-1){ref-type="table"}. PCR for both the SNPs was performed separately in a total reaction volume of 25 µl containing 12.5 µl of 2X Dream Taq Mastermix (Thermo Fischer, Waltham, MA, USA), 0.18 mM of both OF and OR primers, 0.36 mM of both IF and IR primers, 7.7 µl of sterile PCR water and three µl of template DNA (20--50 ng/μl). Thermal profile was as follows: initial denaturation at 95 °C for 2 min followed by 35 cycles with denaturation at 95 °C for 30 s, 30 s of primer annealing at 54 °C for rs3813865 and 58 °C for rs2070672, initial extension at 72 °C for 1 min and a final extension at 72 °C for 2 min. For visualization 12 µl of PCR product was directly loaded onto 3% agarose gel. For rs3813865, homozygous wild type GG genotype had 499 bp and 303 bp fragments, homozygous mutant CC genotype had 499 bp and 236 bp fragments and heterozygous GC genotype had three fragments; 499 bp, 303 bp, and 236 bp. Whereas for rs2070672 homozygous wild type GG genotype had 455 bp and 277 bp fragments, homozygous mutant AA genotype had 455 bp and 218 bp fragments and heterozygous GA genotype had three fragments; 455 bp, 277 bp, and 218 bp. Selected samples were sent for Sanger sequencing, and the results obtained were found to conform with results from our laboratory.
10.7717/peerj.9721/table-1
###### Primer sequences for CYP2E1 rs3813865 and rs2070672 along with their product sizes.

Primer ID Primer sequence Product size
--------------- ----------------------------------------- ----------------------------------- --------------
rs3813865 OF 5′ TGA TGT TGG TTG GGC ATC TA 3′ 499 bp
OR 5′ CCT CGA GGT GAG AAC TGA CA 3′
IF (G allele) 5′ CTC ACC CCA CCA AAG CCT AC 3′ 303 bp
IR (C allele) 5′ CCA CAG ACT GAA ATT GAA CCC 3′ 236 bp
rs3813865 OF 5′ CCA TTC ATG TGG CAG GTG GTG 3′ 455 bp
OR 5′ CCA ATG CCC TCT TGC TAC TCG TCT A 3′
IF (G allele) 5′ TGG AGT TCC CCG TTG TCG AG 3′ 277 bp
IR (A allele) 5′ GTC CTG CCC TTT GGC ACT CGT 3′ 218 bp
Statistical analysis
--------------------
Data were compiled according to the genotype and allele frequencies estimated from the observed numbers of each specific allele. The frequency of each allele and genotype in our samples is given together with the 95% confidence interval. The confidence interval for proportions was calculated using the formula (CI = *p* ± (1.96 × SE), SE = qrt \[*p*(1 − *p*)/*n*\], *p* = proportion, *n* = sample size). Chi-squared test and *p* values were calculated using observed and expected frequencies as per the Hardy--Weinberg equation.
Results
=======
Frequencies of *CYP2E1* (rs2070672) alleles in the Pakistani population are shown in [Table 2](#table-2){ref-type="table"} while representative agarose gel image of the experiments is shown in [Fig. S1](#supp-1){ref-type="supplementary-material"}. The frequency of the major allele was 89.62% and of minor allele was 10.37%. Major allele was found slightly less prevalent in Punjabi and Urdu populations at 87.18% and 84.14% respectively compared to Pathan, Sindhi, Seraiki and Baloch populations, where the prevalence of major allele was slightly higher ([Fig. 1](#fig-1){ref-type="fig"}; [Table 2](#table-2){ref-type="table"}). The frequency of AA genotype was 82.70%, AG was 13.83% and GG was 3.45% in the Pakistan population. Punjabi and Urdu populations showed a slightly lower frequency of wild type genotype at 79.83% and 78.04% respectively while Pathan, Sindhi, and Seraiki populations had a slightly higher prevalence of wild type genotype. Baloch population showed the highest frequency of wild type genotype at 92.68%. No homozygous GG genotype was found in Pathan, Seraiki and Baloch populations ([Table 3](#table-3){ref-type="table"}).
{#fig-1}
10.7717/peerj.9721/table-2
###### Allelic frequencies of CYP2E1 (rs2070672) invarious Pakistani ethnicities.

S. No. Ethnicity *N* A% (95% CI) G% (95% CI)
-------- ----------- ----- ------------------------ ------------------------
1 Pakistan 636 89.62 \[87.94--91.3\] 10.37 \[8.69--12.05\]
2 Punjabi 238 87.18 \[84.18--90.18\] 12.81 \[9.81--15.81\]
3 Pathan 107 90.65 \[86.75--94.55\] 9.21 \[5.34--13.08\]
4 Sindhi 59 92.37 \[87.58--97.16\] 7.62 \[2.83--12.41\]
5 Seraiki 68 92.64 \[88.25--97.03\] 7.93 \[3.39--12.47\]
6 Baloch 82 96.34 \[93.47--99.21\] 3.63 \[0.77--6.49\]
7 Urdu 82 84.14 \[78.55--89.73\] 15.85 \[10.26--21.44\]
10.7717/peerj.9721/table-3
###### Observed and expected frequencies of CYP2E1 (rs2070672) genotypes.

Population Geno *N* Observed frequency percentage (CI) Expected frequency percentage by HW law Chi squared *P* value
------------ ------ ------------------------ ------------------------------------ ----------------------------------------- ------------- -----------
Pakistani AA 526 82.70 \[79.76--85.64\] 80.32 35.10 \<0.05
AG 88 13.83 \[11.15--16.51\] 18.58
GG 22 3.45 \[2.03--4.87\] 1.07
Punjabi AA 190 79.83 \[74.73--84.93\] 76.01 27.82 \<0.05
AG 35 14.70 \[10.2--19.2\] 22.33
GG 13 5.46 \[2.57--8.35\] 1.64
Pathan AA 87 81.30 \[73.91--88.69\] 82.17 1.14 \>0.05
AG 20 18.69 \[11.3--26.08\] 16.94
GG 0 0 0.87
Urdu AA 64 78.04 \[67.08--88\] 70.80 24.17 \<0.05
AG 10 12.19 \[5.11--19.27\] 26.66
GG 8 9.75 \[3.33--16.17\] 2.51
Seraiki AA 58 85.29 \[76.87--93.71\] 78.20 0.43 \>0.05
AG 10 14.70 \[6.28--23.12\] 28.87
GG 0 0 2.66
Seraiki AA 76 92.68 \[87.04--98.32\] 92.81 0.11 \>0.05
AG 6 7.31 \[1.68--1294\] 7.04
GG 0 0 0.13
Sindhi AA 51 86.44 \[77.7--95.18\] 85.33 1.47 \>0.05
AG 7 11.86 \[3.61--20.11\] 14.07
GG 1 1.69 \[0--4.98\] 0.58
Frequencies of *CYP2E1* (rs3813865) alleles in the Pakistani population are shown in [Table 4](#table-4){ref-type="table"} while representative agarose gel image of the experiments is shown in [Fig. S2](#supp-2){ref-type="supplementary-material"}. The frequency of minor alleles for this polymorphism was higher in the Pakistani population, compared to rs2070672, and found to be 14.8% ([Table 4](#table-4){ref-type="table"}). In Punjabi and Urdu populations, the minor allele was found even more prevalent at 18.49% and 18.83% respectively. In Sindhi population, the frequency of minor allele was found to be the lowest at 1.81%. The frequency of the GG genotype was 72.47%, GC was 23.58% and CC was 3.93% in the Pakistan population. In Punjabi and Urdu populations, wild type genotype (GG) was slightly less prevalent at 63.47% and 67.53% respectively. Baloch population showed a higher frequency of wild type genotype at 83.60%. The highest prevalence of wild type genotype was found in the Sindhi population at 96.36%. Sindhi was also the only population in which no homozygous CC genotype was observed. All other ethnic groups showed CC genotype albeit at varying frequencies ([Table 5](#table-5){ref-type="table"}).
10.7717/peerj.9721/table-4
###### Allelic frequencies of CYP2E1 (rs3813865) in various Pakistani ethnicities.

S.No Population *N* (rs 38) G% (95% CI) C% (95% CI)
------ ------------ ------------- ------------------------ ------------------------
1 Pakistan 585 85.12 \[82.34--88\] 14.8 \[11.92--17.68\]
2 Punjabi 219 81.50 \[76.36--86.64\] 18.49 \[13.35--23.63\]
3 Pathan 109 86.69 \[80.31--93.07\] 13.30 \[6.93--19.63\]
4 Sindhi 55 98.18 \[94.65--100\] 1.81 \[0--5.33\]
5 Seraiki 64 85.15 \[76.44--93.86\] 14.84 \[6.13--23.55\]
6 Baloch 61 88.52 \[80.52--96.52\] 11.47 \[3.47--19.47\]
7 Urdu 77 81.16 \[72.43--89.89\] 18.83 \[10.1--27.56\]
10.7717/peerj.9721/table-5
###### Observed and expected frequencies of CYP2E1 (rs3813865) genotypes.

Population Geno *N* Observed frequency percentage (CI) Expected frequency percentage by HW law Chi Squared
------------ ------ ------------------------ ------------------------------------ ----------------------------------------- -------------
Pakistani 585
GG 424 72.47 \[68.85--76.09\] 71.01 7.08 \<0.05
GC 138 23.58 \[20.14--27.02\] 26.49
CC 23 3.93 \[2.36--5.50\] 2.47
Punjabi 219
GG 139 63.47 \[57.09--69.85\] 62.76 0.40 \>0.05
GC 69 31.50 \[25.35--37.65\] 32.91
CC 11 5.02 \[2.13--7.91\] 4.31
Pathan 109
GG 83 76.14 \[68.14--84.14\] 75.15 0.79 \>0.05
GC 23 21.10 \[13.44--28.76\] 23.06
CC 3 2.75 \[0--5.82\] 1.77
Urdu 77
GG 52 67.53 \[54.8--80.26\] 65.88 0.89 \>0.05
GC 21 27.27 \[15.17--39.37\] 30.56
CC 4 5.19 \[0--11.22\] 3.54
Seraiki 64
GG 46 71.87 \[60.85--82.89\] 72.51 0.16 \>0.05
GC 17 26.56 \[15.74--37.38\] 25.27
CC 1 1.56 (0-4.6) 2.20
Balochi 61
GG 51 83.60 \[74.31--92.89\] 78.36 16.23 \<0.05
GC 6 9.83 \[2.36--17.3\] 20.30
CC 4 6.55 \[0.34--12.76\] 1.31
Sindhi 55
GG 53 96.36 \[91.41--100\] 96.39 0.02 \>0.05
GC 2 3.63 \[0--8.57\] 3.56
CC 0 0 0.03
Discussion
==========
According to its Statistics Bureau, Pakistan with an estimated population of over 210 million, is the sixth most populous country in the world ([@ref-15]). The country has a young, multi-ethnic and multi-cultural society and despite being home to a huge population, pharmacogenetic studies on how its population responds to various pharmaceutical drugs are rare. The largest ethnic group in Pakistan is Punjabi, which makes up about 38.78% of the population, followed by Pashtuns (18.24%), Sindhis (14.57%), Seraikis (10.53%), Urdu speaking (7.57%) and Baloch (3.57%) ([@ref-15]). These ethnic groups represent about 94% of the Pakistani population. Genetic variations in CYP genes affecting the metabolism of xenobiotics and drug response have not been investigated in these ethnic groups. Our study partly addresses this issue by reporting frequencies of two of the most important single nucleotide polymorphisms in the *CYP2E1* gene.
The frequency of rs2070672 minor allele (G) in the Pakistani population was similar to the one found in the American population ([Table 6](#table-6){ref-type="table"}). The lowest frequency of minor allele has previously been reported from Europe (0.027). Literature search shows that in the African population, minor allele is slightly more prevalent than in the Pakistani population while East and South Asian populations have the highest frequencies of the minor allele ([@ref-7]). Similar results were found for genotype frequency where the wild type genotype observed in the Pakistani population was comparable to the American population. The highest frequency of wild type genotype is reported from Europe, in which no homozygous GG genotype was found. The highest frequencies of heterozygous and homozygous GG are reported from East and South Asian populations ([@ref-7]). The difference in allele and genotype frequencies between earlier reports for South Asian populations and this study may be because our study estimated frequencies in six different ethnicities while in 1,000 Genome project, the Pakistani population is represented by one ethnicity only. The difference in sample size may be another reason for discrepancy.
10.7717/peerj.9721/table-6
###### CYP2E1 (rs2070672) allele frequencies in 1,000 Genome population.

Population G C GG GC CC
------------ ------- ------- ------- ------- -------
AFR 0.852 0.148 0.734 0.236 0.030
AMR 0.889 0.102 0.813 0.170 0.017
EAS 0.733 0.267 0.530 0.407 0.063
EUR 0.974 0.26 0.948 0.52 0
SAS 0.713 0.287 0.513 0.399 0.088
BEB 0.686 0.315 0.488 0.395 0.116
GIH 0.728 0.272 0.524 0.408 0.068
ITU 0.721 0.279 0.520 0.402 0.078
PJL 0.755 0.245 0.594 0.323 0.083
STU 0.672 0.328 0.441 0.461 0.098
**Note:**
AFR, African; AMR, American; EAS, East Asian; EUR, European; SA, South Asian; BEB, Bengali in Bangladesh; GIH, Gujrati Indian in Houston, TX; ITU, Indian Telugu in UK; PJL, Punjabi in Lahore, Pakistan; STU, Sri Lankan Tamil in UK.
Among various ethnicities, Urdu speaking showed the highest frequency of rs2070672 minor allele. Punjabi ethnicity displayed the highest prevalence of the minor allele after Urdu speaking while Baloch people exhibited the lowest frequency of this allele. While comparing genotypes frequencies, Urdu speaking ethnicity showed the lowest frequency of wild type genotype (AA) followed by Punjabi ethnicity. The highest frequency of wild type genotype was exhibited by Baloch ethnicity. Pathan, Baloch and Seraiki ethnicities did not show any homozygous mutant genotype (GG) while Urdu speaking ethnicity displayed the highest frequency of this genotype among the study participants. Studies investigating this polymorphism in the regional populations reveal that the Chinese Uygur population has a low prevalence of this genetic variant at 0.25% ([@ref-19]). Other studies carried out at various geographical locations in China showed much higher frequencies. For example, this variant was found at a frequency of 18.8% in Shantou, 14.1% in Shanghai, 18.8% in Shenyang and 21.9% in Xian ([@ref-16]).
Comparison with other regional populations reveal relatively lower frequencies of the minor allele (rs207067) in Pakistani ethnicities. Sri Lankan Tamils in the UK (STU) and Bengali from Bangladesh (BEB) have shown a much higher frequency of minor allele at 0.328 and 0.315 respectively whereas, in Pakistani population, the highest frequency of this allele is reported by Punjabi and Urdu ethnicities at 0.128 and 0.158, respectively. Even Gujrati Indian in Houston (GIH), Punjabi in Lahore (PJL) and Indian Telugu in the UK (ITU) have reported minor allele frequencies that are higher than most Pakistan ethnicities. Although, largely in agreement with regional ethnicities, this relatively low frequency of minor alleles in Pakistani ethnicities might be due to broad geographical locations from which our samples were obtained. For example, PJL data in the 1,000 genome project, was obtained from one center in Lahore while our samples were collected from various centers in Rawalpindi, Islamabad, and Lahore.
The frequency of rs3813865 minor allele (C) in the Pakistani population was similar to the one found in African population. The lowest frequency of the minor allele is reported from Europe (0.026) ([Table 7](#table-7){ref-type="table"}). The highest frequencies of this polymorphism are reported from South and East Asia at 0.287 and 0.267 respectively ([@ref-7]). The frequency of this genetic variant in the American population is reported at 0.102, which is the second-lowest frequency reported in the 1,000 genome database for this variant. Looking at the genotype frequencies, wild type genotype observed in the Pakistani population was closest to the one reported for the African population. South Asian and East Asian populations are reported to have the lowest frequencies of wild type genotype at 0.513 and 0.530 respectively ([@ref-7]). The highest frequency of wild type genotype (GG) is reported from European populations at 0.948 with a 0.52 heterozygous genotype (GC). However, European populations are the only ones reported in the 1,000 genome to have no homozygous CC genotype.
10.7717/peerj.9721/table-7
###### CYP2E1 (rs2070672) allele frequencies in 1,000 Genome population.

Population A G AA AG GG
------------ ------- ------- --------- ------- -------
AFR 0.850 0.150 0.735 0.230 0.035
AMR 0.899 0.101 0.816 0.167 0.017
EAS 0.736 0.264 0.534 0.405 0.062
EUR 0.973 0.027 0.946 0.054 0
SAS 0.713 0.287 0.513 0.399 0.088
BEB 0.686 0.314 0.488 0.395 0.116
GIH 0.728 0.272 0\. 524 0.408 0.068
ITU 0.721 0.279 0.520 0.402 0.078
PJL 0.755 0.245 0.594 0.323 0.083
STU 0.672 0.328 0.441 0.461 0.098
**Note:**
AFR, African; AMR, American; EAS, East Asian; EUR, European; SA, South Asian; BEB, Bengali in Bangladesh; GIH, Gujrati Indian in Houston, TX; ITU, Indian Telugu in UK; PJL, Punjabi in Lahore, Pakistan; STU, Sri Lankan Tamil in UK.
Comparing rs3813865 polymorphism among various ethnicities revealed that Urdu and Punjabi ethnicities have the highest prevalence of the minor allele (C). The highest major allele frequency was exhibited by Sindhi ethnicity. Pathan, Seraiki and Baloch ethnicity showed frequency of minor allele in the same range but was considerably higher than Sindhi ethnicity. Studying genotype frequencies of various ethnicities showed that Sindhi ethnicity possesses the highest wild type genotype (GG). The lowest wild type genotype was exhibited by Punjabi ethnicity. Pathan, Seraiki, Baloch, and Urdu speaking ethnicities showed an intermediate prevalence of wild type genotype compared to Sindhi and Punjabi ethnicities. Only Sindhi ethnicity did not report any homozygous mutant genotype (CC). Consistent with our findings with rs207067, the frequency of rs3813865 minor allele was found slightly lower in our ethnic populations in comparison with other regional ethnicities. Sri Lankan Tamils in the UK (STU) and Bengali from Bangladesh (BEB) have shown a higher frequency of minor allele at 0.328 and 0.315 respectively whereas, in Pakistani population, the highest frequency of this allele is reported by Punjabi and Urdu ethnicities at 0.185 and 0.188, respectively. Even Gujrati Indian in Houston (GIH), Punjabi in Lahore (PJL) and Indian Telugu in the UK (ITU) have reported minor allele frequencies that are higher than most Pakistan ethnicities. A literature search shows that the frequency of this genetic variant at various geographical locations in China displayed comparable and, in some cases, higher frequencies. For example, this variant was found at a frequency of 18.7% in Shantou, 14% in Shanghai, 23.4% in Shenyang and 22.4% in Xian ([@ref-16]).
Limitations of our study include finding out the prevalence of only two SNPs while there are more than 100 SNPs found in *CYP2E1*. However, only a few might alter the enzyme activity or associated with certain diseases. Our methods for the determination of these SNPs also prohibited us from finding novel SNPs in our population. Sequencing all samples could have helped find new SNPs in our population. This would have also helped us finding copy number variants in the *CYP2E1* gene in our population if any. Functional analysis of the CYP2E1 enzyme, containing these SNPs could have helped establish the functional relevance of observed SNPs.
Conclusions
===========
To our knowledge, this is the first study to report frequencies of *CYP2E1* gene polymorphisms in various ethnicities of the Pakistani population. Genetic information about patients' *CYP2E1* gene is likely to help physicians prescribe to patients the most suitable and safest drug based on their genetic make-up. We propose further studies with individual drugs metabolized by CYP2E1 to shed more light on genotype phenotype relations. Carrying out enzyme activities of CYP2E1 containing these SNPs would be helpful to establish functional relevance and importance of these SNPs in the Pakistani population.
Supplemental Information
========================
10.7717/peerj.9721/supp-1
###### A representative gel of CYP2E1 (rs3813865) genotyping assay 1.
######
Click here for additional data file.
10.7717/peerj.9721/supp-2
###### A representative gel of CYP2E1 (rs2070672) genotyping assay 1.
######
Click here for additional data file.
10.7717/peerj.9721/supp-3
###### Polymorphism of CYP2E1 (rs2070672) in the ethnic groups.
Shows all subjects examined according to their gender, ethnicity, age, genotype, addiction (eg. smoking), diet (red meat consumption), sedentary life, family history, medication, co-morbidities, and diseases.
######
Click here for additional data file.
10.7717/peerj.9721/supp-4
###### Polymorphism of CYP2E1 (rs3813865) in the ethnic groups.
Shows all subjects examined according to their gender, ethnicity, age, genotype, addiction (eg. smoking), diet (red meat consumption), sedentary life, family history, medication, co-morbidities, and diseases.
######
Click here for additional data file.
Additional Information and Declarations
=======================================
The authors declare that they have no competing interests.
[Sagheer Ahmed](#author-1){ref-type="contrib"} conceived and designed the experiments, performed the experiments, analyzed the data, prepared figures and/or tables, and approved the final draft.
[Nadeem Altaf](#author-2){ref-type="contrib"} conceived and designed the experiments, performed the experiments, authored or reviewed drafts of the paper, and approved the final draft.
[Mahnoor Ejaz](#author-3){ref-type="contrib"} conceived and designed the experiments, performed the experiments, prepared figures and/or tables, and approved the final draft.
[Zaira Zulfiqar](#author-4){ref-type="contrib"} conceived and designed the experiments, performed the experiments, prepared figures and/or tables, and approved the final draft.
[Kholood Janjua](#author-5){ref-type="contrib"} conceived and designed the experiments, performed the experiments, authored or reviewed drafts of the paper, and approved the final draft.
[Dana Festila](#author-6){ref-type="contrib"} analyzed the data, prepared figures and/or tables, authored or reviewed drafts of the paper, and approved the final draft.
[Nicula Cristina](#author-7){ref-type="contrib"} analyzed the data, prepared figures and/or tables, authored or reviewed drafts of the paper, and approved the final draft.
The following information was supplied relating to ethical approvals (i.e., approving body and any reference numbers):
The Institutional Review Board and Ethics Committee of Shifa Tameer-e-Millat University, Islamabad, Pakistan approved this research (990-265-2018).
The following information was supplied regarding data availability:
The raw measurements are available in the [Supplemental Files](#supplemental-information){ref-type="supplementary-material"}.
|
Grant McCann keeps Peterborough United afloat with free-kick stunner
A superb Grant McCann free-kick was enough to give relegation-battlers Peterborough United all three points on Saturday evening against fellow strugglers Sheffield Wednesday.
The second-half strike was the only difference between the two sides on the day and it gives the Posh a great chance for survival in the Championship after a very poor start to the season that saw them go seven games without a single point.
Before the game, Posh knew that only a win would do as they saw Barnsley pick up three-vital points at home to Hull City and in-front of a packed out London Road, it was a Grant McCann special that secured the vital points.
Sheffield Wednesday started the game on the front foot after a Steve Howard header was saved well by Bobby Olejnik, but once the game got into the swing of things, it was the hosts that saw most of the possession.
The first real chance for Peterborough came when Lee Tomlin saw his shot parried by veteran goalkeeper Chris Kirkland and after the rebound fell back to Tomlin, he passed the ball across to in-form striker Dwight Gayle, who saw his shot eventually cleared on the line by defender, Miguel Llera.
Despite having over 70% of the possession in the opening stages, Posh couldn't get behind the Wednesday defence and the first-half ended with both sides deadlocked at 0-0.
Early in the second half, it was Gayle yet again that came close to scoring, but his shot was once again blocked off the line by Miguel Llera and the hosts appeal for hand-ball was quickly rejected. TV replays showed that the ball hit the defender in the chest.
Just as the hour-mark passed, Peterborough won a free-kick after loanee midfielder Alex Pritchard was bundled over by centre-back, Anthony Gardner.
Grant McCann has a lot of history scoring from free-kicks, his most famous one coming at Old Trafford when the Posh beat Huddersfield 3-0 to get promoted to the Championship and this free-kick could be just as important come the end of the season.
The Northern Ireland international smashed the ball over the wall and saw the ball smash against the post and nestle in the back of the net much to the delight of the home fans.
After the goal, chances were at a premium as neither side really had golden chances to add another, but the one goal was all that Peterborough needed to climb out of the relegation zone.
The Posh will now go into the last game of the season knowing that their survival fight is in their own hands as they travel to Crystal Palace.
The win means that there are seven teams fighting it out for survival, with two of them going down to League One.
DISCLAIMER: This article has been written by a member of the GiveMeFootball Writing Academy and does not represent the views of GiveMeFootball.com or SportsNewMedia. The views and opinions expressed are solely that of the author credited at the top of this article. GiveMeFootball.com and SportsNewMedia do not take any responsibility for the content of its contributors.
Do YOU want to write for GiveMeSport? Get started today by signing-up and submitting an article HERE: http://gms.to/writeforgms
Report author of article
DISCLAIMER
This article has been written by a member of the GiveMeSport Writing Academy and does not represent the views of
GiveMeSport.com or SportsNewMedia. The views and opinions expressed are solely that of the author credited at the top of this article.
GiveMeSport.com and SportsNewMedia do not take any responsibility for the content of its contributors.
Want more content like this?
Like our GiveMeSport Facebook Page and you will get this directly to you. |
Formulated with various natural ingredients such as egg yolk and white willow bark, it works to soothe sensitive skin cause by ance, Making it suitable for excessive oily skin and sensitive skin. It functions to relieve red, uneven, irritated and damaged skin and control soil and moisture as well as sebum, leaving the skin fresh
What is an egg yolk antibody(IgY)?
It contains an egg yolk antibody made using eco-friendly ingredients derived from nature.
Life Science research center and egg yolk antibody, IgY
A key natural antibody, lgY, was developed jointly by Dan Biotech and Department of Biological Sciences in Dankook University through the process of separation, refinement and inoculation of organisms such as P.acne, and S. epidermidis that cause skin troubles. It is effective for acne and troubled skin.
Development process of egg yolk antibody.
DnB Premium Total Soluon Composition
[DnB Snail Premium Foam Cleansing]
It removes makeup and the production of sebum with extremely soft bubble |
602 F.Supp. 1458 (1985)
UNITED STATES of America, Plaintiff,
v.
Alejandrina TORRES, et al., Defendants.
No. 83 CR 494, 1-4.
United States District Court, N.D. Illinois, E.D.
March 8, 1985.
*1459 Michael E. Deutsch, Dennis Cunningham, Melinda Power, David C. Thomas, Chicago, Ill., for defendants.
Joseph H. Hartzler, U.S. Atty., Chicago, Ill., for plaintiff.
MEMORANDUM
LEIGHTON, District Judge.
In this criminal case, two national electronics news media corporations, National Broadcasting Company, Inc. ("NBC"), and American Broadcasting Companies, Inc. ("ABC"), move the court for leave to intervene. Their interest in this prosecution is the prospect that at trial before a jury the evidence against defendants will include tapes of intercepted aural and visual communications, which, according to the government, show that before their arrest, defendants were engaged in a seditious conspiracy against the United States, one of the charges in this eight-count superseding indictment.
The corporations, as electronics news media institutions, want these tapes made available to them in one of two ways. First, and this is what they prefer, they want this court to enter orders which would allow them to cooperate, install wires in the courtroom, capture the contents of the tapes simultaneously with their introduction as evidence to the jury. The *1460 corporations argue that because of the nature of the charges in this case, alleged acts of domestic terrorism, the public has an interest in knowing the contents of the tapes as the evidence is presented to the jury. In the alternative, if their first request is not granted, the corporations ask that this court enter an order that would make the contents of the tapes available to them, during or after recesses, at convenient times during the trial.
The government has no objection to these news media requests. Defendants, however, object on the ground that the broadcasting corporations will give a distorted and unfair construction to the intercepted evidence against them; that the media coverage which the broadcasting corporations intend to give to this case will be biased, they already having branded defendants terrorists despite their pleas of not guilty to the government's charges; and that making the audiotapes and videotapes available to the corporations will serve only "to gratify private spite or promote public scandal." For these reasons, defendants insist, the applications by the corporations should be denied because granting them would only give the news media an opportunity to publicize the contents of the tapes and serve the improper purpose of using defendants' trial as an official source for propaganda.
Based on the following facts and applicable law, and having resolved the issues presented, this court grants the motions for leave to intervene, denies the motions for orders granting the broadcasting corporations permission to install wires in the courtroom and instantaneously capture and broadcast the audio and videotapes; but, in the alternative, grants the corporations' motions for an order which, at their expense, will permit them to copy all the audio and videotapes admitted in evidence, promptly after such tapes are presented to the jury at the trial of this cause, but in no event later than the conclusion of the half-day court session at which the tapes are played to the jury.
I
On June 29, 1983, Alejandrina Torres, Edwin Cortes, Alberto Rodriguez, and Jose Rodriguez were arrested in Chicago by agents of the government on a charge that they were members of a seditious conspiracy against the United States by which the conspirators sought "to achieve their goals and thereby oppose ... the authority of the government of the United States by means of force, terror and violence, including the construction and planting of explosives and incendiary devices at banks, stores, office buildings and government buildings ..." in the metropolitan area of the City of Chicago. Defendants were arraigned; and bail was set at $5,000,000 cash for Alejandrina Torres and $10,000,000 cash for each of the other defendants.
At a conference which the parties were required to hold under a local rule of this court, and at pretrial proceedings that followed, the government disclosed to defendants that at various dates between January 18, 1983 and shortly before the arrests, the United States Attorney for this district, acting by one of his assistants, applied to the Chief Judge of this court for orders pursuant to Section 2518 of Title 18, United States Code, authorizing FBI agents to intercept wire and oral communications in two locations, Apartment 505, 736 W. Buena Street and Apartment 211, 1135 Lunt Avenue, Chicago, Illinois. It appears that agents had reasons to believe Alejandrina Torres and Edwin Cortes were renters of the apartments and the subscribers to the telephone in the Buena Street location.
The orders that issued, included authority for the agents to install devices which enabled them "to surreptitiously enter the [apartment in question] ... and at night if necessary ... for the purpose of installing, concealing, adjusting and ... removing aural interception and visual observation devices ... that will visually monitor and record the activity taking place in furtherance of the [alleged conspiracy]." In all, in addition to interceptions of wire and oral communications, the government as a result of the visual surveillance, obtained approximately *1461 130 hours of videotapes contained in 52 separate reels which, according to government agents, recorded the activities of defendants, or some of them, within the privacy of the two apartments. In at least one scene captured by one of the cameras, Alejandrina Torres and Edwin Cortes, according to the government, are seen engaged in the act of assembling a bomb.
But on motion of one of the defendants, construed as having been joined in by all of them, this court, after hearing the parties, suppressed the videotapes on three grounds. First, Title III of the Omnibus Crime Control and Safe Streets Act of 1968, 18 U.S.C. §§ 2510 to 2520, on which the government relied, did not authorize surreptitious entry of an apartment by agents of the government for the purpose of installing cameras and engaging in the interception of visual, as distinguished from aural communications. Second, even if the statute had so authorized, the United States Attorney had not complied with certain procedural requirements of Title III. Third, no warrant, as that term is known in Fourth Amendment law, had been obtained by the United States Attorney. See United States v. Torres, 583 F.Supp. 86 (N.D. Ill.1984).
The government appealed; and on December 19, 1984, the court of appeals reversed the suppression order. United States v. Torres, 751 F.2d 875 (7th Cir. 1984). Now, in anticipation of trial of this case on the merits, and on the assumption that only unsuppressed videotapes are involved, the court issues this Memorandum in order to furnish all interested parties with the reasons for its grant of the motions of NBC and ABC for leave to intervene, denial of their motions for orders allowing them to install wires in the courtroom and capture the contents of the tapes simultaneous with their introduction in evidence; and, the reasons for the court's grant of the alternative request of the two broadcasting corporations.
II
A
Defendants' only argument against grant of the motions for leave to intervene is in a footnote to their opposition memorandum in which they say that "[c]ounsel has found no cases [sic] which specifically discuss the right of intervention in a criminal matter." This lack of authority for intervention in a criminal prosecution is understandable. "Intervention a procedure by which an outsider with an interest in a lawsuit may come in as a party though he has not been named as a party by the existing litigants is a comparatively recent innovation in Anglo-American legal procedure." 7A Wright & Miller, Federal Practice & Procedure § 1901. It is a proceeding whereby a person is permitted to become a party in an action between other persons, after which litigation proceeds with both original and intervening parties. Richins v. Mayfield, 514 P.2d 854, 85 N.M. 578 (1973). In a criminal case, it is rare that one person ever has enough interest in the outcome of a prosecution of another. For this practical reason, there is no rule governing intervention in a criminal proceeding. Intervention is common in civil actions; and in the federal courts, it is governed by Rule 24 Fed.R.Civ.P.
However, a cursory review of cases involving news media interest in criminal prosecutions (usually involving evidence to be captured or copied) shows that courts, without discussion, have permitted applications to be made for certain relief, or have granted news media organizations leave to intervene. In such cases, news media entities or organizations have been named and treated as applicants or as intervenors. See United States v. Edwards, 672 F.2d 1289 (7th Cir.1982); United States v. Criden, 648 F.2d 814 (3d Cir.1981); United States v. Dorfman, 550 F.Supp. 877 (N.D. Ill.1982); Application of CBS, Inc., 540 F.Supp. 769 (N.D.Ill.1982). It is of no significance that these cases do not discuss the right of news media companies or corporations to intervene in a criminal case; what is important is that they are permitted *1462 to enter, and thus become subject to the jurisdiction of the court, a fact that may inure to the protection of defendants and the public. These are the reasons for this court's grant of the motions for leave to intervene by NBC and ABC.
B
This brings us to the question whether orders should be entered which would allow NBC and ABC to cooperate, install at least three sets of wires in the courtroom, connected to electronics equipment nearby, and simultaneous with their introduction in evidence by the government, capture the contents of audiotapes and videotapes for broadcast by their television stations located throughout the United States. The two corporations argue that this case is newsworthy; they state that the allegations of the indictment (charges of domestic terrorism) make it essential that they, as new media institutions, be allowed to exercise their First Amendment right to access to a courtroom and discharge of their duty to inform the public of this evidence as it is presented to the jury. Although they do not say this, a careful examination of the authorities cited show that this is a request of first impression in a federal court.
Defendants object to this court granting any of the news media requests. They argue that from their arrest until now, they have denied all of the charges made against them; they have insisted that they are not terrorists nor are they conspiratorial criminals. They say that they are Puerto Rican patriots who are fighting for the independence of Puerto Rico, a country defendants say should be an independent nation free of domination and control by the United States. Defendants remind the court that in a voluminous memorandum supporting their motion to dismiss the indictment against them, they recited the history of Puerto Rico when it was a colony of the Spanish Empire, and since their cession to the United States by Spain in 1897. Defendants complain that neither NBC, ABC, nor any entity of the news media, has given them a fair and unbiased treatment in stating to the public their views that they are prisoners of war in this case, and not criminals. They assert that since their arrest, "the media has [sic] unhesitantly labeled them as terrorists, [and] this highly prejudicial publicity has served to create in the public mind the image of these four Puerto Rican patriots as dehumanized, bombthrowing maniacs."
NBC and ABC respond to this argument by saying that defendants' views are ideological rhetoric. The corporations argue that the burden is on defendants to show why the access being sought to the audiotape and videotape evidence should be denied; and quoting selected language from United States v. Edwards, 672 F.2d 1289, 1294 (7th Cir.1982), they insist that defendants have not carried the burden of proof the law places on them; and for this reason, all of their requests, including installing wires in the courtroom for simultaneous and instantaneous capture of the audiotape and videotape evidence, should be granted.
This court does not agree. In its judgment, poorly as defendants express themselves, they have presented many "articulable facts" which show that the primary request of the two corporations, if granted, would endanger defendants' rights to a fair trial in this prosecution. They have said enough to remind the court that this case will be difficult enough to preside over when it comes to trial. The accusations against defendants are charged with political emotions. Although this court is convinced that defendants mistakenly interpret the history of the relation between the United States and Puerto Rico, it is also convinced that defendants are sincere in the views they hold concerning the way the islands have been treated by the government of the United States, particularly the military, and in the complaints they make about the way the natural resources of those islands have been exploited by multi-national American corporations. To begin this trial from the posture of allowing two of the country's leading broadcast corporations instantaneous access *1463 to dramatic evidence that casts invidious reflections on defendants is to start this trial on a wrong footing.
The trial of a criminal case implicates the nuances of all constitutional and social values that make us a civilized nation. During its process, the trial judge must keep in mind that his principal purpose is assuring fairness to both sides: the government, on the one hand, the defendant or defendants on the other. United States v. Kerley, 753 F.2d 617 (7th Cir. 1984); see United States v. Portis, 542 F.2d 414 (7th Cir.1976); cf. United States v. Chaussee, 536 F.2d 637 (7th Cir.1976). He must see to it that the trial is so conducted that the jurors, as triers of fact, are not distracted from their tasks; he must see to it that nothing occurs to impede the lawyers in their advocacy of the cause they represent; he must see that witnesses are accorded a full and complete opportunity to give their evidence; he must take steps to afford members of the press all avenues by which they can be present and hear so they can accurately report the proceedings; and finally, the trial judge must give those who come to the public's courtroom full opportunity to see and hear the judicial process as it unfolds during the trial, all of this in an orderly and dignified manner.
A criminal trial is not designed as a forum in which entities of the news media can flex their First Amendment muscles. Nor is it a device attuned to the task of educating absent members of the public to what occurs in a particular criminal case, selected by broadcasting corporations for attention in accordance with their standard of what is newsworthy. As Justice Clark said for the court in Estes v. Texas, 381 U.S. 532, 540, 85 S.Ct. 1628, 1631, 14 L.Ed.2d 543 (1965):
[T]he "primary concern of all must be the proper administration of justice"; that "the life and liberty of any individual in this land should not be put in jeopardy because of the actions of any news media"; and that "the due process requirements in both the Fifth and Fourteenth Amendments and the provisions of the Sixth Amendment require a procedure that will assure a fair trial ...".
In Chandler v. Florida, 449 U.S. 560, 574, 101 S.Ct. 802, 809, 66 L.Ed.2d 740 (1981), Chief Justice Burger recognized the point this court has in mind when he said:
Any criminal case that generates a great deal of publicity presents some risks that the publicity may compromise the right of the defendant to a fair trial. Trial courts must be especially vigilant to guard against any impairment of the defendant's right to a verdict based solely upon the evidence and the relevant law. 449 U.S. at 574, 101 S.Ct. at 809.
There is an additional reason that mandates denial of the primary request of these two corporations. On September 19-20, 1984, the Judicial Conference of the United States met in Washington, D.C. This conference is the statutory, representative body of federal judges, chaired by the Chief Justice of the United States; it is responsible for submitting "suggestions and recommendations to the various courts [of the United States] to promote uniformity of management procedures and the expeditious conduct of court business." 28 U.S.C. Section 331. On its agenda was a report of the Ad Hoc Committee on Cameras in the Courtroom, which had considered a petition filed by twenty-eight separate radio, TV, newspaper and related organizations requesting that Canon 3 A(7) of the Code of Conduct for United States Judges, and Rule 53 of the Federal Rules of Criminal Procedure, be amended to allow radio broadcasting, televising, motion picture and still camera coverage of federal court proceedings. The committee, after careful consideration, unanimously recommended that the petition be denied. The report of the conference shows that the recommendation was approved without a recorded dissenting voice by any judge present. See Westmoreland v. Columbia Broadcasting System, Inc., 752 F.2d 16 (2d Cir.1984).
Canon 3 A(7), which was sought to be amended, provides, in its relevant part, that:
*1464 A judge should prohibit broadcasting, televising, recording, or taking photographs in the courtroom and areas immediately adjacent thereto during sessions of court or recesses between sessions. ...
Rule 53 prohibits what this Canon requires a judge to bar from the courtroom and its immediate areas. In mandatory language, it states that:
The taking of photographs in the court room during the progress of judicial proceedings or radio broadcasting of judicial proceedings from the court room shall not be permitted by the court. Fed.R. Crim.P., Rule 53, 18 U.S.C.A.
This court, to the extent that it understands the technology involved, can perceive little difference between the wires NBC and ABC want to install in the courtroom, and cameras; both accomplish "broadcasting, televising, recording, or taking photographs in the courtroom ..." prohibited by Canon 3 A(7) and Rule 53. This court will venture the guess that if the primary request of these two corporations is granted, NBC and ABC will, in the future, cite this case to another federal judge as precedent for the proposition that they should be allowed to install cameras in a courtroom, instead of wires. In this court's judgment, the primary request being made to this court by NBC and ABC, if granted, would violate the spirit if not the letter of an important canon and rule that govern the conduct of federal judges, and would contravene the policy declared by the Judicial Conference of the United States when it approved the report of the Ad Hoc Committee on Cameras in the Courtroom.
Moreover, in this district there is an even more categorical prohibition of what the two corporations seek by their primary request. Rule 1.52, General Rules of the United States District Court for the Northern District of Illinois, states:
The taking of photographs, radio and television broadcasting or taping in the court environs during the progress of or in connection with judicial proceedings, including proceedings before a United States Magistrate, whether or not court is actually in session, is prohibited.
This rule, limited to the courtroom and its environs, is constitutional. See United States v. Yonkers Bd. of Educ., 587 F.Supp. 51, 53-54 (S.D.N.Y.1984); even though it restricts certain activities otherwise protected by the First Amendment. Dorfman v. Meiszner, 430 F.2d 558, 561 (7th Cir.1970). Rules like this one do nothing more than assure "the maintenance of an orderly, dignified environment, free from ancillary distractions, for the solemn conduct of judicial proceedings." United States v. Cicilline, 571 F.Supp. 359, 363 (D.R.I.1983); Annot. 14 A.L.R.4th § 6[a] at 121, 134 (1979).
C
The alternative request that NBC and ABC make to this court is more in accord with the decided cases, and thus entitled to a different consideration. What they ask is not permission to intrude into the trial process and install wires in the courtroom with the potential for disruption of the trial; they seek merely access to the audiotapes and videotapes, at convenient recesses of the court, after they have been admitted in evidence. In sum, NBC and ABC are asserting the common law right of access to judicial records, a right that is of non-constitutional origin. United States v. Edwards, 672 F.2d 1289, 1294 (7th Cir. 1982); cf. In re Continental Illinois Securities Litigation, 732 F.2d 1302, 1308 (7th Cir.1984).
There is a strong presumption in support of the common law right to inspect and copy records, United States v. Peters (Appeal of Hearst Corporation), 754 F.2d 753, 763 (7th Cir.1985); and permission to inspect, copy, and disseminate the contents of judicial records should be denied only where actual, as opposed to hypothetical, factors demonstrate that justice so requires. United States v. Edwards, supra, 672 F.2d at 1294; cf. United States v. Criden, 648 F.2d 814, 823 (3d Cir.1981); *1465 see, e.g., Application of CBS, Inc., 540 F.Supp. 769, 771 (N.D.Ill.1982).
Of course, in a proper case, after balancing the rights of news media entities with the rights of defendants to a fair trial, access to court proceedings as well as the opportunity to copy documents which are parts of judicial records, can be prohibited, in the exercise of a court's sound discretion. Nixon v. Warner Communications, Inc., 435 U.S. 589, 603, 98 S.Ct. 1306, 1315, 55 L.Ed.2d 570 (1978); see Application of CBS, Inc., supra at 771. While this is so, the burden is on the party seeking to interfere with this common law right to demonstrate that justice requires the denial of access. Application of CBS, Inc., supra at 771. It has been emphasized that access of the kind sought here by NBC and ABC "may be denied only if ... `justice so requires ...'." In Re Nat. Broadcasting Co., Inc., 653 F.2d 609, 613 (D.C.Cir.1981). As this court sees it, defendants, as the only parties who seek to interfere with this common law right, have not demonstrated that justice requires denying NBC and ABC access to the audiotapes and videotapes during convenient recesses of the trial. Cf. Newman v. Graddick, 696 F.2d 796 (11th Cir.1983); see United States v. Miller, 579 F.Supp. 862 (S.D.Fla.1984). For these reasons, an order, containing provisions for the protection of all the parties, will be entered granting the alternative request.
For example, among others, one of the provisions will be that after the tapes are admitted in evidence, they will be delivered to the Courtroom Deputy who will promptly enter a minute order showing admittance, thus making the tapes a part of the judicial records of this trial. Thereupon, the tapes are to be delivered to the Court Administrator, Mr. H. Stuart Cunningham, who will be responsible for making the tapes available to NBC and ABC, at their costs. This provision is intended by this court to minimize direct contact between lawyers in the case and representatives of news media entities during the trial and thus "provide a `unified and singular source for the media concerning these proceedings'." See KPNX Broadcasting Co. v. Arizona Superior Court, 459 U.S. 1302, 103 S.Ct. 584, 74 L.Ed.2d 498 (1982), per Justice Rehnquist, as Circuit Justice.
So ordered.
|
Crafty Beer Shop is a bar and beer retailer in Raleigh, that recent opened their business in Raleigh, NC. Crafty Beer Shop carries the best of national and international craft beer, while keeping a focus on the North Carolina beer offerings. They have 8 different beers on tap at all times, rotating stock and access to the best beers in NC and the world. They sell all of our beer by the bottle so customers can feel free to choose what they want. Crafty Beer shop has the neighborhood feel of a relaxing coffee shop vibe, and they offer free wi-fi. They also sell wine and offer customers a glass of wine from their rotating wine offerings. They also strive to support the local community and offer local snack items, display local artists work, and often feature local musicians. Crafty caters to the new customer to the craft bee scene as well as craft beer veterans.
"The owners contacted to Restaurant Furniture Supply for new restaurant chairs, bar stools and tables because of their reputation for high quality at competitive prices", explained sales person Zach. For seating, he decided to go with Restaurant Furniture Supply's Vertical Slat Wood Chairs and matching Vertical Slat Wood Bar Stools in mahogany wood finish with solid wood seats. The Vertical Slat Wood Chairs are currently on sale at Restaurant Furniture Supply for $56 and the Vertical Slat Wood Bar Stools are on sale for $80. They are available in 5 standard finishes. The chairs and bar stools come with the option of a solid wood seat or a padded seat made with American made foam and fabric. A custom finish can also be made for an additional fee and the padded seats can be made of any material.
For table tops the owner decided to go with solid wood table tops in dark mahogany finish in eased edge in sizes 24"X24" which sell for $65 and 30"X48" which sell for $142.25. The solid wood tabled tops also come in a bullnose edge for an additional fee. He chose X-prong table bases to go with them, which start at just $24.
The solid wood chairs, bar stools and solid wood table tops are made in the USA from FSC (Forest Stewardship Council) Certified wood harvested in the Midwest. "Restaurant Furniture Supply is committed to being a responsible corporate citizen and helping protect the environment as well as provide jobs to Americans" says Zach. "That is why we recently moved our facilities to the US". |
Adenovirus-mediated gene transfer of a heat shock protein 70 (hsp 70i) protects against simulated ischemia.
We have recently shown that the overexpression of a heat shock protein 70 (hsp 70) in a rat myogenic cell line confers protection against simulated ischemia. We also developed and demonstrated that overexpression of this protein, in the hearts of transgenic mice, protects against ischemia/reperfusion injury. We have now inserted the hsp70 gene in an adenoviral vector and show that we are able to transfer and achieve overexpression of this protein in neonatal cardiomyocytes and in the rat myogenic cell line H9c2. We find that cells infected with the adenoviral-hsp70i construct are rendered tolerant to simulated ischemia as compared to cells infected with a control recombinant adenoviral construct. In conclusion, our results demonstrate the feasibility of using adenoviral vectors to overexpress the hsp70 in myogenic cells, specially in cardiomyocytes, and the efficiency of this approach for providing protection against myocardial ischemia. |
Peripheral venous contrast echocardiography.
Contrast echocardiography is the technique of injecting various echo-producing agents into the bloodstream and, with standard echocardiographic techniques, observing the blood flow patterns as revealed by the resulting cloud of echoes. These techniques have only recently been utilized to evaluate various cardiac defects. Two physical properties of these agents characterize their usefulness: (1) clouds of echoes can be observed downstream as well as at the injection site, and (2) the echo-producing quality of these agents is completely lost with a single transit through either the pulmonary or the systemic capillary bed. Thus, detection of resultant echoes in both the venous and the arterial blood pool is indicative of abnormal shunting. In 60 patients with a spectrum of cardiac defects and a wide range in age of presentation, studies were made of (1) the feasibility of performing contrast echocardiography with superficial peripheral venous injections, and (2) the clinical usefulness of this relatively noninvasive technique in detecting and localizing intracardiac right ot left shunting. Most superficial peripheral veins could be utilized, and the resultant contrast echograms were reproducible and similar in quality to those obtained more central (caval) injections. Right to left shunts could be localized in the atrial, ventricular or intrapulmonary level. Characteristic flow patterns were also recognized for tricuspid atresia and common ventricle. |
1. Field of the Invention
The present invention relates to a nozzle plate member (also referred to as a gas diffusion plate) for supplying fluids in a dispersed manner, and a manufacturing method thereof. More specifically, the invention relates to a film-forming nozzle plate member for dispersing and causing gas to feed and flow out, the gas being used for a film-forming process in manufacturing a semiconductor device or a liquid crystal substrate device, and a manufacturing method of such a nozzle plate member.
2. Description of the Related Art
In the process of manufacturing a semiconductor device or a liquid crystal display substrate, film formation has been carried out by spaying gas to a substrate in the process of chemical vapor deposition (CVD) or the like. In such a film-forming process, each of gases of one, two or more kinds, selected from silane gas, oxygen gas, and so on, is supplied, a plurality of gases are uniformly mixed immediately before the substrate, and then a film is formed on the substrate. In the film-forming process, the dispersed supplying of the plurality of gases must be maintained separately immediately before the gases are reached on the substrate, and each of the gases must be supplied to keep uniform mixing on a substrate surface.
Thus, the inventors examined a conventional nozzle plate like that shown in each of FIGS. 26(a) and 26(b), which was used to disperse gases as fluids in stages and supply them through a number of holes. FIG. 26(a) is a sectional view of a gas supplying nozzle plate, and FIG. 26(b) is a sectional view.
As shown in FIGS. 26(a) and 26(b), the gas supplying nozzle plate is constructed by laminating sheet metal members 40, 41 and 42. The plate metal member 40 includes an A gas path hole 43, its branch 44, and a B gas path hole 47, which are all formed by machining. The plate metal member 41 includes an A gas path hole 45, a B gas path hole 48 and its branch 49, which are all formed by machining. The plate metal member 42 includes an A gas path hole 46 and a B gas path hole 50, which are formed by machining. These plate metal members 40, 41 and 42 are joined together by soldering, electron beam welding or bolt fastening, and then laminated to form a unified body.
In the gas supplying nozzle plate constructed by laminating the metal members 40, 41 and 42, A gas is passed through the path hole 43, branched at the branch 44, and dispersed into a number of flows. Then, the A gas flows out through the path holes 45 and 46 to be supplied to a film-forming region. B gas is passed through the path holes 47 and 48, branched at the branch 49, and dispersed into a number of flows. Then, the B gas flows out through the path hole 50 to be supplied to the film-forming region. Then, the A and B gases are mixed with each other immediately before the substrate to form a film on the substrate.
The gas supplying nozzle plate described above with reference to FIGS. 26(a) and 26(b) can supply gas in a dispersed manner. However, problems have been inherent particularly with respect to sealing, the state of the joined portions of the gas path holes, and so on, in the cases of joining by soldering, electron beam welding, and bolt fastening. Specifically, in the case of joining by soldering, the problems include: a reduction in sealing, which is caused by a pinhole formed by gas entrainment during soldering; a loss of cleanness necessary for semiconductor manufacturing or a liquid crystal substrate manufacturing, which is caused by gas generated from a component such as solder; a loss of dimension or function of the gas path hole, which is caused by damaging the precise and fine gas path hole or the branch, such damaging occurring due to the melting of brazing filler metal during joining; and others. To solve the problem of the damaging the gas path hole caused by the melting of solder during joining, soldering foil was used. However, the use of such soldering foil proved to be costly, because the need to process and dispose the soldering foil to match the shape of the precise and fine gas path hole or the branch resulted in much man-hour. In addition, it was impossible to deal with a temperature of about 400° C. during film formation. This problem occurred because of a limitation placed by a temperature during the film formation.
In the case of joining by electron beam welding, the problems include: the difficulties of securing sealing corresponding to all of a number of precise and fine gas path holes or branches formed in the sheet metal member, and carrying out joining without any hole clogging; the difficulty of manufacturing a large gas nozzle plate because of a limitation placed by the size of a high vacuum chamber, in which electron beam joining is performed; and high costs.
In the case of joining by bolt fastening designed to secure sealing by disposing a gasket, the problems include: a loss of designing freedom satisfying a request made by a user, which occurs because of the need to provide a space for machining and disposing a gasket to match the shape of the precise and fine gas path hole or the branch; high costs caused by much man-hour; and the difficulty of securing complete sealing by the gasket. In addition, heat resistance is a significant matter, particularly since such film formation is often carried out at a high temperature. In this respect, it was difficult to provide sufficient heat resistance by the method using the gasket.
The present invention is directed to a gas supplying nozzle plate, which is constructed by laminating a plurality of metal members having fluid paths formed therein. It is an object of the invention to provide a fluid nozzle plate member capable of providing high sealing at joined portions, and high reliability without any reductions in the functions of highly precise fluid paths and branches even when used in high vacuum or at a high temperature. It is another object of the invention to provide a manufacturing method of such a fluid nozzle plate member. |
Cobalamin reduction by dithionite. Evidence for the formation of a six-coordinate cobalamin(II) complex.
Evidence for the formation of a unique, six-coordinate cobalamin(II) complex with the anion-radical SO(2)(-) during the reduction of aquacobalamin(III) by sodium dithionite, was obtained from spectrophotometric and EPR measurements. The pK(a) value of the weakly coordinated dimethylbenzimidazole group was found to be 4.8 ± 0.1 at 25 °C. |
import pytest
from flask import g
from flask import session
from flaskr.auth.models import User
def test_register(client, app):
# test that viewing the page renders without template errors
assert client.get("/auth/register").status_code == 200
# test that successful registration redirects to the login page
response = client.post("/auth/register", data={"username": "a", "password": "a"})
assert "http://localhost/auth/login" == response.headers["Location"]
# test that the user was inserted into the database
with app.app_context():
assert User.query.filter_by(username="a").first() is not None
def test_user_password(app):
user = User(username="a", password="a")
assert user.password != "a"
assert user.check_password("a")
@pytest.mark.parametrize(
("username", "password", "message"),
(
("", "", b"Username is required."),
("a", "", b"Password is required."),
("test", "test", b"already registered"),
),
)
def test_register_validate_input(client, username, password, message):
response = client.post(
"/auth/register", data={"username": username, "password": password}
)
assert message in response.data
def test_login(client, auth):
# test that viewing the page renders without template errors
assert client.get("/auth/login").status_code == 200
# test that successful login redirects to the index page
response = auth.login()
assert response.headers["Location"] == "http://localhost/"
# login request set the user_id in the session
# check that the user is loaded from the session
with client:
client.get("/")
assert session["user_id"] == 1
assert g.user.username == "test"
@pytest.mark.parametrize(
("username", "password", "message"),
(("a", "test", b"Incorrect username."), ("test", "a", b"Incorrect password.")),
)
def test_login_validate_input(auth, username, password, message):
response = auth.login(username, password)
assert message in response.data
def test_logout(client, auth):
auth.login()
with client:
auth.logout()
assert "user_id" not in session
|
Franz Jakubowski
Franz Jakubowski (10 June 1912, Posen, Province of Posen, Prussia, Germany, now Poznan, Poland1970, U.S.) was a philosopher and Western Marxist theorist. Born in Prussia, he grew up in what was then the Free City of Danzig. His father was a doctor. From 1930 to 1933 he studied law in Heidelberg, Berlin, Munich and Breslau, before completing his studies in political science at Basel University. After student activism and the agitational role he would briefly play in Danzig, Jakubowski abandoned Europe, and settled in the USA, changing his name to Frank Fisher and marrying Margaret Citron with whom he had two children Thomas and Robert Fisher. In the 1970's he moved back to Europe and married Elisabeth Spanjer. There he would play a part in establishing the Alexander Herzen Foundation, a publisher of samizdat soviet literature.
Contribution to theory
Jakubowski published his only major work, a book based on his doctoral thesis, in Danzig, 1936. It is entitled Ideology and Superstructure in Historical Materialism, and may be seen as an extension to the seminal work of Karl Korsch on the centrality of the Hegelian dialectic to Marxian thought. Jakubowski rehearses for the reader the steps Marx and Engels took away from Hegel, via Feuerbach, to their 'historical materialist' position. Its unique contribution to Marxian thought is the clarity of its exposition of the relationship between subject and object in Marxian theory.
"In order to combat a widespread misunderstanding, it must be stressed that the superstructure is real. Lenin in particular tended to overlook this, when he contrasted being and idea in his 'reflection theory'. The superstructure is no less real than its base. The terms 'reflection' and 'to reflect', which Engels was fond of using when he was discussing ideological superstructure, can be misleading; these terms are meant to indicate something about the relationship between base and superstructure, not to describe the superstructure itself. There are in fact two forms of reality: the material reality and the 'ideal' reality (ie, the reality of human ideas). Political and legal superstructure are as real as the base. Both are social relations consisting of human relationships. Both exist in the idea, both are also material realities. As Marx said in The Holy Family, 'The communist workers know full well that property, capital, money, wage labour etc. are in no way the mere creations of their imagination but are the extremely concrete and practical results of their own self-alienation', and the same is true of non-economic relationships. The reality of social ideas, then, forms a necessary and constituent part of the material reality of social relationships. Material relations are what they are only in conjunction with the ideas which correspond to them. The reality of both is expressed by their social efficacy."
Ideology and Superstructure also offered a critique of competing interpretations of Marxian thought, particularly that associated with Karl Kautsky and that with Max Adler.
Influence
History has not been kind to Jakubowski. His one contribution is still read in certain small Marxist political currents, and occasionally touches the fringes of academic study, for example, a brief review in the journal Radical Philosophy by British philosopher Kate Soper.
External links
Text of Ideology and Superstructure in Historical Materialism
Category:1912 births
Category:1970 deaths
Category:Marxist theorists |
Christian Health Co-Ops Cater to 'Obamacare' Opponents
"There's still health care for people of faith after health care 'reform,' " proclaims a banner ad on the website of Samaritan Ministries , a member-based nonprofit that works like a Christian co-op for health care expenses. The ad is meant to appeal to conservative Christians who are wary about the coming implementation of the federal mandate to purchase individual health insurance.
A press release from sister organization Christian Care Ministry argues its point more boldly: "11 million Americans Need Not Comply with ObamaCare."
These aren't gestures of public defiance. The health care law does in fact contain language exempting faith-based groups from the requirement that all Americans be enrolled in a conventional health insurance plan by 2014 or face penalties. The number of Americans who rely on these organizations, called "health care sharing ministries," is currently small — only 100,000 households are members nationwide — but Christian Care Ministry hopes to find an eager market in the 11 million Americans that it estimates profess Christian faith and are not covered by an employer's insurance plan.
"We are starting to see some growth," says Robert Baldwin, president of Christian Care Ministry. "Our efforts are focused on getting the word out to people that there is an alternative for Christians to Obamacare."
Samaritan Ministries, for its part, just purchased a new three-story headquarters building in Peoria, Illinois, to accommodate the administrative needs of serving a growing membership. Samaritan outpaced its growth projections for 2010 by 50 percent, with a 12 percent overall increase in members. The new headquarters will allow it to serve up to 50,000 households, compared with 17,500 at the moment.
Biblical command
The specifics vary among faith-based organizations, but the concept is the same: Christians can keep down their medical costs while fulfilling the Bible's command to care for fellow-believers. Members exchange more than $60 million annually to help one another cover health expenses, in return for which they must agree to requirements such as limiting or prohibiting alcohol and tobacco consumption and abstaining from sex outside of marriage.
Under Samaritan's program, members contribute $135 to $320 monthly, depending on the size of their household, and are told whom to send their regular contribution to. A person who has just experienced a significant health expense can collect dozens of checks in a given month. Expenses incurred must exceed $300 to be eligible for reimbursement, so members cover their more modest costs in much the same way they would with a deductible under an insurance plan.
Kari Fox, a 27-year-old registered nurse and mother of two young children in North Carolina, has been a Samaritan member for 15 years and is a strong believer in both the spiritual and financial components of the program. Her mother was diagnosed with a cancerous brain tumor that ultimately took her life in 2007; Samaritan members covered $225,000 in medical expenses. Later, Fox and her family were able to rely on Samaritan members to help pay for the births of her two children and her husband's treatment for skin cancer. In return for their coverage, they pay $320 a month.
The problem, some state insurance commissioners say, is that these unlicensed programs are treated as nonprofits under state law even though they function like insurance companies. The difference is that they offer few consumer protections and little opportunity for legal recourse when members don't have as positive an experience as Kari Fox and her family.
The National Association of Insurance Commissioners has warned consumers to investigate these organizations before joining. ''Our concern is that families will participate believing that they're purchasing health insurance when in fact what they're purchasing is little more than an aspiration," says Michael McRaith, director of the Illinois Department of Insurance.
Christian Care Ministries is currently prohibited from accepting new members in Illinois because of a cease-and-desist order issued by McRaith's department in response to a court battle over medical expenses not covered when a child was injured in a car accident. A similar situation in Montana has forced Christian Care to withdraw from the state completely, although Samaritan and other sharing ministries are still permitted to accept members there.
The Kentucky Supreme Court ruled in the fall that Christian Care was pooling the risk of its members and should therefore be treated as regulated insurance under the law — although the implication of this case for Christian Care's ability to operate in the state remains in doubt. Christian Care believes that changes made to its business model and procedures since that case was originally filed will allow it to work out an agreement with insurance regulators in Kentucky.
Insurance exemptions
Sharing ministries are explicitly exempt from insurance codes in 11 states. Most courts have been hesitant to rule against them in the rare cases where disputes have been brought by members whose health care needs have not been fully met. Faith-based groups and their lobbying arm, the Alliance of Christian Health Care Sharing Ministries, are aggressively pushing to receive exemptions in states where they are not yet in place. "It removes any potential ambiguity for the state directors of insurance," says James Lansberry, executive vice president of Samaritan Ministries and president of the Alliance of Christian Health Care Sharing Ministries.
The organizations are careful to state explicitly in their materials and agreements with members that they are not insurance companies and offer no guarantees to pay for medical expenses. Samaritan Ministries, for example, keeps no cash reserves and covers only a percentage of each need in months when total expenses exceed total demand. Members who lose out this way may receive additional tax-deductible contributions from other members who are informed of their plight and wish to help out by pitching in extra cash. In some cases reimbursement is rolled over to the following month.
Disputes tend to be settled internally among members. Christian Care Ministry allows those who believe they aren't being treated fairly under the membership guidelines to bring disputes before panels of fellow members for final approval or rejection of appeals. "It really is a Biblical principle, where you go to your brothers if you have a disagreement rather than to court," says Baldwin of Christian Care.
Legislation related to health care sharing ministries will be debated this year in at least seven states — Arizona, Georgia, Indiana, Maine, Montana, North Carolina and South Carolina. This is in large part thanks to the growing interest among conservative state legislators in finding workarounds to the federal health care reform law.
"Rather than just saying no and criticizing," says Indiana state Representative Eric Koch, "I and other state legislators around the country have stepped up and offered other solutions." Koch, a Republican, is sponsoring bills aimed at helping health care sharing ministries become a viable "free-market alternative" to other health care options.
The bills would exempt the organizations from the state's insurance code and offer members tax deductions similar to those offered to employers who cover their employees' traditional health insurance costs. Koch says he's just trying to level the playing field, and modeled his provision after a Missouri law passed in 2007 — the only such law currently on the books in any state. "At the present time, the economic incentives may not exist to make it as attractive as an insurance plan or a public option," says Koch.
Montana state Representative Cary Smith, a Republican who is sponsoring a bill that aims to exempt ministries from the state's insurance code and bring Christian Care Ministry back into the state, says he isn't at all concerned about the absence of licensing and regulation for these organizations.
"Most of us are big kids who can take care of ourselves," he says. "We don't need our government protecting us all the time. When I saw there was a way to opt out of the federal mandate, I was all for it. That's the way it ought to be done: People caring for other people, not government trying to take care of everybody."
About The Pew Charitable Trusts
The Pew Charitable Trusts is driven by the power of knowledge to solve today's most challenging problems. Pew applies a rigorous, analytical approach to improve public policy, inform the public and invigorate civic life.
Trust Magazine
Our quarterly news magazine. Every issue features articles on Pew’s work from across the organization.Read Current Issue |
Tag: coconut oil
This straightforward recipe for making cannabis infused oils in your slow cooker is so simple you’ll wish you tried ages ago.
The Benefits of Using a Slow Cooker
Easy-peasy – You no longer have to spend the whole day stuck in the kitchen keeping an eye on the stove to make sure the oil doesn’t boil – with the slow cooker method you simply set it up, switch it on and go to bed and in the morning, your oil is ready- what a pleasure!
No Smell – The second big benefit is that the smell is almost non-existent. The slow cooker method contains the odors so you don’t have to suffocate in clouds of incense for fear of the neighbours smelling your herb.
Ingredients
50grams cannabis
500 ml oil (coconut/olive/almond/etc)
Water
You can use as much or as little as you like. The basic math is a 1:10 ratio of cannabis to oil. IE: 10 grams of cannabis to 100 ml coconut oil.
Why Coconut Oil?
Coconut oil is great for you for a multitude of reasons – great at reducing bad cholesterol and high in saturated fats – which makes it excellent for extracting both THC and CBD’s. And when you combine cannabinoids with fat, the fat actually helps the cannabinoids travel through your digestive and assist with better absorption of the different properties.
Ingredients
500 ml Pure Virgin Organic Coconut oil
50 g Dry Cannabis
(Roughly 100 ml of coconut oil to 10 grams of powdered cannabis)
NOTE: I do not recommend decarboxylating the plant material unless you are specifically making oil to treat cancer where a highr THC ratio is required. For all other conditions no decarboxylating is required as you want to maximize your CBD’s and the heat from decarboxylating can destroy CBD’s. You will still convert THC-A into THC through the extraction process.
Method
Separate the flowers from seeds and stalks. You can use a sieve to help with this process. Pull out any larger stalks and put the dried flower into a sieve and rub it through – the seeds and smaller stalks will be held back and the plant matter will fall through.
Break your cannabis up or use scissors to chop it finely.
Gently melt the coconut oil – do not let it come to the boil.
Double boil: Use a large pot with water in it as the base. Put the smaller pot with the coconut oil into this pot. The water in the bottom pot will help keep the coconut oil from getting overheated.Water has a boiling point of 100C which helps to keep the coconut oil at this temperature too.
Use only enough oil to cover the cannabis amount used, work on 100 ml of oil to 10 grams of powdered cannabis for a good quality.
Once the oil is melted, add the chopped cannabis. The oil must never bubble or boil therefore you have to keep a constant eye on the pot, stirring at regular intervals.
If the oil starts to bubble reduce the heat immediately even if this means switching off for a while this is no problem – the oil must never boil or bubble.
Continue with this process for six hours always checking the heat and keeping it on constant low heat, using a wooden spoon to stir at frequent intervals.
Six hours may feel long but it produces the best possible oil.
After six hours turn the heat off and let the oil cool. There is no harm in switching off and continuing after a few hours if time or circumstances do not permit, even if you are cooking on a fire.
Once the oil has cooled but is still fluid strain it through a muslin cloth, stocking or a fine mesh sieve using the back of a teaspoon to press the oil through. It is much easier to use the cloth or stocking which you can secure over a bowl with an elastic band.
Store the oil in glass jar and keep it in a cool dry place.
Coconut oil naturally solidifies in cooler temperatures and all you have to do is place the glass jar in some boiling warm water and let it melt. Always remember to open the glass jar before you put it in boiling water as it will crack and many patients have lost their valuable medicine in this way. You can also use your Cannabis Coconut oil in the solid form as butter or swallow it solid with water, like a pill.
Do not leave the oil on the heat unattended – you will damage the cannabinoids and lose potency. Even street marijuana is expensive and this is a valuable lesson learned.
Coconut oil has a smoke point of 171 degrees Celsius. At 100 degrees and less it cannot produce any dangerous fumes because it will not create smoke at this temperature. So this recipe can be followed while cooking on gas, electricity, even fire, and anyone can make their own medicine with this recipe. |
Q:
list all the ppa repositories added to my system
How can I list all the ppa repositories added to my system and save it to a .txt file, so that I don't want to spend my time in searching for ppa's for fresh installations and i can just select a ppa line in my .txt file and append to the command sudo add-apt-repository? Also is there any other ways to do this in which i dont want to give the gpg keys manually?
A:
From How can I get a list of all repositories and PPAs from the command line into an install script?
Part of the answer looks to have what you are looking for:
#! /bin/sh
# listppa Script to get all the PPA installed on a system ready to share for reininstall
for APT in `find /etc/apt/ -name \*.list`; do
grep -o "^deb http://ppa.launchpad.net/[a-z0-9\-]\+/[a-z0-9\-]\+" $APT | while read ENTRY ; do
USER=`echo $ENTRY | cut -d/ -f4`
PPA=`echo $ENTRY | cut -d/ -f5`
echo sudo apt-add-repository ppa:$USER/$PPA
done
done
Save this as listppa.sh
listppa.sh > installppa.sh
This creates a script that you can backup somewhere, then run to add your PPAs on a fresh install by simply running:
installppa.sh
A:
For those who just want to check the PPAs they have installed without actually doing anything with them automatically you can do:
$ apt-cache policy
In my system, here's a bit of what it shows:
% apt-cache policy
Package files:
100 /var/lib/dpkg/status
release a=now
500 http: ppa.launchpad.net/ubuntu-toolchain-r/test/ubuntu/ precise/main Translation-en
500 http: ppa.launchpad.net/ubuntu-toolchain-r/test/ubuntu/ precise/main i386 Packages
release v=12.04,o=LP-PPA-ubuntu-toolchain-r-test,a=precise,n=precise,l=Toolchain test builds,c=main
origin ppa.launchpad.net
500 http: ppa.launchpad.net/ubuntu-toolchain-r/test/ubuntu/ precise/main amd64 Packages
release v=12.04,o=LP-PPA-ubuntu-toolchain-r-test,a=precise,n=precise,l=Toolchain test builds,c=main
origin ppa.launchpad.net
500 http: ppa.launchpad.net/rael-gc/scudcloud/ubuntu/ precise/main Translation-en
500 http: ppa.launchpad.net/rael-gc/scudcloud/ubuntu/ precise/main i386 Packages
release v=12.04,o=LP-PPA-rael-gc-scudcloud,a=precise,n=precise,l=ScudCloud - Linux client for Slack,c=main
origin ppa.launchpad.net
...
Quoted from here:
[apt-cache policy] retrieves priorities associated with each repository resource. From
its output, you can infer a list of all available repositories and
PPAs.
Source: http://ask.xmodulo.com/list-installed-repositories-ppas-ubuntu.html
|
The third edition of the Hyderabad Queer Film Festival was held on Saturday. Featuring 17 short films in Tamil, English, Telugu, Hindi, Malayalam and Marathi, the Festival saw visitors trickling in slowly during the morning hours, with the numbers peaking towards the afternoon.“It’s great that a lot of people are coming for such film festivals. In fact, I have invited my colleagues from office and my classmates from college, and most of them are expected to come. These films can help remove some of the misconceptions about the LGBT community ,” said one of the visitors Teju N, an HR professional from Begumpet The festival, organised by the Telangana Queer Swabhimana Yatra Collective , was held after a gap of two years. “The film festival is a very important part of the Queer movement in the city. Films have been the main cultural and entertainment outlet for our society. And mainstream cinema so far has portrayed the LGBT community in bad light. People need to see the other side as well. We hoped that mainstream directors would stand up for our cause, but it hasn’t happened. Now queer activists themselves are turning directors and making films. And this is a platform where they can showcase and promote the queer cause to a larger audience,” said Moses Tulasi , the festival director. |
Impedance to defibrillation countershock: does an optimal impedance exist?
Defibrillation is thought to occur because of changes in the transmembrane potential that are caused by current flow through the heart tissue. Impedance to electric countershock is an important parameter because it is determined by the magnitude and distribution of the current that flows for a specific shock voltage. The impedance is comprised of resistive contributions from: (1) extra-tissue sources, which include the defibrillator, leads, and electrodes; (2) tissue sources, which include intracardiac and extra-cardiac tissue; and (3) the interface between electrode and tissue. Tissue sources dominate the impedance and probably contribute to the wide range of impedance values presented to the defibrillation pulse. Because impedance is not constant within or between subjects, defibrillators must be designed to accommodate these differences without compromising patient safety or therapeutic efficacy. Experimental investigations in animals and humans suggest that impedance changes at several different time scales ranging from milliseconds to years. These alterations are believed to be a result of both electrochemical and physiological mechanisms. It is commonly thought that impedance is optimized when it has been decreased to a minimum, since this allows the most current flow for a given voltage shock. However, if the impedance is lowered by changing the location or size of the electrodes in such a way that current flow is decreased in part of the heart even though current flow is increased elsewhere, then the total voltage, current, and energy needed for defibrillation may increase, not decrease, even though impedance is decreased. A simple boundary element computer model suggests that the most even distribution of current flow through the heart is achieved for those electrode locations in which the impedance across the heart is at or near the maximum cardiac impedance for any location of these particular electrodes. Thus, the optimum shock impedance is achieved when impedance is minimized for extra-tissue and extra-cardiac tissue sources and is at or near a maximum for intracardiac tissue sources. |
In two rulings on the final day of its 2012-2013 term, the U.S. Supreme Court struck downparts of the federal Defense of Marriage Act (DOMA), the 1996 law that banned the government from recognizing same-sex marriages performed in states where they are legal, and let stand a lower court ruling that struck down a California gay marriage ban.
The rulings left in place the laws that ban same-sex marriage in 37 states. Among them is Ohio.
FreedomOhio, an advocacy group pushing to overturn Ohio's ban, said the high court's decisions add momentumto its effort to get the issue on the November 2014 ballot.
Citizens for Community Values, a Cincinnati-based conservative group that championed the 2004 constitutional ban, said it was ready to fight measures that would bring same-sex marriage to the state.
Phil Burress, president of the group, was quoted sayingin March that legalizing same-sex marriage in Ohio is unlikely: "I can't look into the future, but I just don't ever see it happening. This nation was founded on Judeo-Christian principles, and, like Judeo-Christian beliefs, every major religion is opposed to same-sex marriage. You can't allow same-sex marriage until you destroy all religions."
While his last sentence is matter of opinion that PolitiFact Ohio can't rate, we wondered about the accuracy of his statement about religious opposition.
The Supreme Court decisions affected the legal recognition of marriage under civil law. They do not extend to religious recognition.
But what do religions say about same-sex marriage?
Citizens for Community Valuestold us it stands behind the statement by Burress, which was also cited in a Plain Dealer story last month, and added: "The mainstream, conservative and orthodox majorities of the primary religions in America, that is Judaism, Christianity and Islam, oppose same-sex marriage."
They referred us to a comprehensive survey of the U.S. religious landscapeby the nonpartisan Pew Forum on Religion & Public Life. It details the country's current religious makeup and changes in religious affiliation.
Pew also presents an overview of official positions on same-sex marriageamong major religions in the United States. These are the findings, summarized alphabetically:
American Baptist Churches USA has affirmed that "God's design for sexual intimacy places it within the context of marriage between one man and one woman."
Buddhism has no universal position on same-sex marriage.
The U.S. Conference of Catholic Bishops opposes same-sex marriage, affirming that "marriage is a faithful, exclusive and lifelong union between one man and one woman."
The Church of Jesus Christ of Latter-day Saints does not endorse same-sex marriage; Mormon theology says that "marriage between a man and a woman is ordained of God." Featured Fact-check "PEDOPHILIA is now LEGAL in CALIFORNIA. Now a 21 year old can have sex with an 11 year old, and not be listed on the sex registry as a sex offender."
The General Convention of the Episcopal Church last year approved a liturgy for blessing same-sex relationships. "Each Episcopal bishop will decide whether to allow churches in his or her jurisdiction to use the new liturgy to bless same-sex unions," Pew reports. "And in those dioceses where blessing same-sex relationships is permissible, no Episcopal priest will be required to perform the blessing ceremony."
Evangelical Lutheran Church in America defines marriage as "a lifelong covenant of faithfulness between a man and a woman," but allowed congregations to recognize and bless same-sex unions.
Hinduism has no official position on same-sex marriage.
Islamic law forbids homosexuality.
In Judaism, the Reform and Reconstructionist Jewish movements support gay and lesbian rights, including same-sex marriage. The Conservative Jewish movement has a ceremony to allow same-sex couples to marry. Individual rabbis can choose not to officiate at same-sex weddings.
Orthodox Judaism does not accept same-sex marriage.
The Lutheran Church-Missouri Synod's position is that same-sex marriage is "contrary to the will of the Creator."
The National Association of Evangelicals does not support gay marriage or civil unions.
The Presbyterian Church (U.S.A.) defines marriage as a union between a man and a woman -- though, Pew notes, its General Assembly "urged state legislatures to give individuals in same-gender relationships the right to be joined in civil unions."
The Southern Baptist Convention is opposed to gay marriage.
The Unitarian Universalist Association of Congregations passed a resolution in 1996 in support of same-sex marriage.
The United Church of Christ’s General Synod has voted to legally recognize and advocate in favor of same-sex marriage. "Given the autonomous nature of United Church of Christ churches," Pew reports, "each congregation may adopt or reject the recommendations of the General Synod."
The United Methodist Church affirms that marriage is between a man and a woman.
"Religious groups do not speak with one voice on the same-sex marriage issue," said a report in March from Religion & Ethics Newsweekly, "but more oppose it than support it."
"Religious groups fall on both sides of the same-sex marriage debate," the Public Religion Research Institutereported in March.
Burress would have been on solid ground stating that the majority of major religions do not approve same-sex marriage. The opposition is significant. Most of the biggest religious groups do not accept same-sex marriage.
But "most" is not "all." The opposition is not unanimous. Views varywithin Judeo-Christian tradition. The number of denominations accepting same-sex marriage has been increasing.
We rate his statement Half True. |
T-HAN
This Travelers’ Health Alert Notice (T-HAN) is given at ports of entry to travelers arriving from high-risk countries (with a LEVEL 3 Travel Health Notice). The T-HAN directs travelers to a webpage with more information in multiple languages on self-monitoring, symptoms of COVID-19, and what to do if they have symptoms.
Health Alert: For All Travelers
This prevention poster is available to download and use in your community. It reminds travelers to: Protect yourself and others by staying home if you feel sick, covering your coughs and sneezes, and washing your hands often.
Stop the Spread of Germs Poster
This prevention poster is available to download and use in your community. It reminds travelers and others to prevent the spread of COVID-19 by staying at least 6 feet from other people; covering your cough or sneeze; wearing a cloth face covering in public; not touching your eyes, nose, and mouth; and washing your hands with soap and water.
Symptoms of Coronavirus Disease 2019 Poster
This informational poster is available to download and use in your community to inform people that symptoms of COVID-19 can include fever, cough and shortness of breath, and these symptoms may appear 2-14 days after exposure. |
Researchers have long suspected that male genitalia evolved particularly rapidly, especially because they can be very different even among closely related species. Hemipenes—the paired male organ used by snakes and lizards—consist of a pair of tubular structures, and the surface of each hemipenis contains a groove through which semen is conveyed. The shape ranges from cylindrical to deeply bilobed, which can be ornamented with spines. A team studying the hemipenes of over two dozen lizard species have discovered that genital traits evolve much more rapidly than nongenital traits. The findings were published in the Journal of Zoology last week.
A trio of researchers led by Harvard’s Julia Klaczko examined the hemipenes of 25 Anolis lizards from the Caribbean. They measured the total length, width at the lobes, and width at the hemipenial body. They also measured three nongenital traits: thigh length, shank (or lower foreleg) length, and the length of the dewlaps, the loose skin that hangs down from their throat. For each of these traits, the team performed mathematical calculations to figure out their rate of evolutionary change. Some hemipenial morphological variation is pictured here: (a) Anolis litoralis, (b) A. evermani, (c) A. brunneus (d) A. cybotes, and (e) A. grahami, also used to illustrate hemipenial measurements (1: length; 2: width at the lobes; 3: width at the body). Scale bar = 1 mm.
Anolis hemipenes, they found, have been evolving up to six times faster than non-sexual traits. "That the differences were that high was a great finding," Klaczko tells New Scientist.
The team has at least two major ideas about why changes in hemipenes over time were so rapid. One possibility is that females have specific preferences for what fits and stimulates them better. Another less cooperative idea, Live Science reports, is that male and female lizards are locked in an evolutionary arms race, and both are trying to control reproduction: Males may be evolving genitals that give them an advantage when it comes to fertilizing the females, while females are evolving their genitals in an attempt to take that advantage back.
Images: Wikimedia (top), J. Klaczko et al., Journal of Zoology 2015 (middle) |
Fatty liver produced by dietary deficiencies: its pathogenesis and potentiation by ethanol.
In a study of the pathogenesis of hepatic fat accumulation under experimental conditions mimicking chronic alcoholism, rats were fed a low-fat diet, deficient in amino acids and choline, containing either ethanol or isocaloric amounts of carbohydrate. Dietary deficiencies alone produced a moderately fatty liver after 24 days. The combination of ethanol and dietary deficiencies resulted in enhanced lipid accumulation, which was apparent after only 11 days. In an investigation of the origin of hepatic triglyceride fatty acids, the experiment was repeated after the adipose lipids had been marked by the feeding of oils containing characteristic fatty acids (linseed oil, containing linolenate, or coconut oil, containing laurate and myristate). In all animals, the fatty acid composition of the hepatic triglycerides differed markedly from that of adipose tissue; it had a larger percentage of endogenously synthesized fatty acids and a five times smaller percentage of the marker fatty acids. In addition, ethanol feeding resulted in a greater retention of the marker fatty acids in the adipose tissue. Thus, the deposition of hepatic triglycerides produced by the feeding of deficient diets is markedly potentiated by ethanol; the triglyceride fatty acids accumulated under these conditions appear to originate, for the most part, not from mobilization of depot fat, but from endogenous synthesis. |
Screening (tactical)
Screening is a defensive tactic in which a picket or outposts are used to hide the nature and strength of a military force; provide early warning of enemy approach; impede and harass the enemy main body with indirect fire; and report on the activity of the enemy main body. Screening forces may conduct patrols, establish outposts, and help destroy enemy reconnaissance units.
A screening mission seeks to deny enemy reconnaissance units close-in observation of the main body. An effective screen can conceal where an army begins and ends, making it hard to flank. In modern warfare, screening is performed by armoured cars and light tanks.
Screening force
Screening is often done by reconnaissance units such as cavalry, which operate within range of supporting artillery. In contrast to a guard force, a screening force may consist of a scout platoon rather than a task force or squadron; and its mission is less ambitious, focusing on early warning to the main body rather than preventing enemy observation and direct fire on the main body. Also, unlike a guard force, a screening force is deployed over an extended area, to the rear and flanks of the main force, rather than to the front. The screening force's minimal tasks enable it to have a wide frontage. The screen line describes the trace along which the protecting unit is providing security. Aerial assets are used when ground assets cannot keep pace with the main body.
A screening force normally uses direct fire only for self-defense and does not seek to become decisively engaged with enemy forces.
Examples
During the American Civil War, at Gettysburg, Pennsylvania, Maj. Gen. John Buford set the conditions for Maj. Gen. George Meade's success by ensuring the Army of the Potomac occupied the high ground, which General Robert E. Lee's army shattered itself attacking.
See also
Covering force
References
Category:Force protection tactics |
/*
Unix SMB/CIFS implementation.
NBT name registration testing
Copyright (C) Andrew Tridgell 2005
This program is free software; you can redistribute it and/or modify
it under the terms of the GNU General Public License as published by
the Free Software Foundation; either version 3 of the License, or
(at your option) any later version.
This program is distributed in the hope that it will be useful,
but WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
GNU General Public License for more details.
You should have received a copy of the GNU General Public License
along with this program. If not, see <http://www.gnu.org/licenses/>.
*/
#include "includes.h"
#include "lib/socket/socket.h"
#include "libcli/resolve/resolve.h"
#include "system/network.h"
#include "lib/socket/netif.h"
#include "torture/torture.h"
#include "torture/nbt/proto.h"
#include "param/param.h"
#define CHECK_VALUE(tctx, v, correct) \
torture_assert_int_equal(tctx, v, correct, "Incorrect value")
#define CHECK_STRING(tctx, v, correct) \
torture_assert_casestr_equal(tctx, v, correct, "Incorrect value")
/*
test that a server responds correctly to attempted registrations of its name
*/
static bool nbt_register_own(struct torture_context *tctx)
{
struct nbt_name_register io;
NTSTATUS status;
struct nbt_name_socket *nbtsock = torture_init_nbt_socket(tctx);
struct socket_address *socket_address;
struct nbt_name name;
const char *address;
const char *myaddress;
struct interface *ifaces;
if (!torture_nbt_get_name(tctx, &name, &address))
return false;
load_interface_list(tctx, tctx->lp_ctx, &ifaces);
myaddress = iface_list_best_ip(ifaces, address);
socket_address = socket_address_from_strings(tctx, nbtsock->sock->backend_name,
myaddress, 0);
torture_assert(tctx, socket_address != NULL, "Unable to get address");
status = socket_listen(nbtsock->sock, socket_address, 0, 0);
torture_assert_ntstatus_ok(tctx, status,
"socket_listen for nbt_register_own failed");
torture_comment(tctx, "Testing name defense to name registration\n");
io.in.name = name;
io.in.dest_addr = address;
io.in.dest_port = lpcfg_nbt_port(tctx->lp_ctx);
io.in.address = myaddress;
io.in.nb_flags = NBT_NODE_B | NBT_NM_ACTIVE;
io.in.register_demand = false;
io.in.broadcast = true;
io.in.multi_homed = false;
io.in.ttl = 1234;
io.in.timeout = 3;
io.in.retries = 0;
status = nbt_name_register(nbtsock, tctx, &io);
torture_assert_ntstatus_ok(tctx, status,
talloc_asprintf(tctx, "Bad response from %s for name register",
address));
CHECK_STRING(tctx, io.out.name.name, name.name);
CHECK_VALUE(tctx, io.out.name.type, name.type);
CHECK_VALUE(tctx, io.out.rcode, NBT_RCODE_ACT);
/* check a register demand */
io.in.address = myaddress;
io.in.register_demand = true;
status = nbt_name_register(nbtsock, tctx, &io);
torture_assert_ntstatus_ok(tctx, status,
talloc_asprintf(tctx, "Bad response from %s for name register demand", address));
CHECK_STRING(tctx, io.out.name.name, name.name);
CHECK_VALUE(tctx, io.out.name.type, name.type);
CHECK_VALUE(tctx, io.out.rcode, NBT_RCODE_ACT);
return true;
}
/*
test that a server responds correctly to attempted name refresh requests
*/
static bool nbt_refresh_own(struct torture_context *tctx)
{
struct nbt_name_refresh io;
NTSTATUS status;
struct nbt_name_socket *nbtsock = torture_init_nbt_socket(tctx);
const char *myaddress;
struct socket_address *socket_address;
struct nbt_name name;
const char *address;
struct interface *ifaces;
if (!torture_nbt_get_name(tctx, &name, &address))
return false;
load_interface_list(tctx, tctx->lp_ctx, &ifaces);
myaddress = iface_list_best_ip(ifaces, address);
socket_address = socket_address_from_strings(tctx, nbtsock->sock->backend_name,
myaddress, 0);
torture_assert(tctx, socket_address != NULL,
"Can't parse socket address");
status = socket_listen(nbtsock->sock, socket_address, 0, 0);
torture_assert_ntstatus_ok(tctx, status,
"socket_listen for nbt_referesh_own failed");
torture_comment(tctx, "Testing name defense to name refresh\n");
io.in.name = name;
io.in.dest_addr = address;
io.in.dest_port = lpcfg_nbt_port(tctx->lp_ctx);
io.in.address = myaddress;
io.in.nb_flags = NBT_NODE_B | NBT_NM_ACTIVE;
io.in.broadcast = false;
io.in.ttl = 1234;
io.in.timeout = 3;
io.in.retries = 0;
status = nbt_name_refresh(nbtsock, tctx, &io);
torture_assert_ntstatus_ok(tctx, status,
talloc_asprintf(tctx, "Bad response from %s for name refresh", address));
CHECK_STRING(tctx, io.out.name.name, name.name);
CHECK_VALUE(tctx, io.out.name.type, name.type);
CHECK_VALUE(tctx, io.out.rcode, NBT_RCODE_ACT);
return true;
}
/*
test name registration to a server
*/
struct torture_suite *torture_nbt_register(TALLOC_CTX *mem_ctx)
{
struct torture_suite *suite;
suite = torture_suite_create(mem_ctx, "register");
torture_suite_add_simple_test(suite, "register_own", nbt_register_own);
torture_suite_add_simple_test(suite, "refresh_own", nbt_refresh_own);
return suite;
}
|
Q:
Parsing XML into an array for use in jQuery DatePicker calendar
I am stuck here and hope to get some guidance on this. I'm trying to take XML from a feed, put some elements into an array, then pass into jQuery's DatePicker plugin. My code below is displaying the calendar, but not the events from the feed. Chrome is show no errors or warnings either. Not sure what's going on. Any assistance is much appreciated.
(My XML):
<entry>
<published>2012-05-29T13:05:53-08:00</published>
<updated>2012-05-29T13:05:58-08:00</updated>
<title type="html">
<![CDATA[ Businesses Get Help With Legal Issues ]]>
</title>
<content type="html">
<![CDATA[ Click the article header for the complete story.
<!-- /Publications/26674.htm -->
]]>
</content>
<link rel="alternate" type="text/html" href="/Publications/26675.htm"/>
</entry>
(In external JS file):
$(document).ready(function(){
var events = new Array();
events = getSelectedDates();
$("div.datepicker").datepicker({
beforeShowDay: function(date) {
var result = [true, '', null];
var matching = $.grep(events, function(event) {
return event.published.valueOf() === date.valueOf();
});
if (matching.length) {
result = [true, 'highlight', null];
}
return result;
},
onSelect: function(dateText) {
var date,
selectedDate = new Date(dateText),
i = 0,
event = null;
while (i < events.length && !event) {
date = events[i].published;
if (selectedDate.valueOf() === date.valueOf()) {
event = events[i];
}
i++;
}
if (event) {
alert(event.Title);
}
}
});
});
function getSelectedDates()
{
var the_selected_dates = new Array();
$.ajax(
{
url: 'news.xml',
type: 'GET',
dataType: 'xml',
async: false,
success: function(data)
{
$(data).find('entry').each(function(i, entryObj)
{
var entryObj = new Object();
entryObj.eTitle = $('title', this).text();
entryObj.eDate = $('published', this).text();
the_selected_dates.push(entryObj);
});
}
});
return the_selected_dates;
}
A:
You have several issues with this snippet, but the reason you weren't actually parsing the XML correctly so events was always empty. I changed the getSelectedDates function to perform the each over each entry (before you were searching for entry elements inside of entry elements):
function getSelectedDates() {
return $(data).map(function() {
return {
title: $('title', this).text(),
published: new Date($('published', this).text())
};
}).get();
}
As you can see I also am using .map to transform the XML elements into an array of objects with properties title and published. You were using several property names (sometimes eDate, sometimes published) which was causing problems down the line, but I've fixed that as well.
The next problem is that you were comparing dates using valueOf. Since the dates passed to beforeShowDay have no time portion, there is pretty much no chance that your $.grep function is going to return true for any date. The way I fixed this was to compare against the elements of the dates we cared about (date, month, full year):
beforeShowDay: function(date) {
var result = [true, '', null],
matching = $.grep(events, function(event) {
return event.published.getDate() === date.getDate() &&
event.published.getMonth() === date.getMonth() &&
event.published.getFullYear() === date.getFullYear();
});
if (matching.length) {
result = [true, 'highlight', null];
}
return result;
},
I also made a similar change for onSelect:
onSelect: function(dateText) {
var date, selectedDate = new Date(dateText),
i = 0,
event = null;
while (i < events.length && !event) {
date = events[i].published;
if (selectedDate.getFullYear() === date.getFullYear() &&
selectedDate.getMonth() === date.getMonth() &&
selectedDate.getDate() === date.getDate()) {
event = events[i];
}
i++;
}
if (event) {
alert(event.title);
}
}
I have a full working example here: http://jsfiddle.net/4extL/31/
Note: I would be very careful with the date format you're using in the XML. I'm not sure that an ISO8601 date with a time zone will always be properly parsed.
|
UNDER pressure Housing Minister Eoghan Murphy today reveals he personally knows the struggles the homeless are going through as he’s made a point of going into hostels and has even ended up serving the residents breakfast.
The 37-year-old claims the homeless crisis is easing and he is striving to make things better.
“I’ve gone to the hostels late at night that people have said they are scared of going into, to see what conditions are like,” he tells the Sunday World.
“I was serving breakfast in one of the larger hostels a while back and it was difficult to actually serve breakfast because people wanted to talk to me about what they were experiencing, which was really nice.
“They were talking about the challenges that they were [facing] in terms of trying to find work and some of them had other more complex issues. They were telling me their stories and they were asking me to help.”
He admits that he finds it distressing to see people sleeping rough but claims the number is a new low of 90 each night.
“It’s still way too high,” he reflects .“For many people who are sleeping rough, and the tents that they see, that’s the human face of the crisis and that’s why people are so upset about this.
“It doesn’t have to touch a person personally but because we are a very compassionate country, people do want to make sure we are doing everything we can to help the most vulnerable.”
He insists he is not out of touch .“The first thing that Sinn Fein and Fianna Fail said about me when I became minister was this kind of posh boy jibe,” says Murphy.
“But it doesn’t matter if I’m from Dublin 4 or Farranfore, it doesn’t matter if I’ve a south Dublin accent or a Kerry accent, what matters is the policies I’m implementing.
“I do understand the crisis that people are in, not just people who are sleeping rough, or families or kids in hotels, but also young families trying to get out of a small apartment to a house to raise their family,” he says.
Asked if he has become a bit of a ‘fall guy’, he replies: “I think there is a lot of people caught up in this crisis. I’m the minister for housing, I’m the person responsible, I’ve got to solve it and that’s what I’ve got to do.
“People recognise me and people do want to talk to me. The good thing that we have is we have a close relationship between politicians and the people who elect them and you wouldn’t want to see that change. So people do come up and talk to you about housing and other things.”
The Minister, who is running for re-election in Dublin Bay South, explains he has only been in the job two and a half years and turned down a different Cabinet position to try and solve the housing crisis.
“A lot of people I know have been burned twice by housing,” he discloses. “Some people who were lucky enough in the late 2000s to buy a home.
“Like some of my friends live in ghost estates, or negative equity and have unfortunately lost their jobs and have not been able to afford the mortgage, so they have that experience. A lot of them are trying to move out of small apartments into houses.”
He maintains that 20,000 new homes were built last year compared to 10,000 in 2016 and that new builds will increase this year.
Latest opinion polls show Sinn Fein almost neck and neck with Fianna Fail and Fine Gael.“If you look what’s happening with Sinn Fein in the polls, the prospect of a Sinn Fein-Fianna Fail coalition is now very real as I look at it,” he muses.
“I don’t believe Micheal Martin when he says he won’t go into power with Sinn Fein and I think it would be a terrible mistake for the economy.”
Online Editors |
---
abstract: 'Let $S$ be a non-empty scheme with 2 invertible. In this paper we present a functor $F: AZ_*^{n''} \rightarrow GS_*^n$ where $AZ_*^{n''}$ and $GS_*^n$ are fibered categories over $Sch_S$ given respectively by degree $n''$ Azumaya algebras with an involution of type $*$ and rank $n$ adjoint group schemes of classical type $*$ with absolutely simple fibers. Here $n''$ is a function of $n$. We show that this functor is an equivalence of fibered categories using [étalifstar[é]{}[e]{}]{}descent, thus giving a classification of adjoint (as well as simply connected) groups schemes over $S$, generalizing the well known case when the base scheme is the spectrum of a field. In particular, this implies that every adjoint group scheme of classical type with absolutely simple fibers is isomorphic to the neutral component of automorphism group scheme of a unique (up to isomorphism) Azumaya algebra with involution. We also show interesting applications of this classification such as specialization theorem for isomorphism classes of Azumaya algebra with involution over Henselian local rings, uniqueness of integral model for groups with good reduction over discrete valued fields and discuss its implications on the Grothendieck-Serre conjecture over certain domains.'
address: |
Department of Mathematics\
University of Colorado\
Boulder, CO 80309\
USA
author:
- Srimathy Srinivasan
bibliography:
- 'ref\_azumaya.bib'
nocite: '\nocite{}'
title: Azumaya algebras with involution and classical semisimple group schemes
---
Introduction {#sec:intro}
============
It is well known that the category of rank $n$ (with some $n$ excepted) absolutely simple adjoint (or simply connected) algebraic groups of a given classical type over any field $F$ is equivalent to the category of degree $n'$ central simple algebras with involution of analogous type over $F$. Here $n'$ is a function of $n$. Moreover, the functor which gives this equivalence is obtained by taking a given central simple algebra with involution over $F$ to the identity component of its automorphism group (or its simply connected cover for the simply connected case). This result is originally due to Weil ([@weil]) and the proof of this equivalence can also be found in §26, Chapter VI in [@boi]. This gives neat classification results for groups of classical types in terms of central simple algebras with involution which can be translated to the well understood language of sesquilinear forms over division algebras. This kind of classification is very useful for studying many properties of algebraic groups and the projective homogeneous varieties associated to them.\
In this paper, we show a similar classification for adjoint (as well as simply connected) group schemes over an arbitrary scheme where $2$ invertible. Since we are in the general case of arbitrary base scheme, we use the language of stacks and gerbes to prove that the fibered category of degree $n'$ Azumaya algebras with an involution of a given type is equivalent to the fibered category of rank $n$ classical adjoint group schemes with absolutely simple fibers of the corresponding type via [étalifstar[é]{}[e]{}]{}descent. As before, $n'$ is a function of $n$ with some $n$ excepted. This implies that an adjoint group scheme of classical type with absolutely simple fibers is isomorphic to the neutral component of automorphism group scheme of a unique (up to isomorphism) Azumaya algebra with involution. We also give a few applications of this classification such as a specialization theorem for Azumaya algebras with involution and uniqueness of integral model for group schemes with good reduction. Another interesting corollary is that Grothendieck-Serre conjecture on principal $G$-bundles holds whenever $G$ is adjoint group scheme over $R$ with absolutely simple fibers where $R$ regular local ring containing field of characteristic $\neq 2$ or a semilocal Bézout domain with $2$ invertible.
Notations
=========
Through out this paper, $S$ denotes a non-empty scheme with $1/2 \in \mathcal{O}_S(S)$. The category of schemes over $S$ will be denoted by $Sch_S$. Given a scheme $X$ over $S$ and a point $s$ in $S$, $k(s), X_s, X_{\overline{s}}$ denote respectively the residue field, fiber and geometric fiber at $s$. For a presheaf $\mathcal{F}$ over a scheme $X$, $\mathcal{F}_x$ denotes its stalk at the point $x \in X$. The ring of $n \times n$ matrices is denoted by $\mathcal{M}_n$. The identity matrix of size $n$ is denoted by $I_n$. For a sheaf of algebra $\mathcal{A}$, $\mathcal{A}^{op}$ denotes the sheaf of opposite algebra given by $U \rightarrow \mathcal{A}(U)^{op}$. The reference [@sga3] is mentioned as SGA3.
Group schemes over an arbitrary scheme {#sec:gpscheme}
======================================
In this section we recall the necessary results from the literature on group schemes over an arbitrary scheme. The main sources of reference are SGA3 and [@demazure_red].\
A group scheme $G$ over $S$ is called *reductive* (resp. semi-simple, adjoint, simply connected) if $G$ is affine, smooth over $S$ and for every $s \in S$, the geometric fiber $G_{\overline{s}}$ is a connected reductive (resp. semi-simple, adjoint, simply-connected) group ([@demazure_red Def. 2.1.2] and Def. 4.3.3 , Exp. XXII, SGA3).\
Let $G$ be an adjoint (or simply connected) group scheme $G$ over $S$. The *type* (resp. *rank*) of $G$ at $s \in S$ is the type (resp. rank) of $G_{\overline{s}}$ (Def. 2.7, Exp. XXII, SGA3). The type and rank of $G$ are locally constant functions over $S$ (Prop.2.8, Exp. XXII, SGA 3 and Cor. 2.6, Exp. XIX, SGA 3).
Any adjoint (resp. simply connected) group scheme over $S$ can be obtained as Weil restriction of an adjoint (resp. simply connected) group scheme with absolutely simple fibers over $S'$ where $S' \rightarrow S$ is a finite [étalifstar[é]{}[e]{}]{}cover (see [@bconrad_red Prop 6.4.4 and Remark 6.4.5]). Therefore, classification adjoint group schemes over $S$ reduces to classification of adjoint group schemes with absolutely simple fibers.
**Definition:** Let $G$ be an adjoint group scheme over $S$ with absolutely simple fibers. We say that $G$ is of type $A$ (resp. $B$, $C$, $D$) if the every fiber $G_{\overline{s}}, s \in S$ is of type $A$ (resp. $B$, $C$, $D$).
\[prop:grp\_etale\] Let $G$ and $H$ be adjoint group schemes over $S$ with absolutely simple fibers of a given type. Then locally for the [étalifstar[é]{}[e]{}]{}topology on $S$, $G$ and $H$ are isomorphic. In fact, any reductive group scheme with root datum $\mathcal{R}$ is [étalifstar[é]{}[e]{}]{}locally isomorphic to a unique Chevalley group over $spec~ \mathbb{Z}$ with root datum $\mathcal{R}$.
See [@demazure_red §5, Cor. 5.1.4.I and Prop. 5.1.6].
Let $G$ be any group scheme over $S$. In SGA3 (Def 3.1, Exp. VI~B~), the notion of *the neutral component of $G$* denoted by $G^0$ is defined by the functor $$\begin{aligned}
T \rightarrow G^0(T) = \{u \in G(T)| \forall s \in S ,u_s(T_s) \subset (G_s)^0\}\end{aligned}$$ We refer the reader to §3, Exp. VI~B~ for more details. It can be shown that the neutral component of $G$ is stable under base change. We restate here below.
(SGA3, Exp. VI~B~, Prop. 3.3). \[prop:basechange\] Let $G$ be group scheme over $S$. Then for any scheme $S' \rightarrow S$, we have $$\begin{aligned}
(G \times_S S')^0 = G^0 \times_S S'\end{aligned}$$ i.e., the functor $G \rightarrow G^0$ commutes with base change.
We will be using the following result about $G^0$.
([@bconrad_red Prop 3.1.3]) \[prop:conrad\_neutral\] Let $G$ be a smooth separated group scheme of finite presentation such that $G_{\overline{s}}^0$ is reductive for all $s \in S$. Then $G^0$ is a reductive group scheme over $S$ that is open and closed in $G$
For a group scheme $G$ over $S$, we associate the automorphism functor $\underline{Aut}(G)$ on $Sch_S$ defined by $$\begin{aligned}
\underline{Aut}(G): S' \mapsto Aut_{S'-grp}(G_{S'})\end{aligned}$$
\[prop:autg\] Let $G$ a semisimple group scheme over $S$. Then the functor $\underline{Aut}(G)$ is represented by a smooth, affine scheme over $S$.
See SGA 3, Exp. 24, Theorem 1.3(i) and Corollary 1.6.
\[rmk:representable\] A representable functor on $Sch_S$ is a sheaf for the fpqc topology ([@vistoli_descent Theorem 2.55]). Therefore if $G$ is semisimple, by Proposition \[prop:autg\], $\underline{Aut}(G)$ is a sheaf for the fpqc topology and hence for the [étalifstar[é]{}[e]{}]{}topology on $Sch_S$.
Azumaya algebras with involution over an arbitrary scheme
=========================================================
Recall that an *Azumaya algebra* $\mathcal{A}$ over $S$ is an $\mathcal{O}_S$-algebra that is locally free and finite type as an $\mathcal{O}_S$-module such that the canonical homomorphism $$\begin{aligned}
\mathcal{A} \otimes \mathcal{A}^{op} &\rightarrow End_{\mathcal{O}_S-mod}(\mathcal{A}) \\
a \otimes b &\mapsto (x \mapsto a.x.b)
\end{aligned}$$ is an isomorphism. This implies that there is an [étalifstar[é]{}[e]{}]{}covering $\{U_i \rightarrow S \}$ such that $\mathcal{A} \otimes_{\mathcal{O}_S}\mathcal{O}_{U_i} \simeq \mathcal{M}_{n_i}(\mathcal{O}_{U_i})$ for some $n_i$. If $n_i = n$ for all $i$ (this happens for example when $S$ is connected), we call $\mathcal{A}$ an Azumaya algebra of *degree* $n$ over $S$. Also recall that for an Azumaya algebra $\mathcal{A}$ over $S$, $\mathcal{A}_s \otimes k(s)$ is a central simple algebra over $k(s)$ for every $s \in S$ (see [@milne_etale Chapter IV, §2, Prop. 2.1]).\
Involutions on central simple algebras are well studied in the literature ([@boi]). In a similar fashion one can also define involution on Azumaya algebras over the scheme $S$. This is discussed in detail in [@parimala_involution] and [@parimala_brauer] which we briefly recall now.\
An *involution of first kind* $\sigma$ on $\mathcal{A}$ is an isomorphism of $\mathcal{O}_S$-algebras $$\begin{aligned}
\sigma: \mathcal{A} \rightarrow \mathcal{A}^{op}\end{aligned}$$ such that $\sigma^{op}\circ \sigma$ is the identity. The involution $\sigma$ on $A$ is said to be of *orthogonal type* (resp. *symplectic type*) if [étalifstar[é]{}[e]{}]{}locally on $S$, it corresponds to a non-degenerate symmetric (resp. skew-symmetric) bilinear form on a locally free $\mathcal{O}_S$-module with values in a line bundle over $S$ (see [@parimala_brauer §1.1]).\
Now let $\pi: T \rightarrow S$ be a an [étalifstar[é]{}[e]{}]{}covering of degree $2$. Let $\mathcal{A}$ be an Azumaya algebra over $T$. An involution $\sigma$ of *second kind* (a.k.a *unitary type*) on $\mathcal{A}$ is an anti-automorphism on $\mathcal{A}$ of order $2$ which on $\mathcal{O}_T$, restricts to the non-trivial element of the Galois group of the covering. Locally for the [étalifstar[é]{}[e]{}]{}topology on $S$ unitary involutions correspond to hermitian forms on locally free $\mathcal{O}_T$-modules ([@parimala_brauer §1.2]).\
The data of an Azumaya algebra $\mathcal{A}$ with a involution $\sigma$ over $S$ is denoted by $(\mathcal{A}, \sigma)$. A homomorphism between Azumaya algebras with involution is a homomorphism between the algebras which respects the involution structure.\
**Definition:** In the case above where $\mathcal{A}$ is an Azumaya algebra over a quadratic [étalifstar[é]{}[e]{}]{}extension $T$ of $S$ and $\sigma$ is unitary, we will make a slight abuse of notation and call $(\mathcal{A},\sigma)$ an *Azumaya algebra with unitary involution over $S$* even though the center of $\mathcal{A}$ is not $\mathcal{O}_S$. This agrees with the corresponding notion of central simple algebras with unitary involution defined in [@boi §2.B, Chapter I].
If $(A, \sigma)$ is a degree $n$ Azumaya algebra with involution over $S$ where $\sigma$ is of a given type, then for any $s \in S$, $(A_s \otimes k(s), \sigma_s \otimes k(s))$ is a degree $n$ central simple algebra with involution of the same type over $k(s)$
We now give an [étalifstar[é]{}[e]{}]{}local description of Azumaya algebras with involution.
\[prop:local\_azumaya\] Let $(A, \sigma)$ be a degree $n$ Azumaya algebra with involution over $S$. Then locally for the [étalifstar[é]{}[e]{}]{}topology on $S$, we have
1. $(\mathcal{A}, \sigma) \simeq (\mathcal{M}_n, tr)$ when $\sigma$ is of orthogonal type where $tr: A \rightarrow A^{tr}$ is the transpose involution.
2. $(\mathcal{A}, \sigma) \simeq (\mathcal{M}_{2m}, sp)$ when $\sigma$ is of symplectic type. Here $sp$ is the involution on $\mathcal{M}_{2m}$ given by $A \rightarrow J_m A^{tr} J_m^{-1}$ where $J_m = \begin{bmatrix} 0& I_m \\ -I_m & 0 \end{bmatrix}$ is the standard matrix associated to an alternating form.
3. $(\mathcal{A}, \sigma) \simeq (\mathcal{M}_n \times \mathcal{M}_n^{op}, \epsilon)$ when $\sigma$ is of unitary type where $\epsilon : (A,B^{op}) \rightarrow (B,A^{op})$ is the exchange involution.
All of the above are well known if the base scheme $S$ is the spectrum of a field (see [@boi]). For the general case, proofs of (1) and (2) can be easily derived and can also be found in the literature. See for example, [@parimala_brauer §1.1] and [@knus_quad Chapter III, §8.5]. We could not find the proof of (3) anywhere in the literature, so we give a proof here.\
In this case, $\mathcal{A}$ an Azumaya algebra with center $\mathcal{O}_T$ where $T \rightarrow S$ is a degree $2$ [étalifstar[é]{}[e]{}]{}cover of $S$ with the non-trivial element in its Galois group denoted by $\tau$. Consider the degree $2$ [étalifstar[é]{}[e]{}]{}cover $p:T \times_S T \rightarrow T$ obtained via the [étalifstar[é]{}[e]{}]{}base change $ \pi: T \rightarrow S$. It follows from Galois theory of schemes that $(T \times_S T, \pi^*\tau) \simeq (T \coprod T, ex)$ (see proof of Theorem 5.10 in [@galois_schemes]) where $ex: (x,y) \rightarrow (y,x)$. Now $p^*\mathcal{A}$ is an Azumaya algebra over $T \coprod T$. Therefore the center $\mathcal{O}_T \times \mathcal{O}_T$ of $ p^*\mathcal{A}$ contains the idempotent $e= (1,0)$ where $ex(e) = 1-e$. Note that $B =e(p^*\mathcal{A})$ an Azumaya algebra over $T$ and we have an isomorphism of Azumaya algebras with unitary involution given by $$\begin{aligned}
(p^*\mathcal{A}, p^*\sigma) &\xrightarrow{\simeq} (B \times B^{op}, \epsilon) \\
a &\mapsto (ea, (e(p^*{\sigma}(a)))^{op})
\end{aligned}$$ By taking a suitable [étalifstar[é]{}[e]{}]{}covering of $T$ which splits $B$, we obtain (3).
**Definition:** With notations as in Proposition \[prop:local\_azumaya\], we say that a degree $n$ Azumaya algebra with unitary involution (resp. orthogonal, resp. symplectic) over $S$ is *split* if it is isomorphic to $(\mathcal{M}_n \times \mathcal{M}_n^{op}, \epsilon)$ (resp. $(\mathcal{M}_n, tr)$, resp. $(\mathcal{M}_n, sp)$).\
The Group scheme of Automorphisms of Azumaya algebras with involution
=====================================================================
Let $(\mathcal{A}, \sigma)$ be a degree $n$ Azumaya algebra with involution of any type over $S$. Consider the functor $$\begin{aligned}
\underline{Aut}(\mathcal{A}, \sigma) : &Sch_S \rightarrow Groups \\
&(U \xrightarrow{i} S) \mapsto Aut_{\mathcal{O}_U-alg}(i^*(\mathcal{A}, \sigma)) := Aut_{\mathcal{O}_U-alg}(i^*\mathcal{A}, i^*\sigma)
\end{aligned}$$
**Notation:** If a functor $\underline{F}$ on $Sch_S$ is representable, let us denote the representing scheme by $F$.
\[thm:autoazu\] The functor $\underline{Aut}(\mathcal{A}, \sigma)$ is representable by a smooth, affine group scheme over $S$.
Let $S' \rightarrow S$ be an fpqc morphism. Recall that the category of affine $S$-schemes is equivalent to the category of affine $S'$-schemes with descent data. To see this use [@neron Theorem 4, Chapter 6] and the fact that for any scheme $X$, the category of affine $X$-schemes is anti-equivalent to the category of quasi-coherent sheaves of $\mathcal{O}_X$-algebras ([@stacks-project [Tag 01S5](https://stacks.math.columbia.edu/tag/01S5), Lemma 29.11.5] or see [@vistoli_descent Theorem 4.33]). Moreover, the properties smooth and affine are fpqc local over the base (see [@stacks-project [Tag 02YJ](https://stacks.math.columbia.edu/tag/02YJ)] or [@ega4_2 Prop 2.7.1 and Prop 6.8.3]). Therefore by Proposition \[prop:local\_azumaya\] it suffices to prove the theorem when $(\mathcal{A}, \sigma)$ is split. So assume that $(\mathcal{A}, \sigma)$ is split. Note that in this case the functor $$\begin{aligned}
\underline{Aut}(\mathcal{A}) : (U \xrightarrow{i} S) \mapsto Aut_{\mathcal{O}_U-alg}(i^*\mathcal{A})
\end{aligned}$$ is representable by a closed subscheme of the affine $\mathbb{Z}$-scheme $End_{\mathcal{O}_S -mod}(A) = \mathcal{M}_{r^2}$ where $r = dim_{\mathcal{O}_S}(A)$ (see [@milne_etale §2, Chapter IV]). Module homomorphisms of $\mathcal{A}$ that respect the involution can be expressed as vanishing of polynomials and hence is representable by a closed subscheme of $\mathcal{M}_{r^2}$. The intersection of these two subschemes represents $\underline{Aut}(\mathcal{A}, \sigma)$ and hence is an affine scheme over $S$.\
Now we prove that this affine scheme is smooth. For the unitary case, consider the functor $$\begin{aligned}
\underline{Aut}_{\mathcal{O}_S \times \mathcal{O}_S} (\mathcal{M}_n \times \mathcal{M}_n^{op}, \epsilon) : (U \xrightarrow{i} S) &\mapsto Aut_{\mathcal{O}_U \times \mathcal{O}_U -alg}(\mathcal{M}_n(\mathcal{O}_U) \times \mathcal{M}_n(\mathcal{O}_U)^{op}, \epsilon) \\
&\simeq Aut_{\mathcal{O}_U -alg}(\mathcal{M}_n(\mathcal{O}_U))
\end{aligned}$$ Hence $\underline{Aut}_{\mathcal{O}_S \times \mathcal{O}_S} (\mathcal{M}_n \times \mathcal{M}_n^{op}, \epsilon)$ is representable by the smooth affine $\mathbb{Z}$-scheme $GL_n$ (see [@milne_etale Chapter IV, §2] for affineness and [@demazure_gabriel Chapter II, §5, 2.7] for smoothness). The functor $\underline{Aut}_{\mathcal{O}_S} (\mathcal{O}_S \times \mathcal{O}_S)$ is representable by the finite group scheme $\mathbb{Z}/2\mathbb{Z}$. Since representable functors on $Sch_s$ are sheaves for the fpqc topology ([@vistoli_descent Theorem 2.55]), we have the following exact sequence of sheaves over $S$ $$\begin{aligned}
0 \rightarrow \underline{Aut}_{\mathcal{O}_S \times \mathcal{O}_S} (\mathcal{M}_n \times \mathcal{M}_n^{op}, \epsilon) \rightarrow \underline{Aut}(\mathcal{M}_n \times \mathcal{M}_n^{op}, \epsilon) \rightarrow \underline{Aut}_{\mathcal{O}_S} (\mathcal{O}_S \times \mathcal{O}_S) \rightarrow 0
\end{aligned}$$ Smoothness of $Aut(\mathcal{M}_n \times \mathcal{M}_n^{op}, \epsilon)$ now follows from Prop. 9.2, Exp. $VI_B$, SGA3.\
For the other cases, note that $Aut(\mathcal{M}_{n}, sp) \simeq Sp_n/Z$ and $Aut(\mathcal{M}_n, tr) \simeq O_n/Z$ (as fpqc quotients) where $Sp_n$ , $O_n$ denote respectively the symplectic group, orthogonal group and $Z$ their respective centers. Required smoothness results for these group schemes follow from [@demazure_gabriel Chapter II, §5, 2.7] and Prop. 9.2, Exp. $VI_B$, SGA3.
By [@vistoli_descent Theorem 2.55] and Theorem \[thm:autoazu\], $\underline{Aut}(\mathcal{A}, \sigma)$ is a sheaf for the fpqc topology.
**Definition:** Let $Aut^0(\mathcal{A}, \sigma) := Aut(\mathcal{A}, \sigma)^0$ denote the neutral component of $Aut(\mathcal{A}, \sigma)$ defined in §\[sec:gpscheme\].
\[thm:neutral\] Let $(\mathcal{A}, \sigma)$ be an Azumaya algebra with involution over $S$. Then $Aut^0(\mathcal{A}, \sigma)$ is an adjoint group scheme over $S$ with absolutely simple fibers. Moreover $Aut^0(\mathcal{A}, \sigma)$ is of type $A$ if $\sigma$ is unitary, type $B$ if $\sigma$ is orthogonal and $n$ is odd, type $C$ if $\sigma$ is symplectic and type $D$ if $\sigma$ is orthogonal and $n$ is even.
By Lemma \[lem:pullback\] below, for every $s \in S$ we have $$\begin{aligned}
\label{eqn:neutral}
Aut^0(\mathcal{A}, \sigma)_s = (Aut(\mathcal{A}, \sigma)_s)^0 \simeq Aut(\mathcal{A}_{k(s)}, \sigma_{k(s)})^0 =: Aut^0(\mathcal{A}_{k(s)}, \sigma_{k(s)})
\end{aligned}$$ Now $Aut^0(\mathcal{A}_{k(s)}, \sigma_{k(s)})$ is an absolutely simple adjoint algebraic group over $k(s)$ ([@boi Chapter VI, §26]). This together with Theorem \[thm:autoazu\] and Proposition \[prop:conrad\_neutral\] shows that $Aut^0(\mathcal{A}, \sigma)$ is a reductive group scheme over $S$. The rest of the claim follows from (\[eqn:neutral\]), unravelling the definitions in §\[sec:gpscheme\] and [@boi Chapter VI, §26].
**Definition:** Based on Theorem \[thm:neutral\], we say that the pair $(\mathcal{A}, \sigma)$ is of type $*$ where $*$ is
- A if $\sigma$ is unitary
- B if $\sigma$ is orthogonal and the degree of $\mathcal{A}$ is odd
- C if $\sigma$ is symplectic
- D if $\sigma$ is orthogonal and the degree of $\mathcal{A}$ is even
The fibered categories $Az_*^n$ and $GS_*^n$
============================================
We will now construct the fibered category of Azumaya algebras with involution over $Sch_S$ and show that it is a stack (in fact a gerbe) with respect to the [étalifstar[é]{}[e]{}]{}topology. The classical reference for stacks and gerbes is [@giraud]. Other references are [@vistoli_descent], [@moerdijk] and the Appendix in [@deligne_tannakian].\
**Definition:** Given a scheme $U$ in the category $Sch_S$, let $Az_*^n(U)$ denote the groupoid of degree $n$ Azumaya algebras with involution of type $*$ (where $*$ is A, B, C or D) over $U$ (morphisms are isomorphisms of Azumaya algebras over $U$ that respect the involution structures). For any morphism $f: V \rightarrow U$ in $Sch_S$ we have a pull-back functor $$\begin{aligned}
Az_*^n (U) &\rightarrow Az_*^n(V)\\
(\mathcal{A}, \sigma) &\mapsto f^*(\mathcal{A}, \sigma) := (f^*\mathcal{A}, f^*\sigma)
\end{aligned}$$ which makes the assignment $U \rightarrow Az_*^n(U)$ a pseudo-functor on $Sch_S$ (see [@vistoli_descent], Chapter 3).\
**Definition:** The fibered category of degree $n$ Azumaya algebras with involution of type $*$ associated to the above pseudo-functor is denoted by $Az_*^n \rightarrow Sch_S$.\
**Definition:** The fibered category $GS_*^n \rightarrow Sch_S$ of rank $n$ adjoint group schemes with absolutely simple fibers of type $*$ (where $*$ is A, B, C or D) is defined in a similar way where morphisms in every fiber $GS_*^n(U)$ are isomorphisms.
\[prop:gerbe\] The fibered categories $Az_*^n \rightarrow Sch_S$ and $GS_*^n \rightarrow Sch_S$ are stacks for the [étalifstar[é]{}[e]{}]{}topology. In fact, they are gerbes.
By standard arguments from decent theory, it is easy to see that $GS_*^n \rightarrow Sch_S$ is a stack for the [étalifstar[é]{}[e]{}]{}topology. It is a gerbe by Proposition \[prop:grp\_etale\]. For the case of $Az_*^n$, we note from descent theory that quasi-coherent sheaves (as well as the morphisms) satisfy descent for the fpqc topology ([@neron Chapter 6, Theorem 4]) and hence also for the [étalifstar[é]{}[e]{}]{}topology. Quasi-coherent sheaves together with additional structure such as an algebra structure and involutions also descend (see for example [@vistoli_descent §4.2.2 and §4.2.3] or [@azumaya_descent Chapter II, Theorem 3.4]). This shows that $Az_*^n\rightarrow Sch_S$ is a stack for the [étalifstar[é]{}[e]{}]{}topology. It is a gerbe by Proposition \[prop:local\_azumaya\].
Equivalence of $Az_*^{n'}$ and $GS_*^n$
=======================================
Let $Az_*^n \rightarrow Sch_S$ and $GS_*^n \rightarrow Sch_S$ be the fibered categories defined in the previous section. In this section we describe a morphism between $Az_*^{n'}$ and $GS_*^n$ (where $n'$ is determined by $n$) that will yield the required equivalence of fibered categories. We will need the following lemma.
\[lem:pullback\] Let $(\mathcal{A}, \sigma) $ be an Azumaya algebra with involution over a scheme $X$. The assignment $$\begin{aligned}
(\mathcal{A}, \sigma) \rightarrow Aut^0(\mathcal{A}, \sigma)\end{aligned}$$ respects pull-backs i.e., for $f: Y \rightarrow X$ we have a canonical isomorphism $$\begin{aligned}
f^*(Aut^0(\mathcal{A}, \sigma)) \simeq Aut^0(f^*(\mathcal{A}, \sigma))\end{aligned}$$
We note that $f^*(\underline{Aut}(\mathcal{A}, \sigma)) = \underline{Aut}(f^*(\mathcal{A}, \sigma))$. Hence by Yoneda lemma, there is a canonical isomorphism $f^*(Aut(\mathcal{A}, \sigma)) \simeq Aut(f^*(\mathcal{A}, \sigma))$. This together with Proposition \[prop:basechange\] proves the claim.
\[thm:main\] The functor $$\begin{aligned}
\mathbf{Aut^0} : Az_*^{n'} &\rightarrow GS_*^n \\
(\mathcal{A}, \sigma) &\mapsto Aut^0(\mathcal{A}, \sigma)\\
((\mathcal{A}, \sigma) \xrightarrow{i} (\mathcal{B}, \tau)) &\mapsto (\phi \rightarrow i\circ \phi \circ i^{-1})\end{aligned}$$ is an equivalence of fibered categories where
- $n' = n+1$ if $(\mathcal{A}, \sigma)$ is of type $A$
- $n'=2n+1$ if $(\mathcal{A}, \sigma)$ is of type $B$
- $n' = 2n$ if $(\mathcal{A}, \sigma)$ is of type $C$
- $n \neq 4$ and $n'= 2n$ is $(\mathcal{A}, \sigma)$ is of type $D$
The functor $\mathbf{Aut^0}$ defines a morphism of fibered categories by Lemma \[lem:pullback\]. Since $Az_*^{n'} \rightarrow Sch_S$ and $GS_*^n \rightarrow Sch_S$ are gerbes by Proposition \[prop:gerbe\], to show that $\mathbf{Aut^0}$ is an equivalence it suffices to show that for any object $(\mathcal{A}, \sigma)$ in $Az_*^n(S)$ (say the split object), $\mathbf{Aut^0}$ induces isomorphism of sheaves $\underline{Aut}(\mathcal{A}, \sigma)$ and $\underline{Aut}(Aut^0(\mathcal{A}, \sigma))$ (see [@giraud Chapter IV, §3.1] or [@moerdijk]). Now by Theorem \[thm:autoazu\] and Proposition \[prop:autg\] both $\underline{Aut}(\mathcal{A}, \sigma)$ and $\underline{Aut}(Aut^0(\mathcal{A}, \sigma))$ are represented by smooth affine group schemes over $S$ denoted by $Aut(\mathcal{A}, \sigma)$ and $Aut(Aut^0(\mathcal{A}, \sigma))$ respectively. So it suffices to check that $\mathbf{Aut^0}$ induces isomorphism at every fiber ([@stacks-project [Tag 039E](https://stacks.math.columbia.edu/tag/039E)], [@stacks-project [Tag 025G](https://stacks.math.columbia.edu/tag/025G)]). Again by Lemma \[lem:pullback\], we see that for every $s \in S$, $\mathbf{Aut^0}$ induces morphism of schemes over $k(s)$ $$\begin{aligned}
\mathbf{Aut^0}_{{k(s)}} : {Aut}(\mathcal{A}_{{k(s)}}, \sigma_{{k(s)}}) \rightarrow {Aut}(Aut^0(\mathcal{A}_{{k(s)}}, \sigma_{{k(s)}}))\end{aligned}$$ Now we are in the case of fields and the fact that $\mathbf{Aut^0}_{{k(s)}}$ is an isomorphism follows from [@boi Chapter VI, §26].
The classification of simply connected group schemes with absolutely simple fibers over $S$ is similar to the adjoint case. The functor in this case is given by $$\begin{aligned}
\mathbf{\overline{Aut^0}}: (\mathcal{A}, \sigma) \rightarrow \overline{Aut^0 (\mathcal{A}, \sigma)}\end{aligned}$$ where for a semisimple group scheme $G$ over $S$, $\overline{G}$ denotes its unique simply connected cover (see [@bconrad_red Exercise 6.5.2]).
Applications
============
In this section we show some interesting consequences of Theorem \[thm:main\].\
For a ring $R$, let $P_n(R,*)$ denote the isomorphism classes of rank $n$ Azumaya algebras with involution of type $*$ over $R$.
Let $R$ be a Henselian local ring with residue field $k$. Assume $char~k \neq 2$. Then the restriction map $$\begin{aligned}
P_n(R,*) \rightarrow P_n(k, *)\end{aligned}$$ is bijective.
This follows from Lemma \[lem:pullback\], Theorem \[thm:main\] and Prop. 1.21, Exp. XXIV, SGA3.
A similar statement holds for isomorphism classes of Azumaya algebras. See Theorem 6.1 in [@grothendieck_brauer].
We will recall the concept of *good reduction* for algebraic groups defined in [@crr_spinor]. Let $k$ be a discrete valued field with valuation $v$. Let $k_v$, $\mathcal{O}_v$ and $k^{(v)}$ denote respectively the completion of $k$, the valuation ring of $k_v$ and the residue field. An absolutely almost simple linear algebraic group $G$ over $k$ is said to have *good reduction at* $v$ if there exists a reductive group scheme $\mathcal{G}$ over $\mathcal{O}_v$ such that $\mathcal{G} \otimes_{\mathcal{O}_v} k_v \simeq G \otimes_{k} k_v$. In this case, let us call $\mathcal{G}$ an $\mathcal{O}_v$-*model for* $G$. Studying good reduction of $G$ has many application such as computing the genus of algebraic group and proving Hasse principles. We refer the reader to [@crr_spinor] for more details.
Let $G$ be an absolutely simple adjoint (or simply connected) algebraic group over a discrete valued field $k$ with valuation $v$. Assume that the characteristic of the residue field $k^{(v)}$ is different from $2$. Suppose $G$ has good reduction at $v$. Then any two $\mathcal{O}_v$-models of $G$ are isomorphic. In other words, an $\mathcal{O}_v$-model of $G$ if it exists is unique upto isomorphism.
This follows from Lemma \[lem:pullback\], Theorem \[thm:main\] and [@panin_purity Theorem 1.1] (or [@sofie Theorem 3.7]).
Let $R$ be a regular local ring and let $G$ be a reductive groups scheme over $R$. A conjecture of Grothendieck and Serre ([@gro58 pp. 26-27, Remark 3], [@gro68 Remark 1.11(a)] and [@serre58 pp. 31, Remark]) states that rationally trivial principal $G$-homogeneous spaces are trivial i.e., the kernel of the canonical map $$\begin{aligned}
\label{eqn:conj}
H^1(R, G) \rightarrow H^1(K, G)\end{aligned}$$ where $K$ is the fraction field of $R$, is trivial. While the conjecture is still open to be proved in complete generality, the proofs for various cases of $R$ and $G$ have been established since Nisnevich’s thesis([@nis]). If $R$ is a regular local ring containing a field of characteristic $\neq 2$ or if $R$ is a semilocal Bézout domain with $2$ invertible, I.Panin ([@panin_purity Theorem 1.1]) and S.Beke ([@sofie Theorem 3.7]) respectively have proved that any two Azumaya algebras with involutions over $R$ that are rationally isomorphic (i.e., isomorphic over the fraction field of $R$) are already isomorphic. This implies that for the above cases of $R$, the kernel of the map in (\[eqn:conj\]) is trivial when $G \simeq Aut(A, \sigma)$, the automorphism scheme of an Azumaya algebra with involution over $R$. Since any adjoint group scheme of classical type over $R$ with absolutely simple fibers is isomorphic to $Aut^0(A, \sigma)$ for some $(A, \sigma)$ by Theorem \[thm:main\], we conclude:
Let $R$ be a integral domain with $2$ invertible which satisfies the property that any two Azumaya algebras with involutions over $R$ that are isomorphic over the fraction field of $R$ are already isomorphic. Then the Grothendieck-Serre conjecture is true for any adjoint group scheme of classical type with absolutely simple fibers over $R$. In particular, this happens when $R$ is a regular local ring containing a field of characteristic $\neq 2$ or a semilocal Bézout domain with $2$ invertible.
|
Filed 7/30/15 P. v. Thomas CA6
NOT TO BE PUBLISHED IN OFFICIAL REPORTS
California Rules of Court, rule 8.1115(a), prohibits courts and parties from citing or relying on opinions not certified for
publication or ordered published, except as specified by rule 8.1115(b). This opinion has not been certified for publication
or ordered published for purposes of rule 8.1115.
IN THE COURT OF APPEAL OF THE STATE OF CALIFORNIA
SIXTH APPELLATE DISTRICT
THE PEOPLE, H038396
(Monterey County
Plaintiff and Respondent, Super. Ct. No. SS070833)
v.
TOMMY EUGENE THOMAS,
Defendant and Appellant.
THE PEOPLE, H039512
(Monterey County
Plaintiff and Respondent, Super. Ct. No. SS070833)
v.
TOMMY THOMAS,
Defendant and Appellant.
STATEMENT OF THE CASE
A jury convicted defendant Tommy Eugene Thomas of assault with a deadly
weapon (Pen. Code, § 245, subd. (a)(1))1 and unlawful possession of ammunition (former
§ 12316, subd. (b)(1)). At the sentencing hearing on January 30, 2009, the trial court
1
Subsequent unspecified statutory references are to the Penal Code.
placed defendant on probation, and it ordered defendant to pay “victim restitution in the
amount and manner to be determined.”
At a restitution hearing on April 4, 2013, the trial court ordered defendant to pay
the assault victim $33,684.55 in restitution. The trial court ordered defendant to pay
10 percent interest on the restitution award, with the interest beginning to accrue on
January 30, 2009.
Defendant now appeals from the restitution order. On appeal, defendant contends
that the trial court acted in excess of its jurisdiction in issuing the restitution order. He
also contends that the trial court erred in imposing interest on the restitution award. As
set forth below, we will modify the restitution order to have the 10 percent interest begin
accruing on April 4, 2013, and we will otherwise affirm.
STATEMENT OF THE FACTS2
Defendant stabbed Kevin Thissel with a barbeque fork. Thissel was hospitalized
due to his stab wounds.
Police officers searched defendant’s house after the stabbing. The officers found
ammunition in defendant’s bedroom.
DISCUSSION
I. Defendant is Estopped from Contesting Jurisdiction
Defendant contends that we must reverse the restitution order because the trial
court acted in excess of its jurisdiction in issuing the order. Defendant asserts that the
trial court “lost all lawful authority and jurisdiction to order victim restitution” when his
probation expired on April 15, 2012. Defendant further asserts: “Because the court did
not order restitution until April 4, 2013, . . . the court lost jurisdiction and could no longer
2
The facts underlying defendant’s conviction are largely irrelevant to the issues
presented on appeal. We therefore provide only a very brief summary of those facts.
2
order [defendant] to pay victim restitution.” As explained below, defendant is estopped
from contesting jurisdiction.
A. Background
At the sentencing hearing on January 30, 2009, the trial court did not determine
the amount of restitution that defendant would be required to pay. Rather, on that date
the trial court ordered defendant to pay “victim restitution in the amount and manner to
be determined.”
On March 19, 2012, the probation department filed a petition for “setting of
restitution hearing.” The petition specified that “defendant requests a hearing” regarding
“the amount of restitution.” The trial court set a restitution hearing for March 22, 2012.
On March 22, 2012, defendant consented to a continuance of the restitution
hearing beyond April 15, 2012. At the March 22, 2012 hearing, the trial court stated,
“The matter is continued to April 17th at 8:30 for setting of restitution hearing.”
Defendant did not object to the continuance. Rather, when the trial court proposed
April 17, 2012 as a date for setting the restitution hearing, defense counsel responded,
“That sounds good.”
There were several continuances after April 17, 2012. The trial court eventually
held the restitution hearing on April 4, 2013. On April 4, 2013, the trial court ordered
defendant to pay victim restitution in the amount of $33,684.55, plus interest.
B. Analysis
Our Supreme Court recently addressed the issue presented here. In People v. Ford
(2015) 64 Cal.4th 282 [187 Cal.Rptr.3d 919, 349 P.3d 98, 99-100] (Ford), the Supreme
Court held: “We need not decide whether a trial court retains jurisdiction to modify the
amount of restitution once a defendant’s term of probation has expired. So long as a
court has subject matter jurisdiction—and both parties agree the trial court had it here—
then a party seeking or consenting to action beyond the court’s power may be estopped
3
from complaining that the resulting action exceeds a court’s jurisdiction. [Citation.] By
agreeing to a continuance of the restitution hearing to a date after his probationary term
expired, defendant implied his consent to the court’s continued exercise of jurisdiction.
He is therefore estopped from challenging it.”
Ford is controlling here. Defendant does not assert that the trial court lacked
subject matter jurisdiction. Indeed, we must conclude that the trial court did have subject
matter jurisdiction. (Ford, supra, 64 Cal.4th 282 [187 Cal.Rptr.3d 919, 349 P.3d 98, 101]
[a trial court “lacks jurisdiction in a fundamental sense when it has no authority at all
over the subject matter,” and “it is well settled that the expiration of a probationary period
does not terminate a court’s fundamental jurisdiction”]; see also In re Bakke (1986)42
Cal.3d 84, 89 [neither the probation statutes nor the cases applying them support a
holding that expiration of the probationary period terminates the court’s jurisdiction of
the subject matter].) Moreover, like Ford, defendant agreed to a continuance of the
restitution hearing to a date after his probationary term expired. Defendant requested a
restitution hearing, and the trial court set the restitution hearing for March 22, 2012, a
date when defendant was still on probation. On March 22, 2012, defendant agreed to
continue the matter to April 17, 2012, a date when defendant was no longer on probation.
By agreeing to continue the restitution hearing to a date after his probation expired,
defendant implied his consent to the trial court’s exercise of jurisdiction. (See Ford,
supra, 64 Cal.4th 282 [187 Cal.Rptr.3d 919, 349 P.3d 98, 99-100].) Defendant therefore
is estopped from challenging jurisdiction. (See Ford, supra, 64 Cal.4th 282 [187
Cal.Rptr.3d 919, 349 P.3d 98, 102] [although the defendant did not seek the continuance,
estoppel can “apply to a party who merely consents to a continuance to a date beyond the
court’s ordinary authority to act”].)
4
II. Section 1202.4 Authorized the Trial Court to Impose Interest, But the Trial Court
Abused its Discretion in Ordering the Interest to Begin Accruing on January 30, 2009
Defendant contends that the trial court erred in ordering him to pay interest on the
restitution award. His argument is twofold. Defendant first asserts that “section 1202.4
authorized interest on a victim restitution award only where there was evidence the
victim suffered a loss pertaining to interest,” and the trial court erred in imposing interest
because there was no evidence that Thissel suffered a loss pertaining to interest.
Defendant next asserts that the trial court erred in ordering the interest to begin accruing
on January 30, 2009, a date four years before the restitution order. As explained below,
section 1202.4 authorized the trial court to impose 10 percent interest, but the trial court
abused its discretion in ordering the interest to begin accruing on January 30, 2009.
A. Background
The trial court held the restitution hearing on April 4, 2013. Thissel testified at the
hearing, and a victim loss statement was admitted into evidence. The evidence at the
hearing established that Thissel suffered the following economic losses due to the assault:
lost wages in the amount of $4,200, ruined clothing valued at $312, a lost cell phone
valued at $110, and hospital bills in the amount of $29,062.55. Based on the evidence
presented at the hearing, the trial court ordered defendant to pay restitution in the amount
of $33,684.55. The trial court ordered 10 percent interest to accrue on the restitution
award beginning on January 30, 2009.
Defendant objected to the imposition of interest. Defense counsel asserted that
there “was absolutely no testimony, whatsoever, that interest was owed to the hospital for
the payment of 29,062.” Defense counsel also noted that it would be unfair to impose
interest, arguing in part: “[B]ack when this case came to sentencing, no restitution order
was issued. The restitution issue was reserved . . . . Had restitution been ordered
previously, [defendant] would have been able to begin paying the restitution amount, and
5
we would not have the issue pending about interest.” The trial court rejected the defense
arguments, stating: “The Court’s going to order interest at the legal rate of 10 percent
from January 30, 2009.”
B. Legal Principles and the Standard of Review
“Restitution is constitutionally and statutorily mandated in California.” (People v.
Keichler (2005) 129 Cal.App.4th 1039, 1045.) The constitutional mandate for restitution
is carried out through section 1202.4. (Ibid.)
Section 1202.4, subdivision (f) provides: “[I]n every case in which a victim has
suffered economic loss as a result of the defendant’s conduct, the court shall require that
the defendant make restitution to the victim or victims in an amount established by court
order, based on the amount of loss claimed by the victim or victims or any other showing
to the court. If the amount of loss cannot be ascertained at the time of sentencing, the
restitution order shall include a provision that the amount shall be determined at the
direction of the court. The court shall order full restitution unless it finds compelling and
extraordinary reasons for not doing so and states them on the record.”
Subdivision (f)(3) of section 1202.4 describes the method to be used in calculating
restitution. As pertinent here, that subdivision provides: “To the extent possible, the
restitution order shall be prepared by the sentencing court, shall identify each victim and
each loss to which it pertains, and shall be of a dollar amount that is sufficient to fully
reimburse the victim or victims for every determined economic loss incurred as the result
of the defendant’s criminal conduct, including . . . [i]nterest, at the rate of 10 percent per
annum, that accrues as of the date of sentencing or loss, as determined by the court.” (§
1202.4, subd. (f)(3)(G).)
A restitution order “must fully reimburse the victim for every economic loss
caused by the defendant’s criminal conduct, including 10 percent interest . . . .” (People
v. Wickham (2014) 222 Cal.App.4th 232, 238, italics in original.) “And the point of a
6
restitution award is that the crime perpetrator is indeed responsible to pay the award now,
which is why the award carries interest from the date of sentencing or date of loss.”
(People v. Pangan (2013) 213 Cal.App.4th 574, 581 (Pangan), fn. omitted, italics in
original.)
“In determining the amount of restitution, all that is required is that the trial court
‘use a rational method that could reasonably be said to make the victim whole, and may
not make an order which is arbitrary or capricious.’ ” (People v. Akins (2005) 128
Cal.App.4th 1376, 1382 (Atkins).) “A restitution order is intended to compensate the
victim for its actual loss and is not intended to provide the victim with a windfall.”
(People v. Chappelone (2010) 183 Cal.App.4th 1159, 1172.)
“We review the trial court’s restitution order for abuse of discretion.” (People v.
Busser (2010) 186 Cal.App.4th 1503, 1508.) “The order must be affirmed if there is a
factual and rational basis for the amount.” (Akins, supra, 128 Cal.App.4th at p. 1382.)
“An order resting upon a ‘demonstrable error of law’ constitutes an abuse of the court’s
discretion.” (People v. Busser, supra, 186 Cal.App.4th at p. 1508.)
C. Section 1202.4 Authorized the Trial Court to Impose 10 Percent Interest
Without Evidence of Loss Pertaining to Interest
Defendant contends that the “plain language” of section 1202.4 authorizes a trial
court to impose interest on a restitution award only if there is evidence that the victim
“has suffered a determined economic loss pertaining to interest.” He asserts that the
restitution order here must be reversed due to the absence of such evidence.
Defendant’s argument is unpersuasive. Section 1202.4, subdivision (f)(3)(G)
specifically states that the trial court is authorized to impose “[i]nterest, at the rate of
10 percent per annum, that accrues as of the date of sentencing or loss, as determined by
the court.” No provision in section 1202.4 states that interest may be imposed only if
there is evidence of economic loss pertaining to interest. Moreover, defendant’s
7
argument overlooks the purpose of imposing interest on a restitution award, which is to
secure immediate payment of restitution. (Pangan, supra, 213 Cal.App.4th at p. 581.)
To require evidence of loss pertaining to interest would defeat the purpose of
section 1202.4’s interest provision. We therefore cannot conclude that section 1202.4
requires evidence of loss pertaining to interest, and we will not reverse the restitution
order here due to lack of such evidence.
D. The Trial Court Abused its Discretion in Ordering the Interest to Begin
Accruing on January 30, 2009
Defendant alternatively asserts that the trial court abused its discretion in ordering
the 10 percent interest to begin accruing on January 30, 2009. We agree.
Section 1202.4, subdivision (f)(3)(G) states that 10 percent interest “accrues as of
the date of sentencing or loss, as determined by the court.” “Section 1202.4, subdivision
(f) creates a presumption victim restitution loss should be ascertained at ‘the time of
sentencing,’ subject to the trial court’s discretion to ascertain the date of loss at another
time.” (Pangan, supra, 213 Cal.App.4th at p. 581, fn. 7.) It has been assumed that the
“time of sentencing,” as used in section 1202.4, subdivision (f), “is the time of the
restitution order” and not the date when the defendant is sentenced. (Pangan, supra, 213
Cal.App.4th at p. 581, fn. 7.)
January 30, 2009 was the date of defendant’s sentencing hearing. On that date, the
trial court placed defendant on probation and ordered defendant to pay “victim restitution
in the amount and manner to be determined.” Over four years later, on April 4, 2013, the
trial court issued a restitution order requiring defendant to pay the victim $33,684.55,
plus 10 percent interest. The trial court abused its discretion in ordering the interest to
begin accruing on January 30, 2009. As explained above, the purpose of imposing
interest on a restitution award is to secure immediate payment of restitution. Before
April 4, 2013, there was no amount of restitution for defendant to pay. To require
8
defendant to pay 10 percent interest for the four years during which there was no amount
of restitution for him to pay would be unreasonable. (See Akins, supra, 128 Cal.App.4th
at p. 1382 [the trial court must use a rational method in determining the amount of
restitution].) Indeed, before the restitution amount was set, defendant informed the trial
court: “Your honor, I also would like to state I made an attempt through the Revenue
Department to make restitution payments and they would not take it . . . . [T]hey did not
take any payment whatsoever.” Given that defendant was prevented from paying
restitution before April 4, 2013, we believe that it would be unfair for 10 percent interest
to begin accruing before that date. We accordingly will modify the restitution order to
have the 10 percent interest begin accruing on April 4, 2013.
DISPOSITION
The restitution order is modified to reflect 10 percent interest beginning to accrue
on April 4, 2013. As so modified, the judgment is affirmed.
9
______________________________________
RUSHING, P. J.
WE CONCUR:
____________________________________
ELIA, J.
____________________________________
MÁRQUEZ, J.
People v. Thomas
H038396 & H039512
10
11
|
476 F.2d 924
5 ERC 1187, 155 U.S.App.D.C. 168, 3Envtl. L. Rep. 20,219
Harriet K. BROOKS et al., Petitioners,v.The ATOMIC ENERGY COMMISSION and United States of America,Respondents, Indiana & Michigan Electric Companyand Indiana & Michigan Power Company, Intervenors.
No. 72-2177.
United States Court of Appeals,District of Columbia Circuit.
Argued Feb. 14, 1973.Decided March 8, 1973.Rehearing Denied April 13, 1973.
Lewis D. Drain, Grand Rapids, Mich., for petitioners with whom Myron M. Cherry, Chicago, Ill., was on the pleadings for petitioners.
Jerome Nelson, Sol. U. S. A. E. C., for respondents with whom Edmund B. Clark, Atty., Dept. of Justice, was on the response for respondents.
Gerald Charnoff, Washington, D. C., for intervenors, Indiana & Michigan Electric Co. and Indiana & Michigan Power Co., with whom Jay E. Silberg, Washington, D. C., was on the response for intervenors.
Before BAZELON, Chief Judge, FAHY, Senior Circuit Judge, and Mac-KINNON, Circuit Judge.
PER CURIAM:
1
On March 25, 1969, the Atomic Energy Commission issued two provisional construction permits to the Indiana and Michigan Electric Company and the Indiana and Michigan Power Company (hereinafter Companies) for construction of Units 1 and 2 of the Donald C. Cook Nuclear Plant. In accordance with section 185 of the Atomic Energy Act1 the construction permits for the two units stated the earliest and latest dates for the completion of construction. On October 10, 1972, the companies requested an extension of the latest permit completion date on both permits, citing bad weather, unexpected labor troubles and delay due to the redesign of certain reactor containment components. The Commission, on October 26, 1972, without notice or opportunity for hearing, entered an order extending the latest completion dates in the two construction permits as requested by the companies.2 Petitioners, persons who live and/or own property on Lake Michigan near the construction site of the Cook nuclear facility, claim, under several different theories, that they were entitled to notice and a hearing before the Commission summarily extended the construction permit completion dates. Petitioners ask that we reverse the Commission's Order of October 26, 1972. For the reasons stated below, we grant summary reversal and order that the Commission promptly afford petitioners a hearing on the issue of the extension of the permit completion dates. We decline to order the suspension of construction as requested by petitioners under the circumstances of this case.
2
In order fully to appreciate petitioners' argument, it is necessary briefly to outline the action taken by the Commission with respect to the Cook nuclear facility in response to this Court's decision in Calvert Cliffs' Coordinating Committee, Inc. v. Atomic Energy Commission, 146 U.S.App.D.C. 33, 449 F.2d 1109 (1971)3. On June 29, 1972, the Commission published in the Federal Register a Notice of Consideration of Issuance of Facility Operating Licenses and Notice of Opportunity for Hearing.4 This notice provided that interested persons could request a hearing:
3
(1) with respect to whether, considering those matters covered by appendix D to 10 CFR Part 50, the provisional construction permits should be continued, modified, terminated, or appropriately conditioned to protect environmental values; and (2) with respect to the issuance of the facility operating licenses.5
4
Petitioners, on July 28, 1972, filed a timely response to this notice requesting leave to intervene, and an opportunity for hearing, with respect to both the continuation, modification, or termination of the construction permits and the issuance of the facility operating licenses. On September 29, 1972, the Commission issued a memorandum opinion and order which stated that a hearing would be held on the applications for the issuance of operating licenses. The order admitted petitioners as parties to the operating license proceeding but inexplicably failed to advert to the noticed section C proceedings concerning the required NEPA review of the construction permits.6
5
We believe that petitioners are correct in contending that, apart from the full environmental review of the construction permits mandated by the NEPA regulations, 10 C.F.R. Part 50, App. D, Section C,7 they should have been afforded the opportunity for a hearing on the extension of the permit completion dates. Section 189(a) of the Atomic Energy Act provides, as amended:
6
In any proceeding under this chapter, for the granting, suspending, revoking, or amending of any license or construction permit . . . the Commission shall grant a hearing upon the request of any person whose interest may be affected by the proceeding, and shall admit any such person as a party to such proceeding. . . . In cases where such a construction permit has been issued following the holding of such a hearing, the Commission may, in the absence of a request therefor by any person whose interest may be affected, issue an operating license or an amendment to a construction permit or an amendment to an operating license without a hearing, but upon thirty days' notice and publication once in the Federal Register of its intent to do so. The Commission may dispense with such thirty days' notice and publication with respect to any application for an amendment to a construction permit or an amendment to an operating license upon a determination by the Commission that the amendment involves no significant hazards consideration.8
7
The language of this section clearly seems to require that the Commission grant a hearing upon the request of any interested person in a proceeding amending a construction permit. The Commission and the Companies do not argue that the extension of the permit completion dates was not an amendment of the construction permit; they argue instead that the last two sentences of section 189(a), added to the section in 1962,9 indicate Congressional intent to dispense with hearings in construction permit amendment proceedings in the absence of a request therefor or when the Commission determines that the amendment involves "no significant hazards consideration."
8
First of all, the Commission's Order of October 26, 1972, extending the permit completion dates, gives no indication whatsoever that the amendment involved no significant hazards consideration. Where one of the reasons given by the Companies in requesting an extension is the necessity for redesign of certain reactor containment components, the Commission must surely make the required significant hazards determination, and note such determination in its order, if it intends to put forward such determination as the basis for its denial of a hearing.10 The necessity for administrative agencies to provide a statement of reasons, especially in cases such as this where the public interest demands close scrutiny of agency action, is a fundamental principle of administrative law.11
9
Secondly, and perhaps more to the point, the legislative history of the 1962 amendments indicates that it was Congress' intent to lessen the mandatory hearing requirement only when there was no request for a hearing. Both the Senate and House Reports contain the following language:
10
Under this plan, the issuance of amendments to such construction permits . . . would be only after a 30-day public notice and an offer of hearing. In the absence of a request for a hearing, issuance of an amendment to a construction permit . . . would be possible without formal proceedings.12
11
It is altogether untenable to argue that petitioners made no formal request for a hearing on the amendment of the construction permit, and therefore the Commission did not err in issuing the order without notice and hearing. The 30-day public notice required by section 189(a) must, of course, precede the Commission's action since the obvious purpose of such notice is to allow interested persons, such as petitioners, to decide whether they desire to exercise their statutory right and request a hearing. Indeed, the Senate and House Reports make this amply clear by stating that any regulatory action which takes place after the initial issuance of the construction permit "will take place only upon publication and sufficient advance notice to afford an interested party the opportunity to intervene."13 Certainly logic compels the conclusion, as Congress recognized, that one may not timely request a hearing if he lacks notice that the Commission is about to take action. Especially, in a case such as this one, where petitioners had already formally expressed their interest in the continuation or modification of the construction permit by requesting intervention in the section C proceedings, elementary fairness as well as the clear language of section 189(a), demands that the Commission afford notice and an opportunity for hearing before extending the completion dates of the construction permits.
12
Accordingly, petitioners' motion for summary reversal is granted to the extent that the Commission is ordered promptly to afford the petitioners, and any other interested persons, an opportunity for hearing on the question of whether the Companies have shown "good cause" for extension of the permit completion dates.14 The continuing validity of the amendment of the construction permit is made subject to the outcome of a hearing on this issue.
1
42 U.S.C. Sec. 2235
2
This Order by the Commission was published in the Federal Register on November 2, 1972. 37 Fed.Reg. 23373. Section 185 of the Atomic Energy Act of 1954, 42 U.S.C. Sec. 2235, provides that if construction is not completed by the latest completion date, the construction permit shall expire, and all rights thereunder be forfeited, "unless upon good cause shown, the Commission extends the completion date." The Commission's own regulations provide that all rights under the construction permit shall be forfeited if the facility is not completed by the latest completion date unless the Commission extends the completion date "upon good cause shown." 10 C.F.R. Sec. 50.55(b)
3
The Commission's regulations implementing the National Environmental Policy Act of 1969 (NEPA), 42 U.S.C. Sec. 4321 et seq., are found in 10 C.F.R. Part 50, Appendix D
4
37 Fed.Reg. 12866
5
Id. Section C of Appendix D to 10 C.F.R. Part 50 provides, in compliance with this Court's decision in Calvert Cliffs' Coordinating Committee v. AEC, supra at 1128, that a full NEPA review be conducted to determine whether construction permits issued prior to the effective date of NEPA, as were those in this case, should be continued, modified, terminated, or appropriately conditioned to protect environmental values
6
The Commission has represented in its papers before this Court, and at oral argument, that the intent of the September 29 Order was to afford petitioners a hearing on both issues, that is the continuation, modification, or termination of the construction permits and the issuance of the operating licenses. These hearings, which will be before a duly designated Atomic Safety and Licensing Board, are presently scheduled to begin sometime in the summer of 1973
7
See note 5 supra
8
42 U.S.C. Sec. 2239(a)
9
Pub.L.No. 87-615, Sec. 2, 76 Stat. 409
10
It is highly instructive to note the Commission's Draft Environmental Statement, issued in December, 1972, where it is stated at pages IV-6-7:
The purpose of the reactor containment is to safeguard against releases of radioactivity to the environs in the highly unlikely event of a major loss of coolant accident postulated (for analytical purposes) to occur within the containment. The design criteria for the Station reactor containment and its components were reviewed and found acceptable by the staff, and were, among other things, the subject of a licensing hearing prior to the issuance of the construction permits. During the course of the staff's review of the application for an operating license for the Station, certain components designed, fabricated and installed within the containment were found not to meet the design criteria earlier found acceptable by staff during the construction permit review. Consequently, redesign and testing of these components are required in order to achieve an adequate safety system. The environmental impact of accidents occurring within the context of such a system is discussed in Section VI.
11
See, e. g., Citizens Ass'n of Georgetown v. Zoning Commission, 155 U.S.App.D.C. -, 477 F.2d 402 (1973); Greater Boston Television Corp. v. FCC, 143 U.S. App.D.C. 383, 393, 444 F.2d 841, 851 (1971); Environmental Defense Fund v. Ruckelshaus, 142 U.S.App.D.C. 74, 86-88, 439 F.2d 584, 596-598 (1971)
12
S.Rep.No.1677, 87th Cong., 2d Sess. 8 (1962), U.S.Code Cong. & Admin.News 1962, p. 2207; H.R.Rep.No.1966, 87th Cong., 2d Sess. 8 (1962)
13
Id
14
The hearing which we order in this case is in addition to the hearings required by 10 C.F.R. Part 50, Appendix D, presently scheduled for this summer, on the continution, modification, termination, or conditioning of the construction permits and the issuance of the operating licenses
|
Q:
Mysterious loss of weight
Now an entry into Fortnightly Topic Challenge #41: Short and Sweet
A man enters a room and presses a button. Within seconds he loses 20 lbs body weight. How did he lose the weight?
A:
Since it's tagged 'lateral-thinking', an alternative that blatantly ignores the question's title is that:
The man is in the UK, and he just pressed 'OK' button to confirm a £20 purchase
A:
He entered
an elevator and pressed the down button. The downward acceleration from the elevator reduces his apparent weight.
A:
He presses the button to start a machine. It catastrophically fails within seconds and takes off the lower part of his leg, which weighed 20 lbs.
|
Run the streets and trails of Dallas, Texas
Apparel
Post navigation
This girl loves shoes [the kind that RUNNN!], so I’m excited about heading to Boston this Saturday through Monday to check out a bunch. Nike’s fall shoe and apparel preview for media types is happening Boston Marathon weekend, so I’m also hoping to soak up some sweet, prime runner rays to fuel up my easily-depleted training tank. I’ll take motivation in any form I can get it, and where better than at one of the most high-tone marathons of ever?
I’ll be blogging (or blerging, as my husband calls it), picture-taking and generally acting as if I’ve just been let out of the basement and deposited directly into a world of hydration belts, Vaseline’d feet, high-end sports bras and GPS-enabled heart rate monitor watches. Should be fun.
*Disclaimer: Nike is paying for this trip, not me. It is not affiliated with The Dallas Morning News. Readers of this blog shouldn’t be surprised if I end up liking some of Nike’s new products, and Nike shouldn’t be surprised if I end up panning some of their products. This blog is a “call-it-as-I-see-it” zone.
I’m curious how many runners change clothes in their car before a run. Surely I’m not the only one.
This practice starts with the fact that I’m too lazy to get up any earlier before work than I positively have to. This trait makes me an evening runner by default, usually after work.
I could bring my running clothes to work and change in the bathroom before I leave. But I’m not really jazzed about co-workers seeing me in thigh-showing shorts and a wrinkled men’s v-neck undershirt. We don’t have that kind of relationship.
I also could stop off at a gas station to change, but I really just want to get to the trail and down to business.
Quick car changes are tricky, at least if you’re female, but I’ve got it down. So, I bring to you my tips for changing in the car without getting arrested.
1. Park far out and open.
It would seem like it’s best to wedge your car between two big F-250s for the coverage. But the coverage goes both ways — you might not be able to see one of the vehicle owners approaching, keys in hand and jaw on the ground after catching you semi-nude. If you have someone with you to act as lookout (who you don’t mind seeing you naked-ish), even better.
2. Bottoms down.
Changing bottoms isn’t the big deal. Just make sure the coast is relatively clear, and the car itself will cover you while you shimmy out of jeans and into shorts.
3. Use your current top as a really-cramped miniature dressing room.
This is the most potentially-arrestable part, so be careful. If you’re wearing a loose top, pull your arms inside. Pull your bra off underneath. Peek your hands out from under your shirt and locate your sports bra. If it’s the pullover kind, put it around your neck. Then pull your arms back inside the shirt, grab the sports bra down inside and maneuver your arms and goods into it. Now that the prime property is properly concealed, just take off the shirt and pull on the other one. |
The use of network computing and storage has proliferated in recent years, and continues to proliferate. The resources for network computing and storage are often provided by computing resource providers who leverage large-scale networks of computers, servers and storage drives to enable clients, including content providers, customers and the like, to host and execute a variety of applications and web services. The usage of network computing allows content providers and customers, among others, to efficiently and adaptively satisfy their computing needs. However, with the growing use of virtual resources, customers are encountering situations in which the virtual resources cannot accommodate their needs during certain situations, such as unanticipated traffic spikes or need for immediate responses to satisfy increased loads. Some of these situations may at least partly be caused by insufficient scalability of components used to manage, instantiate, or otherwise control the functionality of the virtual resources.
A related consideration is that with the growing use of virtual resources, the configuration (whether by customer or otherwise) of such resources, and the interconfiguration and topology of multiple resources, is becoming increasingly complex. Accordingly, it is becoming easier, and potentially more damaging, to inadvertently or intentionally make destructive changes to such configurations. |
Purification and characterization of a C5a-inactivating enzyme from human peritoneal fluid.
Earlier work has suggested that familial Mediterranean fever, an inherited disorder characterized by sporadic episodes of inflammation involving the pleural and peritoneal cavities and the joints, is caused by the lack of a C5a inactivator normally found in serosal fluid. We have purified this inactivator from ascites fluid and obtained a protein of molecular weight 53 to 56 kD with a specific activity 10,000-fold greater than the crude material. On Western blot, an inhibitory antibody recognized a single antigenic species at the same molecular weight. The enzyme had no activity against denatured bovine serum albumin. With recombinant C5a as substrate, the Km and Vm were 3.4 mumol/L and 52 nmol C5a/min/mg protein, respectively. |
1. Introduction {#sec1}
===============
Aneurysms of the aorta and peripheral arteries are uncommon clinical conditions.
Historically, in the literature, the prevalence of thoracoabdominal aortic aneurysm (TAAA) is thought to vary between 1 and 10 per 100,000 people per year \[[@B1]--[@B4]\], with less than 7% of all intra-abdominal aneurysms isolated iliac artery aneurysm (IAA). They are found in only 0.03% of the population in autopsy studies \[[@B5], [@B6]\]. However, up to 40% of iliac arteries aneurysms coexist with Abdominal Aortic Aneurysms (AAA) \[[@B5], [@B6]\]. If left untreated, they may grow and rupture, ultimately leading to the death of the patient \[[@B7], [@B8]\].
Aneurysm treatment has been performed with the open surgical approach since the early 1950s \[[@B9]\]. In the last two decades, as a result of the developments of endovascular methods, treatment with percutaneous access has become an alternative to surgery \[[@B10], [@B11]\]. Endovascular treatment is now the primary option for aneurysm treatment, with regard to its low mortality and risk of morbidity if technically feasible \[[@B12]--[@B14]\]. Branches patency must remain a major consideration regarding complex aneurysm treatment. Amongst the well-known adverse consequences of visceral or thoracic aorta branches are bowel infarction, renal failure or necrosis, and paraplegia. Open surgery is thought to cause 13.2% spinal cord ischemia \[[@B15]--[@B18]\].
A vast range of endovascular devices have been developed to cope with the presence of major lateral branches within or near the aneurysm sac, the best known of which are the chimney technique, fenestrated stent grafts, and MFM. When the aneurysm is isolated with the chimney technique and fenestrated stent grafts, the flow of the vital lateral branches is maintained mechanically. However, application of these stents is very difficult and the clinical results are unsatisfactory \[[@B19]\]. Notably, the multicentre prospective French study (Windows) on AAA and TAAA treatment with fenestrated and/or branched endovascular repair (f/b-EVAR) \[[@B20]\] reveals up to 16.7% of paraplegia/parapesia for type II and III TAAA, up to 7.1% severe ischemic colitis for suprarenal AAA and type IV TAAA, as well as 2.4% bowel infarction and 23.8% of renal impairment in suprarenal and type II, III, and IV TAAAs. Those complications need to be seriously considered, regarding both the patient\'s well-being and the medico-economic impact.
MFM is an unconventional endovascular device that has been developed to manage complex aneurysms. MFMs have been shown to be easier to apply and not require a specific preliminary preparation of the prosthesis for each patient in advance, since they are off-the-shelf solution readily available in all size and diameters, with favourable midterm clinical outcome \[[@B21]--[@B26]\].
MFMs are uncoated, self-expanding, 3D braided multilayer devices, with high radial force and made of a memory-shape cobalt/chrome alloy (Phynox™). The device is available in a wide range of lengths and diameters, making it possible to treat all locations, shape, and size of aneurysm. It is currently CE marked for peripheral and aortic aneurysms and is under investigation for the treatment of chronic type B aortic dissection. Being porous stents, these multilayered devices modulate the flow dynamics along the vessel wall into the aneurysm, converting recirculating flow into the aneurysm into a laminar flow and at the same time acting as a passive barrier by reducing the flow velocity (\>90%); the reduction of flow velocity into the aneurysm, as well as lamination, induces the formation of gradual thrombus in the form of Zahn lines within the aneurysm sac.
On the other hand, since it does not cause any discontinuation of the flow on the side, the MFM redirects the blood flow to the lateral branches due to the Venturi effect \[[@B23], [@B24]\]. Branches are kept patent when the device is landed before the ostium of emerging arteries. A Systematic Review and Patient-Level Meta-Analysis of the Streamliner Multilayer Flow Modulator in the Management of Complex Thoracoabdominal Aortic Pathology reports a rate of 97.8% of branches patency at the latest follow-up documented in 13 reviewed publications. The French STRATO trial also reports the same range of patency, with 100.0% and 97.0% of branches patency at, respectively, 24 and 36 months \[[@B25], [@B26]\]. In our study, we provided early and midterm results of patients enrolled and treated with MFMs.
2. Methods {#sec2}
==========
After obtaining the approval of Intuitional Ethics Committee, the medical records and computerized data of 78 patients admitted to our clinic between April of 2014 and February of 2016 and received stent graft implantation through endovascular approach owing to aortic aneurysm and iliac artery aneurysm were retrospectively reviewed. Of the 78 patients, 23 patients (19 males and 4 females) who were treated with MFM stents were included in the present study. The common symptom seen in half of the patients was abdominal and back pains. One of the patients showed claudication which became apparent during walking. The rest of the patients were asymptomatic.
Of 23 patients operated, 17 had TAAA while five of them had TAAA associated with bilateral iliac artery aneurysms. Another patient was detected with giant pseudoaneurysm of right iliac artery developed iatrogenically during the surgery for lumbar disc hernia. All the patients had both major lateral branches emerging from the aneurysm sac and showed involvement of the major lateral branches. All the aneurisms were fusiform in shape, apart from the saccular iliac aneurisms. When the patients were evaluated according to aetiology, there was at least one more disease accompanied with nonspecific degenerative aneurysms. Furthermore, 13 patients were inflicted with hypertension. Eleven of them had dyslipidemia. Eight patients were identified to have diabetes mellitus while seven patients had coronary artery disease. Seven patients suffered from chronic obstructive pulmonary disease while four patients had congestive heart failure and peripheral atherosclerotic disease. Three patients were inflicted with renal insufficiency. The maximal diameter of aneurisms in TAAA was between 55 and 76 mm and it was between 34 and 48 mm in IAA patients. The main characteristics of patients have been presented in [Table 1](#tab1){ref-type="table"}.
All the patients who were to receive endovascular intervention due to TAAA and IAA were designated to get contrast-enhanced computed tomography (CT) angiography with 1.5 cm CT section thickness prior to the procedure in our clinic. Structure of the aneurism and the critical branches exiting from it were carefully assessed in detail in CT angiography. Aortic diameter, calcification in the wall of the aorta, presence of thrombus in the vascular lumen, and the length and angulation of the aneurism in which the stent was to be placed were evaluated and measured as well. Moreover, the type and dimensions of the grafts that were to be used were also evaluated with regard to their compliance with the size of the iliac and femoral arteries. Diameter of the graft was determined using 20% larger of the diameter that was measured at the proximal and distal ends of the graft that were to be placed to healthy part of the vessel.
Endovascular attempt was preferred since planned surgical interventions had high risk of mortality and morbidities. Surgical interventions were performed in the angiography unit after obtaining written consent of the patients and implementing required sterilization of the operation room. The surgical interventions were completed under local anaesthesia accompanied with sedation in 21 patients and under general anaesthesia accomplished through femoral artery in 2 patients. Cardiatis MFM stents were used throughout implantation procedures in 23 patients.
Effective implantation of MFM within the aneurysmal area without complications was defined as a successful intervention. Inclusion criteria were as follows:Patient suitable for endovascular repair (EVAR) or thoracic endovascular repair (TEVAR) for thoracoabdominal aneurysms and not suitable for graft stent regarding the presence of iliac artery aneurysms.55 mm or more for thoracoabdominal aneurysms diameter and presence of giant aneurysm (\>35 mm) affecting internal iliac artery for iliac artery aneurysms.Presence of major lateral branches within or near the aneurysm incisionPatients technically suitable for MFM implantation (\<60 degrees proximal angulations, aneurysm diameter \< 90 mm, distal and proximal landing zone \> 20 mm, and iliac artery diameter \> 6.5 mm)
The patients were monitored for 48 hours, being released with the daily treatment of 100 mg aspirin and 75 mg clopidogrel. The patients were checked at postoperative 1, 3, 6, and 12 months to assess conditions of the endovascular stents. In addition, all the patients received a CT angiography at postoperative 3rd month to further evaluate condition of the endovascular stents.
3. Results {#sec3}
==========
The procedure was successfully completed in 23 patients (Figures [1(A)](#fig1){ref-type="fig"} and [1(B)](#fig1){ref-type="fig"}) but two patients were excluded from the current study since the delivery system failed due to extensive calcifications and/or access artery tortuosity. In two patients (one male and one female), the reason for failure was that the delivery system could not be advanced to the target area. In the female patient, advanced calcifications (porcelain aorta) are the reason for the inability to pass through the introducer femoral artery ([Figure 2](#fig2){ref-type="fig"}). The left subclavian artery was the surgically cut down to provide new access, but the introducer could not be advanced there. Similarly, in the other patient, the sheath could not be advanced due to excessive calcification and tortuosity in iliac arteries. It is to note that inadequate arterial access (due to tortuosity or calcifications) is presently contraindications for MFM implantation.
All the operations were planned to be performed under local anaesthesia and deep sedation. However, since one patient refused to be treated under local anaesthesia and one other presented with excessive anxiety, both were treated under general anaesthesia. The remaining 21 patients were treated with local anaesthesia. The procedure was successfully implemented in all the patients. The device was introduced through a surgical cutdown of the common femoral artery in 22 patients, and one patient (with iliac aneurysms) underwent a percutaneous approach. Only two patients developed type 1 endoleak as procedural complication. Following control angiography, the proximal part of the MFM was dilated with an extension balloon of 46 mm, thus eliminating the endoleak. No further complications, such as MFM migration and no aneurysm rupture, were noted. A total of 45 MFM were used to treat a total of 23 patients, with a mean number of 2 MFM per patient. In three patients, postdilation procedure was performed because the MFM had not achieved a desirable opening. The average duration of the intervention was 65 minutes. Intervention characteristics have been summarized in [Table 2](#tab2){ref-type="table"}.
Patients were followed for a total of 12 months in terms of clinical event development. One patient (70 years old male) died in hospital on the third day due to acute renal failure (ARF), another one dying (72 years old male) at the end of the first month due to Superior Mesenteric Artery (SMA) and Celiac Artery (CA) occlusion. Still another (78 years old male) died at the end of the third month due to acute anterior lobe myocardial infarction (MI). It was assumed that secondary nephropathy, induced by the contrast agent in the patient who died in the hospital and hypotension, developed during the procedure. Doppler ultrasonography revealed that both renal arteries were patent in this patient. This patient was hemodialyzed twice and died on the 5th day of his follow-up. The patient who died at the end of the first month presented with a type II TAAA and implanted with 2 MFM. This patient was advised to take clopidogrel 75 mg/day and ASA 100 mg/day for 6 months. It has been learned, however, that the patient had not taken his dual antiplatelet therapy the week before. CT angiography showed that the SMA and the Coeliac Trunk were occluded by intense thrombus load ([Figure 3](#fig3){ref-type="fig"}). The patient was urgently operated upon but died two days after the reintervention. The third death was caused by an acute anterior MI recurrence at the end of the third month. The patient subsequently died from acute cardiogenic shock.
Within the hospitalization period, a short ischemic cerebrovascular event occurred 36 hours after implantation of two MFM into a type II TAAA presented by a 63-year-old patient. There were no neurological sequelae and this patient continued the dual antiplatelet therapy for 12 months. A 78-year-old patient with an implanted MFM due to type III TAAA developed contrast-induced nephropathy. This patient did not require haemodialysis and his renal function returned to normal by the end of the 7th day. In-hospital and 12-month unwanted clinical events are summarized in [Table 3](#tab3){ref-type="table"}.
4. Discussion {#sec4}
=============
In the current study, we present the early and midterm results associated with the usage of MFM, which is used in treating the patients diagnosed with TAAA and IAA. While the procedure was successfully in 23 patients, it was unsuccessful in two patients due to calcification and tortuosity in the iliofemoral artery, which hindered advancement of the delivery system into the aorta, so these two patients were excluded from the study.
Both aorta and peripheral arteries aneurysms can grow with time. With the increase in aneurysm diameter, the radial stress upon the aneurysm wall increases as well. At the same time, recirculating flow into the aneurysm sac is amongst the most important factors that lead to further expansion of aneurysm and its rupture \[[@B27], [@B28]\], inducing a profound shift of the artery wall towards elastolysis, inflammation, and oxidative stress. Of all the suggested methods for treating aneurysms, it is endovascular methods that are regarded as the golden treatment approach. The purpose of all endovascular treatments is to prevent aneurysm rupture, almost lethal in every case \[[@B29], [@B30]\]. The choice of EVAR technique must be customized depending on the patient and aneurysm presentation. Stent graft is currently the most common choice for endovascular treatment of aneurysms with no major branches involved. However, there is still no definite and completely off-the-shelf treatment for aortic aneurysms involving major branches.
All the patients included in this study had a significant number of major branches involved (total of 60 branches). While custom-made fenestrated stent grafts were used in some studies of TAAA with branches, the multilayer flow modulator has also been used in such pathologies \[[@B21]--[@B26]\].
MFMs are relatively newly developed devices. They have been CE marked for the treatment of peripheral aneurysms since 2009 and since 2011 for aortic aneurysms. In our single centre study, the MFM was used to treat all our patients. Although preliminary results are satisfactory, there is a need for long-term follow-up and a stronger clinical experience.
The MFM may provide valuable solution in the treatment of aneurysms when patient selection is performed accurately. In a meta-analysis evaluation performed on seven studies with a total of 155 patients treated with custom-made branched/fenestrated stent grafts, mortality was 7.1% at 30 days and 16.1% through a mean follow-up of 11.8 months \[[@B31]\]. In addition, 30-day mortality was 0.0% in the STRATO study, which was initiated in 2010 and was performed on 23 patients. But one patient died during the first year of follow-up \[[@B25]\]. The all-cause mortality rate at the end of the first year of follow-up was found to be 5.5% with one perioperative death, all deaths being not aneurysm-related in another multicentre registry study involving 54 patients whose peripheral and visceral arteries were treated with the MFM \[[@B32]\]. The aneurysm rupture rate, as documented in a meta-analysis performed on 15 MFM-specific publications, was reported as low as 1.2%. Importantly, all ruptures occurred in cases probably out of Instruction For Use, as quoted by the authors \[[@B26]\].
MFM devices trigger the formation---in a controlled way---of an organized thrombus within the aneurysm without leading to any degradation in flow patency in collaterals. Furthermore, the aneurysm gets stabilized with time. The porosity of the device, inducing a drop of pressure and an increase in blood flow velocity as it gets through the mesh, ensures that the branches remain patent \[[@B24], [@B32]\]. Our results are consistent with those presented in the MFM-specific literature. When the clinical results of the studies regarding this topic are taken into consideration, in the event where significant subbranches emerge out of the aneurysms or are located very nearby and in the device landing zone, considering MFM first may be reasonable.
In our study, three patients passed away by the end of month 12. The first patient who passed away in our study was lost on acute renal failure (ARF) 5 days after MFM implantation. A total volume of 230 ml of contrast agent was used on this patient during the operation. The duration of the operation was 110 minutes. Before operation GFR was 52 ml/min. Both renal arteries were documented patent before and after the operation. We think that ARF developed in this patient due to a contrast nephropathy. ARF related to contrast nephropathy is a complication that could potentially be observed in such group of high risk, polymorbid patients. The most important causes of contrast nephropathy are the amount of the contrast substances used, basal renal functions, coronary failure, and diabetes mellitus \[[@B33]\].
Most of the patients had moderate renal failure and type 2 diabetes mellitus and were at high risk of contrast-induced nephropathy: the amount of contrast agent must remain minimal. Also, intravenous serum physiological liquid at a speed of 1 ml/kg/hour including the 12 hours before the operation and another 12 hours afterwards must be given. During the operation, particular care should be observed in order not to leave the patient hypotensive. All those precautions were taken in this series of patients; however, endovascular intervention by its nature may be harder and more complex than planned. Similarly, in the patient passing away due to possible contrast-induced nephropathy, the duration of operation and the amount of contrast were higher than expected. We think that hypotensive fluctuations happening a few times during the operation caused hypoperfusion and contributed to the severity of the contrast-induced nephropathy.
The second patient who passed away in our study suffered from SMA and CA thrombosis by the end of the 30th day of follow-up. In the medical record obtained from this patient, it was found out that he had not been taking the recommended dual antiplatelet treatment for the last three weeks of the follow-up. In the CT angiography examination of the patient, SMA and CA were occluded due to thrombosis ([Figure 3](#fig3){ref-type="fig"}). Surgical therapy was performed. On the second day following the reintervention, his general situation deteriorated and he passed away.
Aortography records related to MFM implantation in this patient were examined again. In the presentations before and after the operation, it was observed that subbranch ostia were open. We think that the subacute thrombosis condition that developed in this patient is indeed due to lack of dual antiplatelet treatment. As is the case in our patient, in patients whose significant subbranches are covered by the device, we think it is necessary to get the dual antiplatelet treatment in long term. Unfortunately, there is not a consensus regarding the intensity and duration of the antiplatelet treatment that is to be performed in these patients \[[@B25], [@B34], [@B35]\]. In a study carried out by Pane et al. dual antiplatelet treatment following MFM was used for 12 months for TAA aneurysm \[[@B19]\]. However, one should remain careful when using dual antiplatelet since the stabilization of the aneurysm process induced by the MFM relies on the formation of an organized thrombus \[[@B24]\].
The other highly risky group of patients in terms of thrombosis development is the group presenting with atheromatous plaque causing a \>50--70% stenosis. If this is the case, the decision to get treatment must be taken more carefully, and it must be considered to perform percutaneous treatment of the stenosed branches before endovascular treatment of aneurysm in required situations \[[@B31]\]. In our centre, we advise our patients to get dual antiplatelet treatment (clopidogrel 75 mg/day and ASA 100 mg/day) for minimum 12 months and ASA 100 mg/day and single antiplatelet treatment indefinitely for afterwards.
The third patient that passed away in our study suffered from an acute anterior MI (MI). In this group of patients, the frequency of coronary artery disease is quite high. 33% of the patients in our study population presented with coronary artery disease. Therefore, this group of patients is at high risk for developing MI. While planning the treatment of these patients, it must also be ensured that they get an optimal treatment for coronary artery disease \[[@B35], [@B36]\]. In conclusion, none of the three deaths was MFM related and only one death was procedure related (the patient who suffered from kidney insult following the use of contrast agent). The MFM can be regarded safe and performant for the treatment of aneurysms involving significant subbranches.
Moreover, since we failed to get an iliofemoral access, endovascular intervention was not performed in two patients who were excluded from the study. The most important reason of the impossibility of the MFM delivery system to be advanced through the access is that the size of artery is not sufficient or the access artery presents calcification and tortuosity \[[@B37]\]. The fact that there is an excessive amount of tortuosity in the vein is another problem that makes it difficult to intervene percutaneously. When there is tortuosity, the vein may be flattened by using hard wires with assistance force. This assistance force might be increased with two or three wires when necessary. Importantly, patients presenting with such tortuous or calcified access arteries are contra-indicated per the current MFM Instruction for Use.
5. Limitations {#sec5}
==============
We are aware of the fact that the present study has some limitations. The current study was a retrospective one and provided results of short follow-up regarding the competence of the MFM in the treatment of aorta and iliac artery aneurysms with major branches involved.
6. Conclusion {#sec6}
=============
The present results suggest that MFM is safe and reliable and can be preferred as an alternative approach in the treatment of aorta and iliac artery aneurysms with major branches involved. Future studies with not only larger patient population but also longer period of follow-up are needed to further confirm and strengthen the current results.
Disclosure
==========
This manuscript was presented as an abstract at EuroPCR 2017, 16--19 May 2017, Paris.
Conflicts of Interest
=====================
The authors declare that there are no conflicts of interest regarding the publication of this paper.
{#fig1}
{#fig2}
{#fig3}
######
Demographic characteristics of the patients and lesion features.
*n* \%
------------------------------------------- --------------- ----------------
Age (year) (min--max) 72,5 (55--81)
Gender (male/female) 19/4
HT 13 56
Dyslipidemia 11 47
Renal insufficiency 3 13
Smoking 14 60
DM 8 35
COPD 7 30
CHF 4 17
CAD 7 30
Peripheral atherosclerosis 4 17
Max diameter of aneurysm (mm) *Mean* *(Min*--*max)*
(i) Aorta 58.6 (55--76)
(ii) Iliac 36.5 (34--48)
Aneurysm length (mm)
(i) Aorta 132
(ii) Iliac 36
Thoracoabdominal aneurysm type \[[@B22]\] *n* \%
(i) Crawford type 1 5 23
(ii) Crawford type 2 4 18
(iii) Crawford type 3 7 32
(iv) Crawford type 4 6 27
Lateral branches asset 23 100
CAD: coronary artery disease, CHF: chronic heart failure, COPD: chronic obstructive pulmonary disease, DM: diabetes mellitus, and HT: hypertension.
######
Intervention-related results.
*n* \%
---------------------------------------- ------------------- -----
Type of anaesthesia
(i) Local 21 19
(ii) General 2 9
Number of MFM
(i) 1 6 26
(ii) 2 12 52
(iii) 3 5 22
Postintervention-related complications
(i) Endoleak 2 9
(ii) Femoral hematoma \-
(iii) Device migration \-
(iv) Aneurysm rupture \-
Postdilatation 3 13
Intervention success 23 100
Intervention time (minutes) 65 ± 23 (43--115)
Hospitalization duration (days) 5.6 ± 2.3 (3--10)
MFM: multilayer flow modulator.
######
Undesired clinical events during in-hospital treatment and 12-month follow-up period.
In-hospital period 12 month
----------------------------------- -------------------- ----------
MI (*n*) \- 1
CVE (*n*) 1 \-
Acute renal failure (*n*) 2 \-
Occlusion of lateral branch (*n*) \- 1
Aneurysm rupture (*n*) \- \-
Deaths (*n*) 1 2
CVE: cerebrovascular event, MI: myocardial infarction.
[^1]: Academic Editor: Bhagwan Satiani
|
Well now, who's not next
this is a discussion within the Saints Community Forum; The object to winning is to score more than your opponent.........but that is not possible when you allow 40 on avg. on D. Defense, What is so difficult about that? C\'mon, maybe a tight end, but let\'s get a line ...
The object to winning is to score more than your opponent.........but that is not possible when you allow 40 on avg. on D. Defense, What is so difficult about that? C\'mon, maybe a tight end, but let\'s get a line that can stop a run,and a defensive backfield that can contain receivers. We have nothing on D,maybe less than last year. Knight had a bad year,but he was the stud when he was the interception guy. And Ruff is an unknown performer. Defense. I am tired of repeating,but we have screwed up thus far this offseason.
Gator, you never cease to amaze me. LOL Great picture. You boy\'s play nice now. I\'ll be gone for about a week, they\'re gonna rotor rooter out my heart. I don\'t want to come back and find any dead bodies. LOL. See ya\'ll when I get back. |
www.journalgazette.net
Jered Blanchard, president of the Fort Wayne Public Market board, speaks Monday at the former GE Club about plans for a combined farmers market. (Cathie Rowand | The Journal Gazette)
Tuesday, February 13, 2018 1:00 am
Ex-GE site lands farmers market
2 downtown entities to merge, run year-round
MATTHEW LEBLANC | The Journal Gazette
Two downtown farmers markets will combine this fall under a new management group to eventually operate a year-round market, officials announced Monday.
The nonprofit Fort Wayne Public Market will be at Electric Works, the redevelopment of the former General Electric campus south of downtown. Its leaders have signed a letter of intent to lease space at the 39-acre site.
Plans call for the nonprofit to take over management of YLNI Farmers Market and Fort Wayne's Farmers Market in September. They will continue to operate separately until then.
“The overwhelming success of the current Saturday markets has shown that Fort Wayne is ready for something bigger,” Public Market board President Jered Blanchard said in a statement. “By moving into a permanent location at Electric Works, we hope to crate an exciting and unique destination for regional residents.
“With this move the engaging, friendly culture of the farmers market can be experienced all week long, in any weather.”
Specifics are few as Blanchard and others at a news conference Monday on the GE campus said details such as the size of the space needed at the site must be discussed. Mayor Tom Henry said he expected the market to be “a significant” part of Electric Works.
Cost of the lease has not been decided.
The market is the third entity in recent weeks to express interest in Electric Works. Indiana Tech announced plans in December to lease a portion of the site, which includes plans for retail, residential and educational space. Fort Wayne Community Schools is considering classroom space there.
Officials from RTM Ventures, which will develop the site, have said a farmers market likely would be there.
Jeff Kingsbury of the development group said Monday the market will provide access to healthy food and a place for “civic and social engagement.”
A 2011 feasibility study said the city can support a year-round farmers market, board member Stephanie Veit said. She said the two markets will be able to grow as one in the new space.
Board members have been meeting since May to discuss the move.
“Partnering with committed community organizations like Fort Wayne Public Market, Electric Works can help address community health as a key to Fort Wayne's continued revitalization, and this is an important step toward that vision,” Kingsbury said.
It will be awhile before a move is made.
RTM Ventures paid GE $5.5 million in September for the property, and work is underway to secure funding for the redevelopment, which is estimated at $213 million.
A tax credit of up to $50 million was approved in December by the Indiana Economic Development Corp., and state lawmakers are considering a bill that would allow the city to create a 50-year tax increment financing district around the campus to pay for infrastructure improvements.
The site includes 18 buildings and more than 1.2 million square feet of space. Work on a portion of the campus is slated to begin next year.
The new market will be centrally located to provide access to food downtown, officials said.
There are a handful of farmers markets in the city, and some organizers whose operations will not be part of the Electric Works project applauded the announcement Monday.
Maureen Partee started the Georgetown Square Farmers Market seven years ago. She said her group serves a specific population in the city and was not asked to be a part of the downtown market.
“I hope they do well,” she said. “We're serving northeast Fort Wayne. We want people to come out to Georgetown.”
The same is true for Chris Shatto, who runs the Historic West Main Street Farmers Market.
“We weren't necessarily looking to have the same reach as the other markets,” he said.
The Public Market will operate at Barr and Wayne streets until construction is complete. |
Jeff Ruby Culinary Entertainment
Opticare Vision
Thursday, July 14, 2016
Gosney named Highlands starting quarterback
PHOTO: Allen Ramsey, DWCPhoto.com. Highlands senior Brady Gosney (left) has been named the starting quarterback this fall. He is the sixth straight senior to start at that position.
Note: This is a series of previews leading up to the season.
Some things may change with the new season, but one characteristic will not when it comes to the starting quarterback for the Highlands Bluebirds football team.
For the sixth straight year, it will be a senior who happened to serve as the back-up as a junior the previous season. Brady Gosney assumes that role after backing up Austin Hergott last year. Hergott took his talents to Central Michigan University.
The last time a quarterback entered the season as the starter as a junior came in 2010 when Patrick Towles did it. The 2012 Highlands alum and current Boston College Eagle started in all of 2011 and 2010 after taking over the role the sixth game against Cincinnati St. Xavier in 2009. Towles helped Highlands to three of its state-record six consecutive state championships during that time.
Highlands would love to be as efficient offensively as recent seasons and Gosney knows a lot of that responsibility falls on him. The Bluebirds ran 781 plays last year averaging 327.7 yards per contest. But the 2014 Class 4A state championship team broke a 13-year Kentucky state record for the most offensive plays run in a season with 932 plays averaging about 438 yards per contest.
"If you are able to run that many plays, it's everything," Weinrich said. "The defense is playing well and giving us the ball back. Special teams are doing well pinning (opponents) and getting good returns. Even if you don't get the big play, you keep the chains moving. You hope eventually the defense is going to make a mistake and you will get the big play. We're emphasizing being efficient so we can keep the ball moving down the field."
Gosney knows he's following in the shoes of many great quarterbacks at Highlands such as Towles, Gino Guidugli, Beau Hoge, Clay Cecil, Jared Lorenzen, Donovan McCoy and Drew Houliston. Hoge is currently playing at Brigham Young University. But Gosney is focused on setting his own mark instead of trying to do everything like one of them.
"It's big because I'm filling Hergott's shoes," Gosney said. "There is some pressure like that because before you step on the field, people knew your name like even before you said it."Gosney brings one career start to the table. It came on Sep. 4 of last year in a 54-28 loss at Scott County. Gosney completed 9-of-25 passes for 93 yards and an interception in that game. For the season, Gosney completed 11-of-34 passes for 101 yards, three interceptions and no touchdowns.
"Coach Weinrich was really understanding," Gosney said. "He knew I was going to make mistakes against such a great team and as long I learned from it, he was accepting of it. He said to just go out there and do your best."Over the offseason, Gosney has been working with the returning wide receivers in the Bluebird Spread offense. Highlands played several games in a 7-on-7 tournament at Ryle on Tuesday. Junior Griffin Huber is the leading returning wide receiver for the Bluebirds with 14 catches for 203 yards and a touchdown last year.
"I've been playing with most of them for a while now so I know what they're good at," Gosney said. "I know what routes they break off sooner than others."The Bluebirds hope to improve the passing game last year after averaging 130.2 per game. Highlands averaged about 238 a contest the previous season.
"We corrected some routes," Gosney said. "When we do running plays now, we added different things to keep the defenses always moving. Last year, they would always key on the run. This year, we're trying to disguise more."Highlands hopes not to rely on one player to move the ball like early last season in a 1-5 start. The Bluebirds are known for adjusting to the personnel, but scrambling quarterbacks have given Highlands an added dimension in the past. Gosney ran the ball nine times for 32 yards and two touchdowns last year.
Gosney did not participate in spring ball because he played on the back-to-back 9th Region champion Highlands baseball team. But compared to the spring of 2015 when Highlands did not have spring ball because of work done to the turf field at David Cecil Memorial Stadium, the Bluebirds are more ahead of schedule.
Highlands has two returning running backs with experience. They are seniors Grant Murray and Jared Pulsfort with 534 yards rushing and six touchdowns and 377 yards and three touchdowns last year respectively."We're looking to run the ball quite a bit just like we did last year toward the end," Murray said. "That way it opens up the passing. But we don't want it lopsided one way or the other."Highlands scrimmages at Cincinnati St. Xavier on Aug. 12. The Bluebirds then open the season against Cooper in Fort Thomas on Aug. 19 at 7:30 p.m. |
Organic electroluminescent (hereinafter referred to as EL) elements are thin and capable of achieving various emitting colors. Thus, applications of organic EL elements to light-emitting devices such as displays and lighting units are expected. However, organic EL elements have various problems.
For solving such problems, light-emitting elements utilizing electrochemiluminescence (hereinafter referred to as ECL) have been developed.
As described in JP-A 2008-84644 (KOKAI), the emitting layer of an ECL element is liquid. Thus, unlike an organic EL element, the emitting material of the ECL element can circulate in the emitting layer. Therefore, ECL elements are less prone to cause image burn-in as compared with organic EL elements.
Further, an organic EL element generally employs a multilayer structure including an emitting layer, charge-transporting layers, charge injection layers, and a pair of electrodes in order to achieve high luminous efficiency. By contrast, an ECL element can be composed only of an emitting layer in liquid form and a pair of electrodes. Thus, ECL elements can be manufactured at a lower cost as compared with organic EL elements.
In addition, unlike organic EL elements, ECL elements utilize an electrochemical reaction. Therefore, ECL elements can be driven at a lower voltage as compared with organic EL elements.
As above, ECL elements are superior to organic EL elements in various respects. However, light-emitting devices utilizing ECL elements have not yet been put to practical use. |
Q:
Ruby on Rails: Route a deprecated URL to application's root
How would I write the Rails route in config/routes.rb when I need to point a deprecated URL that still exists on someone else's website I can't control ('/something/article.jsp?id=1787') to the root of my application?
How would the below (wrong) attempt need to be corrected?
get '/something/article.jsp?id=1787' => 'root#index'
A:
You can specify a constraint:
get '/something/article', to: redirect('/'),
:constraints => lambda { |request| request.params[:id] == '1787' }
This creates a 301 "Moved Permanently" redirect.
If you don't want to do a redirect, but instead want that URL to simply trigger the root#index action, you can substitute the to: redirect('/') line for to: 'root#index'. However, this approach will keep the old URL in the address bar.
More info on redirects here.
More info on constraints here.
Hope it helps!
|
Pretzel chocolate Bites
These are just a really fun little variation on chocolate covered pretzels. I have always loved snacks like trail mixes or Chex mixes that are both salty and sweet, and that’s the reason that I love these so much. They’re not so much a dessert as a salty, chocolatey snack. Plus, they’re incredibly easy to make, and they travel well. I always love finding snacks that are easy to take along to a party.
Helpful Hints: With all of the different kinds of Hershey Kisses and M&Ms that there are now, you can use any number of different flavor combinations with these. You can also use Rolo candies instead of Hershey Kisses, and there are plenty of other little chocolates/toppings that could be used in place of the kisses or M&Ms. And of course, with M&Ms, you can always coordinate the colors for a holiday or season. |
/* $This file is distributed under the terms of the license in LICENSE$ */
package edu.cornell.mannlib.vitro.webapp.controller;
import java.util.ArrayList;
import java.util.HashMap;
import java.util.List;
import java.util.Map;
import edu.cornell.mannlib.vitro.webapp.web.templatemodels.individual.IndividualTemplateModelBuilder;
import org.apache.commons.logging.Log;
import org.apache.commons.logging.LogFactory;
import org.apache.jena.query.QuerySolution;
import org.apache.jena.query.ResultSet;
import edu.cornell.mannlib.vitro.webapp.beans.Individual;
import edu.cornell.mannlib.vitro.webapp.controller.freemarker.FreemarkerHttpServlet;
import edu.cornell.mannlib.vitro.webapp.controller.freemarker.responsevalues.ExceptionResponseValues;
import edu.cornell.mannlib.vitro.webapp.controller.freemarker.responsevalues.ResponseValues;
import edu.cornell.mannlib.vitro.webapp.controller.freemarker.responsevalues.TemplateResponseValues;
import edu.cornell.mannlib.vitro.webapp.controller.freemarker.UrlBuilder;
import edu.cornell.mannlib.vitro.webapp.controller.individual.IndividualRequestAnalysisContextImpl;
import edu.cornell.mannlib.vitro.webapp.controller.individual.IndividualRequestAnalyzer;
import edu.cornell.mannlib.vitro.webapp.controller.individual.IndividualRequestInfo;
import edu.cornell.mannlib.vitro.webapp.dao.jena.QueryUtils;
import freemarker.ext.beans.BeansWrapper;
import freemarker.template.DefaultObjectWrapper;
import javax.servlet.annotation.WebServlet;
@WebServlet(name = "ExportQrCodeController", urlPatterns = {"/qrcode"})
public class ExportQrCodeController extends FreemarkerHttpServlet {
private static final long serialVersionUID = 1L;
private static final Log log = LogFactory.getLog(ExportQrCodeController.class);
private static final String TEMPLATE_DEFAULT = "foaf-person--exportQrCode.ftl";
private static String VCARD_DATA_QUERY = ""
+ "PREFIX obo: <http://purl.obolibrary.org/obo/> \n"
+ "PREFIX vcard: <http://www.w3.org/2006/vcard/ns#> \n"
+ "SELECT DISTINCT ?firstName ?lastName ?email ?phone ?title \n"
+ "WHERE { \n"
+ " ?subject obo:ARG_2000028 ?vIndividual . \n"
+ " ?vIndividual vcard:hasName ?vName . \n"
+ " ?vName vcard:givenName ?firstName . \n"
+ " ?vName vcard:familyName ?lastName . \n"
+ " OPTIONAL { ?vIndividual vcard:hasEmail ?vEmail . \n"
+ " ?vEmail vcard:email ?email . \n"
+ " } \n"
+ " OPTIONAL { ?vIndividual vcard:hasTelephone ?vPhone . \n"
+ " ?vPhone vcard:telephone ?phone . \n"
+ " } \n"
+ " OPTIONAL { ?vIndividual vcard:hasTitle ?vTitle . \n"
+ " ?vTitle vcard:title ?title . \n"
+ " } \n"
+ "} " ;
private List<Map<String,String>> vcardData;
private Map<String, String> qrData = null;
@Override
protected ResponseValues processRequest(VitroRequest vreq) {
try {
Individual individual = getIndividualFromRequest(vreq);
qrData = generateQrData(individual, vreq);
DefaultObjectWrapper wrapper = new DefaultObjectWrapper();
wrapper.setExposureLevel(BeansWrapper.EXPOSE_SAFE);
Map<String, Object> body = new HashMap<String, Object>();
body.put("individual", wrapper.wrap(IndividualTemplateModelBuilder.build(individual, vreq)));
body.put("qrData", qrData);
return new TemplateResponseValues(TEMPLATE_DEFAULT, body);
} catch (Throwable e) {
log.error(e, e);
return new ExceptionResponseValues(e);
}
}
private Individual getIndividualFromRequest(VitroRequest vreq) {
IndividualRequestInfo requestInfo = new IndividualRequestAnalyzer(vreq,
new IndividualRequestAnalysisContextImpl(vreq)).analyze();
return requestInfo.getIndividual();
}
@Override
protected String getTitle(String siteName, VitroRequest vreq) {
try {
return "Export QR Code for " + getIndividualFromRequest(vreq).getRdfsLabel();
} catch (Throwable e) {
log.error(e, e);
return "There was an error in the system. The individual could not be found";
}
}
private Map<String, String> generateQrData(Individual individual, VitroRequest vreq) {
try {
String firstName = "";
String lastName = "";
String preferredTitle = "";
String phoneNumber = "";
String email = "";
vcardData = getVcardData(individual, vreq);
Map<String,String> qrData = new HashMap<String,String>();
for (Map<String, String> map: vcardData) {
firstName = map.get("firstName");
lastName = map.get("lastName");
preferredTitle = map.get("title");
phoneNumber = map.get("phone");
email = map.get("email");
}
if(firstName != null && firstName.length() > 0)
qrData.put("firstName", firstName);
if(lastName != null && lastName.length() > 0)
qrData.put("lastName", lastName);
if(preferredTitle != null && preferredTitle.length() > 0)
qrData.put("preferredTitle", preferredTitle);
if(phoneNumber != null && phoneNumber.length() > 0)
qrData.put("phoneNumber", phoneNumber);
if(email != null && email.length() > 0)
qrData.put("email", email);
String tempUrl = vreq.getRequestURL().toString();
String prefix = "http://";
tempUrl = tempUrl.substring(0, tempUrl.replace(prefix, "").indexOf("/") + prefix.length());
String externalUrl = tempUrl ;
qrData.put("externalUrl", externalUrl);
String individualUri = individual.getURI();
String contextPath = vreq.getContextPath();
qrData.put("exportQrCodeUrl", contextPath + "/qrcode?uri=" + UrlBuilder.urlEncode(individualUri));
qrData.put("aboutQrCodesUrl", contextPath + "/qrcode/about");
return qrData;
} catch (Exception e) {
log.error("Failed getting QR code data", e);
return null;
}
}
private List<Map<String,String>> getVcardData(Individual individual, VitroRequest vreq) {
String queryStr = QueryUtils.subUriForQueryVar(VCARD_DATA_QUERY, "subject", individual.getURI());
log.debug("queryStr = " + queryStr);
List<Map<String,String>> vcardData = new ArrayList<Map<String,String>>();
try {
ResultSet results = QueryUtils.getQueryResults(queryStr, vreq);
while (results.hasNext()) {
QuerySolution soln = results.nextSolution();
vcardData.add(QueryUtils.querySolutionToStringValueMap(soln));
}
} catch (Exception e) {
log.error(e, e);
}
return vcardData;
}
}
|
Administering and managing enterprise environments consumes time, money and resources. In many cases, this is because the application and data management process is decentralized and labor-intensive. For example, a significant portion of an administrator's time may be spent providing more storage or performing backups for the corporate data, or updating servers to handle growth in corporate data. Also, an administrator may need to create and provision new servers to handle the growth in data. Additionally, an administrator may spend time updating or provisioning a server to provide a particular user application. Additionally, a significant portion of corporate data may reside outside the corporate data center. For example, corporate documents, files and data may exist on or are distributed to various computers remote to the data center.
In an effort to reduce the time, money, and resources required to administer and manage corporate data and applications, many companies have consolidated and centralized servers, corporate data and applications. Although consolidation and centralization have reduced some costs and have produced some benefits, centralized data and applications introduce additional challenges in providing access to data and applications. One such challenge involves a remote user trying to access a file over a wide area network (WAN) connection. For example, a remote user at a branch office which typically has a network connection to the corporate data center that operates much slower than a LAN connection may try to open over the WAN a Microsoft Office document stored in at a corporate data center. The remote user's access over the network to the file may be delayed due to the latency, reliability and bandwidth with the WAN. The delays may be larger for larger files. Furthermore, as the distance between the remote user and the corporate data center grows, the frequency and length of network delays in accessing files also may increase. Adding virtual private network, security and other network layers on the WAN may further reduce bandwidth available to the remote users and increase delays in accessing the file. The lower speed and bandwidth of the remote office may cause unacceptable delays in accessing remote files. To avoid the delays in remote file access, remote users may copy and use files locally, defeating the purpose of centralized operations. Additionally, WAN connections may be less reliable than LAN connections, resulting in packet loss and network disconnection. WAN interruptions may occur during a file operation, such as saving or opening a document, further causing delays experienced by the remote user.
Therefore, systems and methods are desired to improve access by remote users to centralized applications and data files, including acceleration of the delivery of applications and data files to remote users. |
[Trophic niches in calyptrate Diptera in Rio de Janeiro, RJ].
Niche breadth and niche overlap of flies were estimated. The flies were breeding in different environments in Rio de Janerio (rural, urban and forest). It were used as a larvae substrate: banana mashed, mouse carcass, fish (sardine), bovine liver, shrimp and fresh human faeces. It were bred 14,294 flies, belonging to four families: Calliphoridae, Fanniidae, Muscidae and Sarcophagidae. The greater niche overlap values observed were: rural area: Phaenicia cuprina versus Chrysomya megacephala; urban area: Phaenicia eximia versus Sarcodexia innota and P. eximia versus Synthesiomyia nudiseta; forest area: P. eximia versus Hemilucilia flavifacies. The greater niche breadth recorded were: rural area: Peckia chrysostoma; urban area: S. nudiseta and Musca domestica; forest area: Euboettcheria collusor and P. eximia. |
The shortage of health care workers, especially physicians, in sub-Saharan Africa is critical. According to the World Health Organization, that region had only 0.3 physicians per 1,000 population in 2013.^[@R1]^ In contrast, there were 3.2 physicians per 1,000 population in Europe and 1.4 per 1,000 worldwide.^[@R1]^ The 225,120 physicians in sub-Saharan Africa in 2013 represent just a fraction of the estimated current need for 867,876.^[@R2]^ Significant shortcomings in medical education compound the overall shortage. The sub-Saharan African Medical Schools Study, published in 2011, documented pervasive faculty shortages in basic and clinical sciences, poor physical and communications infrastructure, inadequate linkages with other medical research and education centers in Africa and abroad, and little use of external accreditation.^[@R2]^
The U.S. President's Emergency Plan for AIDS Relief (PEPFAR) began in 2003 to alleviate the global epidemic of HIV infection and AIDS. By 2011, 3.9 million people had begun lifesaving antiretroviral treatment with PEPFAR support^[@R3]^; nonetheless, limitations in the number of health workers and the quality of their education were among the greatest constraints in achieving and extending these accomplishments, especially in sub-Saharan Africa where the burden of HIV infection and AIDS was the highest. To address this challenge, the first PEPFAR reauthorization in 2008 included a congressional mandate to train 140,000 new health care workers, including doctors, nurses, and other allied health professionals.^[@R4]^
In 2010, PEPFAR partnered with the U.S. National Institutes of Health (NIH) and the U.S. Health Resources and Services Administration (HRSA) to establish the Medical Education Partnership Initiative (MEPI) to substantially support medical education at select medical schools in sub-Saharan Africa to boost the quantity of medical graduates, the quality of their education, and their retention where they are most needed---all while providing or enhancing research capabilities and ensuring sustainability.^[@R5],[@R6]^ HRSA and NIH announced the first MEPI grants in October 2010 and invested a total of \$130 million over five years (2010--2015) to directly support medical schools in 12 sub-Saharan African countries.
Here, we describe the implementation, accomplishments, and effect of this first phase of MEPI and its related activities. We also explain some of the challenges, limitations, and lessons for future initiatives to support health professions education in sub-Saharan Africa, including considerations of the scale and time frame needed to effect significant, positive, population-wide changes in health outcomes.
Information Sources
===================
This article represents a qualitative, narrative review of the first phase of MEPI implementation (2010--2015) and related activities. As mentioned, we have focused on the main objectives, accomplishments, critical success factors, and lessons learned. Our primary data sources for this article included the reports from the MEPI implementation sites, periodic programmatic summary documents, and the five-year summary report prepared by the MEPI grant recipient principal investigators (PIs).^[@R7]^
These sources provided information derived from a detailed monitoring framework established at the inception of MEPI. The framework included 161 quantitative indicators, such as the number of medical school graduates per year, and 42 qualitative indicators, such as descriptions of how MEPI helped increase the number of medical school graduates. Monitors conducted annual surveys and site visits, and PIs prepared annual school summary reports. The final survey was conducted in August 2015, so additional accomplishments accrued after the last survey and may not be reflected in this article.
Our article reflects our experiences---conducting site visits and holding discussions with MEPI PIs and implementation partners---as program officers, technical staff, and leaders for MEPI funding organizations. Our article also includes select findings from 58 articles (2010--2017) related to MEPI (which we discovered through an April 2017 PubMed search using the key words "MEPI" and "Medical Education Partnership Initiative").
MEPI Funding and Grants
=======================
PEPFAR, which is administered by the Office of the Global AIDS Coordinator in the U.S. Department of State, funded the MEPI programmatic grants in 2010, providing \$100 million over a five-year period through 11 grants to 11 institutions in 10 countries (Appendix 1). Two HHS agencies were designated to administer MEPI based on their respective competencies. The Fogarty International Center (FIC) at NIH supported 7 of the grants, while HRSA's HIV/AIDS Bureau managed the other 4. FIC, which facilitates global health research conducted by NIH, had been increasingly engaged with African medical research and educational institutions since the inception of the AIDS International Training and Research Program in the late 1980s.^[@R8]^ HRSA, which largely focuses on improving access to and quality of care in the United States, had been increasingly engaged in Africa overseeing HIV/AIDS program implementation since the inception of PEPFAR. Concurrent with MEPI, HRSA had the lead role in implementing the companion PEPFAR-funded Nursing Education Partnership Initiative.^[@R6]^ In addition to the 11 programmatic grants awarded to African institutions, HRSA also provided funding to a U.S.-based coordinating center (George Washington University \[GWU\]) to facilitate and monitor MEPI; this funding was administered by HRSA through a cooperative agreement.
In addition, the NIH Common Fund and seven other NIH institutes, centers, and offices (ICOs; see List 1) provided \$30 million over a five-year period beginning in 2010 to build biomedical research capacity. With these funds, FIC administered an additional 6 linked grants in five of the countries with MEPI programmatic grants, plus 2 pilot grants in two countries that did not have MEPI programmatic grants, increasing the total number of MEPI grantee institutions to 13.
In sum, in the first phase of MEPI described herein, NIH awarded 19 foreign grants (totaling \$130 million) to 13 institutions in 12 countries (Appendix 1). The funding amounts for the programmatic grants ranged from a total of \$8.6 to \$9.3 million per institution over the five-year implementation period, while the funding amounts for the linked and pilot grants ranged from a total of \$1.9 to \$2.5 million per institution over five years.
The grants resulted in a large number of substantive national, regional, and global partnerships, including many with U.S. universities. In addition, many of the PIs formed collaborative networks in their countries with other universities and with ministries of health and education that did not receive MEPI funds (see Appendix 1).
Coordination of MEPI
====================
The U.S.-based MEPI coordinating center at GWU and its Uganda-based counterpart, the African Centre for Global Health and Social Transformation (ACHEST), supported the MEPI institutions by providing technical assistance, developing capacity in medical education research, supporting and coordinating the monitoring and evaluation of MEPI-funded programs and activities, organizing annual meetings, and fostering collaboration. According to site visit reports and survey results, GWU and ACHEST facilitated the formation of technical working groups in, initially, six areas: e-learning, physician tracking, medical education research, community-based medical education, competency-based medical education, and research support centers. Later working groups focused on monitoring and evaluation and on library information science. Within these eight areas, MEPI institutions established their own priorities and implemented their own plans to meet the MEPI goals in alignment with national policies and needs (Table [1](#T1){ref-type="table"}).^[@R9]^
######
Key Interventions and Examples Thereof Funded by the Medical Education Partnership Initiative (MEPI)^a^

The PIs of the programmatic grants (n = 11), the PIs of the linked and pilot grants (n = 8), and the coordinating center came together in 2011 to form the MEPI PI Council. This council served as a leadership group for MEPI, provided a coordinated channel of communication among grantees and funding organizations, and established common policies for publication and partnership agreements. The MEPI PI Council selected from among its membership a chair and a vice chair. Each chair and vice chair served for a one-year term, and the vice chair assumed the role of chair the following year. The MEPI PI Council met biannually at varying MEPI host institutions, including in an annual symposium organized to foster collaboration and share best practices and lessons learned in medical education and research. The MEPI PI Council further supported collaboration and communication by encouraging PIs to visit other schools as members of site visit teams. The annual symposium evolved into a major meeting on medical education and research in Africa with more than 250 participants from MEPI-funded programs, academia, governments, and national and international partner agencies.
In the third year of MEPI, much of the coordination role was transitioned to ACHEST and the MEPI PI Council as a result of their demonstrated capacity; GWU continued to support networking by hosting webinars, maintaining the MEPI website, and publishing and distributing newsletters.
Increasing the Quantity and Quality of Doctors and Other Health Professionals
=============================================================================
To increase the number of medical graduates, MEPI institutions employed a variety of strategies, such as increasing the number of enrollees, using new pedagogical methods, expanding teaching facilities, collaborating with other medical schools, and supporting the launch of new medical schools in their respective countries. For example, enrollment in internal medicine more than doubled in Zimbabwe and in Mozambique from an average of 10 students per year prior to MEPI to 75 in 2012.^[@R10]^ The number of new students at the MEPI schools peaked at over 2,500 per year from 2010 to 2015.^[@R7]^ Training and recruiting additional faculty was required in some countries, such as in Zambia where 70 postgraduate students helped fill basic science faculty positions including at two new schools, the addition of which increased the number of students in Zambia from 54 to 250.^[@R11]^ In Tanzania, faculty incentives and recruitment efforts increased the number of faculty members from 96 to 167 in under five years.^[@R7]^ Some countries focused on specialists according to national priority. For example, in Ghana, 15 emergency physicians and 59 emergency nurses were graduated, 500 medical students were trained in emergency medicine, and 300 district health care workers were trained in HIV/AIDS care in the emergency department.^[@R7]^ Ethiopia had already greatly increased the number of medical school enrollees,^[@R12]^ so there the support from MEPI was largely focused on improving the quality of education, faculty training, retention, and research capacity.^[@R13]^
Curricula were reviewed and revised as needed at all MEPI institutions to adapt to new health care needs and new educational methods and technologies. Seven schools revised their curricula to follow the tenets of competency-based medical education, which prepares graduates to be able to apply specific competencies in care situations. Competencies may cover critical thinking, information management, communication skills, clinical skills, knowledge of population health, foundational scientific knowledge, and professional values and attitudes. The template that the University of Ibadan developed to tailor its curriculum to address core competencies became the national standard for Nigeria.^[@R7]^ HIV/AIDS was also integrated into training curricula. For example, the University of KwaZulu-Natal (UKZN) in South Africa incorporated HIV/AIDS training into degree programs in internal medicine, pharmacy, nursing, and family medicine.^[@R7]^ Makerere University in Uganda enhanced HIV/AIDS content and training in the community-based clerkship, while Kwame Nkrumah University of Science and Technology (KNUST) in Ghana incorporated training in recognizing and treating HIV in emergency settings into the curriculum.^[@R7]^
Faculty development, a critical component of improving faculty effectiveness and retention, was achieved mainly through short courses in subjects including teaching methods, leadership, mentoring, epidemiology, and research. Nine of 13 schools established or strengthened medical education departments.^[@R14]^ Master's degree programs in health professions education were introduced at three schools.^[@R7]^ Twelve schools funded faculty conference registration and travel.^[@R7]^ Most schools also supported research mentoring, research seed grants, and the acquisition of computer hardware and other office equipment. Many faculty were supported to pursue additional advanced degrees. MEPI funds were used to hire 51 staff at six schools, of whom all but 4 were expected to be retained with other funds after the MEPI grant period.^[@R7]^
One of the MEPI technical working groups focused on e-learning, which was adopted at 12 of the 13 MEPI institutions.^[@R7],[@R15]^ In Ghana, for example, KNUST made many of their didactic lectures and training modules available online---and then documented thousands of page views. Clinical skills laboratories and simulation learning, which allow students to learn without interfering with patient care, were established or strengthened at 7 MEPI schools, some of which served medical and nursing students in interprofessional teams.^[@R7]^ Library resources were strengthened at all schools. Improvements included providing librarian training; discarding outdated materials; purchasing new books; and procuring e-books, electronic journal subscriptions, and computer hardware, thereby establishing e-library information centers. In Kenya, for example, the library services at the University of Nairobi College of Health Sciences were improved in partnership with the University of Maryland Health Sciences and Human Services Library.^[@R16]^
Retention and Rural Placement
=============================
Retention of medical graduates in-country is a long-term goal that was not feasible to ascertain over the five-year MEPI implementation period; however, graduate tracking systems were established, and several key activities addressed this goal.^[@R17]^ In Tanzania, for example, nearly 100% of medical graduates were being tracked through alumni associations, social media, and other approaches.^[@R7]^ Further, the Year Five Report^[@R7]^ noted a shift in student attitude in Zimbabwe, where, at the beginning of MEPI, most students (80%) indicated that they planned to leave the country, but by the end, most (82%) said that they planned to remain.
Most MEPI schools expanded community-based education to make training more relevant to the local context by adding new community sites and sending more students to the sites.^[@R18],[@R19]^ The Uganda consortium, for example, increased the number of sites by 43% to 162 sites in 72 districts.^[@R7]^ Further, the MEPI consortium in Uganda included Mbarara University of Science and Technology, a new medical school, which, located in a rural area, strengthened Uganda's decentralized medical education model. In Ethiopia, MEPI provided resources, including a minibus for student transport and Internet access to decongest overcrowded classrooms and to support the training of students in rural areas.^[@R7]^ The University of Nairobi adapted a U.S. model for regional training to provide clinical training at 14 decentralized training sites throughout Kenya without requiring costly new construction.^[@R20]^ Additionally, preceptorships or honorary teaching appointments were given to some rural practitioners in Nigeria, which boosted their morale and motivated them to remain in rural practice.^[@R7]^ Five schools targeted recruitment of students from rural or underserved populations as a strategy to increase retention of graduates in these communities. UKZN focused its research capacity building on rural sites to facilitate trainees returning there as mentors.^[@R21]^
HIV Service Delivery
====================
Increasing capacity for high-quality services to prevent HIV infection and to provide care and treatment for people living with HIV was the principal reason for the establishment of MEPI and was a particular focus throughout both planning and implementation. According to the MEPI Year Five Report, activities included revising both undergraduate and postgraduate curricula to incorporate new HIV guidelines; providing preservice and in-service HIV/AIDS training for physicians, nurses, midwives, and others; and supporting myriad HIV-focused research activities.^[@R7]^ At UKZN, for example, MEPI supported 22 PhD candidates who conducted research projects on HIV clinical and laboratory services and health systems. At Stellenbosch University in South Africa, faculty participated in a clinician mentoring program focused on HIV and tuberculosis coinfection. The University of Malawi trained colposcopy screeners, oncology nurses, palliative care nurses, clinical officers, and counselors who returned to their clinics to train their colleagues in HIV-associated cervical cancer screening and treatment through visual techniques (e.g., visual inspection with acetic acid) and cryotherapy. The program provided integrated services including cancer screening, family planning, and HIV care at three clinics delivering care to 15,000 HIV-infected women per year. In addition to the HIV/AIDS-focused research and training, another success is the number of people who received care. According to the Year Five Report,^[@R7]^ an estimated 12,000 people living with HIV/AIDS received treatment and care services from MEPI trainees in Mozambique, and in Zimbabwe, more than one million HIV prevention, care, and treatment services were provided from 2011 to 2014 by MEPI trainees.
Research Support
================
All MEPI institutions conducted courses on research-related topics such as research methods, the design of research studies (including in implementation science^[@R22]^), data collection, data management and analysis, scientific manuscript and grant writing, and research ethics. According to one internal NIH report (November 2015), students from MEPI institutions in nine countries conducted 511 original mentored research projects. By 2015, a total of 376 publications were attributed to support from MEPI; of these, 307 had a MEPI school faculty member as the first author, 109 concerned medical education, and 51 focused on HIV/AIDS.^[@R7]^ By 2015, MEPI faculty had given over 400 presentations at scientific meetings worldwide, including at the African Conference on Emergency Medicine, the Third Global Forum on Human Resources for Health, and the World Health Summit.^[@R7]^ In MEPI year five (2015), nearly 3,000 undergraduates, 552 postgraduates, and 129 PhD candidates were reported to be participating in MEPI-funded research.^[@R7]^
At each MEPI institution, 5% of the programmatic grant funding was dedicated to strengthening research administration. Many institutions established research support centers to assist faculty and students with designing research investigations, identifying and applying for funds, administrating grants post award, and analyzing data.^[@R23]^ Most MEPI institutions successfully applied for grants from the NIH and other international funders, such as the Wellcome Trust; overall, 10 schools reported 26 successful grant awards by 2015.^[@R7]^
Further, in 2014--2015, the NIH Common Fund and nine other NIH ICOs (List 1) committed an additional \$36.5 million (over and above the original \$130 million) from 2015 to 2020 to support early- and midcareer faculty in HIV/AIDS and other scientific areas at MEPI institutions under the MEPI Junior Faculty Program (Appendix 1). These 11 grants (awarded to 11 institutions in 8 countries) illustrate the strengthening research enterprise at MEPI institutions.
Partnerships
============
Grantees used MEPI funding to strengthen in-country partnerships with medical institutions to improve medical education and research training.^[@R24]^ For example, Makerere collaborated with four other universities in Uganda; the five universities shared technical and faculty resources, and faculty from all five institutions worked together to revise curricula.^[@R24]^ In Nigeria, more than 1,600 faculty, graduate students, and resident doctors (from a consortium of nine institutions) were trained in career development as part of a comprehensive alliance, heralding a new era of collaboration among research universities.^[@R25]^
All MEPI institutions also worked closely with the ministries of health and ministries of education in their countries. Senior government officials regularly participated in in-country MEPI meetings and the international MEPI PI Council annual symposium. In Zambia, for example, MEPI worked with the Ministry of Health to adapt the obstetrical and neonatal guidelines developed for the university teaching hospital for use at the provincial and district levels.^[@R7]^ Additionally, MEPI institutions in Zimbabwe and Kenya worked with the ministries of health in those countries to strengthen disease outbreak investigations, responses, and surveillance systems.^[@R7]^ In Tanzania, the Kilimanjaro Christian Medical University improved information and communications infrastructure through the successful establishment of e-learning with tablet computers for all medical students; as a result, the Ministry of Education planned to develop e-learning as a primary tool for all higher learning institutions and invested in providing Internet accessibility to all universities.^[@R26]^
MEPI also supported interprofessional collaboration. Training across the MEPI network included thousands of nurses, midwives, laboratory technicians, pharmacists, and other allied health professionals. Additionally, MEPI institutions provided cross-discipline training, such as laboratory training for clinicians,^[@R27]^ and use of skills laboratories for simulated learning for physician, nursing, and other health professions trainees.
Several international South--South partnerships occurred (Appendix 1). For example, KNUST in Ghana collaborated with UKZN in South Africa; KNUST faculty, residents, and nursing trainees shared their emergency medicine expertise while UKZN faculty, residents, and nursing trainees contributed their HIV expertise. In another international, South--South collaboration, Universidade Eduardo Mondlane in Mozambique established resident exchanges and collaborative research with the Universidade Federal da Bahia and Fiocruz in Brazil.
Finally, MEPI supported many North--South collaborations. Every MEPI programmatic, linked, and pilot grant included one or more collaborations with institutions in the United States, Canada, or Europe (Appendix 1).
Taken together, these MEPI-established partnerships and networks constituted a community of practice. This extended group of faculty and trainees interacted regularly through telecommunications and meetings to share common interests and innovative solutions to improve health professions education and research capacity. This community helped leverage resources, disseminate and implement more effective practices, and ensure relevancy and support over the long term.^[@R28]^
Sustainability
==============
Sustainability was a priority of MEPI from the outset. It was an important element in the MEPI grant review criteria and became increasingly important over the five-year implementation period. Sustainability and capacity building were particularly emphasized in the evolution of North--South collaborations. MEPI-supported activities, such as developing enrollment and retention policies, revising curricula, and reforming pedagogical methods, were integrated into the work of partner sub-Saharan African institutions. In Zimbabwe, for example, lectures on cardiovascular physiology were developed with visiting professors from a U.S. university, and teaching responsibility was gradually turned over to Zimbabwean junior faculty and postdoctoral fellows.^[@R7]^
Some MEPI institutions attracted monetary support from their governments and/or nonmonetary support from other donors to sustain select MEPI activities after the grant funding ended, but most anticipated having to scale down their programs. In response to a year five (2015) survey,^[@R7]^ most schools reported that they would have to cut back MEPI-supported programs, especially the research activities, by 25% to 50% when MEPI funding ended; however, no school said the number of faculty and students enrolled would be reduced. Six schools said that the most durable MEPI-funded resource was information and communication technology, making this the most common response.^[@R7]^
The 11 MEPI Junior Faculty Program grants (Appendix 1) were also important to consolidate and sustain the research capacity developed through the original programmatic, linked, and pilot MEPI grants.
Summary and Success Factors
===========================
MEPI was successful in achieving its primary goal: increasing the numbers of medical school enrollees and graduates in the institutions it supported. Additionally, numerous activities to increase the quality of education and retention and rural placement of medical graduates were successfully implemented. Capacity to conduct biomedical research was strengthened and scientific productivity was increased through MEPI support. Lastly, several elements (e.g., partnerships, additional funding and support, enduring technology) to help ensure sustainability were successfully incorporated. Importantly, early indicators, such as additional grant funding, multiple publications, and ongoing international and intranational partnerships, have demonstrated MEPI's lasting impact on medical education in Africa.
One of the critical success factors (Table [2](#T2){ref-type="table"}) for MEPI was ensuring the leadership of the African grantees and institutions by awarding the competitive grants directly to the leaders of the institutions themselves, rather than routing the funding through U.S.-based institutions. This direct funding allowed the African grantees control, thereby increasing their engagement and responsiveness and also enhancing the relevance of MEPI projects to local priorities. Partnerships and networking were also critical to the initiative's success. To illustrate, one PI commented, "MEPI demonstrates that North--South as well as South--South partnerships, with an explicit focus on improving local health systems through better education, can be designed to empower partners in the South with support from collaborators in the North."^[@R29]^ In-country partnerships and resource sharing with other schools of medicine and other health professions effectively multiplied the reach and effectiveness of the initiative.
######
Factors Contributing to the Success of the Medical Education Partnership Initiative (MEPI)^a^

The emergence of the robust network of MEPI PIs in the MEPI PI Council was another key factor in the initiative's overall success and sustainability. The group continues to communicate regularly, meet, share best practices, and coordinate activities in the newly formed African Forum for Research and Education in Health,^[@R30]^ a direct successor to the MEPI PI Council.
The inclusion of research as a main component of MEPI was helpful to establish an academic foundation for activities and to engage and retain not only faculty at MEPI institutions but also international scholars. The research focus also helped to mobilize substantial additional resources from NIH institutes through the MEPI pilot and linked awards and through the ongoing MEPI Junior Faculty Program. The benefits of strengthening research capacity in MEPI institutions are expected to have a lasting effect in the training of physicians through new, evidence-based approaches; in the provision of outstanding, cutting-edge care to patients; and in turn, in the creation of medical centers of excellence.^[@R31]^
Lessons Learned and Limitations
===============================
The coordinating center at GWU played an important role in not only supporting and providing technical assistance to the MEPI institutions but also incubating the community of practice. One drawback, however, was the perceived conflict of interest that arose from both evaluating and facilitating the MEPI institutions. In retrospect, designating separate institutions for facilitating and evaluating MEPI may have been advantageous. In addition, while each site reported substantial information, a limitation in the evaluation was the lack of systematic summary data across all sites across all five years. This idiosyncrasy in reporting is typical for separate NIH grants awarded under a single funding opportunity announcement, but it does limit our ability to report reliable quantitative summary data. Moreover, assessing the longer-term national effect of MEPI was beyond the scope of the required grant reporting. Future work could include national surveys to assess the number, retention, and rural placement of doctors, as well as the numbers of grants awarded to and publications emanating from MEPI institutions. Finally, as staff members of the funding and implementing agencies, we acknowledge the potential for bias in assessing and reporting the accomplishments and outcomes of MEPI.
Future Directions
=================
The achievements in the first phase of MEPI have been considerable, and taken together, they provide a foundation for additional gains.^[@R32]^ These accomplishments align well with the vision articulated in 2010 by the Lancet Commission on the Education of Health Professionals for the 21st Century:
> all health professionals in all countries should be educated to mobilize knowledge and to engage in critical reasoning and ethical conduct so that they are competent to participate in patient and population-centered health systems as members of locally responsive and globally connected teams.^[@R33]^
Major gaps remain in the quantity and retention of health care workers, in the quality of health professions education, and in the resources available for research to decrease the incidence of HIV/AIDS and meet other global health goals.^[@R1]^ Future support for health professions education and research capacity building in Africa should seek to consolidate, broaden, and further improve the progress made to date. Additional investments (including domestic resources); international health workforce policy interventions (e.g., task shifting); and emphases (with goals measured by quantitative data) on performance, productivity, efficiency, quality, and innovation are all needed.^[@R1]^ The long-term social and economic value of investments---including the creation of quality jobs in the health sector, leveraged domestic and foreign investment in health care and research, and improved health care and health outcomes---could be substantial.
With support from the NIH, the National Academy of Medicine convened a workshop in Uganda in 2016 with African health professions leaders to discuss extending the work of the MEPI PI Council and establishing an African association for health professions education and research. Interprofessional membership---including doctors, nurses, and other allied health professionals---would be a core feature of such an association. The 2016 workshop participants also recommended disseminating educational resources and sharing best practices in health professions education; encouraging research on educational methodologies and approaches; and integrating biomedical, behavioral, clinical, and operational research into health professions education and practice.^[@R34]^
In addition to support for an African health professions education association,^[@R35]^ additional programmatic support for high-HIV-burden, low-resource PEPFAR countries is anticipated. Such monetary support will further strengthen the quality of medical and nursing education, increase the retention of health professionals post training, fund research on best educational practices, and enhance the capacity of students to conduct health research.^[@R36]^ As with the first phase of MEPI, these activities are intended to be relevant and responsive to national and international needs and policies.^[@R1],[@R37]^
Conclusions
===========
MEPI succeeded in increasing the number of graduates from African medical schools, in improving the quality of their education, and in enhancing the retention of physicians where they were most needed. Biomedical research capacity and productivity were also increased---and are being sustained with additional NIH support for junior faculty at 11 institutions in 8 countries. The transformative impact of MEPI on medical education in Africa will be extended with planned additional PEPFAR support for an African association for health professions education and research^[@R35]^ and new programmatic grants^[@R36]^ for interprofessional education and research in high-HIV-burden, low-resource PEPFAR countries.
List 1
======
The NIH Institutes, Centers, and Offices Providing Funding for MEPI Institutionsa
---------------------------------------------------------------------------------
*The 7 NIH ICOs providing funding (\$30 million) for linked and pilot grants (2010--2015*)
1. National Heart, Lung and Blood Institute
2. National Human Genome Research Institute
3. National Institute of Mental Health
4. National Institute of Neurological Disorders and Stroke
5. National Institute of Nursing Research
6. Office of AIDS Research
7. Office of Research on Women's Health
*The 9 NIH ICOs providing funding (\$36.5 million) through the MEPI Junior Faculty Program (2015--2020*)
1. Eunice Kennedy Shriver National Institute of Child Health and Human Development
2. National Heart, Lung, and Blood Institute
3. National Institute of Dental and Craniofacial Research
4. National Institute of Mental Health
5. National Institute of Neurological Disorders and Stroke
6. National Institute of Nursing Research
7. National Institute on Minority Health and Health Disparities
8. Office of AIDS Research
9. Office of Research on Women's Health
Abbreviations: NIH indicates National Institutes of Health; ICOs, institutes, centers, and offices; MEPI, Medical Education Partnership Initiative.
^a^MEPI was implemented at 13 sites in 12 African countries from 2010 to 2015. See Appendix 1.
Acknowledgments:
================
The authors thank Dr. Joel Breman for his critical review of this article.
*Funding/Support:* None reported.
*Other disclosures:* None reported.
*Ethical approval:* Reported as not applicable.
*Disclaimer:* The findings and conclusions in this report are those of the authors and do not necessarily represent the official position of the U.S. government.
*Previous presentations:* A previous article described the midterm accomplishments of the Medical Education Partnership Initiative (MEPI) from the National Institutes of Health perspective: Glass RI, Razak MH, Said M. The importance of research in the MEPI program: Perspectives from the National Institutes of Health. Acad Med. 2014;89:S9-S10.

|
<?xml version="1.0" encoding="utf-8" ?>
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">
<head>
<meta http-equiv="Content-Type" content="text/html; charset=utf-8" />
<meta name="generator" content="Docutils 0.14: http://docutils.sourceforge.net/" />
<title>bep_0020.rst_post</title>
<meta name="author" content="David Harrison <dave@bittorrent.com>" />
<link rel="stylesheet" href="../css/bep.css" type="text/css" />
</head>
<body>
<div class="document">
<div id="upper" class="clear">
<div id="wrap">
<div id="header">
<h1><a href="../index.html">BitTorrent<span>.org</span></a></h1>
</div>
<div id="nav">
<ul>
<li><a href="../index.html">Home</a></li>
<li><a href="../introduction.html">For Users</a></li>
<li><a href="bep_0000.html"><span>For Developers</span></a></li>
<li><a href="../mailing_list.html">Developer mailing list</a> </li>
<li><a href="http://forum.bittorrent.org"> Forums (archive) </a></li>
</ul>
</div> <!-- nav -->
<!-- ### Begin Content ### -->
<div id="second">
<table class="docinfo" frame="void" rules="none">
<col class="docinfo-name" />
<col class="docinfo-content" />
<tbody valign="top">
<tr class="bep field"><th class="docinfo-name">BEP:</th><td class="field-body">20</td>
</tr>
<tr class="title field"><th class="docinfo-name">Title:</th><td class="field-body">Peer ID Conventions</td>
</tr>
<tr><th class="docinfo-name">Version:</th>
<td>be95a2e0d612b8026e981480a7d0423a0bccd971</td></tr>
<tr class="last-modified field"><th class="docinfo-name">Last-Modified:</th><td class="field-body">Thu Aug 30 22:19:08 2018 -0600</td>
</tr>
<tr><th class="docinfo-name">Author:</th>
<td>David Harrison <<a class="reference external" href="mailto:dave%40bittorrent.com">dave<span>@</span>bittorrent<span>.</span>com</a>></td></tr>
<tr><th class="docinfo-name">Status:</th>
<td>Active</td></tr>
<tr class="type field"><th class="docinfo-name">Type:</th><td class="field-body">Process</td>
</tr>
<tr class="created field"><th class="docinfo-name">Created:</th><td class="field-body">Feb-27-2008</td>
</tr>
<tr class="post-history field"><th class="docinfo-name">Post-History:</th><td class="field-body"></td>
</tr>
</tbody>
</table>
<p>The 20-byte <em>peer id</em> field sent in tracker requests and in the peer
handshake has traditionally been used not only to identify peers but
also to identify the client implementation and version.</p>
<p>The mainline client sets the first character in the peer-id to <tt class="docutils literal">M</tt>
followed by version number represented by ascii digits with major,
minor and tiny versions separated by dashes. Examples include
<tt class="docutils literal"><span class="pre">M4-3-6--</span></tt> or <tt class="docutils literal"><span class="pre">M4-20-8-</span></tt> for versions 4.3.6 and 4.20.8. The remaining
bytes in the peer id are random. The following list was originally
derived from <a class="footnote-reference" href="#theory" id="id1">[1]</a>.</p>
<p>A number of clients begin the peer id with a dash followed by two
characters to identify the client implementation, four ascii digits to
denote version number, and a dash. As with mainline, the remaining
bytes are random. An example is <tt class="docutils literal"><span class="pre">-AZ2060-</span></tt>.</p>
<p>Known clients that use this encoding style are</p>
<pre class="literal-block">
'AG' - Ares
'A~' - Ares
'AR' - Arctic
'AV' - Avicora
'AX' - BitPump
'AZ' - Azureus
'BB' - BitBuddy
'BC' - BitComet
'BF' - Bitflu
'BG' - BTG (uses Rasterbar libtorrent)
'BR' - BitRocket
'BS' - BTSlave
'BX' - ~Bittorrent X
'CD' - Enhanced CTorrent
'CT' - CTorrent
'DE' - DelugeTorrent
'DP' - Propagate Data Client
'EB' - EBit
'ES' - electric sheep
'FT' - FoxTorrent
'FW' - FrostWire
'FX' - Freebox BitTorrent
'GS' - GSTorrent
'HL' - Halite
'HN' - Hydranode
'KG' - KGet
'KT' - KTorrent
'LH' - LH-ABC
'LP' - Lphant
'LT' - libtorrent
'lt' - libTorrent
'LW' - LimeWire
'MO' - MonoTorrent
'MP' - MooPolice
'MR' - Miro
'MT' - MoonlightTorrent
'NX' - Net Transport
'PD' - Pando
'qB' - qBittorrent
'QD' - QQDownload
'QT' - Qt 4 Torrent example
'RT' - Retriever
'S~' - Shareaza alpha/beta
'SB' - ~Swiftbit
'SS' - SwarmScope
'ST' - SymTorrent
'st' - sharktorrent
'SZ' - Shareaza
'TN' - TorrentDotNET
'TR' - Transmission
'TS' - Torrentstorm
'TT' - TuoTu
'UL' - uLeecher!
'UT' - µTorrent
'UW' - µTorrent Web
'VG' - Vagaa
'WD' - WebTorrent Desktop
'WT' - BitLet
'WW' - WebTorrent
'WY' - FireTorrent
'XL' - Xunlei
'XT' - XanTorrent
'XX' - Xtorrent
'ZT' - ZipTorrent
</pre>
<p>The following clients have been seen in the wild and need to be identified:</p>
<pre class="literal-block">
'BD' (example: -BD0300-)
'NP' (example: -NP0201-)
'wF' (example: -wF2200-)
</pre>
<p>Shad0w with his experimental BitTorrent implementation and BitTornado
introduced peer ids that begin with a character which is``T`` in the
case of BitTornado followed by up to five ascii characters for version
number, padded with dashes if less than 5, followed by <tt class="docutils literal"><span class="pre">---</span></tt>. The
ascii characters denoting version are limited to the following
characters:</p>
<pre class="literal-block">
0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz.-
</pre>
<p>For example: 'S58B-----'... for Shadow's 5.8.11</p>
<p>As with other peer id formats, the remanining bytes are random. There
are significant deviations from this explained here <a class="footnote-reference" href="#shad0w" id="id2">[2]</a>.</p>
<p>Known clients that uses this encoding style are:</p>
<pre class="literal-block">
'A' - ABC
'O' - Osprey Permaseed
'Q' - BTQueue
'R' - Tribler
'S' - Shadow's client
'T' - BitTornado
'U' - UPnP NAT Bit Torrent
</pre>
<p>BitComet produces peer ids that consists of four ASCII characters
<tt class="docutils literal">exbc</tt>, followed by two bytes <em>x</em> and <em>y</em>, followed by random
characters. The version number is <em>x</em> in decimal before the decimal
point and <em>y</em> as two decimal digits after the decimal point. BitLord
uses the same scheme, but adds <tt class="docutils literal">LORD</tt> after the version bytes. An
unofficial patch for BitComet once replaced <tt class="docutils literal">exbc</tt> with <tt class="docutils literal">FUTB</tt>. The
encoding for BitComet Peer IDs changed to Azureus-style as of BitComet
version 0.59.</p>
<p>XBT Client has its own style too. Its peer_id consists of the three
uppercase characters <tt class="docutils literal">XBT</tt> followed by three ASCII digits representing
the version number. If the client is a debug build, the seventh byte
is the lowercase character <tt class="docutils literal">d</tt>, otherwise it is a <tt class="docutils literal">-</tt>. Following that
is a <tt class="docutils literal">-</tt> then random digits, uppercase and lowercase letters. Example:
<tt class="docutils literal">XBT054d-</tt> at the beginning would indicate a debug build of version
0.5.4.</p>
<p>Opera 8 previews and Opera 9.x releases use the following peer_id
scheme: The first two characters are <tt class="docutils literal">OP</tt> and the next four digits
equal the build number. All following characters are random lowercase
hexdecimal digits.</p>
<p>MLdonkey use the following peer_id scheme: the first characters are
<tt class="docutils literal"><span class="pre">-ML</span></tt> followed by a dotted version then a <tt class="docutils literal">-</tt> followed by
randomness. e.g. <tt class="docutils literal"><span class="pre">-ML2.7.2-kgjjfkd</span></tt></p>
<p>Bits on Wheels uses the pattern <tt class="docutils literal"><span class="pre">-BOWxxx-yyyyyyyyyyyy</span></tt>, where y is
random (uppercase letters) and x depends on the version. Version 1.0.6
has xxx = A0C.</p>
<p>Queen Bee uses Bram``s new style: <tt class="docutils literal"><span class="pre">Q1-0-0--</span></tt> or <tt class="docutils literal"><span class="pre">Q1-10-0-</span></tt> followed by
random bytes.</p>
<p>BitTyrant is an Azureus fork and simply uses <tt class="docutils literal">AZ2500BT</tt> + random bytes
as peer ID in its 1.1 version. Note the missing dashes.</p>
<p>TorrenTopia version 1.90 pretends to be or is derived from Mainline
3.4.6. Its peer ID starts with <tt class="docutils literal"><span class="pre">346------</span></tt>.</p>
<p>BitSpirit has several modes for its peer ID. In one mode it reads the
ID of its peer and reconnects using the first eight bytes as a basis
for its own ID. Its real ID appears to use <tt class="docutils literal"><span class="pre">\\0\\3BS</span></tt> (C notation) as
the first four bytes for version 3.x and <tt class="docutils literal"><span class="pre">\\0\\2BS</span></tt> for version 2.x. In
all modes the ID may end in <tt class="docutils literal">UDP0</tt>.</p>
<p>Rufus uses its version as decimal ASCII values for the first two
bytes. The third and fourth bytes are <tt class="docutils literal">RS</tt>. What then follows is the
nickname of the user and some random bytes.</p>
<p>G3 Torrent starts its peer ID with <tt class="docutils literal"><span class="pre">-G3</span></tt> and appends up to 9
characters of the nickname of the user.</p>
<p>FlashGet uses Azureus style with <tt class="docutils literal">FG</tt> but without the trailing
<tt class="docutils literal">-</tt>. Version 1.82.1002 still uses the version digits <tt class="docutils literal">0180</tt>.</p>
<p>AllPeers takes the sha1 hash of a user dependent string and replaces
the first few characters with "AP" + version string + "-".</p>
<div class="section" id="references">
<h1>References</h1>
<table class="docutils footnote" frame="void" id="theory" rules="none">
<colgroup><col class="label" /><col /></colgroup>
<tbody valign="top">
<tr><td class="label"><a class="fn-backref" href="#id1">[1]</a></td><td><a class="reference external" href="http://wiki.theory.org/BitTorrentSpecification">http://wiki.theory.org/BitTorrentSpecification</a></td></tr>
</tbody>
</table>
<table class="docutils footnote" frame="void" id="shad0w" rules="none">
<colgroup><col class="label" /><col /></colgroup>
<tbody valign="top">
<tr><td class="label"><a class="fn-backref" href="#id2">[2]</a></td><td><a class="reference external" href="http://forums.degreez.net/viewtopic.php?t=7070">http://forums.degreez.net/viewtopic.php?t=7070</a></td></tr>
</tbody>
</table>
</div>
<div class="section" id="copyright">
<h1>Copyright</h1>
<p>This document has been placed in the public domain.</p>
<!-- Local Variables:
mode: indented-text
indent-tabs-mode: nil
sentence-end-double-space: t
fill-column: 70
coding: utf-8
End: -->
</div>
</div>
<div id="footer">
<hr/>
</div>
</div>
</body>
</html>
|
module Panwriter.Toolbar where
import Prelude
import Data.Functor (mapFlipped)
import Data.Monoid (guard)
import Panwriter.Button (button)
import React.Basic (Component, JSX, StateUpdate(..), capture_, createComponent, make)
import React.Basic.DOM as R
import React.Basic.Events (EventHandler)
import Electron.CurrentWindow as CurrentWindow
data ViewSplit = OnlyEditor | Split | OnlyPreview
derive instance eqViewSplit :: Eq ViewSplit
component :: Component Props
component = createComponent "Toolbar"
type Props = {
fileName :: String
, fileDirty :: Boolean
, split :: ViewSplit
, onSplitChange :: ViewSplit -> EventHandler
, paginated :: Boolean
, onPaginatedChange :: Boolean -> EventHandler
}
data Action = Close
| Minimize
| Maximize
showAction :: Action -> String
showAction Close = "close"
showAction Minimize = "minimize"
showAction Maximize = "maximize"
toolbar :: Props -> JSX
toolbar = make component
{ initialState: {}
, update: \{state} action -> case action of
Close -> UpdateAndSideEffects state \self -> CurrentWindow.close
Minimize -> UpdateAndSideEffects state \self -> CurrentWindow.minimize
Maximize -> UpdateAndSideEffects state \self -> CurrentWindow.maximize
, render: \self ->
let paginatedBtn props = guard (props.split /= OnlyEditor)
R.div
{ className: ""
, children: [
button
{ active: props.paginated
, children: [ R.img
{ alt: "Paginated"
, src: "page.svg"
}
]
, onClick: props.onPaginatedChange $ not props.paginated
}
]
}
splitBtns props =
R.div
{ className: "btngroup"
, children: [
splitButton OnlyEditor
, splitButton Split
, splitButton OnlyPreview
]
}
where
splitButton split =
let splitIcon OnlyEditor = {alt: "Editor", src: "notes.svg"}
splitIcon Split = {alt: "Split", src: "vertical_split.svg"}
splitIcon OnlyPreview = {alt: "Preview", src: "visibility.svg"}
in button
{ active: split == props.split
, children: [R.img $ splitIcon split]
, onClick: props.onSplitChange split
}
in R.div
{ className: "toolbar"
, children: [
R.div
{ className: "toolbararea"
, children: [
R.div
{ className: "windowbuttons"
, children: mapFlipped [Close, Minimize, Maximize] \action ->
R.div {
onClick: capture_ self action
, children: [R.img { src: "macOS_window_" <> showAction action <> ".svg" }]
}
}
, R.div
{ className: "filename"
, children: [
R.span
{ children: [R.text self.props.fileName]
}
, R.span
{ className: "edited"
, children: [R.text $ guard self.props.fileDirty " — Edited"]
}
]
}
, R.div -- icons from https://material.io/tools/icons/
{ className: "btns"
, children: [paginatedBtn self.props <> splitBtns self.props]
}
]
}
]
}
}
|
Michael P. Warsaw, Chairman of the Board and CEO of Eternal Word Television Network. (EWTN)
| May. 4, 2016
EWTN Asks Federal Court to Reconsider Its HHS Mandate Case
The request is based on an admission by the federal government, in a recent brief before the U.S. Supreme Court in another HHS mandate case.
CNA/EWTN NEWS
WASHINGTON — The Eternal Word Television Network (EWTN) has asked a federal court to reconsider its ruling forcing the company to comply with the revised HHS mandate, based on an admission by the federal government in its brief before the Supreme Court.
“The government admitted what we have said from the beginning,” said Michael Warsaw, CEO of EWTN. “Once you get past the bureaucratic smokescreen, this really comes down to one issue: the government wants to hijack our health plan. EWTN cannot let them do it.”
EWTN, the world’s largest religious media network, is one of hundreds of non-profits and charities suing the federal government over its mandate — and the revisions it made to the mandate — that requires employers to offer health plans including contraceptives, sterilizations, and drugs that can cause early abortions.
The government’s revision to the mandate was what it called an “accommodation” for non-profits who religiously objected to providing the coverage. The parties would send a notice of their objection to the government, who would then notify their insurer of the objection. The insurer would provide the contraception coverage separately.
In the current HHS mandate case before the Supreme Court, Zubik v. Burwell, a number of charities including the Little Sisters of the Poor and the Archdiocese of Washington have argued that sending their notice of objection to the government still constitutes tacit acceptance and facilitation of a morally objectionable act, providing contraceptives for employees. They are basically acting as a “gatekeeper” for the objectionable coverage, they argued.
Furthermore, they say that the government is unconstitutionally “hijacking” their health plan, which is an agreement between them and their insurer, in forcing the unwanted coverage into the plan.
EWTN lost its initial case at the 11th Circuit Court of Appeals in February. A panel of judges ruled 2-1 that the government had indeed forced the network, under threat of heavy fines, to choose between its religious beliefs and participating with a morally objectionable act in honoring the mandate.
Nevertheless, the judges ruled that the government was not imposing a “substantial burden” on EWTN’s religious beliefs by doing so. Federal law protects from government action that “substantially burdens” a person’s religious beliefs, unless that action is for a “compelling government interest” and is the “least-restrictive means” of furthering that interest.
The dissenting opinion in the ruling sharply disagreed, saying that the ruling “runs roughshod over the sincerely held religious objections of Eternal Word Television Network.”
Now EWTN wants the 11th Circuit Court to reconsider the decision. The Supreme Court, in a historically rare move in the middle of the case, asked both sides in the Zubik v. Burwell case to submit supplemental briefs outlining an alternative solution — if any — that would fulfill both parties’ interests of contraceptive coverage and religious freedom.
The government, in its supplemental brief, “essentially” admitted that it is “taking over” the health plans of the Little Sisters and other non-profits, Daniel Blomberg of the Becket Fund for Religious Liberty told CNA. Since EWTN is a non-profit as well, the same standard would apply to its own case.
“The government’s been arguing all along that it’s not really forcing EWTN to do anything except sign some paperwork,” he said. Meanwhile, EWTN has said that the government is indeed “forcing” them to do something very significant, to “sign something that changes my health care plan, the plan that I administer and I stay involved with.”
The 11th Circuit had sided with the government that the revised mandate only asked EWTN to perform a task the equivalent of raising its hand, which was not a “substantial burden” on its religious beliefs, Blomberg explained.
Now, the government’s admission in the supplemental brief that it is intruding on health plans, he continued, acknowledges that “this is a hijack of a plan that forces [EWTN] to be involved — as long as they’re providing health care, they’re involved in the government’s scheme.”
It is “something much more significant and something only EWTN can do, and that is create new legal responsibilities for their health care plan to start providing drugs that violate their faith.”
EWTN broadcasts to over 258 million television households in more than 145 countries and territories. It also broadcasts via satellite radio, Internet radio and other media. Its publications include the National Catholic Register. Its news services include Catholic News Agency.
We encourage a lively and honest discussion of our content. We ask that charity guide your words.
By submitting this form, you are agreeing to our discussion guidelines.
Comments are published at our discretion. We won't publish comments that lack charity, are off topic, or are more than 400 words.
Thank you for keeping this forum thoughtful and respectful. |
7 Easy Tips for Outstanding Donor Premiums
August 27, 2018
We’ve had an incredibly hot summer here in Ottawa. In fact, most of us have found it too hot to spend a whole lot of time outdoors. With the A/C on blast, many of us have taken to indoor projects. For me, that’s meant finally tackling the mountain of charitable mailing samples and donor premiums (small thank you gifts) that have been beckoning for months.
As I sorted and stacked, it dawned on me that the ‘premiums’ that some nonprofit organizations choose to send these days are kind of meaningless. I struggle to connect the flowered pen and notepad with the organization that provides a safe and loving home for animals. The tote bag and magnet I received in an oversized cardboard envelope seems wasteful.
When did these charities decide that ALL premiums were good premiums? When did a cheaply produced pen, magnifying glass or set of address labels with ZERO branding replace the beautiful cause-related calendar I used to receive every fall?
It seems many charitable organizations have fallen into the trap of sending premiums to try and encourage donations. And while these have proved successful in past, the reality is that today’s donor is less likely to be guilted into making a donation. Rather, today’s donor wants to know that their donations are actually making a difference (read: that their hard-earned dollars are supporting your mission). They’re concerned with admin costs, and your gifts, although perhaps well-intentioned, are likely having an adverse effect on their giving. (These gifts can actually erode trust not only of your charitable organization, but of the sector as a whole. Many donors are tired of receiving what they perceive as “junk”.)
Can I let you in on a little secret? Most donors would likely give more to your cause if they saw more in the way of results.
Want to know another secret? Premiums can work. The trick is to be strategic about what you send, who you send to, and how you’ll retain these donors. Yep, premium-acquired donors are tricky and retaining them can be challenging.
If you’re going to send a small gift to donors to thank them for their loyalty, here’s a list of do’s and don’ts:
Do:
Make sure that what you’re sending is purposeful. Think calendar, bookmark or post-it notes.
Make sure that what you choose aligns with your charity’s brand. A calendar is a great fit for an organization that helps protect lands or endangered species because they can actually SHOW donors how they’re making a difference.
Ask your donors if they want to receive these gifts, that way you can segment donors for future ‘no premium’ mailings.
Consider inviting donors to make a donation BEFORE receiving a gift (this is called a back-end premium), and give them the opportunity to opt-out if they aren’t interested.
Don’t:
Send premium packages that include everything but the kitchen sink. We’ve all received these mailings that include a little bit of everything, with little thought put into how these gifts will actually be used or whether or not these items will help create/increase brand awareness.
Leave off your organization’s logo and name. If you’re going to send these items, you should be proud to display your logo and invite donors to help spread the word about the work you’re doing by using these purposeful items in their day-to-day.
Look for local suppliers who can produce high-value, low-cost premiums. This can help to significantly reduce production time and keeps the money in the pockets of local suppliers.
Have you consistently used premium packages to inspire support? Are you trying to get away from sending these? Drop me a line…I’d love to hear about your experience.
This post was written by Heather Brown, former Philanthropic Counsel at Good Works and fundraiser extraordinaire.
The Good Works Goldfish
Search
Categories
Blog Authors
State of the Web Nation
The online benchmarks you actually need.
The first-ever benchmark report – made just for Canadian charities like you.
Let's get personal
3 data gems for better donor asks.
More from the Blog
“SINCE GOOD WORKS BEGAN WORKING ON OUR FILE OVER 5 YEARS AGO, THEY’VE CONTINUALLY PUSHED US TO TEST SO WE KNOW WHAT’S WORKING AND WHAT ISN’T. IT’S A PLEASURE TO WORK WITH A TEAM THAT’S ALWAYS THINKING OUTSIDE THE BOX AND CHALLENGING US TO DO THE SAME.” |
// *************************************************************************************************
//
// QPropertyEditor v 0.3
//
// --------------------------------------
// Copyright (C) 2007 Volker Wiendl
// Acknowledgements to Roman alias banal from qt-apps.org for the Enum enhancement
//
// This library is free software; you can redistribute it and/or
// modify it under the terms of the GNU Lesser General Public
// License as published by the Free Software Foundation; either
// version 2.1 of the License, or any later version.
//
// This library is distributed in the hope that it will be useful,
// but WITHOUT ANY WARRANTY; without even the implied warranty of
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
// Lesser General Public License for more details.
//
// You should have received a copy of the GNU Lesser General Public
// License along with this library; if not, write to the Free Software
// Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA
//
// *************************************************************************************************
#include "EnumProperty.h"
/////////////////////////////////////////////////////////////////////////////////////////////
// Constructor
/////////////////////////////////////////////////////////////////////////////////////////////
EnumProperty::EnumProperty(const QString &name /* = QString()*/,
QObject *propertyObject /* = 0*/, QObject *parent /* = 0*/)
: Property(name, propertyObject, parent)
{
// get the meta property object
const QMetaObject* meta = propertyObject->metaObject();
QMetaProperty prop = meta->property(meta->indexOfProperty(qPrintable(name)));
// if it is indeed an enum type, fill the QStringList member with the keys
if(prop.isEnumType()){
QMetaEnum qenum = prop.enumerator();
for(int i=0; i < qenum.keyCount(); i++){
m_enum << qenum.key(i);
}
}
}
/////////////////////////////////////////////////////////////////////////////////////////////
// value
/////////////////////////////////////////////////////////////////////////////////////////////
QVariant EnumProperty::value(int role /* = Qt::UserRole */) const {
if(role == Qt::DisplayRole){
if (m_propertyObject){
// resolve the value to the corresponding enum key
int index = m_propertyObject->property(qPrintable(objectName())).toInt();
const QMetaObject* meta = m_propertyObject->metaObject();
QMetaProperty prop = meta->property(meta->indexOfProperty(qPrintable(objectName())));
return QVariant(prop.enumerator().valueToKey(index));
} else{
return QVariant();
}
} else {
return Property::value(role);
}
}
/////////////////////////////////////////////////////////////////////////////////////////////
// createEditor
/////////////////////////////////////////////////////////////////////////////////////////////
QWidget* EnumProperty::createEditor(QWidget* parent, const QStyleOptionViewItem& /*option*/){
// create a QComboBox and fill it with the QStringList values
QComboBox* editor = new QComboBox(parent);
editor->addItems(m_enum);
connect(editor, SIGNAL(currentIndexChanged(const QString)),
this, SLOT(valueChanged(const QString)));
return editor;
}
/////////////////////////////////////////////////////////////////////////////////////////////
// setEditorData
/////////////////////////////////////////////////////////////////////////////////////////////
bool EnumProperty::setEditorData(QWidget *editor, const QVariant &data)
{
QComboBox* combo = 0;
if( (combo = qobject_cast<QComboBox*>(editor) ) ){
int value = data.toInt();
const QMetaObject* meta = m_propertyObject->metaObject();
QMetaProperty prop = meta->property(meta->indexOfProperty(qPrintable(objectName())));
int index = combo->findText(prop.enumerator().valueToKey(value));
if(index == -1)
return false;
combo->setCurrentIndex(index);
} else {
return false;
}
return true;
}
/////////////////////////////////////////////////////////////////////////////////////////////
// editorData
/////////////////////////////////////////////////////////////////////////////////////////////
QVariant EnumProperty::editorData(QWidget *editor)
{
QComboBox* combo = 0;
if( (combo = qobject_cast<QComboBox*>(editor) ) )
{
return QVariant(combo->currentText());
}
else
{
return QVariant();
}
}
/////////////////////////////////////////////////////////////////////////////////////////////
// valueChanged
/////////////////////////////////////////////////////////////////////////////////////////////
void EnumProperty::valueChanged(const QString item){
setValue(QVariant(item));
}
|
As Florida authorities work to identify the people who died in Thursday's catastrophic bridge collapse, state and federal investigators will begin the task of figuring out how and why the five-day-old span failed.More >>
As Florida authorities work to identify the people who died in Thursday's catastrophic bridge collapse, state and federal investigators will begin the task of figuring out how and why the five-day-old span failed.More >>
(AP Photo/Brandon Wade). Florida guard Egor Koulechov (4) and St. Bonaventure guard Idris Taqqee (1) battle for the ball during the first half of a first-round game at the NCAA college basketball tournament in Dallas, Thursday, March 15, 2018.
Egor Koulechov scored 20 points and Florida eased past St. Bonaventure 77-62, ending the Bonnies' postseason run two days after their first NCAA Tournament victory in 48 years.
(CNN) -- For the second year running, seat-kickers have earned the dubious distinction of being America's most annoying airplane passengers.
The tap, tap, tapping with intermittent knees and feet to the back irks 61% of Americans surveyed for Expedia's third annual Airplane Etiquette Study.
Inattentive parents rank a close second, with 59% of respondents registering their aggravation with moms and dads who let their kids run wild.
Dereliction of parenting duty annoys travelers in other settings, too: Inattentive parents ranked as the most annoying hotel guests in another recent Expedia survey.
The Airplane Etiquette Study, released Tuesday, was conducted for Expedia by GfK, an independent global market research company. The study asked 1,019 randomly selected U.S. adults to rank the most annoying airplane behaviors.
Aromatic passengers and audio-insensitive passengers ranked third and fourth, both cited by half of study respondents. Boozers rounded out the top 5, aggravating 45% of respondents with their excessive in-flight drinking.
This year's study rankings are very similar to the 2014 results, with a few shifts.
The queue-jumper, who rushes to deplane, moved up from No. 10 in 2014 to No. 8 this year. The overhead bin user who grabs the first available space moved up one spot from No. 11 last year to break into 2015's top 10.
Armrest hogs, who ranked No. 8 on last year's list, dropped off the study map entirely.
Have travelers in 2015 learned to tuck their elbows in, or have we just become immune to jockeying for space? Hard to say.
"With Airplane Etiquette, the survey firm does not ask Americans to supply a rationale, so we'd be speculating as to why armrest hogs have dropped down the list," Sarah Gavin, Expedia's head of communication, wrote in an email.
"But for us, given the number of possible behaviors onboard a flight that could be maddening, it's more of a surprise that armrest hogging was top 10 at all."
The full list
Here's the ranked list of etiquette violators, with percentage cited by study respondents:
1. Rear seat-kicker (61%)
2. Inattentive parents (59%)
3. Aromatic passenger (50%)
4. Audio-insensitive (talking/music) (50%)
5. Boozer (45%)
6. Chatty Cathy (43%)
7. Carry-on baggage offenders (38%)
8. Queue-jumper (rushes to deplane) (35%)
9. Seat-back guy (aka seat recliner) (32%)
10. Overhead bin inconsiderate (stows bag in first available spot, rather than nearest to his/her seat) (32%) |
In a conventional wireless local area network (WLAN), an access point (AP) is a station that transmits and receives data (sometimes referred to as a transceiver). A conventional AP connects users to other users within the network and also can serve as the point of interconnection between the WLAN and a fixed wire network. Each AP can serve multiple users within a defined network area. As users move beyond the range of one AP, they can be automatically handed over to the next one. A small WLAN may only require a single AP. Conventionally, the number of APs required increases as a function of the number of network users and the physical size of the network.
APs are typically shipped with a default configuration to allow connection of wireless clients, but most require an elaborate and confusing manual configuration procedure to set up a new AP or new client (e.g., a wireless card, embedded wireless local area network on motherboard (WLAM), etc.). with security features enabled. For example, the following instructions describe how to manually configure a particular wireless connection.
A user opens a client configuration program for a wireless client. A new wireless network configuration can be generated or a default configuration edited. To connect to an AP, the AP is activated. The user must enter a network name or Secure Set ID (SSID) name for the network. Alternately, the user can scan for an available network. To specify a name, the user looks for a network name or SSID option in the configuration utility. The user must ensure that their network card's name or SSID setting is identical to the network name or SSID assigned to the AP. The user enables a security selection, for example enabling wired equivalent privacy (WEP) encryption and enters one or more keys. The keys on the user device and AP must be identical and the same key type (encryption level and hexadecimal or ASCI format) must be used on every device. The user then saves the configuration and attempts to connect the user device to the AP. |
Looking forward, looking back: anticipation is more evocative than retrospection.
The results of 5 experiments indicate that people report more intense emotions during anticipation of, than during retrospection about, emotional events that were positive (Thanksgiving Day), negative (annoying noises, menstruation), routine (menstruation), and hypothetical (all-expenses-paid ski vacation). People's tendency to report more intense emotion during anticipation than during retrospection was associated with a slight, but only occasionally significant, tendency for people to expect future emotions to be more intense than they remembered past emotions having been. The greater evocativeness of anticipation than retrospection was also associated with and statistically mediated by participants' tendency to report mentally simulating future emotional events more extensively than they report mentally stimulating past emotional events. The conclusion that anticipation is more evocative than retrospection has implications for research methodology, clinical practice, decision making, and well-being. |
/* @(#)s_modf.c 5.1 93/09/24 */
/*
* ====================================================
* Copyright (C) 1993 by Sun Microsystems, Inc. All rights reserved.
*
* Developed at SunPro, a Sun Microsystems, Inc. business.
* Permission to use, copy, modify, and distribute this
* software is freely granted, provided that this notice
* is preserved.
* ====================================================
*/
/*
* modf(double x, double *iptr)
* return fraction part of x, and return x's integral part in *iptr.
* Method:
* Bit twiddling.
*
* Exception:
* No exception.
*/
#include <openlibm_math.h>
#include "math_private.h"
static const double one = 1.0;
OLM_DLLEXPORT double
modf(double x, double *iptr)
{
int32_t i0,i1,j0;
u_int32_t i;
EXTRACT_WORDS(i0,i1,x);
j0 = ((i0>>20)&0x7ff)-0x3ff; /* exponent of x */
if(j0<20) { /* integer part in high x */
if(j0<0) { /* |x|<1 */
INSERT_WORDS(*iptr,i0&0x80000000,0); /* *iptr = +-0 */
return x;
} else {
i = (0x000fffff)>>j0;
if(((i0&i)|i1)==0) { /* x is integral */
u_int32_t high;
*iptr = x;
GET_HIGH_WORD(high,x);
INSERT_WORDS(x,high&0x80000000,0); /* return +-0 */
return x;
} else {
INSERT_WORDS(*iptr,i0&(~i),0);
return x - *iptr;
}
}
} else if (j0>51) { /* no fraction part */
u_int32_t high;
if (j0 == 0x400) { /* inf/NaN */
*iptr = x;
return 0.0 / x;
}
*iptr = x*one;
GET_HIGH_WORD(high,x);
INSERT_WORDS(x,high&0x80000000,0); /* return +-0 */
return x;
} else { /* fraction part in low x */
i = ((u_int32_t)(0xffffffff))>>(j0-20);
if((i1&i)==0) { /* x is integral */
u_int32_t high;
*iptr = x;
GET_HIGH_WORD(high,x);
INSERT_WORDS(x,high&0x80000000,0); /* return +-0 */
return x;
} else {
INSERT_WORDS(*iptr,i0,i1&(~i));
return x - *iptr;
}
}
}
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.