text
stringlengths 0
128k
|
---|
Switch function
I need check the value ranges for a dataframe, each vector in data frame has different ranges. The data frame need to be checked might be different each time.
All the features I have are c("temp","y","d","p"). I want to check if the value of each vector are within the range, otherwise fill in NA.
temp_range = c(0,140)
y_range = c(0,100)
d_range = c(-80,100)
p_range = c(0.00,99.9)
check_range <- function(x, range){
x[which(x<range[1] | x>range[2])] = NA
return(x)
}
check_all_range <- function(pp, features){
for( ff in features){
z<- switch(ff,"temp" = check_range(pp$temp,temp_range),
"y" = check_range(pp$r, y_range),
"d" = check_range(pp$d, d_range),
"p"= check_range(pp$p, p_range),
)
print(f)
return(z)
}
}
Now I have a data frame
x=data.frame(c(200,30,20,-10,-140), c(-10,20,100,10, NA))
names(x)=c("temp","y").
features = c("temp","y")
When use check_all_range(x,features) somehow it only check the first feature temp and x is still unchanged.
I think maybe I didn't understand switch well.
The return in check_all_range is inside the for loop, therefore the function returns during the first iteration. There are other problems too.
It looks like you are overwriting z each iteration of the loop.
if you prepopulate z with pp and then you only assign z[ff] to be the checked values it should work
new code for check_all_range
check_all_range <- function(pp, features){
z <- pp
for( ff in features){
z[ff] <- switch(ff,
"temp" = check_range(pp$temp,temp_range),
"y" = check_range(pp$y, y_range),
"d" = check_range(pp$d, d_range),
"p" = check_range(pp$p, p_range),
)
print(ff)
}
return(z)
}
|
const Test = require('../config/testConfig.js');
const BigNumber = require('bignumber.js');
const truffleAssert = require('truffle-assertions');
contract('Flight Surety Tests', async (accounts) => {
const airlineInitialFund = web3.utils.toWei("10", "ether");
const oneEther = web3.utils.toWei("1", "ether");
const timestamp = Math.floor(Date.now() / 1000);
const lateFlight = "FLY-1"
var config;
before('setup contract', async () => {
config = await Test.Config(accounts);
await config.flightSuretyData.authorizeCaller(config.flightSuretyApp.address);
});
/****************************************************************************************/
/* Operations and Settings */
/****************************************************************************************/
it(`firstAirline is registered in contract deploy`, async function () {
// Get operating status
const airline = await config.flightSuretyApp.getAirline.call(config.firstAirline, { from: config.flightSuretyApp.address });
// Checks airline atributes
assert.equal(airline[0], 'First Airline', 'Wrong name of first airline');
assert.equal(airline[1], true, 'First airline is not registered');
assert.equal(airline[2], 0, "First airline should't have funds");
assert.equal(airline[3], 0, "First airline should't have votes");
});
it(`dataContract has correct initial operational status`, async function () {
// Get operating status
let status = await config.flightSuretyData.isOperational.call();
assert.equal(status, true, "Wrong initial operating status value");
});
it(`dataContract can block access to setOperatingStatus() for non-contractOwner account`, async function () {
// Ensure that access is denied for non-contract Owner account
let accessDenied = false;
try {
await config.flightSuretyData.setOperatingStatus(false, { from: config.firstAirline });
}
catch(e) {
accessDenied = true;
}
assert.equal(accessDenied, true, "Access is not restricted to contractOwner");
});
it(`dataContract can allow access to setOperatingStatus() for contractOwner`, async function () {
// Ensure that access is allowed for contractOwner
let accessDenied = false;
try {
await config.flightSuretyData.setOperatingStatus(false);
}
catch(e) {
accessDenied = true;
}
assert.equal(accessDenied, false, "Access is not restricted to contractOwner");
});
it(`dataContract can block access to functions by setting operational status to false`, async function () {
await config.flightSuretyData.setOperatingStatus(false);
await truffleAssert.reverts(config.flightSuretyData.authorizeCaller(config.flightSuretyApp.address));
// Set it back for other tests to work
await config.flightSuretyData.setOperatingStatus(true);
});
it('dataContract can authorize appContract to call dataContract functions', async () => {
// ARRANGE
let isAuthorized = false;
// ACT
try {
await config.flightSuretyData.authorizeCaller(config.flightSuretyApp.address);
isAuthorized = true;
}
catch(e) {
console.log(e);
}
// ASSERT
assert.equal(isAuthorized, true, "dataContract doesn't authorize appContract");
});
it('firstAirline can add funds to firstAirline', async () => {
await truffleAssert.passes(config.flightSuretyApp.fund({from: config.firstAirline, value: airlineInitialFund}));
const airline = await config.flightSuretyApp.getAirline.call(config.firstAirline);
assert.equal(airline[0], 'First Airline', 'Wrong name of firstAirline');
assert.equal(airline[1], true, 'firstAirline is not registered');
assert.equal(airline[2], airlineInitialFund, "firstAirline should have funds");
});
it('firstAirline can add secondAirline', async () => {
await truffleAssert.passes(config.flightSuretyApp.addAirline(config.secondAirline, 'Second Airline', {from: config.firstAirline}));
const airline = await config.flightSuretyApp.getAirline.call(config.secondAirline);
// Checks airline atributes
assert.equal(airline[0], 'Second Airline', 'Wrong name of secondAirline');
assert.equal(airline[1], false, 'secondAirline should not be registered');
assert.equal(airline[2], 0, "secondAirline should't have funds");
assert.equal(airline[3], 0, "secondAirline should't have votes");
});
it('airline has no fund cannot add an Airline', async () => {
await truffleAssert.reverts(config.flightSuretyApp.addAirline(config.thirdAirline, 'Third Airline', {from: config.secondAirline}));
const airline = await config.flightSuretyApp.getAirline.call(config.thirdAirline);
// Checks airline atributes
assert.equal(airline[0], '', 'thirdAirline should not be added by no fund airline');
});
it('firstAirline can vote to get second Airline registered', async () => {
await config.flightSuretyApp.vote(config.secondAirline, {from: config.firstAirline});
const airline = await config.flightSuretyApp.getAirline.call(config.secondAirline);
assert.equal(airline[0], 'Second Airline', 'Wrong name of second airline');
assert.equal(airline[1], true, 'secondAirline is not registered');
assert.equal(airline[2], 0, "secondAirline should't have funds");
});
it('secondAirline can fund to secondAirline', async () => {
await config.flightSuretyApp.fund({from: config.secondAirline, value: airlineInitialFund});
const airline = await config.flightSuretyApp.getAirline.call(config.secondAirline);
assert.equal(airline[0], 'Second Airline', 'Wrong name of second airline');
assert.equal(airline[1], true, 'secondAirline is not registered');
assert.equal(airline[2], airlineInitialFund, "secondAirline should have funds");
});
it('secondAirline can add thirdAirline', async () => {
await config.flightSuretyApp.addAirline(config.thirdAirline, 'Third Airline', {from: config.secondAirline});
const airline = await config.flightSuretyApp.getAirline.call(config.thirdAirline);
assert.equal(airline[0], 'Third Airline', 'Wrong name of thirdAirline');
assert.equal(airline[1], false, 'thirdAirline should not be registered');
assert.equal(airline[2], 0, "thirdAirline should not have funds");
});
it('secondAirline can vote to get thirdAirline registered', async () => {
await truffleAssert.passes(config.flightSuretyApp.vote(config.thirdAirline, {from: config.secondAirline}));
const airline = await config.flightSuretyApp.getAirline.call(config.thirdAirline);
// Checks airline atributes
assert.equal(airline[1], true, 'thirdAirline is not registered');
assert.equal(airline[2], 0, "thirdAirline should not have fund");
assert.equal(airline[3], 1, "thirdAirline should have 1 vote");
});
it('thirdAirline can fund to thirdAirline', async () => {
await config.flightSuretyApp.fund({from: config.thirdAirline, value: airlineInitialFund});
const airline = await config.flightSuretyApp.getAirline.call(config.thirdAirline);
assert.equal(airline[0], 'Third Airline', 'Wrong name of third airline');
assert.equal(airline[1], true, 'thirdAirline is not registered');
assert.equal(airline[2], airlineInitialFund, "thirdAirline should have funds");
});
it('thirdAirline can add fourthAirline', async () => {
await config.flightSuretyApp.addAirline(config.fourthAirline, 'Fourth Airline', {from: config.thirdAirline});
const airline = await config.flightSuretyApp.getAirline.call(config.fourthAirline);
assert.equal(airline[0], 'Fourth Airline', 'Wrong name of fourthAirline');
assert.equal(airline[1], false, 'fourthAirline should not be registered');
assert.equal(airline[2], 0, "fourthAirline should not have funds");
});
it('thirdAirline can vote to get fourthAirline registered', async () => {
await truffleAssert.passes(config.flightSuretyApp.vote(config.fourthAirline, {from: config.thirdAirline}));
const airline = await config.flightSuretyApp.getAirline.call(config.fourthAirline);
// Checks airline atributes
assert.equal(airline[1], true, 'fourthAirline is not registered');
assert.equal(airline[2], 0, "fourthAirline should not have fund");
assert.equal(airline[3], 1, "fourthAirline should have 1 vote");
});
it('fourthAirline can fund to fourthAirline', async () => {
await config.flightSuretyApp.fund({from: config.fourthAirline, value: airlineInitialFund});
const airline = await config.flightSuretyApp.getAirline.call(config.fourthAirline);
assert.equal(airline[0], 'Fourth Airline', 'Wrong name of fourth airline');
assert.equal(airline[1], true, 'fourthAirline is not registered');
assert.equal(airline[2], airlineInitialFund, "fourthAirline should have funds");
});
it('fourthAirline can add fifthAirline', async () => {
await config.flightSuretyApp.addAirline(config.fifthAirline, 'Fifth Airline', {from: config.fourthAirline});
const airline = await config.flightSuretyApp.getAirline.call(config.fifthAirline);
assert.equal(airline[0], 'Fifth Airline', 'Wrong name of fifthAirline');
assert.equal(airline[1], false, 'fifthAirline should not be registered');
assert.equal(airline[2], 0, "fifthAirline should not have funds");
});
it('fourthAirline can not single vote to get fifthAirline registered', async () => {
await truffleAssert.passes(config.flightSuretyApp.vote(config.fifthAirline, {from: config.fourthAirline}));
const airline = await config.flightSuretyApp.getAirline.call(config.fifthAirline);
// Checks airline atributes
assert.equal(airline[1], false, 'fifthAirline should not be registered by single vote');
assert.equal(airline[2], 0, "fifthAirline should not have fund");
assert.equal(airline[3], 1, "fifthAirline should have 1 vote");
});
it('2 votes in the original 4 Airlines can get fifthAirline registered', async () => {
await truffleAssert.passes(config.flightSuretyApp.vote(config.fifthAirline, {from: config.thirdAirline}));
const airline = await config.flightSuretyApp.getAirline.call(config.fifthAirline);
// Checks airline atributes
assert.equal(airline[1], true, 'fifthAirline should be registered by 2 votes');
assert.equal(airline[2], 0, "fifthAirline should not have fund");
assert.equal(airline[3], 2, "fifthAirline should have 2 vote");
});
it('fifthAirline can fund to fifthAirline', async () => {
await truffleAssert.passes(config.flightSuretyApp.fund({from: config.fifthAirline, value: airlineInitialFund}));
const airline = await config.flightSuretyApp.getAirline.call(config.fifthAirline);
// Checks airline atributes
assert.equal(airline[0], 'Fifth Airline', 'Wrong name of fifthAirline');
assert.equal(airline[1], true, 'fifthAirline is not registered');
assert.equal(airline[2], airlineInitialFund, "fifthAirline should have funds");
});
it('fifthAirline can add sixthAirline', async () => {
await config.flightSuretyApp.addAirline(config.sixthAirline, 'Sixth Airline', {from: config.fifthAirline});
const airline = await config.flightSuretyApp.getAirline.call(config.sixthAirline);
assert.equal(airline[0], 'Sixth Airline', 'Wrong name of sixthAirline');
assert.equal(airline[1], false, 'sixthAirline should not be registered');
assert.equal(airline[2], 0, "fifthAirline should not have funds");
});
it("passenger can buy flight insuree", async () => {
let beforeBalance = await web3.eth.getBalance(config.passengerOne);
// console.log('beforeBlance is', beforeBalance);
await truffleAssert.passes(config.flightSuretyApp.buy(config.fifthAirline, lateFlight, timestamp, {from: config.passengerOne, value: oneEther}));
// Checks passenger balance
let afterBalance = await web3.eth.getBalance(config.passengerOne);
// console.log('afterBalance is', afterBalance);
let diff = beforeBalance - afterBalance;
// console.log('diff is', diff);
assert.ok(diff > oneEther, "Balance Wrong!");
});
it("passenger can withdraw flight insuree", async () => {
let beforeBalance = await web3.eth.getBalance(config.passengerOne);
// console.log('beforeBalance is', beforeBalance);
await truffleAssert.passes(config.flightSuretyApp.processFlightStatus(config.fifthAirline, lateFlight, timestamp, 20));
await truffleAssert.passes(config.flightSuretyApp.withdraw({from: config.passengerOne}));
// Checks passenger balance
let afterBalance = await web3.eth.getBalance(config.passengerOne);
// console.log('afterBalance is', afterBalance);
let diff = afterBalance - beforeBalance;
// console.log('diff is', diff);
let compense = oneEther * 1.5;
assert.ok(diff > compense, "Balance Wrong!");
});
});
|
Talk:Sudanese civil war (2023–present)/Archive 2
Help with Timeline section & Timeline article
As discussed in, the Timeline section of the article has become large enough to warrant a split- I have done such a split to the article Timeline of the 2023 Sudan conflict. I'd like to note that the new article needs to be expanded, and the Timeline section must be compressed, so if anyone could help me with those tasks, I'd appreciate it. Presidentofyes12 (talk) 19:54, 5 May 2023 (UTC)
* @Presidentofyes12 second the idea. Go for it and I will support you FuzzyMagma (talk) 18:08, 6 May 2023 (UTC)
* @Presidentofyes12 have a look to 2023 Sudan conflict and let me know if the summary is good. Also section Reactions can be moved to an article to simialr to Reactions to the Russian invasion of Ukraine .. FuzzyMagma (talk) 23:18, 7 May 2023 (UTC)
Wagner...
The info-box lists Wagner as a backer of the militia forces. My understanding though is that while Wagner had previously done training with the militias, this was when they were still under the government's control. I don't think there's any reason to believe that Russia supports an overthrow of the Sudanese government, and in fact they'd recently concluded an agreement for Sudan to host a Russian naval base, so it'd make no sense for them to try to overthrow or destabilize a government that had just agreed to let them set up a new base. -2003:CA:870C:E18:5741:A3A3:2CE8:D385 (talk) 18:05, 1 May 2023 (UTC)
UPDATE: There was no reply here for a few days, so I went ahead and WP:BOLD removed the Wagner allegations from the info-box....The text there had stated that Wagner's involvement in the conflict was "alleged," but no source has been cited with anyone specifically alleging it. In the BBC article which was cited, the BBC seems to try to insinuate that Wagner might somehow be involved in the current conflict, but if you read carefully you'll see that they never actually specifically state this. And in fact they write that: "We've found no evidence that Russian mercenaries are currently inside the country. But there is evidence of Wagner's previous activities in Sudan, and Mr Prighozin's operations in the country have been targeted by both US and EU sanctions."
And none of the other people whose statements they report in that article (including that of Trump Admin official from three years ago) specifically allege Wagner involvement in the current conflict either.
A Military Africa article was also cited, but this one again has no mention of any specific allegation that Wagner is involved in the current conflict - siding with the militia forces against the government, as the info-box had alleged. In fact it actually cites a Sudanese government statement to the contrary: "The Sudanese government has also denied any knowledge of the Wagner group’s presence in the country." If Wagner were involved in the conflict and siding with the rebelling militia forces against the government, one would think that the government would be eager to make that known, in order to get more Western support...
In any case, in the absence of even any clearly stated allegations from reliable sources, it only makes sense to completely remove Wagner from the info-box. -2003:CA:870C:ED4:87F1:B283:22C9:D3E2 (talk) 10:50, 4 May 2023 (UTC)
* I undid your contribution as the section about Wanger provides enough argument to their inclusion. If you disagree; I’d recommend starting from that section, and work your way to the infobox; as the infobox is a summary and not were informative are contested FuzzyMagma (talk) 11:23, 4 May 2023 (UTC)
* @FuzzyMagma - With all due respect, you seem to be confused. Literally nothing in the Wagner section of the article substantiates the claim that Wagner is involved in the current conflict on the side of the militias against the government. Wagner likely worked with the (now-rebelling) militias at some point in the past, when they were under the control of the Sudanese government, but this is NOT the same thing as supporting these groups now, against the government of Sudan.
* And indeed, if one operates under the assumption (as I do) that Wagner, despite its quasi "private" official status, is in fact a de-facto branch of the Russian state, it would make no sense at all for them to be trying to overthrow or destabilize a government which had just agreed to host a Russian military base (a naval base on the Red Sea). There are multiple reports from shortly prior to the start of the conflict about how the Sudanese government was in the process of finalizing that deal with Russia.
* In any event, while the "Wagner" section of the article itself could probably use some work and better clarification, the info-box, which directly stated that Wagner was involved in this conflict on the anti-government side is the more pressing issue. And unless/until you can find a source which substantiates their involvement in the current conflict, on the anti-government side, Wagner should not be included in the info-box at all. I'm going ahead and removing it again, as there's zero substantiation at this point. -2003:CA:870C:ED4:87F1:B283:22C9:D3E2 (talk) 12:01, 4 May 2023 (UTC)
* Magma is stuck up even when everything points towards Wagner not being involved in the current conflict. Fenn Viktor (talk) 01:11, 5 May 2023 (UTC)
The issue of Wagner support has already been discussed, see previous discussion here. General consensus was that Wagner provided support to the RSF BEFORE the current conflict, while there is no evidence Wagner is providing support DURING this conflict, which is two different things. So, the alleged Wagner support should be removed until more (reliable) sources confirm they are providing support during this conflict. EkoGraf (talk) 15:18, 4 May 2023 (UTC)
* I'd really like people to actually contribute to this conversation prior to re-adding Wagner in the infobox. I agree that until RSes clearly state that Wagner is actively supporting the RSF during the conflict, Wagner shouldn't be added to the infobox. Presidentofyes12 (talk) 22:10, 4 May 2023 (UTC)
* @Presidentofyes12 I appreciate doing due diligence but RSF and Wagner statement or denial should be included but shouldn’t change anything as it should be viewed as a primary source unless it was supported by independent analysis. FuzzyMagma (talk) 22:29, 4 May 2023 (UTC)
* Regardless, support can take many forms, from diplomatic support, via technical and intelligence aid, or sale of arms, through to active support in military operations. Unless we can say what kind and degree of support, it's a bit pointless - and dangerous - saying country X supports group Y, when that support may be no more than diplomatic, or tactical advice. I note that we are again saying that Egypt is fighting - although we have no more than a single ex-CIA analyst in MEE claiming this, and editor's assuming that Egypt having sent planes BEFORE the conflict, is actively attacking with them DURING the conflict. That's an astonishly low level of sourcing for the claim that Egypt is at war and killing people in Sudan (the meaning of being a belligerent) IMO. Pincrete (talk) 08:28, 5 May 2023 (UTC)
* @Pincrete I will remove Egypt president from infobox as that is not substantiated in any form. As for Egypt as supporter, I will improve that section soon FuzzyMagma (talk) 14:12, 5 May 2023 (UTC)
* @Tobby72 please see this discussion and the one here Talk:2023 Sudan conflict/Archive 1 in essence saying it is an allegation after credible sources reported on Wagner involvement is not acceptable. if you disagree you need to start with the Wagner section and not the infobox. denial by RSF is considered primary source FuzzyMagma (talk) 23:35, 7 May 2023 (UTC)
* ,, , , , FuzzyMagma claimed that "last consensus is not to include the word allegation or refused". – diff Your thoughts? -- Tobby72 (talk) 18:58, 8 May 2023 (UTC)
* Just to clarify, I did not remove your edit. I just made similar to other notes about supporting group. See this … FuzzyMagma (talk) 19:31, 8 May 2023 (UTC)
I'm not sure what any previous consensus was - but my own position is that all current 'supporters' should not be in the infobox as the nature/degree and certainty of their support is insufficiently established, but attributed text is OK. Though no one doubts that Wagner HAS provided material support in the past, there is insufficient certainty to say they continue to do so NOW. It seems especially 'iffy' to place Wagner under the Russia flag. If we have to add an 'alleged' to such claims, to me that is an indicator that the claim shouldn't be in the infobox nor in WP:VOICE anyway. Infoboxes are not places for nuance and adding 'refuted/denied' to poorly sourced and unclear accusations in an infobox seems like a 'cop-out' to me. Attributed text accommodates nuance far more easily. Pincrete (talk) 04:08, 9 May 2023 (UTC)
* Agree with . -- Tobby72 (talk) 08:11, 14 May 2023 (UTC)
* @Tobby72 With the same logic, can we remove Libya too, as far as what is written in the text their support is also not clear FuzzyMagma (talk) 08:23, 14 May 2023 (UTC)
* . Done -- Diff -- Tobby72 (talk) 08:43, 14 May 2023 (UTC)
Ethopia
@Sanad real this is the talk page FuzzyMagma (talk) 01:15, 8 May 2023 (UTC)
* oh ok i think that ethiopia should be included as a third belligerent because of their attack on the al fushqa district even though it was a relatively minor skirmish Sanad real (talk) 01:17, 8 May 2023 (UTC)
* (Argument for support) If you look to the 2023 Sudan conflict you will find this information mentioned along with Ethiopia’s denial. As both the source for the attack an denial can be considered WP:Primary sources thus they can be discussed but not included in the infobox
* (Argument for belligerent) In addition, Ethiopia attack does not makes it a belligerent in this conflict which is between SAF and RAF. You can start a new page discussing the Sudanese-Ethiopian conflict,
* But as far as this page goes, Ethiopia is not a belligerent, and by Wikipedia policy, it’s not a supporter either. FuzzyMagma (talk) 01:26, 8 May 2023 (UTC)
* @Sanad real Actually there is already an article about that, see Al-Fashaga conflict which can use some improvement FuzzyMagma (talk) 01:29, 8 May 2023 (UTC)
* sudan is a primary source too and also that's why i wrote (ALLEGED,DENIED BY ETHIOPIA Sanad real (talk) 01:35, 8 May 2023 (UTC)
* Yah that’s why is not included as supporter anyway. As belligerent - as you did - is not even to be considered as above argument. Please read what I wrote to the end and visit the links in my reply to familiarise yourself with things around here.
* getting into a debate in your first 2 edits is not a good sign. Take a step back and educate yourself rather that trying to force your narrative. FuzzyMagma (talk) 01:44, 8 May 2023 (UTC)
* i have read it already how about this
* 🇪🇹 Ethiopia (alleged, denied by Ethiopia) (limited combat only in al fashaga region) Sanad real (talk) 01:52, 8 May 2023 (UTC)
* I don’t think you did. The reasons are given above when discussing adding Ethiopia as belligerent which you did not address FuzzyMagma (talk) 01:57, 8 May 2023 (UTC)
* i have proof
* On 19 April, the Sudanese newspaper Al-Sudani reported that the SAF had repelled an invasion by the Ethiopian Armed Forces in the disputed Al Fushqa District. The report alleged that the Ethiopian Army had carried out an attack with tanks, armored vehicles, and infantry and that the SAF had inflicted heavy losses on Ethiopian personnel and equipment. It said that the SAF was monitoring "unusual activity among the Ethiopian forces" since the start of hostilities with the RSF and that Ethiopian forces were carrying out intensive reconnaissance and surveillance operations along the border. Ethiopian Prime Minister Abiy Ahmed denied that clashes had occurred, blaming agitators for the reports.
* it clearly states from a primary source (sudan)that the SAF repelled and invasion by ethiopia even though abiy ahmed denies it Sanad real (talk) 02:08, 8 May 2023 (UTC)
* do i just add ethiopia and continue this tomorrrow Sanad real (talk) 02:39, 8 May 2023 (UTC)
* IMO this is very poor sourcing for the claim you wish to make - one would expect more international coverage if the claim were credible. WP putting it in as a fact and then saying it is denied is not a very good substitute for verifying its truth. It could possibly be mentioned as an attributed claim in text, but doesn't deserve to be in the infobox - which should be for reliably and widely established facts. Pincrete (talk) 08:26, 8 May 2023 (UTC)
* The Sudani issued an apology for the confusion. Ethiopia involvement truned out to be a hoax! FuzzyMagma (talk) 16:35, 8 May 2023 (UTC)
* ok i understand no more Ethiopia this is enough proof Me Sanad (talk) 23:23, 8 May 2023 (UTC)
* thank you for the discussion Me Sanad (talk) 23:26, 8 May 2023 (UTC)
* @Me Sanad and @Sanad real creating a new account does not solve your problems, you are actually now in a worse position and your IP might get blocked. Please go to your User talk and apologise unreservedly for your mistake and ask to be unbanned. Once that is done please join one of the mentor program so someone can help you with familiarising yourself with policies and etiquette. The way you conduct yourself here can alone get you banned. You need to start to listen. This project is not about you or your opinion, it’s a collaborative work. Stay safe FuzzyMagma (talk) 07:46, 9 May 2023 (UTC)
* ok thank you i will join your program just don't ban me please i really want to contribute to wikipedia Me Sanad (talk) 15:46, 9 May 2023 (UTC)
* and again omani bro was just my brothers account Me Sanad (talk) 15:47, 9 May 2023 (UTC)
* Don't bite the newbies Chaotic Enby (talk) 21:35, 14 May 2023 (UTC)
* @Chaotic Enby I think it’s rich to assume that!
* Within 5 edits, this account went to war, and became a socket puppeteer. Only took them 5 edits!
* See above who brought them to the talk, go to their talk and see who talk to them and they decided just not to listen although they there were at odd with couple of policies and just basic human curtesy.
* I think before coming by and throwing shade and an unsolicited advice, you should first do your due diligence. I did far more than what the policy recommended although I didn’t have too. I did not expect applauds but neither this FuzzyMagma (talk) 05:50, 15 May 2023 (UTC)
* I just saw them repeatedly trying to push a claim, which, yes, is not Wikipedia policy (or even good etiquette anywhere), but did not deserve a ban in my mind. I didn't notice the fact they switched accounts as the names were so similar, and in light of this, yes, your actions make way more sense. My bad, I apologize for misreading the situation. Chaotic Enby (talk) 06:50, 15 May 2023 (UTC)
* Thanks for that and sorry for taking your comment a little bit personally
* Anyway, this person actually had 4 accounts. And if you go to the contribution to their account it’s was very disruptive to start with
* even when they were panned (not by me), I was the one advising them on how to get unbanned and learn from this experience (see my comment above)
* I understand your sentiment (it was not easy journey for me to integrate), and I understand there is a need for editors focusing on these topics/regions but I really think I tried my best. They now have 2nd chance after 6 months, I hope they can make good use of it FuzzyMagma (talk) 09:52, 15 May 2023 (UTC)
* Sorry too for reacting without seeing the whole picture! And thanks a lot for the support you gave, I really apologize for misunderstanding what happened. Chaotic Enby (talk) 07:12, 16 May 2023 (UTC)
Can I edit
Can I please edit something real quick I just need to change the duration of the war so far from 1 month to 1 month and 1 day <IP_ADDRESS> (talk) 08:52, 16 May 2023 (UTC)
* The date template used to keep track of the duration does this automatically. Clyde H. Mapping (talk) 10:00, 16 May 2023 (UTC)
A better death toll estimate?
So, according to the artice, the death toll of the conflict is at least 1000, while the page dealing with the battle in Geneina claims that the death toll in West Darfur alone is as high as 2000. Shouldn't the former figure be updated? <IP_ADDRESS> (talk) 17:57, 17 May 2023 (UTC)
Pictures
I wonder if there are already usable non-map images for this article. It just feels different monitoring a conflict on Wiki without much pics. Borgenland (talk) 11:43, 8 May 2023 (UTC)
* Good idea. I asked people to upload their own pictures of the conflict to commons using the tag "2023 Sudan conflict" so keep an eye there .. FuzzyMagma (talk) 15:23, 8 May 2023 (UTC)
* Sounds good after I get confirmed I will add images too Me Sanad (talk) 04:28, 9 May 2023 (UTC)
* Be aware that we cannot use copyrighted images (so for example we can't use most news images) . Pincrete (talk) 04:33, 9 May 2023 (UTC)
* We definitely can use copyrighted images, as long as the images' copyright is compatible with intellectually free usage. See Commons:Commons:Licensing, e.g. The license that applies to an image or media file must be indicated clearly on the file description page using a copyright tag. It's true that most news images have copyrights that prevent them from being accepted on Wikimedia Commons. Boud (talk) 18:02, 17 May 2023 (UTC)
Russian meddling
Russia is supporting the RSF. 2A02:3030:815:CA06:1:0:3C8A:794E (talk) 17:11, 29 May 2023 (UTC)
* Already mentioned in 2023 Sudan conflict .. FuzzyMagma (talk) 18:49, 29 May 2023 (UTC)
Map
There's a few errors in the map such as RSF fully controlling Nyala and Geneina which is false, and in general the shaded areas of control. Is there any plan to correct the map? Truecope (talk) 14:59, 2 June 2023 (UTC)
* Bit late on this but the map is hosted on commons so the proper place to discuss inaccuracies about the map would be at the commons talk page here .-FusionSub (talk) 11:40, 15 June 2023 (UTC)
Change name to sudan war
At this point, the death toll appears to have climbed past 1000, which wikipedia's list of armed conflicts considers to count as a full scale war. There are several sources now referring to the conflict as a "war," such as the following:
https://www.washingtonpost.com/world/2023/05/14/sudan-war-egypt-burhan-hemedti/
https://punchng.com/things-to-know-as-sudan-war-enters-one-month/
https://www.alaskasnewssource.com/2023/05/15/alaskans-family-stuck-war-torn-sudan-humanitarian-crisis-continues/
https://www.bbc.com/news/world-africa-65525006 <IP_ADDRESS> (talk) 18:07, 16 May 2023 (UTC)
* Appreciate the cherry picking of articles, but even these sources call it Sudan conflict, see the last two items on your own list. heck! the last item says that on the title! FuzzyMagma (talk) 19:11, 16 May 2023 (UTC)
* "Things to know as Sudan war enters one month" sounds like they're calling it a war bud. I mean its right there in the title. And it's hardly cherry picked when war is a term that is being used more and more. I think you should learn what cherrypicking as a word means. <IP_ADDRESS> (talk) 20:21, 16 May 2023 (UTC)
* The BBC page calls the 2023 conflict the "Sudan conflict", just like this article does; references to "wars" in that article refer to past events. If a multitude of reliable, secondary sources start primarily using the term "war", then we can change the name. Until then, there's nothing wrong with the title "Sudan conflict" as it's accurate and well-sourced. For as long as there's any question as to whether or not "War"/"Civil war" is the best descriptor, "conflict" will remain the better title. Vanilla Wizard 💙 01:54, 17 May 2023 (UTC)
* I agree with you, I think it's time to call it a war. Here are additional fresh sources that call it an actual war
* https://www.nytimes.com/2023/05/18/world/africa/sudan-war-military-scenarios.html
* https://www.reuters.com/world/africa/air-strikes-hit-khartoums-outskirts-sudans-war-enters-sixth-week-2023-05-20/ Hesham mohamed abd el moty (talk) 10:56, 20 May 2023 (UTC)
* These are two reliable sources (although nyt is behind a paid wall) and I think we may soon need to have a move discussion as we did with previous names FuzzyMagma (talk) 11:22, 20 May 2023 (UTC)
* They are not either of them referring to war as the main descriptor within the article - "One month since Sudan’s conflict erupted" … "as fighting that has trapped civilians in a humanitarian crisis and displaced more than a million entered its sixth week". Headlines don't count and are often shorthand. The present title is sufficiently clear for a situation that doesn't have a COMMONNAME as yet. What on earth is the obsession here with giving a more 'dramatic' name?Pincrete (talk) 13:03, 20 May 2023 (UTC)
* Wouldn’t a conflict be agression towards different militaries and a war being between formal entities? Technically, the Sudan conflict can be equated to an insurgency among a military? I see the conflict as fighting, and these militaries having control of areas, not governing them? Despite the talk, a war is a type of conflict? The Crisis in Darfur wouldn’t be considered a war. Degesh000 (talk) 01:18, 7 June 2023 (UTC)
* Not necessarily, civil wars for example are not always "between formal entities" . But from our point of view, we only call it a war when the majority of sources are doing so - when it becomes the WP:COMMONNAME. Pincrete (talk) 05:16, 7 June 2023 (UTC)
* so the Sudan crisis remains a conflict, as sources he had shown are cherry picked.
* Should we also take into account the importance of the source that states whether it is a war or a conflict, rather than majority first. Degesh000 (talk) 13:13, 7 June 2023 (UTC)
* WITHIN the text both quality and quantity of sources are in favour of the neutral 'conflict'. Headlines don't really count for various reasons and sources are not calling it the "ABCXYZ War as yet - ie a full title. That is normal, it takes a while for sources to see that the event has gone on long enough to need a title and for them to then settle on such a title. If it continues, is it going to be known as a war or a civil war or something else? We don't invent titles for historical events simply because sources haven't yet settled on one. Pincrete (talk) 16:48, 7 June 2023 (UTC)
* Therefore, it should remain a conflict. Degesh000 (talk) 20:13, 7 June 2023 (UTC)
The crisis in Sudan is no longer confined to a specific area, as was the case at the beginning of the confrontation between the Sudanese Army and the Rapid Support Forces; but has spread to wider geographical areas and has not been resolved in favor of either party. It is better to call it 2023 Sudan clashes because it describe the current situation because it has passed the crisis stage. Mr. JamesDimsey (talk) 14:22, 20 June 2023 (UTC)
* Better how? Better why? Is that what the majority of sources are calling it? IMO 'clashes' is vague. Pincrete (talk) 16:04, 20 June 2023 (UTC)
* Most sources say Sudanese conflict, and I've seen some that say that assert that it is not a civil war yet. <IP_ADDRESS> (talk) 18:29, 20 June 2023 (UTC)
Wagner Group involved
US treasury department asserts that Wagner Group has been suppling RSF with surface-to-air missile to fight Sudan's army. In light of these news it's best to reinstate Russia under combatants of RSF. Ecrusized (talk) 20:23, 25 May 2023 (UTC)
* @Ecrusized added to the appropriate section first then please. And I’m airing on the side of leaving the infobox as it is. @Pincrete might also agree with that FuzzyMagma (talk) 20:29, 25 May 2023 (UTC)
* This isn't a ballot box, if reliable sources states that a country is providing arms to belligerents in an active conflict, users voting cannot prevent it from being included in the article infobox. Ecrusized (talk) 20:46, 25 May 2023 (UTC)
* Firstly, supplying with weapons doesn't make one a combatant, only those actually fighting are combatants. Secondly this source says nothing new: "Most recently in Sudan, the Wagner Group has been supplying Sudan’s Rapid Support Forces with surface-to-air missiles to fight against Sudan’s army, contributing to a prolonged armed conflict that only results in further chaos in the region." When is 'recently'? The most this proves is that (at some time recently), Wagner has sold SAM's to RSF, which we already record. Almost all weaponry in Sudan has been supplied by outside countries/suppliers - as Sudan does not produce arms . Whether - and how far - such supplying goes beyond purely commercial transactions isn't clear. I still think that while Wagner's (possible) involvement is properly rendered in text, it would be WP:OR and WP:SYNTH to put anything in the infobox as to the exact nature of their involvement. Pincrete (talk) 05:14, 26 May 2023 (UTC)
* However, technically the Wagner Group is a private military, and two, supplying does not mean the wagner group or Russia is fighting the war. Me funding the SAF does not mean that I am a combatant. It should however, be mentioned of Wagner Group's role in the Sudanese conflict <IP_ADDRESS> (talk) 18:28, 20 June 2023 (UTC)
* It’s mentioned 2023 Sudan conflict FuzzyMagma (talk) 20:17, 20 June 2023 (UTC)
Why is this not being classified as a civil war?
It’s basically the textbook definition 2601:148:380:330:D0AC:B8D3:7577:3D92 (talk) 13:33, 26 June 2023 (UTC)
* Because sources are not (yet?) calling it a civil war in the main. Often the term is reserved for more extended conflicts, but we don't decide whether it has met our - or anyone else's - definition, sources do. Pincrete (talk) 18:43, 26 June 2023 (UTC)
SPLM-N
I added the SPLM-N on the infobox but there are some objections so feel free to discuss what should be done here. Borgenland (talk) 04:56, 27 June 2023 (UTC)
* Although the sources speak mainly of the army accusing them, and this being referred to in one source as " a faction of the … SPLM-N", I think the sourcing is just about strong enough to be included in infobox (and the main text expands the claim). Where you have placed them is also IMO correct, since they appear at the moment to be a third party taking advantage of the instability, rather than being allied to either main faction. Pincrete (talk) 05:34, 27 June 2023 (UTC)
* Thanks! I just hope the map editors get a hold of this since I don't have any idea how to handle Wikimedia Commons. Borgenland (talk) 06:11, 27 June 2023 (UTC)
* @Borgenland putting SPLM on RSF side is a pure WP:OR FuzzyMagma (talk) 18:40, 27 June 2023 (UTC)
* This is similar to what we had with Ethiopian and Egyptian involvement. I don’t think It’s “substantial” to warrant an infobox mention. FuzzyMagma (talk) 18:42, 27 June 2023 (UTC)
* I did put a separate column for it. The edit you removed was made by another user. As regards to merits I believe it holds weight since this was not a one-off incident, unlike Ethiopia Borgenland (talk) 18:44, 27 June 2023 (UTC)
* @Borgenland the article does not say that it “was not a one-off incident”. If you can fix that please FuzzyMagma (talk) 18:46, 27 June 2023 (UTC)
* Just to clarify, only the 21 June attack is mentioned FuzzyMagma (talk) 18:47, 27 June 2023 (UTC)
* Ignore this. I see your point about multiple incidents on the same day and south of the country FuzzyMagma (talk) 18:49, 27 June 2023 (UTC)
* Since you reverted my edit <
can you please change south Sudan to South Kordofan, as these are not the same. And remove the refs from the lead as per MOS:LEDE FuzzyMagma (talk) 18:44, 27 June 2023 (UTC)
Conflict or war?
Why is this still considered a "conflict"? Seems like a "war" to me. 2600:6C5C:6C7F:5E53:7477:DE4E:9DF5:981A (talk) 00:47, 11 July 2023 (UTC)
* Because sources are not (yet?) calling it a war in the main. Often the term is reserved for more extended conflicts, but we don't decide whether it has met our - or anyone else's - definition, sources do and when they do they will give it a name. Pincrete (talk) 05:54, 11 July 2023 (UTC)
* A handful of sources are already calling it a war, including the New York Times:, , , 2600:6C5C:6C7F:5E53:7477:DE4E:9DF5:981A (talk) 13:16, 12 July 2023 (UTC)
* Some of those are only using the word 'war' in the headlines, thereafter 'fighting', 'conflict' etc. Headlines don't really count for our purposes. None has really settled on a name for this 'war', so we'd be inventing a name for it. Even with NYT, uses a variety of nouns to describe the conflict. Pincrete (talk) 16:22, 12 July 2023 (UTC)
Genocide?
The are reports that the fighting in Darfur is becoming another genocide. Do any of you believe that it deserves an article of its own at this point? Borgenland (talk) 06:28, 23 June 2023 (UTC)
* Give me some sources (as I couldn’t find any, only Khamis Abakar claimed that) and I will add other battles and to the RSF section about human right violations and the Darfur war. FuzzyMagma (talk) 07:03, 26 June 2023 (UTC)
* There has been an investigation by the ICC. No word of Genocide yet but they're focusing on Darfur. I might need help on renaming the section title though since it's a bit clumsy. Borgenland (talk) 17:57, 14 July 2023 (UTC)
What should be included in the infobox
Please read Manual of Style/Infoboxes before adding information to the infobox that is not first included in the article and established as a key fact FuzzyMagma (talk) 06:59, 26 June 2023 (UTC)
* Unfortunately, people who add disputed stuff to the infobox, don't usually read 'talk', but I wholeheartedly endorse the sentiment! Pincrete (talk) 11:46, 26 June 2023 (UTC)
* How do you middle align the casualties section? I had to refix it since someone had the bright idea of erasing the SPLM. Borgenland (talk) 18:01, 14 July 2023 (UTC)
Casualties
The Casualties chapter is becoming outdated with respect to the location breakdown of Sudanese casualties with the exception of Darfur. I believe that it is time to rearrange and if necessary trim that part which I will start later. Borgenland (talk) 18:11, 14 July 2023 (UTC)
Map
See this map I saw on a news site. Also posting this on Commons discussion: https://www.dabangasudan.org/en/all-news/article/more-people-killed-in-battles-in-el-obeid-and-sudan-capital Borgenland (talk) 14:46, 21 July 2023 (UTC)
Semi-protected edit request on 21 July 2023
Change "On 13 July, Egypt hosted a summit in Cairo, wherein the SAF, the RSF and leaders of Sudan's neighboring states agreed to a agreed to a new initiative to resolve the conflict." to "On 13 July, Egypt hosted a summit in Cairo, wherein the SAF, the RSF and leaders of Sudan's neighboring states agreed to a new initiative to resolve the conflict." Bigpoobles (talk) 17:44, 21 July 2023 (UTC)
* ✅ Thanks. Deauthorized. (talk) 19:41, 21 July 2023 (UTC)
Map colors
As someone who's red-green colorblind, this might be one of the worst maps I've seen. Why can't more unique colors be used instead? <IP_ADDRESS> (talk) 08:48, 27 July 2023 (UTC)
* you should post this on the file's talk page Abo Yemen ✉ 19:13, 5 August 2023 (UTC)
Move request
I think it's now time to call it a civil war, many sources are now calling this a civil war, theres also now 3 belligrants and it surpassed 10k of deaths
Change from "2023 Sudan Conflict" to "Third Sudanese Civil War" Lucasmota0975 (talk) 23:40, 31 July 2023 (UTC)
* Strong oppose Even if some sources are calling it a civil war some of the time, no source is calling it the Third, Fourth or Nth civil War any of the time. The proposed name is OR and neither COMMONNAME nor recognisable. Neither the number of deaths, nor of belligerents has any bearing on whether 'civil war' nor Nth civil War is the apt title.Pincrete (talk) 07:26, 1 August 2023 (UTC)
* Strong oppose per Pincrete + the nom doesn’t reference any policy or even include references or sources to where it’s been called the “Third Sudanese Civil War”.
* PS: Sorry to say this as I am feeling like I am kinda breaching Wikipedia policy on articles ownership, but it feels like some people just read a few articles and come here to recommend a change in the title nevertheless. Do these people think that editors, who build and maintain this page, don’t actually read how the sources describe this event?! FuzzyMagma (talk) 09:10, 1 August 2023 (UTC)
* Strong oppose, I wouldn't be opposed to a Sudanese Civil War (2023-present) title or 2023 Sudanese Civil War or something similar, but no one is calling it the Third Sudanese Civil War. In addition I've also seen many sources talk about the risk of the conflict becoming a civil war, rather than the conflict being a civil war itself, so a name change to "civil war" may still not be warranted anyways - presidentofyes, the super aussa man 16:23, 1 August 2023 (UTC)
* Support - this is obviously now a protracted civil war, and sources are referring to it as such.XavierGreen (talk) 15:03, 16 August 2023 (UTC)
* But not even a single source is calling it the Third (or fourth or nth) Sudanese Civil War Pincrete (talk) 17:45, 16 August 2023 (UTC)
2023 Sudan Civil War
With over 10,000 deaths and numerous WP:RS calling it a civil war at this point, it unfortunately is one and thus should be classified as the 2023-Present Sudanese Civil War,. Seeking consensus for name change to 2023-Present Sudanese Civil War (or a similar title). Dilbaggg (talk) 13:24, 27 July 2023 (UTC)
Maybe the Fourth Sudanese Civil War will do. Dilbaggg (talk) 13:27, 27 July 2023 (UTC)
* The number of deaths isn't relevant - it's WP:COMMONNAME - ie what the majority of sources and therefore readers are calling this event. The only mention (apart from a headline) in either article of 'war/civil war' is "The United Nations has warned that Sudan could be on the verge of all-out-war"and " UNHCR meanwhile has warned that an "all-out civil war" could lead to the "destabilization" of the region". No one calls it the "Fourth Sudanese Civil War", so no reader would recognise the name. Just about every martial word is being used at present, sometimes 'war', sometimes 'fighting', sometimes 'conflict'. IMO the present title is clear and will suffice until a generally used name evolves. Pincrete (talk) 15:13, 27 July 2023 (UTC)
* These sources, , , hope you know how to click the 4, 5, 6 and read the sources . These are just three of many sources that have already called in a civil War. Conflict in Sudan has been going on since the 1960s, there were already three previous civil war and per WP:RS unfortunately a fourth has begun! Dilbaggg (talk) 06:21, 28 July 2023 (UTC)
* This started as a small anti-coup protests which begun being larger and after WP:RS considered it Myanmar civil war (2021–present) it has been named as such, the same should go for Sudan! Dilbaggg (talk) 06:24, 28 July 2023 (UTC)
* Anyways just at least see the three of many sources:, , Dilbaggg (talk) 07:09, 28 July 2023 (UTC)
* I saw them and does not affect Pincrete point, i.e., what the majority of sources and therefore readers are calling this event? and it is really does not support your point of calling it the "Sudan civil was (2023-present)" .. please stop using provocative language as hope you know how to click, what that suppose to mean?! FuzzyMagma (talk) 19:08, 28 July 2023 (UTC)
* sources 4 & 5 - (DW & CNN), as I've already said, above refer to the UN/UNHCR warnings of what this might lead to when they speak of 'civil war', they aren't using it to describe the present situation. I can't read TES ($£). But nobody anywhere is calling it the Fourth Sudanese Civil War and we don't name articles based on our own assessment of what the event logically should be called - which is what you are proposing. You are welcome to start a move discussion to a 'stronger' term if you wish, but you cannot make up names for a conflict/war/fighting, especially when it risks being less recognisable to the potential reader. Because there is no clear established 'name' at present, we are left with coming up with the most recognisable description of the current events. Just about every martial word is being used at present is sources, sometimes 'war', sometimes 'fighting', sometimes 'conflict' - ocassionally 'civil war', never AFAI can see "Nth Sudanese Civil war". I don't know about the Myanmar events, but maybe sources have settled on a name for what has happened there - IMO they haven't yet iro Sudan. Pincrete (talk) 07:27, 28 July 2023 (UTC)
* NB
* You've posted the DW and CNN three times now and the TES one twice - the first two STILL don't call it a civil war and no one calls it the "Nth Sudanese Civil war".Pincrete (talk) 07:32, 28 July 2023 (UTC)
* The 2021 Myanmar Conflict was gradually changed to Civil War as WP:RS started emerging, i am sure the same would be the case here, there are already many WP:RS that calls it a Civil War and it would be named as such. Perhaps 2023 - Present Sudanese Civil War, just like the current title 2023 Sudan Conflict has been "infered" rather than plagarised from the WP:RSs, lets wait and see but if more Wp:RSs emerges calling it a civil war it would have to be named as such, its not something i hope would happen but unfortunately it may go that way. Dilbaggg (talk) 09:35, 28 July 2023 (UTC)
* If we were to do that, then I suggest we call it Third Sudanese Civil War. WikipedianRevolutionary (talk) 18:39, 28 July 2023 (UTC)
* @WikipedianRevolutionary I 100% agree. Also here is yet another source calling it a Civil war: and there are more emerging. Dilbaggg (talk) 05:42, 29 July 2023 (UTC)
* The headline in AA calls it a civil war, within the article it consistently uses 'conflict'. There have been a few others like that already.Pincrete (talk) 06:39, 29 July 2023 (UTC)
* Why do many RS still not refer to it as a civil war? What does it possibly lack to fit its definition? Are some saying that it's a low-intensity conflict? Jim 2 Michael (talk) 16:37, 1 August 2023 (UTC)
* https://www.cnn.com/2023/08/16/africa/sudan-one-million-flee-un-intl/index.html
* We have a CNN article now refereing to what is going on in sudan as a civil war. Honestly it was only a matter of time, but this page really needs to be updated to fit the current situation. We have multiple news arricles calling it a war, we have over 3,000 people dead in a four month old conflict, so why is this still being referred to as the "2023 sudan conflict"? That really seems to minimize what is actually going on in the country. I think it is more than fair at this point to call this the third sudanese civil war, and if some are still not comfortable calling a spade a spade, I would ask that this page at least be renamed the "2023 sudan war," instead of the "sudan conflict." What is going on in sudan is a war plain and simple. We all know that, and so do major news networks. 2602:306:CD04:62F0:FB99:21D9:B3F8:773B (talk) 17:31, 16 August 2023 (UTC)
* The severity of the fighting has no effect on whether WE call it a civil war and NO sources are calling it the Third Sudanese Civil War. Not one! Pincrete (talk) 17:48, 16 August 2023 (UTC)
* we have multiple sources calling it a war at this point. I told you before, it makes plenty of sense to just call it the 2023 Sudan War at this point. Exactly how long are we supposed to wait to change the name? Till everyone calls it the sudan war? So in a year if 99% of sources call it the sudan war but one article says "Sudan's fighting" or "sudan's conflict," is a conflict with tens of thousands of dead people still gonna be called "a conflict"?
* Also you're not entirely correct about "not one" source calling it the third Sudanese civil war. In a strict sense that is true, but I just listed a source that called it "Sudan's civil war," and seeing as they had two others already, that implies it is the third one. 2602:306:CD04:62F0:61A0:A9E3:6380:9363 (talk) 16:02, 17 August 2023 (UTC)
* And yet all you can dump for this discussion page is just one link. Borgenland (talk) 16:07, 17 August 2023 (UTC)
* Furthermore, in no part of the UN report cited by CNN was the word civil war mentioned. Only a clickbait headline by CNN and an assumption by the same news org. Borgenland (talk) 16:11, 17 August 2023 (UTC)
* https://reliefweb.int/report/sudan/sudan-situation-unhcr-external-update-22-8-14-august-2023 Borgenland (talk) 16:11, 17 August 2023 (UTC)
* I just listed a source that called it "Sudan's civil war," and seeing as they had two others already, that implies it is the third one. That's what we call WP:OR, if the sources thought that this was the Third Sudanese Civil War, they can probably count as well as you and would be calling it that by now.
* It isn't un-common for a clear name to take a while to become established for an event, but we follow, not lead that process. Pincrete (talk) 16:28, 17 August 2023 (UTC)
I think it should be called the third or fourth Sudanese civil war I like third better though.
I heard some people call the aftermath of the second Sudanese civil war the third but I think it could also refer to this or you could call it the fourth but I think third is better I want to see what people think. HuntersHistory (talk) 23:09, 17 August 2023 (UTC)
* You could also just call it like the 2023 Sudanese civil war. HuntersHistory (talk) 23:11, 17 August 2023 (UTC)
* It is not the job of the editors to arbitrarily impose a name for this conflict. We only follow what the consensus of sources, once properly read beyond the headlines, say. See the prior discussions. Borgenland (talk) 01:16, 18 August 2023 (UTC)
Semi-protected edit request on 18 August 2023
{ { félig védett szerkesztés | | válaszolt= nem } } { { subst:trim | 1 = Harmadik Szudánipolgárháború . )
}} <IP_ADDRESS> (talk) 05:23, 18 August 2023 (UTC)
* This is English Wikipedia, not Magyar. Please submit your request in appropriate language. Borgenland (talk) 05:35, 18 August 2023 (UTC)
Semi-protected edit request on 18 August 2023 (3)
--Totz matez (talk) 05:50, 18 August 2023 (UTC) Totz matez (talk) 05:50, 18 August 2023 (UTC)
* See multiple prior discussions - no one is calling this event the "Third (nor fourth, fifth or nth) Sudanese civil war". Pincrete (talk) 05:56, 18 August 2023 (UTC)
Move Request from "2023 Sudan Conflict" to "War in Sudan (2023)" or "Sudan War (2023)"
Due to major news organizations calling it a war. This includes: Reuters, AP, Washington Post, France 24, and many others. Also the amount of casualities and refugees exceed "conflict" level. CatmanBw (talk) 06:54, 1 September 2023 (UTC)
* misplaced at Special:Permalink/1173250155 – robertsky (talk) 07:38, 1 September 2023 (UTC)
* Section title modified by <IP_ADDRESS> to add "Sudan War (2023)" CMD (talk) 15:17, 1 September 2023 (UTC)
* I'd like to point out that Burhan himself calls it a war. Make what you will of it. <IP_ADDRESS> (talk) 02:34, 2 September 2023 (UTC)
* If nobody is opposed to this move and nobody presents evidence contrary to the move, I am gonna be making the move soon. If anyone is opposed to the move, then now is the time to say your opinion. CatmanBw (talk) 00:25, 3 September 2023 (UTC)
* @CatmanBw, I have reverted your move. You had tried to move to 2023 Sudan War, and that was reverted immediately by @Borgenland with rationale of 'reverting undiscussed move'. You then now move it to, a similar name without establishing the necessary consensus with a proper requested move discussion that would see the move banner up on the article effectively making aware to all interested editors, as well as be listed at WP:RMC for the editors monitoring move requests. Do open a proper requested move discussion to establish the consensus. See the steps at WP:PCM. – robertsky (talk) 02:55, 3 September 2023 (UTC)
* Wikipedia also encourages editors to be bold in fixing obvious mistakes. I will go through the step later since it is now been contested, but just so you know, by reverting to this outdated title with no actual reason other than technicality, you are blocking valuable up-to-date information from reaching readers. You are also preventing Wikipedia from being as up-to-date as possible, and you are wasting the community's valuable resources by delaying the inevitable (which is the renaming of this article, and it will 100% be renamed in the near future). CatmanBw (talk) 03:12, 3 September 2023 (UTC)
* May you be warned that WP:CRYSTALBALL and WP:OR. Such threats and accusations are unbecoming and unprofessional of editors in this community. Borgenland (talk) 03:36, 3 September 2023 (UTC)
* There was no threats anywhere in the comment. Where did you get this accusation from? I think you are the one presenting accusations here. WP:CRYSTALBALL refers to events that may happen. The event we are discussing here has already happened and it is in the past already. In addition, there is no original research here....the event has already happened according to the major international news organizations that I already mentioned. CatmanBw (talk) 03:41, 3 September 2023 (UTC)
* To accuse others of Bad faith actions like blocking info, wasting resources and assuming 100% inevitabilities? That is quite speculative. Borgenland (talk) 03:43, 3 September 2023 (UTC)
* I reviewed your refs and found only one supporting you assertions of war. out of several. Borgenland (talk) 03:44, 3 September 2023 (UTC)
* I didn't accuse anyone of bad faith. I have no doubt that the revert had good faith in mind. But I also think it's a waste of resources; one doesn't cancel the other out. CatmanBw (talk) 03:47, 3 September 2023 (UTC)
* It would be incredibly helpful to put the links to the articles/sites you have mentioned.
* amount of casualities and refugees exceed "conflict" level this is either original reporting or there should be a source backing this statement up as it can be seen as contentious to some.
* – robertsky (talk) 03:45, 3 September 2023 (UTC)
* @User:CatmanBw I remember you did post the links prior to the move of the talk page. Could you send them again here so others can evaluate it too? Borgenland (talk) 03:49, 3 September 2023 (UTC)
* Here you go:
* Reuters: https://www.reuters.com/world/africa/sudans-burhan-heads-egypt-meet-president-sisi-statement-2023-08-29/
* AP: https://apnews.com/article/sudan-war-military-rsf-egypt-da846603cfefaacb355d61fcddd446b0
* CNN: https://www.cnn.com/2023/08/16/africa/sudan-one-million-flee-un-intl/index.html
* France 24: https://www.france24.com/en/africa/20230829-sudan-military-ruler-promises-victory-refuses-peace-deal-with-traitors
* Washington Post: https://www.washingtonpost.com/world/2023/08/30/sudan-civil-war-atrocities-abuse/
* VOA: https://www.voanews.com/a/after-4-months-sudan-war-stalemated-plagued-by-abuses/7220806.html
* Al Jazeera: https://www.aljazeera.com/news/2023/6/15/sudans-war-after-two-months-what-you-need-to-know CatmanBw (talk) 03:56, 3 September 2023 (UTC)
* I have added the references. Also, "amount of causalities and refugees exceed conflict level" is not original research or speculation. It is according to Wikipedia's guidelines where an armed conflict with more than 1000 people killed is considered a war, and an armed conflict with more than 10000 deaths is considered a major war. Sudan's war is now at 4000-10000 deaths according to this Wikipedia article. You can see this criteria for classifying armed conflicts at List of ongoing armed conflicts. CatmanBw (talk) 04:14, 3 September 2023 (UTC)
* As per the rules, Wikipedia itself cannot be directly considered as a citation, but I see the points raised in the citations in that article. Borgenland (talk) 04:18, 3 September 2023 (UTC)
* Yup. So what I was trying to say is: I made the move with the backing of the evidence I had presented in this discussion so far. My opinion is that at this point, the title of the article is obviously outdated. I have made the bold move based on exactly that. CatmanBw (talk) 04:22, 3 September 2023 (UTC)
* Ok. Just directly cite the exact source for future incidents of this kind. Borgenland (talk) 05:49, 3 September 2023 (UTC)
* And if any renaming of a contentious topic that precludes a WP:BOLD will happen, it will only be when the community makes a discussion and not someone’s own whims. Borgenland (talk) 03:41, 3 September 2023 (UTC)
* You see it as a waste of community resources, I see it as establishing a new consensus that puts to rest arguments of where the article should be titled, especially when there have been numerous prior discussions about moving the article, be it formal RM requests or informally like this. – robertsky (talk) 03:40, 3 September 2023 (UTC)
* The numerous prior move requests happened under completely different circumstances where the renaming of the article was rightfully contested. I see no potential for contesting the renaming of the article now if it was to be broadly discussed. CatmanBw (talk) 03:44, 3 September 2023 (UTC)
* Would like to note that this "discussion" was closed after less than two days being open, with no requestedmove tag placed in the article or posted at requested moves. Seems like a quick move given the contentious move requests this article has had recently. Yeoutie (talk) 02:46, 3 September 2023 (UTC)
* Personally, I agree with this. At this point its clearly not a conflict, but its a war. Lukt64 (talk) 03:46, 3 September 2023 (UTC)
Numbers
Please also update the refugee and casualty numbers in the body, not just in the infobox and introduction to ensure that this article is always up to date. Borgenland (talk) 16:52, 3 September 2023 (UTC)
Requested move 3 September 2023
The result of the move request was: Moved to War in Sudan (2023). This appears to be the title supported by the majority of editors. There was also some support for inclusion of "civil war" in the title. However based on other similar move discussions I'm aware of, the description of a conflict as a "civil war" is something we don't generally do without (several) sources. Reading through this discussion, I see no sources provided to describe this (in its current state) as a civil war. If any editor can provide sources to support the inclusion of "civil war", I would encourage a separate move discussion for simplicity's sake estar8806 (talk) ★ 02:45, 14 September 2023 (UTC)
2023 Sudan conflict → 2023 Sudan war – As raised by, recent reporting by major international news organisations are moving to reporting this issue as a war rather than just a conflict. Aljazeera, VOA, Washington Post, France24, CNN, AP, Reuters. Indepedently searching for news using 'Sudan conflict' shows further reporting as 'war' or a mix of both: Aljazeera 2, France24 2, both of which are more recent articles. – robertsky (talk) 04:22, 3 September 2023 (UTC)
* Thank you for for considering my point of view. CatmanBw (talk) 04:24, 3 September 2023 (UTC)
* Alternate proposed titles are:
* War in Sudan (2023)
* Sudan War (2023)
* – robertsky (talk) 04:26, 3 September 2023 (UTC)
* Support: I have already presented my argument in the discussions above under: Move Request from "2023 Sudan Conflict" to "War in Sudan (2023)" or "Sudan War (2023)". The title that I would personally choose is: War in Sudan (2023)
* However, I am willing to compromise as long as the title indicates that this armed conflict is now a war. CatmanBw (talk) 05:31, 3 September 2023 (UTC)
* I oppose any name that has a 2023 in parenthesis. It feels a bit clunky unless the war reaches next year. Otherwise I won't mind but I prefer 2023 comes first in any title. Borgenland (talk) Borgenland (talk) 05:48, 3 September 2023 (UTC)
* That's only to distinguish it from the other Sudanese Wars CatmanBw (talk) 05:56, 3 September 2023 (UTC)
* Update: Nevermind, I just read your updated comment. CatmanBw (talk) 06:00, 3 September 2023 (UTC)
* A reason why I am reluctant to call it Sudan War and went with Sudan war is that there isn't strong evidence in it being a proper noun in the news content body. – robertsky (talk) 06:22, 3 September 2023 (UTC)
* That's fair. CatmanBw (talk) 06:26, 3 September 2023 (UTC)
* Support: I too would personally choose War in Sudan (2023). Kind regards, IrrationalBeing (talk) 11:04, 3 September 2023 (UTC)
* If you think this is about your personal choice, then you’re definitely missing the point FuzzyMagma (talk) 21:49, 3 September 2023 (UTC)
* I think he meant to say that he would choose that title based on the evidence presented here. CatmanBw (talk) 21:56, 3 September 2023 (UTC)
* No they didn’t. They said “would personally choose” .. not whatever twist you’re trying to imply. FuzzyMagma (talk) 23:45, 3 September 2023 (UTC)
* What they say and what they mean aren't always the same thing. We can assume that the person has read the evidence presented here. CatmanBw (talk) 00:06, 4 September 2023 (UTC)
* Nice to meet you “mind reader”. Unless this account is yours, then please stop. They can answer for themselves and explain what they mean, if they want. FuzzyMagma (talk) 09:51, 4 September 2023 (UTC)
* I am not a mind reader but it's highly likely that the person who commented have seen the list of sources that was posted since they commented under it. Anyways, you can have it your way. I won't be replying to anymore of your comments. CatmanBw (talk) 09:56, 4 September 2023 (UTC)
* Hi, thanks CatmanBw for explaining what I meant. Regards, IrrationalBeing (talk) 12:02, 5 September 2023 (UTC)
* No problem. You're welcome. CatmanBw (talk) 16:35, 5 September 2023 (UTC)
* Support. War in Sudan (2023) solves the issue of war in the title while staying under WP:COMMONNAME. Jebiguess (talk) 18:13, 11 September 2023 (UTC)
* Support move to "2023 Sudanese civil war" or "Sudanese civil war (2023)" - It's a civil war, not just a simple war.
* <IP_ADDRESS> (talk) 15:35, 3 September 2023 (UTC)
* Note: Please don't just give alternatives without supporting evidence that the event is being referred as such in recent sources. – robertsky (talk) 15:53, 3 September 2023 (UTC)
* 1.
* 2. <IP_ADDRESS> (talk) 17:58, 3 September 2023 (UTC)
* This is already discussed and failed to pass so either go up and reactivate the discussion or start a new one. FuzzyMagma (talk) 21:48, 3 September 2023 (UTC)
* Weak support to “2023 Sudan war” .. weak because some sources call it a conflict e.g., BBC (consistently using “Sudan conflict”), Aljazeera, France24, and Arab News. PS: For others who wants to suggest a different name, kindly do it somewhere else so not to clutter this discussion FuzzyMagma (talk) 21:41, 3 September 2023 (UTC)
* Here is an article from The Guardian that was published today calling it a war also:(The Guardian) CatmanBw (talk) 21:54, 3 September 2023 (UTC)
* Also, here is an article from the BBC calling it a war: (BBC) Quote from the article beyond the headlines: "Some reports say this is the most intense fighting since the beginning of the war in April." CatmanBw (talk) 22:00, 3 September 2023 (UTC)
* It doesn’t. See the title as we are discussing how the fighting is named. If that is your criteria then the article should be “Sudan fighting” FuzzyMagma (talk) 23:39, 3 September 2023 (UTC)
* We have to read beyond the headlines to figure out names for events. We can't rely on the headlines alone. I thought that was known already. CatmanBw (talk) 23:53, 3 September 2023 (UTC)
* By “figure out names” you mean OR? Because we are trying to establish what it’s called. Title is one of the important aspects of how events are called. When you google something you use the “succinct” terms that describes the event. You don’t type “event where millions of jewish people were killed during WW II”, you type “the holocaust”, you don’t type “Sudan fighting that broke in April 2023” you type what you see as a succinct way to describe an event that is normally used by media, wether that is Sudan conflict, fight, civil war or war is why we are discussing this not because how you lift a paragraph from an article. I am glad you didn’t make the nom for this discussion nom because it would have failed immediately FuzzyMagma (talk) 09:40, 4 September 2023 (UTC)
* I'm not quite sure I understand what you mean. Anyways, I am not interested in arguing for the sake of argument. Since you already stated that you support describing the event as "2023 Sudan war", I think it's pointless to keep discussing this. I was just hoping to give you more evidence on why it's the right decision since you only weakly support the move. CatmanBw (talk) 09:51, 4 September 2023 (UTC)
* Just to reiterate, this source says Since fighting broke out between the regular army and.. FuzzyMagma (talk) 23:41, 3 September 2023 (UTC)
* Read the BBC article carefully. It calls the event a war in this quote: "Some reports say this is the most intense fighting since the beginning of the war in April." CatmanBw (talk) 23:55, 3 September 2023 (UTC)
* Since you are still in doubt, I'm gonna present another reliable international news organization that is calling this event a war. Here is an article from DW: https://www.dw.com/en/no-hope-for-peace-as-war-in-sudan-intensifies/a-66203520 CatmanBw (talk) 00:14, 4 September 2023 (UTC)
* Support War in Sudan (2023). I would’ve preferred “Sudanese civil war (2023)” but all sources are currently calling this a war, rather than a civil war. <IP_ADDRESS> (talk) 22:52, 4 September 2023 (UTC)
* Support Third Sudanese Civil War, the death toll is escalating rapidly, I see no reason why we should not do it. DementiaGaming (talk) 22:43, 6 September 2023 (UTC)
* Support War in Sudan (2023) - Originally I supported a change to Sudanese civil war (2023), but sources do not define it as a "civil war", just a "war". Also, I haven't seen anybody calling the war "Sudan war", so I guess "War in Sudan (2023) is the best choice.
* UkraineFella (talk) 14:18, 7 September 2023 (UTC)
Support Sudanese Civil War, widely being called a civil war on msm recently. Ecrusized (talk) 20:08, 4 September 2023 (UTC)
* Support "Sudan War (2023)"—the majority of online sources classify it simply as a "war" rather than a civil one. Since Wikipedia's primary purpose is to follow the general consensus of other newspapers and journals, it's easier to make the argument of "Sudan War" rather than "Third Sudanese Civil War" or "Sudanese Civil War (2023)." Sources include: NYT, WP, DW. Until there are more sources calling this a full-blown Civil War, best keep it simply as Sudan War. - MateoFrayo (talk) 15:20, 8 September 2023 (UTC)
* Most sources do not capitalize war, per MOS:CAPS. UkraineFella (talk) 16:27, 9 September 2023 (UTC)
* You're correct, and "Sudan war (2023)" works just as well—my main point is that we need to note that this has gone from a "conflict" stage to a "war" stage. - MateoFrayo (talk) 17:33, 9 September 2023 (UTC)
* Support a move to War in Sudan (2023). A lot of sources are calling this a war now instead of just a conflict, so it makes sense to call it that. XTheBedrockX (talk) 18:46, 9 September 2023 (UTC)
* Mild Support. I think we should be patient. -CaeserKaiser (talk) 15:11, 13 September 2023 (UTC)
* Support some form of "civil war" title as it is a civil war GLORIOUSEXISTENCE (talk) 02:34, 14 September 2023 (UTC)
Unclassified incident
In an article on looting (https://www.bbc.com/news/world-africa-66637454) residents of Omdurman mention an undated fire at a perfume factory killing 120 people while it was being looted during the conflict. As this is a mass casualty incident, I'd like to add this but am not sure to which section. Any suggestions? Borgenland (talk) 08:15, 14 September 2023 (UTC)
Move
The paged wasn’t moved to War in Sudan (2023) at all. UkraineFella (talk) 09:07, 14 September 2023 (UTC)
* @UkraineFella The page can only be moved by an administrator, hence the delay in the page move until an administrator swings by. The page has since been moved after a WP:RM/TR request was filed to have an administrator to look into this. – robertsky (talk) 16:58, 14 September 2023 (UTC)
* Just finished moving associated pages. But I think I ran into a redirect error after moving the template campaign box. Borgenland (talk) 17:29, 14 September 2023 (UTC)
* What error? I may be of help on this. – robertsky (talk) 17:31, 14 September 2023 (UTC)
* I was trying to edit the campaign box in the main page since the box title doesn't wikilink and when I tried to edit it the code merely said redirect. Borgenland (talk) 17:33, 14 September 2023 (UTC)
* And it seems I have two sets of templates on my watchlist called Template:War in Sudan (2023) and Template:Campaignbox War in Sudan. Borgenland (talk) 17:35, 14 September 2023 (UTC)
* I have fixed the issue at Template:Campaignbox War in Sudan (2023). – robertsky (talk) 18:02, 14 September 2023 (UTC)
* Also, I think that articles should be move to "X in the war in Sudan (2023)" or "X in the 2023 war in Sudan" (WP:NATDAB), given that sources do not called the war as the War. – robertsky (talk) 17:41, 14 September 2023 (UTC)
* Basically did the same thing in the Timeline and humanitarian crisis page. Not sure if I missed anything else. Borgenland (talk) 17:44, 14 September 2023 (UTC)
* Alright. UkraineFella (talk) 04:18, 15 September 2023 (UTC)
add Sudan Liberation Movement - Nur to the map
https://sudantribune.com/article277603/ Lukt64 (talk) 15:28, 25 September 2023 (UTC)
Semi-protected edit request on 25 September 2023
under foreign involvement–ukraine, 'where behind' should be changed to 'were behind'. Tsukayamaj (talk) 19:49, 25 September 2023 (UTC)
* ✅ FuzzyMagma (talk) 21:06, 25 September 2023 (UTC)
Sudan Tribune archival blocked?
There's something odd about the Sudan Tribune references. Most (if not all) are marked as permanent dead links, but when I click through them they seem to work. I tried using a USA proxy site, that worked too. However, the wayback machine/archival website doesn't seem to be capable of viewing or saving them properly, claiming it's been blocked. I'm not sure how to fix this, but I thought it'd be something prudent to point out if it hasn't been already. Silverleaf81 (talk) 13:03, 27 September 2023 (UTC)
Should i change the map to have the Rapid Support forces be Blue?
I would like for it to be colorblind accessible Lukt64 (talk) 17:38, 27 September 2023 (UTC)
* I don't see the big deal WikipediaNerd12345 (talk) 13:30, 28 September 2023 (UTC)
* please go for it. Wikipedia should be accessible. I see you have tried but maybe try the same colours as the Russian invasion of Ukraine. RSF can be yellow (similar to their uniform) and Green is for SAF FuzzyMagma (talk) 18:58, 29 September 2023 (UTC)
* I am fine with it being colorblind friendly, but please keep the territories that are disputed between the Sudanese Armed Forces and the Rapid Support Forces as red and blue, to be more accurate and also because that what people complain about. HuntersHistory (talk) 18:25, 7 October 2023 (UTC)
Wouldn't this be considered a Civil War?
It seems like nobody is invading, so wouldn't it be a Civil war? UB Blacephalon (talk) 17:51, 8 October 2023 (UTC)
* According to the last move discussion, reliable sources do not consistently describe the conflict as a "civil war" enough to justify its usage. Clyde H. Mapping (talk) 04:10, 9 October 2023 (UTC)
Move to 2023 War in Sudan
I feel like this is more consistent with outdated battle articles, and also closer to the old name "2023 Sudan Conflict" Lukt64 (talk) 19:58, 13 October 2023 (UTC)
Requested move 12 November 2023
War in Sudan (2023) → Sudanese Civil War (2023) – This is a months-old conflict and is beginning to escalate again. Its time to call it a civil war. Lukt64 (talk) 01:01, 10 October 1023 (UTC)
changing "part of " in the infobox
Hi @Parham wiki, I see you changed War in Sudan (2023) to Part of the Russo-Ukrainian War (likely) and first and second Sudanese civil war to Arab–Israeli conflict. Maybe they are but surely they are more part of Sudanese Civil Wars. I am not sure if you are claiming that these wars were the results of Russo-Ukrainian War or the Arab–Israeli conflict because they are not. Foreign forces may interfered but they were not the cause so can you please amend your edit FuzzyMagma (talk) 13:29, 17 October 2023 (UTC)
* OK, thanks. Parham wiki (talk) 13:32, 17 October 2023 (UTC)
Map is to be updated
Nyala battle has concluded with RSF seizing full control of the city. The current map does not indicate that. — Preceding unsigned comment added by Gorgedweller (talk • contribs) 08:07, 31 October 2023 (UTC)
Death toll
As of October, we now have a definite minimum toll of 9,000 as confirmed by the UN and relevant government agencies. I believe it is time to take off the minimum 4,000 range in the infobox and wherever else it is mentioned. Borgenland (talk) 06:02, 6 November 2023 (UTC)
Requested move 5 November 2023
The result of the move request was: not moved (non-admin closure). There is a consensus against the proposed title as "Third" is unsupported by the sources. There was no consensus on whether the article should have some variant of "Civil War" in the title so no prejudice against a new RM with e.g. Sudanese Civil War (2023), 2023 Sudanese Civil War, etc. as a proposed title. Jenks24 (talk) 01:55, 12 November 2023 (UTC)
War in Sudan (2023) → Third Sudanese Civil War – Multiple news outlets like The Guardian and the BBC have called it a Civil War, this is a months-old conflict and is beginning to escalate again. Its time to call it a civil war. Lukt64 (talk) 01:01, 5 November 2023 (UTC)
* Weak Support. But I think I can fully support if it reaches next year, making the current title moot. Borgenland (talk) 01:58, 5 November 2023 (UTC)
* There is no end in sight. I dont see peace being reached in 2023. Lukt64 (talk) 02:22, 5 November 2023 (UTC)
* Could you post the relevant sources for further discussion? Borgenland (talk) 02:51, 5 November 2023 (UTC)
* sorry not bbc, cnn https://amp.theguardian.com/world/2023/sep/06/humanitarian-crisis-as-5m-displaced-by-civil-war-in-sudan
* https://amp.cnn.com/cnn/2023/08/16/africa/sudan-one-million-flee-un-intl/index.html Lukt64 (talk) 02:53, 5 November 2023 (UTC)
* Weakly Oppose, but if there is to be a move to a title containing "Civil War", then I'd support Sudanese Civil War (2023), to be updated to Sudanese Civil War (2023–present) if the conflict extends into 2024.
* Surprisingly few sources refer to the present conflict as the Third Sudanese Civil War, with more using the term to describe the early stages of the Sudanese conflict in South Kordofan and Blue Nile. And still, many sources are still considering it just a "war" rather than "civil war".
* The war in Sudan is a consequence of a derailed transition
* UN aid chief says six months of war in Sudan has killed 9,000 people
* How Sudan’s forgotten war is being fought
* "Sudan’s army and rival paramilitary force resume peace talks in Jeddah, Saudi Arabia says" describes conflict as a "war" rather than a civil war, although calling it a conflict in the title.
* Calling it a civil war in the title isn't fully backed by sources as of now but it makes sense. Just, Sudanese Civil War (2023) is a more accurate representation than Third Sudanese Civil War. - presidentofyes, the super aussa man 16:45, 5 November 2023 (UTC)
* @Lukt64 can you link the sources that you said uses the "Third Sudanese Civil War"? BBC and Guardian you said FuzzyMagma (talk) 12:08, 6 November 2023 (UTC)
* Loook above. Lukt64 (talk) 12:42, 6 November 2023 (UTC)
* I think at this rate the word civil war is slightly more acceptable. The real issue is whether this conflict should be numbered if we are to base it on sources. Personally I wouldn’t expect a press with short-term memory to resolve this issue. Probably some books and studies that are years away from publication. Borgenland (talk) 13:24, 6 November 2023 (UTC)
* the use of the "Third" is more of WP:CONSISTENT but we need to establish commonality first which I cannot see, although I agree, it is a civil war FuzzyMagma (talk) 07:56, 7 November 2023 (UTC)
* Oppose. Third Sudanese Civil War is WP:SYNTH-ing a name, as the SPLM-N insurgencies could also easily be called a third civil war. However, Sudanese Civil War (2023) works well. I don't see much reason to change it from War in Sudan however, as most sources switch between civil war and war in Sudan. Jebiguess (talk) 21:47, 6 November 2023 (UTC)
* The only original research I did was a 10 minute google search Lukt64 (talk) 22:30, 6 November 2023 (UTC)
* I understand. What I'm trying to say is that Wiki goes by what reliable sources say - for a while this page was the 2023 Sudan conflict simply because we were waiting for people to call it a war despite full-on battles in Khartoum and genocides in Geneina. We don't wanna be the first ones to call it the Third Sudanese Civil War just because it sounds right because then articles will call it the Third Sudanese Civil War due to our rename. By renaming it that, it also skips over the SPLM-N insurgency, which was pretty huge although little is written about it here. Jebiguess (talk) 05:13, 7 November 2023 (UTC)
* Weak Oppose: I am not personally against the name, but most sources I'm coming across are still calling it a war. "Civil war" seems to be less common. CatmanBw (talk) 23:34, 6 November 2023 (UTC)
* Oppose. "Third" appears to be invented. I have no opinion on something like 2023 Sudanese Civil War, which would be my suggestion if there's a desire to have "civil war" in the title. SnowFire (talk) 16:07, 7 November 2023 (UTC)
* Heres another source that called it a civil war https://www.youtube.com/watch?v=0HlyaIaI81E Lukt64 (talk) 01:11, 11 November 2023 (UTC)
* Other sources calling it a civil war are:
* https://www.washingtonpost.com/world/2023/11/09/sudan-civil-war-humanitarian-crisis/
* https://www.usip.org/publications/2023/10/after-six-months-civil-war-whats-state-play-sudan
* Blaylockjam10 (talk) 21:43, 11 November 2023 (UTC)
Parham wiki (talk) 17:16, 8 November 2023 (UTC)
* Oppose:
* 1) Said sources do not call it "Third Sudanese Civil War". See WP:OR
* 2) As @Presidentofyes12 pointed out, there are sources that don't call it a civil war.
* 3) There are widespread reports of foreign involvement in this war, so it cannot be called a civil war unless it is widely called a civil war like the Syrian civil war.
Support We don't want to be massively late to the punch again like we were with Ethiopia. — Preceding unsigned comment added by 2604:3D09:1F80:CA00:E5FD:89C0:407C:4789 (talk) 21:07, 7 November 2023 (UTC)
* That must be the worst reason for support. FOMO should not be a justification. This vote must be dismissed FuzzyMagma (talk) 08:15, 9 November 2023 (UTC)
SupportAlthough not so many sources call it "Third", its tecnically pretty much a continuation of the previous two wars, just diffrents groups at this time, and many sources are calling it a civil war, not a third, but still a civil war. Lucasoliveira653 (talk) 16:22, 9 November 2023 (UTC)
* Oppose As many other users have mentioned, not alot of sources call this a civil war. As per SnowFire, "Third" seems invented. Yxuibs (talk) 01:57, 11 November 2023 (UTC)
Protection request
Could you add protection to this article for edit warring? UltimateFantasyY (talk) 00:03, 13 November 2023 (UTC)
* I think only registered users should be able to edit it, that was just... wow. Lukt64 (talk) 00:05, 13 November 2023 (UTC)
* It's one person, and it's vandalism, not edit warring. We don't protect pages because of one person. They've been blocked. 25stargeneral (talk) 00:05, 13 November 2023 (UTC)
* Still, its on the front page and normally stuff this important would at least have SOME restriction on it.. Lukt64 (talk) 00:07, 13 November 2023 (UTC)
* Okay. UltimateFantasyY (talk) 00:08, 13 November 2023 (UTC)
* That's what I meant. UltimateFantasyY (talk) 00:18, 13 November 2023 (UTC)
* I support at least pending changes protection and potentially semi protection for this page, because this is a large-scale and ongoing armed conflict, in order to deter vandalism and edits from unregistered & new users. JohnAdams1800 (talk) 02:54, 18 November 2023 (UTC)
Since the Darfur Alliance joined the SAF in war, should we put them and the SAF in one group in the map, as "Sudanese armed forces and allies"?
the Darfur Alliance joined the SAF in war, should we put them and the SAF in one group in the map, as "Sudanese armed forces and allies"? Ghmrsudan (talk) 11:39, 25 November 2023 (UTC)
East Darfur map change
After the capture of Ed Daein this week, the state of East Darfur was also captured fully. Could we change the map to show those recent changes? 2601:183:4281:9CD0:C54D:31AF:25B4:3B6B (talk) 03:42, 26 November 2023 (UTC)
* For issues or requested updates with the map the proper place to do so is on its wikimedia commons talk page as it is hosted on commons rather than wikipedia.-FusionSub (talk) 14:14, 28 November 2023 (UTC)
Remove "This article may be too long to read and navigate comfortably."
I think that the "This article may be too long to read and navigate comfortably." should be considered resolved as there is enough subheading to make the entire article more easily to digest. Eason Y. Lu (talk) 00:36, 14 December 2023 (UTC)
Merge "Peace efforts" into "Course of the war"
Having an entire separate section on peace efforts doesn't make much sense to me, because efforts to achieve peace have not been separate from the actual fighting and as a result the 'Peace efforts' section has become bloated with one-sentence paragraphs that do not really belong in the article per WP:UNDUEWEIGHT, and which has also given the article far too many section titles that clog up navigation. I reckon that the Treaty of Jeddah (2023) and any subsequent important negotiations can be far better covered in the Course of the war section. Thoughts? Devonian Wombat (talk) 01:38, 18 December 2023 (UTC)
* I guess I agree. Now that the section in question has become quite stale. Borgenland (talk) 02:06, 18 December 2023 (UTC)
Requested move 27 December 2023
The result of the move request was: moved. Per consensus, move to War in Sudan (2023–present). – robertsky (talk) 04:50, 4 January 2024 (UTC)
or * B: War in Sudan (2023) → War in Sudan
* War in Sudan (2023) → War in Sudan (2023–present) –
or * C: War in Sudan (2023) → Sudanese civil war (2023–present)
or * D: War in Sudan (2023) → Sudanese civil war
or * E: War in Sudan (2023) no change (You can add other name suggestions if you think that it is appropriate)
With almost a week left for this year to end, I think it is about time we start the discussion for renaming this article (Admins please don't move the article before 1/1/2024)   Bremps ... 04:18, 28 December 2023 (UTC)
* Option A preferably, otherwise option B. This isn't a big change, just accounting for the fact the war will most likely continue into 2024. JohnAdams1800 (talk) 15:47, 28 December 2023 (UTC)
* B Saying that its not a civil war by now is outright false, and more media outlets are using civil war. Lukt64 (talk) 19:42, 28 December 2023 (UTC)
* Comment, if we are going to call it a civil war we will have to call it the Third Sudanese Civil War, as First Sudanese Civil War and Second Sudanese Civil War already exist. I would support such a change, as "War in Sudan" is an incredibly clunky term that is impossible to use well within the article, and most reliable sources have been calling this a civil war for months. Devonian Wombat (talk) 20:29, 28 December 2023 (UTC)
* Not Third Sudanese Civil War, that term is actually used more to refer to the Sudanese conflict in South Kordofan and Blue Nile than it's used to refer to this present conflict. - presidentofyes, the super aussa man 21:26, 28 December 2023 (UTC)
* A, unless sources are constantly using "civil war" to describe the conflict (which they're not, afaik) - presidentofyes, the super aussa man 21:23, 28 December 2023 (UTC)
* A or B probably; but A would be a lot better TheLibyanGuy (talk) 22:27, 28 December 2023 (UTC)
* Oppose. Needless fiddling. Wait for 2024 sources. SmokeyJoe (talk) 01:32, 30 December 2023 (UTC)
* Oppose: wait for 2024 or use "Sudan conflict" (maybe "Sudan war") as it been used by the [BBC consistently] and does not have an year issue FuzzyMagma (talk) 13:15, 30 December 2023 (UTC)
* Support. 2024 is here and the war is still ongoing, article name needs an update. - Creffel (talk) 03:17, 2 January 2024 (UTC)
* Support with option A being best for now I think, for the same reasons as above. It's 2024 now and there are sources to show it is continuing. MariahKRogers (talk) 00:41, 3 January 2024 (UTC)
* Support A until such time as the war aquires a widely used name among journalists or historians. Babakathy (talk) 10:13, 3 January 2024 (UTC)
* Support A, weaker support for C. Apologies, my phone keyboard doesn’t allow straight quotes. Borgenland (talk) 17:21, 3 January 2024 (UTC)
The discussion above is closed. <b style="color: #FF0000;">Please do not modify it.</b> Subsequent comments should be made on the appropriate discussion page. No further edits should be made to this discussion.
SPLM-N captured Dilling
i cant edit very well on a phone, just wanted to tell you all.https://sudantribune.com/article281102/ Lukt64 (talk) 06:16, 9 January 2024 (UTC)
* Also mentioned it in Timeline. Tho it's naming convention in wiki is Dalang. Borgenland (talk) 06:33, 9 January 2024 (UTC)
Per Al Jazeera, owned by Qatar, the SAF is cracking down on pro-democracy activists.
I'm not quite sure where to incorporate this information, but here's the link: https://www.aljazeera.com/features/2024/1/9/sudans-army-is-retaliating-against-activists-amid-the-war-for-their-role-in-bringing-down-their-former-boss-and-president-omar-al-bashir-in-april-2019
Al Jazeera is state-owned media, but for they're been relatively impartial for this topic (2023-present War in Sudan). They're not impartial with respect to the 2023 Israel-Hamas War, which is unsurprising as Qatar harbors the leaders of Hamas. JohnAdams1800 (talk) 21:17, 9 January 2024 (UTC)
Can we change the title to Third Sudanese Civil War yet?
This clearly isn't a short post-coup conflict anymore 2604:3D09:1F80:CA00:ACAC:6FC7:C632:32DE (talk) 20:34, 1 December 2023 (UTC)
* No sources are calling it THIRD. The civil war is more plausible but there is still no consensus. Borgenland (talk) 23:55, 1 December 2023 (UTC)
* Its not a civil war its a conflict between the paramilitary and the country SDUpdates32349 (talk) 15:28, 31 December 2023 (UTC)
* Civil war. "war between organized groups within the same state". So it very much is a civil war. Risa123 (talk) 20:33, 5 January 2024 (UTC)
* https://www.bbc.com/news/world-africa-67438018 (One source that started to call it a civil war) SpinnerLaserzthe2nd (talk) 14:30, 9 January 2024 (UTC)
* “Third Sudanese Civil War” is a proper historic name which we haven’t heard yet, “Sudanese civil war (2023–present)” sounds more plausible <IP_ADDRESS> (talk) 19:09, 6 February 2024 (UTC)
February 2024 analysis by German political scientist Hager Ali
The latest analysis of February 2024 by German political scientist Hager Ali, writing for the German Institute for Global and Area Studies, may be useful for updating recent events of the war in Sudan. - It is an Open Access publication and can be read on the Internet and downloaded free of charge at www.giga-hamburg.de/en/publications/giga-focus. According to the conditions of the Creative-Commons license Attribution-No Derivative Works 3.0, this publication may be freely duplicated, circulated, and made accessible to the public, but NOT be copied for Wikipedia. Munfarid1 (talk) 08:57, 22 February 2024 (UTC)
* Meanwhile, I have summarized this article in the new section /Critical_reception/ - I imagine that there must be several more such analyses... Munfarid1 (talk) 11:57, 8 March 2024 (UTC)
Elephant Trunk Revolution?
A civil war, being a part of the so-called Elephant Trunk Revolution <IP_ADDRESS> (talk) 06:38, 5 March 2024 (UTC)
* It is WP:UNDUE, particularly since the term you insist is not used by a consensus of reliable and non-obscure sources. Not a lot of articles on the Sudanese Revolution even use the term. Borgenland (talk) 07:00, 5 March 2024 (UTC)
* An article by a Professor at the Universidad Internacional de La Rioja is surely an example of an obscure source? We should mention, that it is rarely used (mainly in Spanish and French) to help one to search more information. <IP_ADDRESS> — Preceding unsigned comment added by <IP_ADDRESS> (talk) 07:39, 5 March 2024 (UTC)
* In the context of this entire thing, it is, especially if said professor is virtually alone in asserting that it is so. Furthermore, a simple search on keywords shows a gaping lack of usage of you neologism. And it is the primary responsibility of the initially editor to make changes that could stand scrutiny, not passing it to others if it is a bit murky. Borgenland (talk) 07:46, 5 March 2024 (UTC)
* Frankly speaking, practically all well-known political terms tend to be a bit murky. Compare it to the so-called https://en.wikipedia.org/wiki/Tunisian_Revolution . <IP_ADDRESS> (talk) 07:50, 5 March 2024 (UTC)
* But the Tunisian Revolution is based on widely used and reliable sources. Yours are so far against wide consensus, which does not help provide even a veneer of legitimacy for this current murky argument. Borgenland (talk) 08:07, 5 March 2024 (UTC)
* Revolution of Dignity and Jasmine Revolution is still a very instable term, the Arabic version uses ثورة الحرية والكرامة (Revolution of Liberty and Truth/Dignity) and no jasmine at all, Spanish version adds the Intifada de idi Bouzid, in Russian version you can find even the Финиковая революция (the Date Revolution). Many of them even don't have any academic source or just have some obscure articles connected, as someone said. Should we remove all of them? I don't know. <IP_ADDRESS> (talk) 08:19, 5 March 2024 (UTC)
* But this is primarily English Wikipedia, which has conventions separate from that of other language Wikipedias. A mere importation cannot just happen unless you can have counterpart sources that can support your non-English sources. Borgenland (talk) 08:28, 5 March 2024 (UTC)
* Well, I speak also on the terms in the English version. You could say that Amira Aleya-Sghaier and Mabrouka M'Barek are obscure authors from not very prestigious high schools and their articles couldn't be used as reliable sources. It's a bit strange, isn't it? <IP_ADDRESS> (talk) 08:33, 5 March 2024 (UTC)
* But that is beside the point. The fact is their terms had been widely accepted in English wiki for years, whereas yours suddenly sprouted in this here for a considerably shorter amount of time. What is even more disingenious is that your 2nd French language source was published a year before the war broke out, and you have done an incredible WP:SYNTH fallacy to link the conflict, which does not even mention the word elephant in the body.
* You have also misconstrued my arguments into a snobbery of alma maters when in fact it is the reliability and consensus usage of sources and mediums in which they were broadcast that was in question. Finally, you are treading into WP:OTHERSTUFFEXISTS which I should have pointed out the moment you mentioned the word Tunisia. Borgenland (talk) 08:50, 5 March 2024 (UTC)
* Finally, since you are so keen on insisting the conflict as part of a revolution that is not generally known by that name, I wonder why you chose not to raise this argument first in the Sudanese Revolution, given your tendency towards WP:OTHERSTUFFEXISTS. Had you successfully made your case there, I'm sure nobody would have objected to this edit of yours here. Borgenland (talk) 08:52, 5 March 2024 (UTC)
* Well, it's another revolution, what we are speaking about is 2021 Sudanese coup d'état and its consequences. If you like, add it to this article. But if we tend to unite these processes into one massive revolution, one must create another article, like 2018–2026 instable situtation in Sudan (Elephant Trunk Revolution). <IP_ADDRESS> (talk) 09:23, 5 March 2024 (UTC)
* It it your responsibility since you came up with it. And the fact remains that no consensus of sources even refers to it as a pachyderm revolution even in the 2021 article. Borgenland (talk) 10:07, 5 March 2024 (UTC)
* Agree that this term is UNDUE, no analysts that frequently cover the conflict, news organisations or the sides in the war use this term. As far as I can tell the only individual or does is this one random professor at a not very prestigious Spanish university. Devonian Wombat (talk) 08:00, 5 March 2024 (UTC)
* Someone confused things and translate Khartoum literally [to Elephant Trunk]. See Khartoum FuzzyMagma (talk) 09:26, 6 March 2024 (UTC)
* I have not found any reliable source describing or portraying the War in Sudan (2023-present) as the Elephant Trunk Revolution. I oppose any use of the term until such sources are provided. JohnAdams1800 (talk) 01:38, 9 March 2024 (UTC)*
Assistance in invasion(s) summaries
I have recently created and began working on the List of invasions in the 21st century. Obviously, this invasion and offensives amid the invasion are included in the list. I have a few short summaries already listed in the chart, but I would appreciate if anyone who is familiar with the invasion wants to help out. My current thought process is that anything significant related to the invasion/offensive needs to be mentioned in the summary. So, if anyone wants to help out, feel free to work on, improve, or completely rewrite the summaries in that list. The Weather Event Writer (Talk Page) 19:32, 18 February 2024 (UTC)
* not sure its an invasion, its an internal conflict Bird244 (talk) 17:00, 13 March 2024 (UTC)
Updates?
I happened to notice that this page was being considered for addition to the in-the-news section of the main page (here). The main sticking point seems to be the lack of substantive additions to this entry in April (the timeline article is said to be just one line per day, while this -- considerably more substantive -- entry is said not to have enough updates). Those who work on this page might want to see if there are any developments that warrant addition as the conflict is passing the one-year mark. -- SashiRolls 🌿 · 🍥 19:35, 10 April 2024 (UTC)
Russia or Wagner?
Ever since Prigozhin's death, Wagner has grown closer and closer to the Russian government and is now under direct oversight of the Russian National Guard, and all members have to sign their allegiance to the Russian government. I think we can just put Russia in the list of state supporters instead of Wagner as a non-state supporter. Game2Winter (talk) 04:46, 21 April 2024 (UTC)
* Wagner is largely independent from the Russian government in africa. Ukraine is a different story, but Wagner is its own thing in africa. Lukt64 (talk) 03:09, 22 April 2024 (UTC)
Government
How long has the government been actively involved in the War in Sudan? Initially, the article mentioned only the conflict between the Sudanese Armed Forces and the Rapid Support Forces. This seams to be the edit that changed the info-box. LuxembourgLover (talk) 17:20, 5 May 2024 (UTC)
* This is most likely in reference to the SAF being otherwise described as forces loyal to the current Sudanese regime.
* It's rare for military factions alone to make up "Belligerents" since they best fit into "Units involved." The Yemeni civil war infobox lists the opposing military factions as bullet points under their respective administrations (Republic of Yemen/Yemeni Armed Forces; Supreme Political Council/Houthis). Clyde H. Mapping (talk) 18:05, 5 May 2024 (UTC)
Map update
the map needs to be updated to show the Wad Madani offensive
i would do it but im lazy Lukt64 (talk) 00:16, 15 April 2024 (UTC)
* I haven't seen any major updates from Sudan War Monitor in Gezira state, including the counteroffensive to retake Wad Madani. I think the current map is still fine. JohnAdams1800 (talk) 14:56, 27 April 2024 (UTC)
* I would second what JohnAdams1800 stated. Has there been any significant changes which would justify updating the map showing significant changes in the offensive? Jurisdicta (talk) 01:59, 18 May 2024 (UTC)
* I don't believe so. There is reportedly an RSF offensive in Al-Fashir (El Fasher) in North Darfur, but I haven't read of any major changes in territorial control. The SAF has gained control of Omdurman, but has not taken back control of Gezira state or the capital city of Khartoum. Similarly, the RSF has not appeared to take significant amounts of territory in recent months. JohnAdams1800 (talk) 14:42, 21 May 2024 (UTC)
Requested move 18 May 2024
<div class="boilerplate mw-archivedtalk" style="background-color: #efe; margin: 0; padding: 0 10px 0 10px; border: 1px dotted #aaa;">
The result of the move request was: moved. (non-admin closure) —Compassionate727 (T·C) 21:27, 25 May 2024 (UTC)
War in Sudan (2023–present) → Sudanese civil war (2023–present) – The conflict is a civil war and this has become the most common name used, sources are such as Sky News: (It’s in the title.) BBC News: “… of the year-long Sudanese civil war” Independent: “… during a year-long civil war“ CNN: “Sudan has been gripped by civil war since April 2023”. <IP_ADDRESS> (talk) 14:04, 18 May 2024 (UTC) This is a contested technical request (permalink). <IP_ADDRESS> (talk) 15:25, 18 May 2024 (UTC)
* I agree! MasterOpel 21:29, 18 May 2024 (UTC)
* Plus, the article states, "A civil war between two rival factions of the military government of Sudan, the Sudanese Armed Forces (SAF) under Abdel Fattah al-Burhan, and the paramilitary Rapid Support Forces (RSF) under the Janjaweed leader, Hemedti, began during Ramadan on 15 April 2023." MasterOpel 21:31, 18 May 2024 (UTC)
* The Article names the war as a civil war numerous times, and I believe the rename is an accurate description of the war, and it also shares the perspective that the article seems to have. <IP_ADDRESS> (talk) 22:21, 18 May 2024 (UTC)
* Modified support for Third Sudanese Civil War (2023-present), as Sudanese Civil War is a disambiguation page that already mentions the First Sudanese Civil War and Second Sudanese Civil War. This armed conflict is a civil war, but it's the third major one in a country that has been repeatedly characterized by internal conflict. JohnAdams1800 (talk) 21:02, 20 May 2024 (UTC)
* The first and second civil wars are actually named that in multiple reliable sources, so no need for the word “Third” if it’s not mentioned in sources. We can move the dab page to Sudanese Civil Wars or Sudanese Civil War (disambiguation) FuzzyMagma (talk) 22:30, 20 May 2024 (UTC)
* This is truly a third sudanese civil war. However, we need to use the most common name when referring to wikipedia’s policies, no source seems to give this conflict the historical name “third sudanese civil war”. Therefore it wouldn’t be valid to move it to that, rather we should move it to Sudanese civil war (2023–present). <IP_ADDRESS> (talk) 05:34, 23 May 2024 (UTC)
* good call FuzzyMagma (talk) 19:18, 23 May 2024 (UTC)
* Strong support: There is no doubt it's a civil war and the current title isn't all that encompassing about the reality Waleed (talk) 07:20, 21 May 2024 (UTC)
* Support as now multiple sources are calling it a civil war. Lukt64 (talk) 18:30, 22 May 2024 (UTC)
* Support but would hold off on placing numerologies pending an actual source that describes it. Borgenland (talk) 05:08, 24 May 2024 (UTC)
The war has been going on for a year now, and many sources are now calling it a civil war.
* Support
BigRed606 (talk) 08:23, 19 May 2024 (UTC)
* Not opposed if it lends clarity, but worth noting that the sources given above use civil war as a description, rather than as a specific name for this event. CMD (talk) 15:00, 19 May 2024 (UTC)
* Support. "War in X" is typically used here for interstate wars (see War in Afghanistan (2001-2021), War in Donbas, and War in Somalia (2006-2009)). War in Darfur and War in the Vendée are the only pages that seem to deal with civil wars (although War in Abkhazia (1992-1993) could be argued to also be one). At any rate, "War in X" makes more sense when describing the geographical location of the war. Ships & Space (Edits) 00:51, 20 May 2024 (UTC)
* Support. War in [country] is barely used on Wikipedia, and it is rarely used to refer to a civil war. "Civil War" is far more common. Game2Winter (talk) 19:38, 20 May 2024 (UTC)
* Support per sources provided above. I would note that most major sources referred to this event as the "war in Sudan" (or some variation, see this discussion) in the months following its outbreak, so it doesn't really matter what Wikipedia named different wars in that instance. Also, oppose Third Sudanese Civil War until proof is provided that sources are calling it such. Yeoutie (talk) 00:50, 22 May 2024 (UTC)
I really hope it isn't what the Media specifically is using because the bulk of them suck at getting details right when it comes to African conflicts.
* Support, though also open to Third Sudanese Civil War Might I ask what the standard is for whether you count something from scratch or number it? Growing up I read it usually had to do with whether or not one directly lead to another, like how the First Balkans War caused the Second One. That's how historians who named things would do it. So this would absolutely count as Third.
* Note: WikiProject International relations has been notified of this discussion. FuzzyMagma (talk) 15:24, 25 May 2024 (UTC)
<div style="padding-left: 1.6em; font-style: italic; border-top: 1px solid #a2a9b1; margin: 0.5em 0; padding-top: 0.5em">The discussion above is closed. <b style="color: #FF0000;">Please do not modify it.</b> Subsequent comments should be made on the appropriate discussion page. No further edits should be made to this discussion.
|
At 614, the data encryption circuit 520 generates encrypted user data by encrypting the sensitive user data with the first named CEK 530. At 616, the data encryption circuit 220 tags the encrypted user data and the name of the first named CEK 530 with a tag that is readable by the database server 408. In some arrangements, the tag is a cleartext tag. The tag can include information indicative of the encrypted user data. For example, the information indicative of the encrypted user data can include information indicative of a type of user data corresponding to the encrypted user data and/or information indicative of an identity of a user corresponding to the encrypted user data. In some arrangements, the name of the first named CEK 530 is included in the tag. At 618, the data encryption circuit 520 transmits the encrypted user data and the name of the first named CEK 530 to the database server 408. In arrangements in which the data encryption circuit 520 determines that the data entry entity 404 has received multiple pieces of sensitive user data, the data encryption circuit 520 repeats blocks 610-618 for each piece of sensitive user data.
At 620, the database server 408 receives the encrypted user data and the name of the first named CEK 530 from the data entry entity 404 over the secure connection. At optional block 622, the database server 408 transmits a message to the data entry entity 404 indicating that the database server 408 has received the encrypted user data and the name of the first named CEK 530. At optional block 624, the data entry entity 404 destroys the cleartext sensitive user data in response to receiving a message from the database server 408 indicating that the database server 408 has received the encrypted user data and the name of the first named CEK 530. At 626, the database server 408 saves the encrypted user data and the name of the first named CEK 530 to the user information database 544 of the memory 536.
At 628, the message generation circuit 588 of the data exit entity 416 receives a request for sensitive user data input by a user using the user input/output device 576. At 630, the authentication circuit 596 of the data exit entity 416 validates the certificate of the data exit entity 416 as is described in greater detail with respect to block 328 above.
At 632, the message generation circuit 588 determines information indicative of the requested user data based on the request for sensitive user data input by the user of the data exit entity 416. The information indicative of the requested user data can include information indicative of a type of user data (e.g., social security number, account number, address, birth date, biometric, etc.) and/or information indicative of an identity of the user (e.g., a name, a reference number, etc.). At 634, the message generation circuit 588 generates a data request message including the information indicative of the requested user data, the name of the second named CEK 534, and/or information indicative of the identity of the data exit entity 416. The information indicative of the identity of the data exit entity 416 can include an IP address, an IMEI number, an instance of a software application running on the data exit entity 416 or a browser running on the data exit entity 416, etc. At 636, the message generation circuit 588 transmits the data request message to the database server 408 over a secure connection.
At 638, the data identification circuit 540 receives the data request message from the data exit entity 416. The data request message includes information indicative of the requested user data requested by the data exit entity 416 and the name of the second named CEK 534, and/or information indicative of the identity of the data exit entity 416. At 640, the data identification circuit 540 identifies the encrypted user data that corresponds to the requested user data based on the tag. For example, the data identification circuit 240 can compare the information indicative of the requested user data to the information indicative of the encrypted user data in the tag to identify the encrypted user data that matches the requested user data. The data identification circuit 540 never decrypts or reads the cleartext sensitive user data. At 642, the data identification circuit 540 retrieves the encrypted user data that matches the requested user data. At 644, the data identification circuit 540 transmits the encrypted user data, the name of the first named CEK 530 corresponding to the requested user data, and the name of the second named CEK 534 and/or the information indicative of the identity of the data exit entity 416 to the key manager 412. At 646, the data identification circuit 540 logs each piece of encrypted user data sent to the key manager 412 and the information indicative of the data exit entity 416 requesting the encrypted user data sent to the key manager 412. In some arrangements, the data request message can include one or more pieces of requested user data. In such arrangements, data identification circuit 540 repeats blocks 632-646 for each piece of requested user data. As described herein, the database server 408 excludes the shared secret 526, the first named CEKs 530, and the second named CEKs 534. Therefore, the database server 408 cannot decrypt the encrypted user data to recover the cleartext sensitive user data.
At 648, the translation circuit 560 of the key manager 412 receives the encrypted user data corresponding to the requested user data, the name of the first named CEK 530, the name of the second named CEK 534 and/or the information indicative of the identity of the data exit entity 416. At 650, the translation circuit 560 identifies the certificate for the data exit entity 416 based on the information indicative of the identity of the data exit entity 416. At 652, the authentication circuit 564 validates the certificate of the data exit entity 416 similar to what is described in greater detail above with respect to block 350. In response to determining that the data exit entity certificate is valid, the authentication circuit 264 allows translation of the encrypted user data. In response to determining that the data exit entity certificate is invalid, the authentication circuit 264 prevents translation of the encrypted user data.
At 654, the translation circuit 560 recovers the first named CEK 530 based on the name of the first named CEK 530 and the shared secret 526 established between the data entry entity 404 and the key manager 412. At 656, the translation circuit 560 recovers the cleartext sensitive user data by decrypting the encrypted user data with the first named CEK 530. At 658, the translation circuit 560 recovers the second named CEK 534 based on the name of the second named CEK 534 and the shared secret 542 established between the data exit entity 416 and the key manager 412. At 660, the translation circuit generates second encrypted user data by encrypting the cleartext sensitive user data with the second named CEK 534. At 662, the translation circuit 260 transmits the second encrypted user data and the information indicative of the identity of the data exit entity 416 to the database server 408. At 662, the translation circuit 560 logs information indicative of each piece of encrypted user data that has been translated and the information indicative of the identity of each data exit entity 416 requesting translation of each piece of encrypted user data in the data translation log 572.
At 666, the data identification circuit 540 of the database server 408 receives the second encrypted user data and the information indicative of the identity of the data exit entity 416. At 668, the data identification circuit 540 transmits the encrypted user data to the data exit entity 416 over a secure connection.
At 670, the data decryption circuit 592 of the data exit entity 416 receives the second encrypted user data from the database server 408 over the secure connection. Since the second encrypted user data is encrypted, the cleartext sensitive user data is not visible at the entrance and the exit ends of the secure connection. At 672, the data decryption circuit 592 recovers the second named CEK 534 based on the name of the second CEK 534 and the shared secret 542. At 674, the data decryption circuit 592 recovers the cleartext sensitive user data by decrypting the second encrypted user data with the second named CEK 534. At 672, the data decryption circuit 592 displays the cleartext sensitive user data to the user of the data exit entity 416. For example, the data decryption circuit 592 can display the cleartext sensitive user data on a window of a software application run on a browser of the data exit entity 416 or running locally on the data exit entity 416.
In some arrangements, the user may request more than one piece of sensitive user data. In such an arrangement, the data request message includes all of the pieces of requested user data. The data exit entity 416 repeats blocks 668-672 for each piece of requested data. In some arrangements, the user may request that one or more pieces of sensitive user data are shared with more than one data exit entity 416. In such an arrangement, the data request message includes all of the pieces of requested user data and information indicative of the identities of the data exit entities 416 to which each piece of sensitive user data should be sent. Each of the data exit entities 416 then completes blocks 668-672 for each piece of encrypted user data received.
Although the systems 100 and 400 are described separately, some arrangements may combine features of each system. For example, a system may include one or more data entry entities 104 that encrypt sensitive user data with a CEK and send the encrypted user data and the encrypted CEK to a database server described above with respect to the data entry entity 104. This system may include one or more data exit entities 416 that decrypt and display sensitive user data using a named CEK that is based on a shared secret established with the key manager via a PKC protocol as described above with respect to the system 400. The database server and the key manager of this arrangement combine features of the database servers 108, 408 and the key managers 112, 412, respectively, as described in greater detail below. In such an arrangement, in response to determining that the encrypted user data has been encrypted by a CEK and that the data message request includes a name of a second named CEK, the data identification circuit of the database server is configured to send both the encrypted user data and the encrypted CEK to the key manager as described above with respect to the database server 108. In such arrangements, the key manager is configured to operate as described above with respect to the key manager 112 when decrypting the encrypted CEK. However, the translation circuit of the key manager is further configured to decrypt the encrypted user data to recover the cleartext sensitive user data. The key manager is then configured to recover the second named CEK based on the name of the second CEK sent in the data request message as described above with respect to the key manager 412. The key manager is configured to encrypt the cleartext sensitive user data with the second named CEK as described above with respect to the key manager 412 to generate the second encrypted user data that the data exit entity 416 can decrypt. The key manager is configured to send the second encrypted user data to the database server as described above with respect to the key manager 412.
In another example, a system may include one or more data entry entities 404 as described above with respect to the system 400. The one or more data entry entities 404 generate a shared secret with the key manager via a PKC protocol and then derive a named CEK from the shared secret as described above with respect to the system 400. The one or more data entry entities 404 then encrypt each piece of sensitive user data using the named CEK. This system may include one or more data exit entities 116 that receive second encrypted data that has been encrypted with a CEK that has been encrypted with the private key of each of the one or more data exit entities 116. The database server and the key manager of this arrangement combine features of the database servers 108, 408 and the key managers 112, 412, respectively, as described in greater detail below. In such an arrangement, the data identification circuit of the database server receives the data request message, retrieves the encrypted user data corresponding to the requested user data based on the tag, and sends the encrypted user data, the name of the first named CEK, and the information indicative of the identity of the data exit entity 116 as described with respect to the database server 408. The key manager is configured to recover the first named CEK based on the shared secret previously established between the key manager 412 and the data entry entity 404 as described above with respect to the system 400. In response to determining, based on the information indicative of the identity of the data exit entity 116, that the key database includes a public key corresponding to the data exit entity 116, the key manager is configured to generate a CEK as described above with respect to the data entry entity 104. The key manager is configured to encrypt the cleartext sensitive user data with the CEK as described above with respect to the data entry entity 104 to generate second encrypted user data. The key manager is configured to encrypt the CEK with the public key 261 of the data exit entity 116 as described above with respect to the key manager 112. The key manager is then configured to send the second encrypted user data and the encrypted CEK to the database server or send the second encrypted user data and the encrypted CEK to the data exit entity 116. The data exit entity 116 can decrypt the encrypted CEK using its private key to recover the cleartext CEK and decrypt the second encrypted user data using the cleartext CEK as described above.
In some arrangements, the data entry entity includes the functionality of the data entry entity 104 as described above with respect to the system 100 and the functionality of the data entry entity 404 as described above with respect to the system 400. Such a data entry entity can communicate with database servers 108 as described with respect to the system 100 and database servers 408 as described with respect to the system 400. In such an arrangement, when used with the database server 108 and the key manager 112, the database server 108 may send a message instructing the data entry entity to use the protocol of system 100. When used with the database server 408 and the key manager 412, the database server 408 may send a message instructing the data entry entity to use the protocol of system 400.
In some arrangements, the data exit entity includes the functionality of the data exit entity 116 as described above with respect to the system 100 and the functionality of the data exit entity 416 as described above with respect to the system 400. Such a data exit entity can communicate with database servers 108 as described with respect to the system 100 and database servers 408 as described with respect to the system 400. In such an arrangement, when used with the database server 108 and the key manager 112, the database server 108 may send a message instructing the data exit entity to use the protocol of system 100. When used with the database server 408 and the key manager 412, the database server 408 may send a message instructing the data exit entity to use the protocol of system 400.
In some arrangements, the system 100 and/or the system 400 can be used to manage sensitive user data involved in real estate transactions. In such an arrangement, the data entry entity 104, 404 can include computing devices operated by real estate attorneys, bank employees, property appraisers, real estate agents, etc. The sensitive user data can include information such as a home owner and/or prospective home buyer's name, social security number, address, credit score, income, etc. The operators of the data entry entities 104, 404 have been authorized by an entity such as a bank providing a mortgage for the transaction. After authorization, the bank can send the key manager certificate to the data entry entity 104, 404 operated by the authorized operator. The operator of the data entry entity 104, 404 can input this sensitive user data into a software program run on a browser of the data entry entity 104, 404. The software program can identify the data entered by the operator of the data entry entity 104, 404 as sensitive user data, encrypt the sensitive user data as described above with respect to the data entry entities 104, 404, and send the encrypted user data to the database server 108, 408. In such an arrangement, the database server 108, 408 can be a cloud-based database stored in a cloud network. The database server 108, 408 can be operated by a third party (e.g., the database server is not managed by the data owner or the data receiver). As described above with respect to the systems 100, 400, the database server 108, 408 cannot decrypt the encrypted user data. The key manager 112, 412 may be administered by the bank providing the mortgage.
In such an arrangement, the data exit entity 116, 416 can include computing devices operated by real estate attorneys, bank employees, property appraisers, real estate agents, etc. that need to gain access to the sensitive user data. The operators of the data exit entities 116, 416 have been authorized by an entity such as a bank providing a mortgage for the transaction. After authorization, the bank can send the key manager certificate to the data exit entity 116, 416 operated by the authorized operator and the data exit entity 116, 416 can send its certificate to the key manager 112, 412. The operator of the data exit entity 116, 416 can input information indicative of requested user data into a software program run on a browser of the data exit entity 116, 416. The data exit entity 116, 416, can generate a data request message based on the information indicative of the requested user data and send the data request message to the database server 108, 408. In some arrangements, the data exit entity 116 can receive second encrypted user data and an encrypted CEK encrypted with the public key 261 of the data exit entity 116. The data exit entity 116 can decrypt the encrypted CEK using its private key to generate the cleartext CEK, decrypt the second encrypted user data with the cleartext CEK to recover the cleartext data, and display the cleartext sensitive user data to the operator of the data exit entity 116 as described above with respect to the data exit entity 116. In other arrangements, the data exit entity 416 can receive second encrypted user data encrypted with the second named CEK. The data exit entity 416 can recover the second named CEK based on the shared secret generated between the key manager 412 and the data exit entity 416 and the name of the second named CEK. The data exit entity 416 can decrypt the second encrypted user data using the second named CEK to recover the cleartext sensitive user data, and display the cleartext sensitive user data to the operator of the data exit entity 416 as described above with respect to the data exit entity 416.
In some arrangements, the system 100 and/or the system 400 can be used to manage sensitive user data involved in healthcare. In such an arrangement, the data entry entity 104, 404 can include computing devices operated by healthcare professionals such as doctors, nurses, nursing assistants, etc. The sensitive user data can include information such as a patient's name, social security number, test results, medical history information, etc. The operators of the data entry entities 104, 404 have been authorized by an entity such as the patient's insurance company or a healthcare provider network. After authorization, the insurance company or the healthcare system can send the key manager certificate to the data entry entity 104, 404 operated by the authorized operator. The operator of the data entry entity 104, 404 can input this sensitive user data into a software program run on a browser of the data entry entity 104, 404. The software program can identify the data entered by the operator of the data entry entity 104, 404 as sensitive user data, encrypt the sensitive user data as described above with respect to the data entry entities 104, 404, and send the encrypted user data to the database server 108, 408. In such an arrangement, the database server 108, 408 can be a cloud-based database stored in a cloud network. The database server 108, 408 can be operated by a third party (e.g., the database server is not managed by the data owner or the data receiver). As described above with respect to the systems 100, 400, the database server 108, 408 cannot decrypt the encrypted user data. The key manager 112, 412 may be administered by the insurance company or the healthcare provider network.
In such an arrangement, the data exit entity 116, 416 can include computing devices operated by insurance company employees or employees of the healthcare network different than the employees that operate the data entry entity 104, 404 that need to gain access to the sensitive user data. The operators of the data exit entities 116, 416 have been authorized by an entity such as the insurance company or the healthcare network. After authorization, the insurance company or healthcare network can send the key manager certificate to the data exit entity 116, 416 operated by the authorized operator and the data exit entity 116, 416 can send its certificate to the key manager 112, 412. The operator of the data exit entity 116, 416 can input information indicative of requested user data into a software program run on a browser of the data exit entity 116, 416. The data exit entity 116, 416, can generate a data request message based on the information indicative of the requested user data and send the data request message to the database server 108, 408. In some arrangements, the data exit entity 116 can receive second encrypted user data and an encrypted CEK encrypted with the private key of the data exit entity 116. The data exit entity 116 can decrypt the encrypted CEK using its private key to generate the cleartext CEK, decrypt the second encrypted user data with the cleartext CEK to recover the cleartext sensitive user data, and display the cleartext sensitive user data to the operator of the data exit entity 116 as described above with respect to the data exit entity 116. The operator of the data exit entity 116 can use the displayed sensitive user data to process insurance claims, review a patient's health history, etc. In other arrangements, the data exit entity 416 can receive second encrypted user data encrypted with the second named CEK. The data exit entity 416 can recover the second named CEK based on the shared secret generated between the key manager 412 and the data exit entity 416 and the name of the second named CEK. The data exit entity 416 can decrypt the second encrypted user data using the second named CEK to recover the cleartext sensitive user data, and display the cleartext sensitive user data to the operator of the data exit entity 416 as described above with respect to the data exit entity 416. The operator of the data exit entity 416 can use the displayed sensitive user data to process insurance claims, review a patient's health history, etc.
The arrangements described herein have been described with reference to drawings. The drawings illustrate certain details of specific arrangements that implement the systems, methods and programs described herein. However, describing the arrangements with drawings should not be construed as imposing on the disclosure any limitations that may be present in the drawings.
It should be understood that no claim element herein is to be construed under the provisions of 35 U.S.C. § 112(f), unless the element is expressly recited using the phrase “means for.”
As used herein, the term “circuit” may include hardware configured to execute the functions described herein. In some arrangements, each respective “circuit” may include machine-readable media for configuring the hardware to execute the functions described herein. The circuit may be embodied as one or more circuitry components including, but not limited to, processing circuitry, network interfaces, peripheral devices, input devices, output devices, sensors, etc. In some arrangements, a circuit may take the form of one or more analog circuits, electronic circuits (e.g., integrated circuits (IC), discrete circuits, system on a chip (SOCs) circuits, etc.), telecommunication circuits, hybrid circuits, and any other type of “circuit.” In this regard, the “circuit” may include any type of component for accomplishing or facilitating achievement of the operations described herein. For example, a circuit as described herein may include one or more transistors, logic gates (e.g., NAND, AND, NOR, OR, XOR, NOT, XNOR, etc.), resistors, multiplexers, registers, capacitors, inductors, diodes, wiring, and so on).
The “circuit” may also include one or more processors communicatively coupled to one or more memory or memory devices. In this regard, the one or more processors may execute instructions stored in the memory or may execute instructions otherwise accessible to the one or more processors. In some arrangements, the one or more processors may be embodied in various ways. The one or more processors may be constructed in a manner sufficient to perform at least the operations described herein. In some arrangements, the one or more processors may be shared by multiple circuits (e.g., circuit A and circuit B may comprise or otherwise share the same processor which, in some example arrangements, may execute instructions stored, or otherwise accessed, via different areas of memory). Alternatively or additionally, the one or more processors may be configured to perform or otherwise execute certain operations independent of one or more co-processors. In other example arrangements, two or more processors may be coupled via a bus to enable independent, parallel, pipelined, or multi-threaded instruction execution. Each processor may be implemented as one or more general-purpose processors, application specific integrated circuits (ASICs), field programmable gate arrays (FPGAs), digital signal processors (DSPs), or other suitable electronic data processing components configured to or execute instructions provided by memory. The one or more processors may take the form of a single core processor, multi-core processor (e.g., a dual core processor, triple core processor, quad core processor, etc.), microprocessor, etc. In some arrangements, the one or more processors may be external to the apparatus, for example the one or more processors may be a remote processor (e.g., a cloud based processor). Alternatively or additionally, the one or more processors may be internal and/or local to the apparatus. In this regard, a given circuit or components thereof may be disposed locally (e.g., as part of a local server, a local computing system, etc.) or remotely (e.g., as part of a remote server such as a cloud based server). To that end, a “circuit” as described herein may include components that are distributed across one or more locations.
An exemplary system for implementing the overall system or portions of the arrangements might include a general purpose computing computers in the form of computers, including a processing unit, a system memory, and a system bus that couples various system components including the system memory to the processing unit. Each memory device may include non-transient volatile storage media, non-volatile storage media, non-transitory storage media (e.g., one or more volatile and/or non-volatile memories), a distributed ledger (e.g., a block chain), etc. In some arrangements, the non-volatile media may take the form of ROM, flash memory (e.g., flash memory such as NAND, 3D NAND, NOR, 3D NOR, etc.), EEPROM, MRAM, magnetic storage, hard discs, optical discs, etc. In other arrangements, the volatile storage media may take the form of RAM, TRAM, ZRAM, etc. Combinations of the above are also included within the scope of machine-readable media. In this regard, machine-executable instructions comprise, for example, instructions and data which cause a general purpose computer, special purpose computer, or special purpose processing machines to perform a certain function or group of functions. Each respective memory device may be operable to maintain or otherwise store information relating to the operations performed by one or more associated circuits, including processor instructions and related data (e.g., database components, object code components, script components, etc.), in accordance with the example arrangements described herein.
It should also be noted that the term “input devices,” as described herein, may include any type of input device including, but not limited to, a keyboard, a keypad, a mouse, joystick or other input devices performing a similar function. Comparatively, the term “output device,” as described herein, may include any type of output device including, but not limited to, a computer monitor, printer, facsimile machine, or other output devices performing a similar function.
Any foregoing references to currency or funds are intended to include fiat currencies, non-fiat currencies (e.g., precious metals), and math-based currencies (often referred to as crypto currencies). Examples of math-based currencies include Bit coin, Ethereum, Ripple, Lite coin, and the like.
It should be noted that although the diagrams herein may show a specific order and composition of method blocks, it is understood that the order of these blocks may differ from what is depicted. For example, two or more blocks may be performed concurrently or with partial concurrence. Also, some method blocks that are performed as discrete blocks may be combined, blocks being performed as a combined block may be separated into discrete blocks, the sequence of certain processes may be reversed or otherwise varied, and the nature or number of discrete processes may be altered or varied. The order or sequence of any element or apparatus may be varied or substituted according to alternative arrangements. Accordingly, all such modifications are intended to be included within the scope of the present disclosure as defined in the appended claims. Such variations will depend on the machine-readable media and hardware systems chosen and on designer choice. It is understood that all such variations are within the scope of the disclosure. Likewise, software and web arrangements of the present disclosure could be accomplished with standard programming techniques with rule based logic and other logic to accomplish the various database searching blocks, correlation blocks, comparison blocks and decision blocks.
The foregoing description of arrangements has been presented for purposes of illustration and description. It is not intended to be exhaustive or to limit the disclosure to the precise form disclosed, and modifications and variations are possible in light of the above teachings or may be acquired from this disclosure. The arrangements were chosen and described in order to explain the principals of the disclosure and its practical application to enable one skilled in the art to utilize the various arrangements and with various modifications as are suited to the particular use contemplated. Other substitutions, modifications, changes and omissions may be made in the design, operating conditions and arrangement of the arrangements without departing from the scope of the present disclosure as expressed in the appended claims.
What is claimed is:
1. A data storage and translation computing system comprising: a database server comprising a processing circuit and a memory, the database server configured to receive encrypted user data and a first encrypted content encryption key (CEK) from a data entry entity and store the encrypted user data and the first encrypted CEK to the memory, the processing circuit configured to: identify requested user data and the first encrypted CEK corresponding to the requested user data, wherein the requested user data is requested by a requestor comprising a requestor identity; and transmit the first encrypted CEK corresponding to the requested user data and information indicative of the requestor identity to the key manager; and receive a second encrypted CEK corresponding to the requested user data, wherein the second encrypted CEK is decryptable by the requestor; and a key manager comprising a processing circuit and a memory storing a public/private key pair and a public key of the data exit entity, the processing circuit configured to: receive the first encrypted CEK and the information indicative of the requestor identity; identify the public key of the requestor based on the information indicative of the requestor identity; recover the CEK by decrypting the first encrypted CEK using the private key of the key manager, the database server being segregated from the private key of the key manager and the encrypted user data is not decryptable by the database server; generate a second encrypted CEK that is decryptable by the requestor by encrypting the CEK using the public key of the requestor; and transmit the second encrypted CEK to the database server.
2. The data storage and translation computing system of claim 1, wherein the key manager omits any of the encrypted user data.
3. The data storage and translation computing system of claim 1, wherein the processing circuit of the database server is further configured to generate a cryptographic message syntax (CMS) SignedData message wrapper around the encrypted user data and the second encrypted CEK.
4. The data storage and translation computing system of claim 1, wherein the processing circuit of the database server is further configured to generate a CMS SigncryptedData message wrapper around the encrypted user data and the second encrypted CEK.
5. The data storage and translation computing system of claim 1, wherein the user data and the first encrypted CEK comprise a tag, and the processing circuit of the database server is configured to identify the requested user data based on the tag.
6. The data storage and translation computing system of claim 1, wherein the requestor is a data exit entity that comprises a processing circuit and a memory storing the public key and a private key, and the processing circuit is configured to: generate a data request message comprising information indicative of the requested user data and information indicative of the identity of the data exit entity based on a request received from a user of the data exit entity; transmit the data request message to the database server; receive the encrypted user data and the second encrypted CEK; recover the CEK by decrypting the second encrypted CEK using the private key; and recover the user data by decrypting the encrypted user data using the CEK; and display the user data to the user of the data exit entity.
7. The data storage and translation computing system of claim 6, wherein the requestor is a first requestor and the requested user data is requested by the first requestor and further comprising a second requestor comprising a second requestor identity, the memory of the key manager stores a public key of the second requestor, and wherein: the processing circuit of the database server is configured to transmit information indicative of the second requestor identity to the key manager; and the processing circuit of the key manager is configured to: identify the public key of the second requestor based on the information indicative of the second requestor identity; generate a third encrypted CEK that is decryptable by the second requestor by encrypting the CEK using the public key of the second requestor; and transmit the third encrypted CEK to the database server.
8. The data storage and translation system of claim 1, wherein the key manager is in a hardware security module (HSM), and wherein the HSM is loaded into a host of the database server and the key manager and the database server reside on a single network node.
9. The data storage and translation system of claim 8, wherein the single network node is in a cloud network.
10. A data storage and translation computing system comprising: a database server comprising a processing circuit and a memory, the database server configured to receive first encrypted user data and a name of a first named content encryption key (CEK) from a data entry entity and store the first encrypted user data and the name of the first named CEK to the memory, processing circuit configured to: identify first encrypted user data corresponding to requested user data and the name of the first named CEK corresponding to the requested user data, wherein the requested user data is requested by a requestor comprising a requestor identity; and transmit the first encrypted user data corresponding to the requested user data, the name of the first named CEK, and a name of a second named CEK to the key manager; and receive second encrypted data corresponding to the requested user data, wherein the second encrypted data can be decrypted by the requestor with the second named CEK; and a key manager comprising a processing circuit and a memory storing a first shared secret generated between the key manager and a data entry entity and a second shared secret generated between the key manager and the requestor, the processing circuit configured to: receive the first encrypted user data, the name of the first named CEK, and the name of the second named CEK; recover the first named CEK based on the first shared secret and the name of the first named CEK; recover cleartext sensitive user data by decrypting the first encrypted user data with the first named CEK; recover the second named CEK based on the second shared secret and the name of the second named CEK; generate second encrypted user data that can be decrypted by the requestor by encrypting the cleartext sensitive user data using the second named CEK; and transmit the second encrypted user data to the database server, wherein the database server excludes a private key of the key manager and the second encrypted user data is not decryptable by the database server.
11. The data storage and translation computing system of claim 10, wherein the data entry entity and the requestor are each on different network nodes than the database server and the key manager.
12. The data storage and translation computing system of claim 10, wherein the encrypted user data and the name of the first named CEK comprise a tag readable by the database server, and the processing circuit of the database server is configured to identify the requested user data based on the tag.
13. The data storage and translation computing system of claim 10, wherein the first shared secret is generated by a public key cryptography (PKC) protocol between the key manager and the data entry entity, the second shared secret is generated by a PKC protocol between the key manager and the data exit entity, and wherein the PKC protocol includes a Diffie-Hellman protocol, an elliptic curve Diffie-Hellman protocol, or another post-quantum cryptography protocol.
14. The data storage and translation computing system of claim 10, wherein the requestor is a data exit entity that comprises a processing circuit and a memory storing the second shared secret and the name of the second named CEK, and the processing circuit is configured to: generate a data request message comprising information indicative of the requested user data and the name of the second named CEK and/or information indicative of the identity of the data exit entity based a request received from a user of the data exit entity; transmit the data request message to the database server; and receive the second encrypted user data; recover the second named CEK based on the second shared secret and the name of the second named CEK; recover the cleartext sensitive user data by decrypting the second encrypted user data using the second named CEK; and display the cleartext sensitive user data to the user of the data exit entity.
15. The data storage and translation system of claim 10, wherein the key manager is in a hardware security module (HSM), and wherein the HSM is loaded into a host of the database server and the key manager and the database server reside on a single network node.
16. The data storage and translation system of claim 15, wherein the single network node is in a cloud network.
17. A data storage and translation computing system comprising: a database server comprising a processing circuit and a memory, the database server configured to receive first encrypted user data and an encrypted content encryption key (CEK) from a data entry entity and store the first encrypted user data and the encrypted CEK to the memory, the processing circuit configured to: identify first encrypted user data and the encrypted CEK corresponding to requested user data, wherein the requested data is requested by a requestor comprising a requestor identity; and transmit the encrypted CEK and the first encrypted user data corresponding to the requested user data and information indicative of the requestor identity to the key manager; and receive second encrypted user data corresponding to the requested user data from the key manager, wherein the second encrypted user data is not decryptable by the requestor; a key manager comprising a processing circuit and a memory storing including a public/private key pair and a shared secret generated between the key manager and the requestor, and a name corresponding to a named CEK, the processing circuit configured to: receive the first encrypted user data and the encrypted CEK; recover the cleartext CEK by decrypting the encrypted CEK with the private key of the key manager, the database server excluding the private key of the key manager and the encrypted user data not being decryptable by the database server; recover cleartext sensitive user data by decrypting the first encrypted user data with the cleartext CEK; recover the named CEK based on the shared secret and the name of the named CEK; generate second encrypted user data that is not decryptable by the requestor by encrypting the cleartext sensitive user data using the named CEK; and transmit the second encrypted user data to the database server.
18. The data storage and translation system of claim 17, wherein the requestor is a first requestor and the requested user data is first requested user data, the encrypted CEK is a first encrypted CEK, and further comprising a second requestor comprising a second requestor identity, and the memory of the key manager includes a public key of the second requestor, and wherein: the processing circuit of the database server is configured to: identify second requested user data and a second encrypted CEK corresponding to the second requested user data, wherein the requested data is requested by the second requestor; transmit the second encrypted CEK and information indicative of the second requestor identity to the key manager; and the processing circuit of the key manager is configured to: receive the second encrypted CEK and the information indicative of the second requestor identity; identify the public key of the second requestor based on the information indicative of the second requestor identity; recover the CEK by decrypting the second encrypted CEK using the private key of the key manager; generate a third encrypted CEK that can be decrypted by the second requestor by encrypting the CEK using the public key of the second requestor; and transmit the third encrypted CEK to the database server.
19. A data storage and translation computing system comprising: a database server comprising a processing circuit and a memory, the database server configured to receive first encrypted user data and a name of a named content encryption key (CEK) from a data entry entity and store the first encrypted user data and the name of the named CEK to the memory, the processing circuit configured to: identify the first encrypted user data and the name of the named CEK corresponding to requested user data, wherein the requested user data is requested by a requestor comprising a requestor identity; and transmit the first encrypted user data and the name of the named CEK corresponding to the requested user data and information indicative of the requestor identity to the key manager; and receive second encrypted user data corresponding to the requested user data, wherein the second encrypted user data can be decrypted by the requestor; and a key manager comprising a processing circuit and a memory storing a shared secret generated between the data entry entity and the key manager, and a name corresponding to a named CEK, a public/private key pair and a public key of the data exit entity, the processing circuit configured to: receive the first encrypted user data, the name of the named CEK, and the information indicative of the requestor identity; recover the named CEK based on the name of the named CEK and the shared secret; recover cleartext sensitive user data by decrypting the first encrypted user data with the named CEK; identify the public key of the requestor based on the information indicative of the requestor identity; generate a CEK; generate second encrypted user data by encrypting the cleartext sensitive user data with the CEK; generate an encrypted CEK by encrypting the encrypted CEK with the public key of the requestor; and transmit the second encrypted user data and the encrypted CEK to the database server, wherein the database server excludes the private key of the key manager and the encrypted user data is not decryptable by the database server.
20. The data storage and translation computing system of claim 19, wherein the requestor is a first requestor, and further comprising a second requestor having a second requestor identity, the memory of the key manager stores a shared secret generated between the key manager and the second requestor, and wherein: the processing circuit of the database server is configured to: identify encrypted user data corresponding to second requested user data and a name of a second named CEK corresponding to the second requested user data, wherein the second requested user data is requested by the second requestor; and transmit the encrypted user data corresponding to the second requested user data, the name of the second named CEK, and a name of a third named CEK to the key manager; and receive second encrypted data corresponding to the second requested user data, wherein the second encrypted data can be decrypted by the second requestor with the third named CEK; and the processing circuit of the key manager is configured to: receive the encrypted user data corresponding to the second requested user data, the name of the second named CEK, and the name of the third named CEK; recover then second named CEK based on a shared secret and the name of the second named CEK; recover the cleartext sensitive user data by decrypting the encrypted user data corresponding to the second requested user data with the second named CEK; recover the third named CEK based on the shared secret generated between the key manager and the second requestor and the name of the third named CEK; generate second encrypted user data that can be decrypted by the requestor by encrypting the cleartext sensitive user data using the third named CEK; and transmit the second encrypted user data to the database server.
|
import com.hazelcast.client.ClientConfig;
import com.hazelcast.client.HazelcastClient;
import com.hazelcast.core.AtomicNumber;
import com.hazelcast.core.HazelcastInstance;
import com.hazelcast.core.ILock;
import com.hazelcast.core.IMap;
import com.hazelcast.core.ISet;
import com.hazelcast.core.MultiMap;
public class HazelcastMultiMapTest {
private static IMap<String, String> fooMap;
private static MultiMap<String, String> barMap;
private static ILock lock;
/**
* @param args
* @throws InterruptedException
*/
public static void main(String[] args) throws InterruptedException {
ClientConfig clientConfig = new ClientConfig();
clientConfig.setUpdateAutomatic(true);
clientConfig.setInitialConnectionAttemptLimit(3);
clientConfig.setReconnectionAttemptLimit(5);
clientConfig.addAddress("127.0.0.1:5701");
HazelcastInstance hazelcastInstance = HazelcastClient
.newHazelcastClient(clientConfig);
// ConcurrentMap<String,AtomicNumber> numberMap=hazelcastInstance.getMap("numberMap");
AtomicNumber number1 = hazelcastInstance.getAtomicNumber("atomicNum-1");
ISet<String> nameSet=hazelcastInstance.getSet("nameSet");
// numberMap.putIfAbsent("number1", number1);
// System.out.println(number1.equals(numberMap.get("number1")));
System.out.println(number1);
if(number1.get()==0L){
boolean succ=number1.compareAndSet(0L, 100L);
System.out.println(succ);
}
System.out.println(number1.get());
}
}
|
CREDIT GENERAL INSURANCE COMPANY, Plaintiff-Appellant, v. ABATECO SERVICES, INCORPORATED, Defendant-Appellee.
No. 00-1305.
United States Court of Appeals, Fourth Circuit.
Argued Dec. 7, 2000.
Decided March 28, 2001.
Deborah Shea O’Toole, Cowan & Owen, P.C., Richmond, VA, for appellant. David Allen Hearne, Outland, Gray, O’Keefe & Hubbard, Chesapeake, VA, for appellee.
Before WILKINS, MICHAEL, and MOTZ, Circuit Judges.
OPINION
PER CURIAM.
Credit General Insurance Company (CGIC) filed this diversity suit against its insured, Abateco Services, Inc. (Abateco), seeking a declaration that the insurance policy does not provide Abateco coverage for its expenses in repairing a fire-damaged building. Abateco counterclaimed, seeking a declaration that CGIC is obligated to reimburse Abateco for its expenses. The parties filed cross-motions for summary judgment, and the district court granted Abateco’s motion. CGIC maintains on appeal that Abateco breached a condition precedent to coverage and that, in any event, the loss is not covered under the policy. We conclude that the district court was correct in deciding that CGIC waived the condition precedent and that the policy’s operations exclusion does not apply. We also conclude that there is a material factual issue of whether Abateco was negligent, and negligence is necessary for coverage in this case. Accordingly, we affirm in part, vacate in part, and remand for further proceedings on the negligence issue.
I.
Abateco is a Virginia corporation that specializes in asbestos removal. Abateco is insured by CGIC, an Ohio corporation, under a commercial liability insurance policy. Abateco entered into a subcontract with Virtexeo Corporation (Virtexco), a general contractor that was renovating military housing for the Navy in Chesapeake, Virginia. As subcontractor Abateco was responsible for the removal of paint and asbestos at two units of a housing complex.
Roger Cornell was Abateco’s superintendent on duty at the work site. On March 20, 1998, after Cornell and the other Abateco workers left for the day, a fire broke out, damaging the two housing units. On March 23 Abateco notified CGIC of a potential claim arising out of the fire, and on March 30 CGIC acknowledged receipt of the claim. The Navy conducted an investigation into the cause of the fire and issued a report in May 1998. Cornell (the Abateco supervisor) told Navy investigators in March 1998 that he had “locked the doors” at both units at the end of the work day, shortly before the fire. However, the Navy report noted that the fire department, when it arrived to fight the fire, found that the front door to one of the units was unlocked. The report concluded, “The cause of the fire is suspicious. All causes such as electrical, mechanical, chemical, smoking material, and natural causes were systematically eliminated.” The Navy subsequently instructed Virtexco to rebuild the fire-damaged units and to continue its work under the contract. Virtexco, in turn, told Abateco to perform the repair work at its expense or face termination of the subcontract.
CGIC was aware of these events. It had received a copy of the Navy’s fire investigation report, and it knew that the Navy had demanded that the contractor rebuild the damaged units. Meanwhile, CGIC had hired Lindsey Morden Claims Services, Inc. (Lindsey Morden) to conduct its own fire investigation. Lindsey Morden concluded that “there is no negligence on the part of Abateco Services.” On July 29, 1998, CGIC notified the Navy, Virtexco, and Abateco that it was “denying] any payment in this matter.” CGIC denied coverage on the ground that the fire was neither accidental nor caused by any negligence on the part of its insured, Abateco.
Abateco completed the repairs to the fire-damaged units at its own expense. On March 25, 1999, Abateco wrote CGIC, demanding that CGIC reimburse it for the repair costs in the amount of $191,671.70. CGIC based its demand on a March 15, 1999, letter written by Cornell, its supervisor. In this letter Cornell said that at the time the fire occurred, he was not checking at the end of each work day to make sure that the front and kitchen doors to the units were locked. According to Cornell, “The only door locked and checked daily was the garage door. The kitchen and side/front entrance doors were only checked when the containment was originally constructed,” which was well before the fire. In its March 1999 demand to CGIC for reimbursement, Abateco asserted that Cornell’s failure to lock all doors constituted negligence, and therefore the fire loss was covered under the insurance policy.
On July 20, 1999, CGIC filed this action, seeking a declaration that it is not obligated under the insurance policy to cover Abateco’s loss. Abateco counterclaimed, seeking the opposite, a declaration that it was entitled to insurance coverage for the repair costs. After both parties moved for summary judgment, they filed a stipulation of facts. Among other things, the parties stipulated that “unknown individuals” had entered the housing units and started the fire.
CGIC argued that Abateco was not entitled to coverage because it had failed to obtain CGIC’s consent before incurring the costs of repair. CGIC’s consent was a condition precedent to coverage under the policy. Abateco responded that CGIC had waived compliance with the condition precedent by denying the claim. CGIC also maintained that the loss was not a covered “occurrence” because there was no “accident.” Finally, the insurance company argued that the loss was excluded from coverage for two other reasons: (1) because Abateco had contractually assumed liability and (2) because the loss arose out of Abateco’s operations.
The district court analogized the condition precedent in this case to a policy provision requiring the filing of a proof of loss. Under Virginia law if an insurance company denies liability and refuses to pay a claim, it waives the right to insist upon the insured’s filing of a proof of loss. Likewise, the district court concluded that by denying liability, CGIC had waived compliance with the condition precedent. It would have been useless for Abateco to attempt to get CGIC’s consent to incur the repair costs because CGIC had already refused to pay the claim.
The district court also rejected CGIC’s other arguments. It concluded that the loss was an “occurrence” under the policy because the fire was caused by an “accident,” that is, Cornell’s “negligen[ce] in failing to secure the premises.” Furthermore, the district court held that neither of the policy exclusions relied upon by CGIC are applicable. According to the district court, Abateco did not assume liability under section I(2)(b) of the policy, see supra note 4, by reason of its subcontract with Virtexco. Abateco had to repair the units to avoid being held in default under its subcontract. In addition, the district court concluded that the operations exclusion in section I(2)(j)(5) of the policy, see supra note 4, did not release CGIC from its obligations. According to the court, the fire damage did not arise out of Abateco’s operations since the fire started after all of the workers had left for the day. Based on the above reasoning, the district court granted Abateco’s motion for summary judgment. CGIC appeals.
II.
We review a grant of summary judgment de novo. See Marshall v. Cuomo, 192 F.3d 473, 478 (4th Cir.1999). Summary judgment is appropriate when “there is no genuine issue as to any material fact” and “the moving party is entitled to a judgment as a matter of law.” Fed. R.Civ.P. 56(c). Any doubts as to the existence of a genuine issue of material fact will be resolved against the moving party. See Langham-Hill Petroleum Inc. v. S. Fuels Co., 813 F.2d 1327, 1329 (4th Cir. 1987); Girard v. Gill, 261 F.2d 695, 697 (4th Cir.1958). Before entering summary judgment, a court must be certain that based on the record in front of it, there is no disputed issue of material fact. See Stiltner v. Beretta U.S.A. Corp., 74 F.3d 1473, 1478 (4th Cir.1996); Parar-Chem S., Inc. v. M. Lowenstein Corp. 715 F.2d 128, 132 (4th Cir.1983).
We are satisfied that there is no factual dispute with respect to two of the issues decided by the district court: that CGIC waived compliance with the policy’s condition precedent and that the policy’s operations exclusion does not apply. We are also satisfied that the district court reached the correct result in granting summary judgment to Abateco on these two issues, and to that extent we affirm on the reasoning of the district court. See Credit Gen. Ins. Co. v. Abateco Servs., Inc., No. 3:99CV516 (E.D.Va. Feb. 25, 2000). We conclude, however, that there is a material factual dispute relating to whether the fire loss was covered under the insurance policy.
Abateco’s insurance coverage extends to property damage that is caused by an “occurrence,” which is defined as an “accident.” An “accident” generally includes an insured’s negligence but excludes an insured’s intentional acts. See 14 Lee R. Russ & Thomas F. Segalla, Couch on Insurance § 201:6 (3d ed. 2000). Abateco claims that Cornell’s negligence in failing to secure the doors to the units is the “occurrence” that entitles it to insurance coverage for the fire loss. But Abateco is not entitled to a full award of summary judgment unless Abateco can establish that there is no dispute of fact as to Cornell’s negligence.
Cornell’s (or Abateco’s) negligence is relevant for another reason. The insurance policy contains an exclusion for those losses which the insured is obligated to pay “by reason of the assumption of liability in a contract or agreement.” This exclusion serves to deny coverage in those cases where an insured agrees to hold harmless or indemnify a third party. See 9 Couch on Insurance § 129:30. The district court concluded that this exclusion does not apply to Abateco because Abateco did not assume liability under its subcontract with Virtexco. We do not have to go that far, however. The exclusion, by its terms, is inapplicable if the insured would be liable for the loss “in the absence of the contract or agreement.” In other words, “the exclusion does not destroy coverage for the insured’s own negligence, even that stemming from the insured’s negligent performance of a contract.” 9 Couch on Insurance § 129:30. If Abateco’s negligence caused the fire loss, it would be liable for repairing the housing units regardless of whether its subcontract required it to assume liability for fire loss. Therefore, if Abateco could show that it was negligent, CGIC would not be able to raise the exclusion as a bar to insurance coverage.
Abateco relies on Cornell’s March 15, 1999, letter to establish its negligence. CGIC, however, did not stipulate or agree that Cornell failed to secure the doors to the units. Rather, CGIC pointed out to the district court and to us that Cornell had made inconsistent statements about what he did. On the one hand, Cornell told Navy investigators in March 1998 that he had “locked the doors” at both units. On the other hand, one year later in his March 15, 1999, letter supporting his employer’s demand to the insurance company, Cornell said: “The only door locked and checked daily was the garage door. The kitchen and side/front entrance doors were only checked [well before the fire] when the containment was originally constructed.” There might be an explanation for the apparent inconsistency in Cornell’s statements, but the inconsistency is too material to ignore at the summary judgment stage, particularly since it was noted by CGIC in the district court.
For the foregoing reasons, we conclude that Abateco is not entitled to complete summary judgment because a genuine issue of material fact remains — whether Cornell was negligent in failing to secure the doors to the housing units. Accordingly, we vacate the district court’s entry of complete summary judgment in favor of Abateco and remand for further proceedings on the issue of negligence.
AFFIRMED IN PART, VACATED IN PART, AND REMANDED.
. Before CGIC had filed suit, Virtexco, on behalf of Abateco, had submitted a claim to the Navy Contracting Officer, seeking reimbursement for the cost of repairing the fire-damaged units. The Navy issued a decision denying the claim, and an appeal was filed with the Armed Services Board of Contract Appeals.
. Section IV(2)(d) of the policy provides, "No insureds will, except at their own cost, voluntarily make a payment, assume any obligation, or incur any expense, other than for first aid, without our consent.”
. Section I(l)(b) of the policy provides, "This insurance applies to ‘bodily injury’ and 'property damage' only if ... [tjhe 'bodily injury' or ‘property damage' is caused by an 'occurrence’ that takes place in the 'coverage territory’. ...” Section V(9) defines "occurrence” as "an accident.” CGIC claimed that there was no "accident” because the Navy report concluded that the fire was of suspicious origin.
. Section I(2)(b) of the policy excludes from coverage that property damage "for which the insured is obligated to pay damages by reason of the assumption of liability in a contract or agreement.” Section I(2)(j)(5) states that the insurance does not apply to property damage to "[tjhat particular part of real property on which [the insured’s] contractors or subcontractors ... are performing operations if the 'property damage' arises out of those operations.”
|
Injecting credentials into web browser requests
ABSTRACT
A password manager injects credentials into a web browser request. A user can browse to a form provided by a server that includes a password field. A plug-in requests a password for the field from a password manager. The actual password is not provided to the plug-in or the browser. The password manager provides a proxy password that is not the actual password for the field. A request interceptor in a separate process from the browser intercepts the completed request as it is sent to the server and replaces the proxy password with the actual password.
CROSS-REFERENCE TO RELATED APPLICATIONS
This Application claims priority to U.S. Provisional Patent Application Ser. No. 62/181,699, filed on Jun. 18, 2015, to Petr Dvorák, entitled “Injecting Credentials into Web Browser Requests,” the entire disclosure of which is incorporated herein by reference.
FIELD OF THE INVENTION
The disclosure relates generally to web browsers, and more particularly, to injecting credentials into web browser requests.
BACKGROUND OF THE INVENTION
Many web applications and popular on-line services today use a combination of username and password for authentication. The use of passwords as an authentication mechanism has produced many challenges. One such challenge is that an end user may be required to remember many passwords for the different applications and on-line services used by the end user. Users are generally unable to perform this task properly. For example, the end users commonly choose one master password for all their web applications and services. Alternatively, the end user may write down the passwords, or they simply forget-and-renew them.
A separate category of applications referred to as password managers has emerged to solve this problem. Currently, password managers are typically browser plugins that are able to fill in the credentials directly into web HTML forms, in order to simplify and improve the user experience. This approach, on the other hand, can still make the passwords vulnerable to malicious JavaScript or malicious browser plugins or extensions (generally, to malicious software running in the scope of the web browser). These malicious pieces of software are able to read the password as soon as it is filled in the form and thus compromise the user's account.
SUMMARY OF THE INVENTION
Systems and methods employ a password manager that injects credentials into a web browser request. In particular, systems and methods include making a determination that a form includes a password field for a server application. A password for the server application is requested by a browser plugin from a password manager application, known as a password manager. In response to the request, data is received from the password manager. The data received from the password manager is not the actual password for the server application.
A password proxy is created from the data. The password proxy may be created by creating a derivative of the data received from the password manager. The password proxy may be created by applying a transformation to the data received from the password manager. The password proxy may be created by creating a randomly generated string of text. The password proxy may be created by creating an encrypted version of the actual password. The password proxy may be generated in the native password manager application. Alternatively, the password proxy may be generated in the browser plugin in a manner that enables the password manager application to look up the password. For example, in the case in which the password proxy is generated in the browser plugin, the public key in the browser plugin could be used to encrypt the login information with a login verifier and a private key in the password manager application could be used to decrypt the data and use it for looking up the actual password.
The password manager maintains a reference to the data. The maintained reference to the data associates the data with the actual password for the server application. In embodiments, the reference to the data is maintained for a limited amount of time. In embodiments, the data and the password are deleted after the data has been used once by the password manager to provide the password to the server application. In embodiments, the data and the password are deleted in response to a determination that a tab or window of a browser has closed.
The password field is filled with the created password proxy. A request interceptor intercepts a login request, containing the password proxy, which is intended for the server application. In particular, the request interceptor intercepts a login request containing the password proxy, issued by a browser, where the intended address of the login request is a server hosting the server application. The request interceptor determines the actual password for the server application based on the password proxy, such as by reversing a prior transformation to a data string that was supplied by the password manager to the browser plugin and then retrieving the actual password that is stored in association with that data string. The password proxy is replaced by the actual password and the request interceptor forwards the login request with the actual password to the server application.
DESCRIPTION OF THE SEVERAL VIEWS OF THE DRAWING
For a better understanding of the inventive subject matter, reference may be made to the accompanying drawings in which:
FIG. 1 is a block diagram of an operating environment for a system that injects credentials into a web browser request issued to a server application.
FIG. 2 is a flow chart illustrating operations of a method for a browser to request a password from a password manager and provide a password proxy to a browser form that contains a password field.
FIG. 3 is a flow chart illustrating operations of a method intercepting a request and injecting credentials to the request.
FIG. 4 is a sequence diagram illustrating operations for injecting credentials into a browser request.
FIG. 5 is a block diagram of an example embodiment of a computer system upon which embodiments of the inventive subject matter can execute.
DETAILED DESCRIPTION OF THE INVENTION
In the following detailed description of example embodiments of the invention, reference is made to the accompanying drawings that form a part hereof, and in which is shown by way of illustration specific example embodiments in which the invention may be practiced. These embodiments are described in sufficient detail to enable those skilled in the art to practice the inventive subject matter, and it is to be understood that other embodiments may be utilized and that logical, mechanical, electrical and other changes may be made without departing from the scope of the inventive subject matter.
Some portions of the detailed descriptions which follow are presented in terms of algorithms and symbolic representations of operations on data bits within a computer memory. These algorithmic descriptions and representations are the ways used by those skilled in the data processing arts to most effectively convey the substance of their work to others skilled in the art. An algorithm is here, and generally, conceived to be a self-consistent sequence of steps leading to a desired result. The steps are those requiring physical manipulations of physical quantities. Usually, though not necessarily, these quantities take the form of electrical or magnetic signals capable of being stored, transferred, combined, compared, and otherwise manipulated. It has proven convenient at times, principally for reasons of common usage, to refer to these signals as bits, values, elements, symbols, characters, terms, numbers, or the like. It should be borne in mind, however, that all of these and similar terms are to be associated with the appropriate physical quantities and are merely convenient labels applied to these quantities. Unless specifically stated otherwise as apparent from the following discussions, terms such as “processing” or “computing” or “calculating” or “determining” or “displaying” or the like, refer to the action and processes of a computer system, or similar computing device, that manipulates and transforms data represented as physical (e.g., electronic) quantities within the computer system's registers and memories into other data similarly represented as physical quantities within the computer system memories or registers or other such information storage, transmission or display devices.
In the Figures, the same reference number is used throughout to refer to an identical component that appears in multiple Figures. Signals and connections may be referred to by the same reference number or label, and the actual meaning will be clear from its use in the context of the description. In general, the first digit(s) of the reference number for a given item or part of the invention should correspond to the Figure number in which the item or part is first identified.
The description of the various embodiments is to be construed as examples only and does not describe every possible instance of the inventive subject matter. Numerous alternatives could be implemented, using combinations of current or future technologies, which would still fall within the scope of the claims. The following detailed description is, therefore, not to be taken in a limiting sense, and the scope of the inventive subject matter is defined only by the appended claims.
FIG. 1 is a block diagram of an operating environment for a system 100 that injects credentials into a web browser request issued to a server application. In some embodiments, system 100 includes a browser 102, a password manager 110, and a server application 120.
Browser 102 can be any type of web browser application such as MICROSOFT® INTERNET EXPLORER®, GOOGLE® CHROME®, MOZILLA® FIREFOX®, APPLE® SAFARI® etc. Browser 102 includes a browser plugin 104. Plugin 104 is loadable by browser 102 and becomes a part of browser 102. Plugin 104 typically extends the functionality of browser 102. A plugin may also be referred to as an extension. In some embodiments, plugin 104 is a password manager plugin that interacts with password manager 110 to simplify and improve password entry for server applications that require a password. The plugin 104 can read and manipulate HTML (Hypertext Markup Language) or DOM (Document Object Model) of a form loaded in the browser 102. For example, the server application 120 may provide a login form 106 that includes a password field. The plugin 104 can recognize the login form 106, and request a particular password associated with a user from password manager 110. The use of a password manager 110 and plugin 104 provides a means for a user to securely maintain various passwords for various software applications without having to remember each individual password for each of the various software application.
Password manager 110 is an application that is executed outside of and separate from the browser application. Password manager 110 maintains a database of login credentials (e.g., usernames and passwords) for a user. The database of passwords can include different sets of credentials associated with different applications and web pages utilized by an end-user. The password manager 110 can securely store the credentials, match the credentials to websites or applications, and can typically synchronize, share or export the credentials. Password manager 110 can encrypt the credential data so that the credential data is not in a clear text form as is typically the case when user's write down their user names and passwords.
Password manager 110 can include a request interceptor 112. Request interceptor 112 intercepts requests directed from browser 102 to server application 120 that contain password information for the server application 120 to use to authenticate the user of the browser 102.
In aspects where a request comprises an HTTPS request, password manager 110 can be configured as a root certificate authority so that the request interceptor 112 of the password manager 110 can intercept HTTPS requests. Other types of requests can be intercepted in alternative aspects of the disclosure. In such aspects, the request can be intercepted using a mechanism appropriate to the protocol used to issue the request. In general, any mechanism that redirects requests containing passwords outside of browser 102 can be used. Although shown as part of password manager 112, in some embodiments, request interceptor 112 can be a separate process.
Server application 120 can be any application that provides a login form 106 to a browser 102 for use in authenticating an end user or computing device used by an end user. In some embodiments, server application 120 is a web application that uses form-based authentication. Examples of such applications include financial applications (e.g., banking, stock trading, retirement account management, credit card account management etc.), social networking applications (e.g., Facebook, Linkedin, Twitter, Instagram etc.), information subscription accounts (newspaper, magazines, etc.), medical or educational record accounts etc. The embodiments are not limited to any particular type of server application.
In some aspects, password manager 110 is configured as a “man-in-the-middle” application in order to intercept requests from browser 102 before the request is delivered to server application 120. When the browser 102 is about to make a connection to the server application 120, password manager 110 takes over the handshake and connects itself to the server 120. When the server 120 sends its certificates as part of the HTTPS handshake, the password manager may verify them against a Windows system certificate store, a storage commonly used by browsers such as browser 102. The password manager then impersonates the browser 102 with respect to server 120 and impersonates the server 120 with respect to browser 102. Password manager 110 can run with Administrator rights and/or elevated trust on the computer. For example, it can create and store certificates that the browser 102 correctly accepts and trusts with respect to the machine that the password manager 110 is running on. For every original certificate, the password manager can make a copy and sign it with a special root certificate, located in the Windows certificate store. This special certificate can be used to clearly distinguish that the password manager created the special certificate.
Further details on the operation of system 100 will now be provided with reference to FIGS. 2-4.
FIG. 2 is a flow chart 200 illustrating operations of a method for a plugin to request a password from a password manager and provide a password proxy to a browser form that contains a password field. The method begins at block 202 by sending a request to a password manager to obtain a password. Typically the request will be sent in response to detecting that a form contains a password or PIN (Personal Identification Number) field. For example, a plugin 104 of a browser application may detect that a login form 106 sent from a server application 120 and displayed by the browser application 102 has a password or PIN field.
At block 204, a response is received from the password manager, where the response contains a data string for use in generating a proxy password. In some embodiments, the data string is a random string of characters that is generated by the password manager. The data string may not be the actual password for the server application 120. The password manager 110 maintains an internal reference to the data string for later use by the request interceptor 112. The internal reference associates the data string with the actual password for the server application. The reference to the data string may be kept by the password manager 110 for a limited amount of time. For example, in some aspects, the data string can treated as a “one time use” data string. In such aspects, the data string and password can be deleted after the data string has been used once by the password manager to return provide the password to server application 120. In alternative aspects, the data string and password can be deleted in response to determining that a tab or window of browser 102 that uses the proxy password has been closed.
At block 206, a password proxy is created from the data string. In some embodiments, the password proxy is a derivative of the data string. In other words, a transformation is applied to the data string to create the password proxy. Like the data string, the password proxy is not the actual password for the server application 120. In some aspects, the password proxy can be a randomly generated string of text. In alternative aspects, the password proxy can be an encrypted version of the actual password. For example, the password proxy can be encrypted using Advanced Encryption Standard (AES) or other encryption technique now known or developed in the future. Further transformations can be made to the actual password in order to further obfuscate the actual password during communication between components such as plugin 104, browser 102, and request interceptor 112.
At block 208, the plugin 104 fills in a password field of a login form with the password proxy.
After the plugin 104 has supplied the password proxy to the login form, the browser 102 issues a login request containing the password proxy (and username). The intended address of the login request is that of the server hosting server application 120.
FIG. 2 has described operations performed by a plugin (e.g., a browser password manager plugin). The detailed description will continue with details on operations performed by a password manager and request interceptor that can intercept the login request issued by the browser.
FIG. 3 is a flow chart 400 illustrating operations of a method intercepting a request and injecting credentials into the request. The method begins at block 302 where a password manager initializes as a request interceptor. As noted above, in some embodiments, the password manager establishes itself as a root certificate authority such that HTTPS requests are sent to the password manager instead of the intended destination.
At block 304, the request interceptor receives a request intended for a server application. As discussed above with respect to FIG. 2, the request can include login credentials such as a user name and a password, where the password in the request is a password proxy that is not the actual password of user of the server application.
At block 306, the password manager determines the actual password based on the password proxy received by the request interceptor. The password manager reverses the transformation of the password proxy to obtain the original data string supplied by the password manager to the plugin at block 206 (FIG. 2). As noted above, the password manager maintains an association from the data string to the actual credential data including the actual password for the user of the server application. The password manager uses this association to retrieve the actual credentials. The request interceptor replaces the password proxy in the intercepted request with the actual password for the server application.
At block 308, the request interceptor sends the password to the intended server application.
FIGS. 3 and 4 have described operations performed by a plugin and a password manager respectively. A sequence of operations showing the coordination of the plugin, browser and password manager will now be described.
FIG. 4 is a sequence diagram 400 illustrating operations for injecting credentials into a browser request. At operation 402, in response to the display of a login form by browser 102, the plugin 104 requests a password for server application 120 from password manager 110. In particular, the plugin queries for a password associated with a given web page provided by server application 120.
At operation 404, the password manager determines that a password exists for the requested page. Rather than sending the actual password, the password manager 110. sends a data string to the plugin 104. In some embodiments, the data string is a set of randomly generated characters. In alternative embodiments, the data string can be an encrypted version of the actual password. The password manager maintains an association between the data string and the actual credentials.
At operation 406, the plugin 104 fills in credential information (at least a password or PIN) on the form with the password proxy.
At operation 408, the browser 102 sends the request (containing the password proxy) with the server application 120 as the intended destination.
At operation 410, the request interceptor 112 of password manager 110 intercepts the request. The request interceptor 112 applies a reverse transformation to the password proxy to obtain the data string. The request interceptor 112 then uses the data string association with the actual credential information to retrieve the actual credential information. The request interceptor replaces the proxy password in the credential information in the request with the actual password and forwards the request to the server application 120.
At operation 412, the server application 120 uses the actual credential information (including the actual password) in the forwarded request to establish an authenticated communication session with the browser 102.
As will be appreciated from the foregoing, some embodiments provide a password manager that is separate and independent from a web browser, where the actual password is not entered within the browser, but is supplied after the browser issues a login request. As a result, malicious JavaScript running on the web page or malicious browser plugins or extensions are unable to obtain the actual password for a server application.
FIG. 5 is a block diagram of an example embodiment of a computer system 500 upon which embodiments of the inventive subject matter can execute. The description of FIG. 5 is intended to provide a brief, general description of suitable computer hardware and a suitable computing environment in conjunction with which the invention may be implemented. In some embodiments, the inventive subject matter is described in the general context of computer-executable instructions, such as program modules, being executed by a computer. Generally, program modules include routines, programs, objects, components, data structures, etc., that perform particular tasks or implement particular abstract data types.
As indicated above, the system as disclosed herein can be spread across many physical hosts. Therefore, many systems and sub-systems of FIG. 5 can be involved in implementing the inventive subject matter disclosed herein.
Moreover, those skilled in the art will appreciate that the invention may be practiced with other computer system configurations, including hand-held devices, multiprocessor systems, microprocessor-based or programmable consumer electronics, smart phones, network PCs, minicomputers, mainframe computers, and the like. Embodiments of the invention may also be practiced in distributed computer environments where tasks are performed by I/O remote processing devices that are linked through a communications network. In a distributed computing environment, program modules may be located in both local and remote memory storage devices.
With reference to FIG. 5, an example embodiment extends to a machine in the example form of a computer system 500 within which instructions for causing the machine to perform any one or more of the methodologies discussed herein may be executed. In alternative example embodiments, the machine operates as a standalone device or may be connected (e.g., networked) to other machines In a networked deployment, the machine may operate in the capacity of a server or a client machine in server-client network environment, or as a peer machine in a peer-to-peer (or distributed) network environment. Further, while only a single machine is illustrated, the term “machine” shall also be taken to include any collection of machines that individually or jointly execute a set (or multiple sets) of instructions to perform any one or more of the methodologies discussed herein.
The example computer system 500 may include a processor 502 (e.g., a central processing unit (CPU), a graphics processing unit (GPU) or both), a main memory 504 and a static memory 506, which communicate with each other via a bus 508. The computer system 500 may further include a video display unit 510 (e.g., a liquid crystal display (LCD) or a cathode ray tube (CRT)). In example embodiments, the computer system 500 also includes one or more of an alpha-numeric input device 512 (e.g., a keyboard), a user interface (UI) navigation device or cursor control device 514 (e.g., a mouse), a disk drive unit 516, a signal generation device 518 (e.g., a speaker), and a network interface device 520.
The disk drive unit 516 includes a machine-readable medium 522 on which is stored one or more sets of instructions 524 and data structures (e.g., software instructions) embodying or used by any one or more of the methodologies or functions described herein. The instructions 524 may also reside, completely or at least partially, within the main memory 504 or within the processor 502 during execution thereof by the computer system 500, the main memory 504 and the processor 502 also constituting machine-readable media.
While the machine-readable medium 522 is shown in an example embodiment to be a single medium, the term “machine-readable medium” may include a single medium or multiple media (e.g., a centralized or distributed database, or associated caches and servers) that store the one or more instructions. The term “machine-readable medium” shall also be taken to include any tangible medium that is capable of storing, encoding, or carrying instructions for execution by the machine and that cause the machine to perform any one or more of the methodologies of embodiments of the present invention, or that is capable of storing, encoding, or carrying data structures used by or associated with such instructions. The term “machine-readable storage medium” shall accordingly be taken to include, but not be limited to, solid-state memories and optical and magnetic media that can store information in a non-transitory manner, i.e., media that is able to store information. Specific examples of machine-readable media include non-volatile memory, including by way of example semiconductor memory devices (e.g., Erasable Programmable Read-Only Memory (EPROM), Electrically Erasable Programmable Read-Only Memory (EEPROM), and flash memory devices); magnetic disks such as internal hard disks and removable disks; magneto-optical disks; and CD-ROM and DVD-ROM disks.
The instructions 524 may further be transmitted or received over a communications network 526 using a signal transmission medium via the network interface device 520 and utilizing any one of a number of well-known transfer protocols (e.g., FTP, HTTP). Examples of communication networks include a local area network (LAN), a wide area network (WAN), the Internet, mobile telephone networks, Plain Old Telephone (POTS) networks, and wireless data networks (e.g., WiFi and WiMax networks). The term “machine-readable signal medium” shall be taken to include any transitory intangible medium that is capable of storing, encoding, or carrying instructions for execution by the machine, and includes digital or analog communications signals or other intangible medium to facilitate communication of such software.
Although an overview of the inventive subject matter has been described with reference to specific example embodiments, various modifications and changes may be made to these embodiments without departing from the broader spirit and scope of embodiments of the present invention. Such embodiments of the inventive subject matter may be referred to herein, individually or collectively, by the term “invention” merely for convenience and without intending to voluntarily limit the scope of this application to any single invention or inventive concept if more than one is, in fact, disclosed.
As is evident from the foregoing description, certain aspects of the inventive subject matter are not limited by the particular details of the examples illustrated herein, and it is therefore contemplated that other modifications and applications, or equivalents thereof, will occur to those skilled in the art. It is accordingly intended that the claims shall cover all such modifications and applications that do not depart from the spirit and scope of the inventive subject matter. Therefore, it is manifestly intended that this inventive subject matter be limited only by the following claims and equivalents thereof.
The Abstract is provided to comply with 37 C.F.R. § 1.72(b) to allow the reader to quickly ascertain the nature and gist of the technical disclosure. The Abstract is submitted with the understanding that it will not be used to limit the scope of the claims.
What is claimed is:
1. A method comprising: determining that a form includes a password field for a server application, wherein the form is displayed within a tab or a window of a browser executing on a device; requesting a password for the server application from a password manager, wherein the password manager is executed on the device and includes a request interceptor; receiving data from the password manager responsive to the request, wherein the data is not the actual password for the server application, and wherein the password manager maintains an internal reference associating the data with the actual password for the server application; creating a password proxy from the data; filling in the password field with the password proxy; issuing, by the browser, a login request containing the password proxy, wherein an intended address of the login request is a server hosting the server application; intercepting, by the request interceptor on the device, the login request containing the password proxy that is intended for the server application; determining, by the request interceptor on the device, the actual password for the server application by reversing the password proxy to obtain the data from which the password proxy was created and obtaining the actual password from the internal reference associating the data with the actual password; replacing, by the request interceptor on the device, the password proxy with the actual password in the login request; forwarding, by the request interceptor on the device, the login request including the actual password to the server application; and deleting the data received from the password manager and the password proxy in response to determining that the tab or the window of the browser within which the form is displayed has closed.
2. The method of claim 1, wherein said maintaining a reference to the data comprises maintaining the reference to the data for a limited amount of time.
3. The method of claim 2, said method further comprising deleting the data after the data has been used once by the password manager to provide the password to the server application.
4. The method of claim 1, wherein said creating a password proxy from the data comprises creating a derivative of the data to create the password proxy.
5. The method of claim 1, wherein said creating a password proxy from the data comprises applying a transformation to the data to create the password proxy.
6. The method of claim 1, wherein said creating a password proxy from the data comprises creating a randomly generated string of text.
7. The method of claim 1, wherein said creating a password proxy from the data comprises creating an encrypted version of the actual password.
8. The method of claim 1, said method further comprising initializing the request interceptor.
9. A method comprising: initializing a request interceptor on a device, wherein the request interceptor comprises a password manager; intercepting, by the request interceptor on the device, a login request intended for a server application, the login request including a password proxy, and the login request issued by a browser executing on the device; determining, by the request interceptor on the device, an actual password for the server application by reversing the password proxy to obtain data from which the password proxy was created and obtaining the actual password from an internal reference associating the obtained data with the actual password; replacing, by the request interceptor on the device, the password proxy with the actual password in the login request; forwarding, by the request interceptor on the device, the login request including the actual password to the server application; and deleting, by the request interceptor, the data and the password proxy in response to determining that a tab or a window of the browser that uses the password proxy has closed.
10. The method of claim 9, wherein the password manager establishes itself as a root certificate authority.
11. A method comprising: displaying a browser, wherein the browser is executing on a device; determining that a form includes a password field for a server application, wherein the form is displayed within a tab or a window of the browser; requesting a password for the server application from a password manager, wherein the password manager is executed on the device, and wherein the password manager is separate and independent from the browser; receiving data from the password manager responsive to the request, wherein the data is not the actual password for the server application, wherein the password manager maintains an internal reference associating the data with the actual password for the server application; creating a password proxy from the data; filling in the password field with the password proxy; issuing, with the browser, a login request containing the password proxy, wherein an intended address of the login request is a server hosing the server application; initializing a request interceptor on the device, wherein the request interceptor comprises the password manager; intercepting, by the request interceptor on the device, the login request containing the password proxy that is intended for the server application; determining, by the request interceptor on the device, the actual password for the server application by reversing the password proxy to obtain the data from which the password proxy was created and obtaining the actual password from the internal reference associating the data with the actual password; replacing, by the request interceptor on the device, the password proxy with the actual password in the login request; forwarding, by the request interceptor on the device, the login request including the actual password to the server application; and deleting the data received from the password manager and the password proxy responsive to determining that the tab or the window of the browser within which the form is displayed has closed.
|
Mixed payments issue when "change" is used
Incorrect handling of 'cash' + 'card' + 'change' payment type.
Device : Tremol FP03
Fiscal receipt is printed with 'false' response being sent back.
Replicate :
Request :
{
"uniqueSaleNumber": "ZK111111-0001-0000001",
"items": [
{
"text": "TEST_1",
"quantity": 1,
"unitPrice": 15.00,
"taxGroup": 2
},
{
"text": "TEST_2",
"quantity": 1,
"unitPrice": 20.00,
"taxGroup": 2
}
],
"payments": [
{
"amount": 20.00,
"paymentType": "card"
},
{
"amount": 30.00,
"paymentType": "cash"
},
{
"amount": -15.00,
"paymentType": "change"
}
]
}
Response :
{
"receiptNumber": "",
"receiptDateTime": "0001-01-01T00:00:00",
"receiptAmount": 0,
"fiscalMemorySerialNumber": "",
"ok": false,
"messages": [
{
"type": "error",
"code": "E101",
"text": "The BaseStream is only available when the port is open."
},
{
"type": "info",
"text": "Error occurred while reading last receipt QR code data"
}
]
}
Requesting 'change' from 'card' payment :
Request :
{
"uniqueSaleNumber": "ZK111111-0001-0000002",
"items": [
{
"text": "TEST_1",
"quantity": 1,
"unitPrice": 15.00,
"taxGroup": 2
},
{
"text": "TEST_2",
"quantity": 1,
"unitPrice": 20.00,
"taxGroup": 2
}
],
"payments": [
{
"amount": 50.00,
"paymentType": "card"
},
{
"amount": -15.00,
"paymentType": "change"
}
]
}
Response :
{
"receiptNumber": "",
"receiptDateTime": "0001-01-01T00:00:00",
"receiptAmount": 0,
"fiscalMemorySerialNumber": "",
"ok": false,
"messages": [
{
"type": "error",
"code": "E101",
"text": "Access to the path 'COM4' is denied."
},
{
"type": "info",
"text": "Error occurred while reading last receipt QR code data"
}
]
}
Please provide debug.log
Its looks like connection issue.
debug.log.1.zip
Even on false response a receipt is printed !
Yes, you're right it looks like a connection issue. Previous versions tho weren't having such issues, but this one is used as a 'service'/ msi.
OS: Windows 8.1 ( 6.3.9600 )
Fiscal Unit : Tremol FP03
Any help would be greatly appreciated.
|
---
date: 2021-12-26
time: 20h:00min
duration: "02:30:00"
title: "The 100th Episode"
tags: ["100", "geeksblabla"]
category: "career"
isNext: false
youtube: https://www.youtube.com/watch?v=1Ds--L9ERf0
published: true
featured: true
---
In this episode of GeeksBlabla, we celebrate the 100th episode, we discussed how the podcast started, how we work as a team behind the scene and some statistics about the podcast.
## Guests
- [Mohammed Aboullaite](https://aboullaite.me)
- [Soubai Abderahim](https://soubai.me)
- [Meriem Zaid](https://www.facebook.com/MeriemZaid)
- [Otmane Fettal](https://twitter.com/ofettal)
## Notes
0:00:00 - Introduction
0:04:00 - How the podcast started?
0:23:00 - The secret behind podcast consistency.
0:43:00 - Audience reviews
0:59:00 - Episodes preparation and tools we use
1:10:00 - Statistics quiz
1:19:00 - Geeksblabla funny moments
1:38:00 - Wrap up & Goodbye
## Prepared and Presented by
- [Youssouf El Azizi](https://elazizi.com/)
|
Page:Decline and Fall of the Roman Empire vol 3 (1897).djvu/402
testament 382 THE DECLINE AND FALL to foretell that she should behold the long and auspicious reign of her glorious son. The catholics applauded the justice of heaven, which avenged the persecution of St. Chrysostom ; and perhaps the emperor was the only pereon who sincerely bewailed the loss of the haughty and rapacious Eudoxia. Such a domestic misfortune afflicted hivi more deeply than the public calamities of the East ; *^^ the licentious excursions, fi-om Pontus to Pales- tine, of the Isaurian robbers, whose impunity accused the weak- ness of the government ; and the earthquakes, the conflagrations, the famine, and the flights of locusts,^^ which the popular dis- content was equally disposed to attribute to the incapacity of the monarch. At length, in the thirty-first year of his age, after a reign (if we may abuse that word) of thii'teen years, three months, and fifteen days, Arcadius expired in the palace of Constantinople. It is impossible to delineate his character ; since, in a period very copiously furnished with historical materials, it has not been possible to remark one action that properly belongs to the son of the great Theodosius. His stippoBed The historian Procopius ^^ has indeed illuminated the mind of the dying emperor with a ray of human prudence or celestial wisdom. Arcadius considered, with anxious foresight, the helpless condi- tion of his son Theodosius, who was no more than seven years of age, the dangerous factions of a minority, and the aspiring spirit of Jezdegerd, the Persian monarch. Instead of tempting the allegiance of an ambitious subject by the participation of supreme power, he boldly appealed to the magnanimity of a king ; and placed, by a solemn testament, the sceptre of the East in the hands of Jezdegerd himself. The royal guardian accepted and dischai'ged this honourable trust with unexampled fidelity ; and the infancy of Theodosius was protected by the arms and councils of Persia. Such is the singular narrative of Procopius ; and his veracity is not disputed by Agathias,^^ while he presumes to dissent from his judgment and to arraign the wisdom of a Christian emperor, who so rashly, though so fortu- •ii Philostorg. 1. xi. c. 8, and Godefroy, Dissertat. p. 457. 62 Jerom (torn. vi. p. 73, 76) describes, in lively colours, the regular and destruc- tive march of the locusts, which spread a dark cloud, between heaven and earth, over the land of Palestine. Seasonable winds scattered them, partly into the Dead Sea, and partly into the Mediterranean. 63 Procopius, de Bell. Persic. L i. a 2, p. 8, edit. Louvre. •"^1 Agathias, 1. iv. p. 136, i37[c. 26]. Althoughheconfesses the prevalence of the tradition, he asserts that Procopius was the first who had couimitted it to writing. Tillemont (Hist, des Empereurs, torn. vi. p. 597) argues very sensibly on the merits of this fable. His criticism was not warped by any ecclesiastical authority : both Procopius and Agathias are half Pagans. [The whole tone of Agathias in regard to the story is sceptical.]
|
#include "Strings.h"
INCLUDE_NAMESPACE (lib::mem)
Strings::Strings ()
{
}
Strings::~Strings ()
{
Purge ();
}
bool Strings::Push (const char * x)
{
char * y = x ? strdup (x) : strdup ("");
push_back (y);
return true;
}
bool Strings::Pop (char ** x)
{
if (empty ()) return false;
if (!!x) *x = back ();
pop_back ();
return true;
}
bool Strings::Purge ()
{
iterator it = begin ();
for ( ; it != end (); it++)
delete (*it);
clear ();
return true;
}
|
Validation of a 'parameter' node
All 'parameter' nodes with "type='input'" are [string] type :
I can declare this :
cd 'C:\Users\Laurent\Downloads\Plaster-master\Examples\NewModuleTemplate'
Import-Module ..\..\Plaster.psd1
$PlasterParams = @{
TemplatePath = $PWD
Destination = '..\Out'
ModuleName = ''
FullName = 'John Q. Doe'
Version = '-1'
Options = 'PSake','Pester','Git','None'
Editor = 'VSCode'
License = 'MIT'
}
Invoke-Plaster @PlasterParams
'ModuleName' is a correct string, but not a valid filename.
'Version' is a valid string, but not a valid version.
'Options' is a valid set, but the values seems inconsistent.
How to control these cases ?
How to known the valid values for a 'Powershell Gallery' template ?
This comment by @rkeithhill suggests this might be about to change.
@MartinSGill After thinking about this some more, I think that not only do I want to change the type value from input to text but I'm also tempted to add a subtype attribute (looking for better name) e.g.
<parameter name="FullName" type="text" subtype="fullname" .../>
<parameter name="Email" type="text" subtype="email" .../>
This would allow the "text" type to share more code (instead of the current duplication). The only thing I don't like is I don't know how in XML schema to disallow the subtype attribute when the value of the type attribute is not "text". It might have to be a manual validation check.
That said, this would allow for subtypes like: filename, path, version where we could validate the user's input.
Maybe type and content or purpose as names? Just suggesting stuff, subtype would work for me.
Maybe not content since there is a separate content section but keep the suggestions coming.
I thought to the dynamic parameters Powershell.
The error may occur later in the tempalte processing, how to undo an erroneous installation ?
The checks (if any - not sure author or fullname needs validating) will happen in Test-PlasterManifest. That failure will not allow the template processing to continue. It will also result in no dynamic parameters being defined.
|
Directory structure?
* what is the empty file CATS/ for?
* CNSTRNT/ converts the syntax elements to strings also to pretty printing
* PARSING parses from json
See also my notes for https://github.com/marklemay/ATS-Postiats-contrib/tree/master/projects/MEDIUM/ATS-extsolve-z3
what code solves the linear constraints?
I think the
```
local
#include "./SOLVING/patsolve_z3_solving_ctx.dats"
in
// nothing
end
```
pattern includes the raw file text in a seperate local scope
|
Board Thread:Roleplaying/@comment-26108027-20160916044924/@comment-26108027-20160919103016
Charlee manages to calm down, and nods.
"I'm ready."
|
__________________________________________________________________________ Symbol Name Meaning Length __________________________________________________________________________ p Precharge Precharge is the 8 Clocks closing of a page (de assertion of RAS) and can be caused by closing at the end of a transaction, or opening a page that has not previously been precharged s Sense Sense is the 8 Clocks operation of loading the sense amps to prepare for a CAS and is caused by a command with Open required r RAS RAS always 8 Clocks follows the sense, and is needed to insure that the minimum RAS low time of the core is met. __________________________________________________________________________ Non-interleaved precharged 4 oct 1 bank RWWRR Clk !0 Bank !1 Bank ! Cyc BE BC BD[8:0] !Col 0 1 2 3 !Col 0 1 2 3 ! __________________________________________________________________________ 0 -- wakeup 0 -- -- -- -- -- -- -- -- -- -- -- 1 -- -- -- -- -- -- -- -- -- -- -- -- -- 2 -- -- -- -- -- -- -- -- -- -- -- -- -- 3 -- -- -- -- -- -- -- -- -- -- -- -- -- 4 -- req 0 open -- -- -- -- -- -- -- -- -- -- 5 -- read close -- -- -- -- -- -- -- -- -- -- 6 -- pend 0 precharged 0 -- -- -- -- -- -- -- -- -- -- 7 -- -- -- -- -- -- -- -- -- -- -- -- -- 8 -- -- -- -- -- -- -- -- -- -- -- -- -- 9 -- -- -- -- -- -- -- -- -- -- -- -- -- 10 -- -- -- -- s0 -- -- -- -- -- -- -- -- 11 -- -- -- -- s0 -- -- -- -- -- -- -- -- 12 -- -- -- -- s0 -- -- -- -- -- -- -- -- 13 -- -- -- -- s0 -- -- -- -- -- -- -- -- 14 -- -- -- -- s0 -- -- -- -- -- -- -- -- 15 0 1 -- -- -- s0 -- -- -- -- -- -- -- -- 16 0 1 -- -- -- s0 -- -- -- -- -- -- -- -- 17 0 1 strobe 0 -- -- s0 -- -- -- -- -- -- -- -- 18 0 1 -- -- 0 0 r0 -- -- -- -- -- -- -- -- 19 0 2 -- -- 0 0 r0 -- -- -- -- -- -- -- -- 20 0 2 -- -- 0 0 r0 -- -- -- -- -- -- -- -- 21 0 2 -- -- 0 0 r0 -- -- -- -- -- -- -- -- 22 0 2 -- turn 0 1 r0 -- -- -- -- -- -- -- -- 23 0 3 -- data 0 0 0 1 r0 -- -- -- -- -- -- -- -- 24 0 3 -- data 0 0 0 1 r0 -- -- -- -- -- -- -- -- 25 0 3 -- data 0 0 0 1 r0 -- -- -- -- -- -- -- -- 26 0 3 -- data 0 0 0 2 -- -- -- -- -- -- -- -- -- 27 -- -- data 0 1 0 2 -- -- -- -- -- -- -- -- -- 28 -- -- data 0 1 0 2 -- -- -- -- -- -- -- -- -- 29 -- -- data 0 1 0 2 -- -- -- -- -- -- -- -- -- 30 -- term 0 data 0 1 0 3 -- -- -- -- -- -- -- -- -- 31 -- -- data 0 2 0 3 -- -- -- -- -- -- -- -- -- 32 -- -- data 0 2 0 3 -- -- -- -- -- -- -- -- -- 33 -- -- data 0 2 0 3 -- -- -- -- -- -- -- -- -- 34 -- -- data 0 2 -- -- -- -- -- -- -- -- -- -- 35 -- wakeup 1 data 0 3 -- p0 -- -- -- -- -- -- -- -- 36 -- -- data 0 3 -- p0 -- -- -- -- -- -- -- -- 37 -- -- data 0 3 -- p0 -- -- -- -- -- -- -- -- 38 -- -- data 0 3 -- p0 -- -- -- -- -- -- -- -- 39 -- req 1 open -- p0 -- -- -- -- -- -- -- -- 40 -- write close -- p0 -- -- -- -- -- -- -- -- 41 -- pend 0 precharged 0 -- p0 -- -- -- -- -- -- -- -- 42 -- -- -- -- p0 -- -- -- -- -- -- -- -- 43 -- -- -- -- -- -- -- -- -- -- -- -- -- 44 1 1 -- -- -- -- -- -- -- -- -- -- -- -- 45 1 1 -- -- -- s1 -- -- -- -- -- -- -- -- 46 1 1 -- -- -- s1 -- -- -- -- -- -- -- -- 47 1 1 strobe 1 -- -- s1 -- -- -- -- -- -- -- -- 48 1 2 -- data 1 0 -- s1 -- -- -- -- -- -- -- -- 49 1 2 -- data 1 0 -- s1 -- -- -- -- -- -- -- -- 50 1 2 -- data 1 0 -- s1 -- -- -- -- -- -- -- -- 51 1 2 -- data 1 0 -- s1 -- -- -- -- -- -- -- -- 52 1 3 -- data 1 1 -- s1 -- -- -- -- -- -- -- -- 53 1 3 -- data 1 1 1 0 r1 -- -- -- -- -- -- -- -- 54 1 3 -- data 1 1 1 0 r1 -- -- -- -- -- -- -- -- 55 1 3 -- data 1 1 1 0 r1 -- -- -- -- -- -- -- -- 56 -- -- data 1 2 1 0 r1 -- -- -- -- -- -- -- -- 57 -- -- data 1 2 1 1 r1 -- -- -- -- -- -- -- -- 58 -- -- data 1 2 1 1 r1 -- -- -- -- -- -- -- -- 59 -- -- data 1 2 1 1 r1 -- -- -- -- -- -- -- -- 60 -- term 1 data 1 3 1 1 r1 -- -- -- -- -- -- -- -- 61 -- -- data 1 3 1 2 -- -- -- -- -- -- -- -- -- 62 -- -- data 1 3 1 2 -- -- -- -- -- -- -- -- -- 63 -- -- data 1 3 1 2 -- -- -- -- -- -- -- -- -- 64 -- -- -- 1 2 -- -- -- -- -- -- -- -- -- 65 -- -- -- 1 3 -- -- -- -- -- -- -- -- -- 66 -- -- -- 1 3 -- -- -- -- -- -- -- -- -- 67 -- wakeup 2 -- 1 3 -- -- -- -- -- -- -- -- -- 68 -- -- -- 1 3 -- -- -- -- -- -- -- -- -- 69 -- -- -- -- p1 -- -- -- -- -- -- -- -- 70 -- -- -- -- p1 -- -- -- -- -- -- -- -- 71 -- req 2 open -- p1 -- -- -- -- -- -- -- -- 72 -- write close -- p1 -- -- -- -- -- -- -- -- 73 -- pend 0 precharged 0 -- p1 -- -- -- -- -- -- -- -- 74 -- -- -- -- p1 -- -- -- -- -- -- -- -- 75 -- -- -- -- p1 -- -- -- -- -- -- -- -- 76 2 1 -- -- -- p1 -- -- -- -- -- -- -- -- 77 2 1 -- -- -- s2 -- -- -- -- -- -- -- -- 78 2 1 -- -- -- s2 -- -- -- -- -- -- -- -- 79 2 1 strobe 2 -- -- s2 -- -- -- -- -- -- -- -- 80 2 2 -- data 2 0 -- s2 -- -- -- -- -- -- -- -- 81 2 2 -- data 2 0 -- s2 -- -- -- -- -- -- -- -- 82 2 2 -- data 2 0 -- s2 -- -- -- -- -- -- -- -- 83 2 2 -- data 2 0 -- s2 -- -- -- -- -- -- -- -- 84 2 3 -- data 2 1 -- s2 -- -- -- -- -- -- -- -- 85 2 3 -- data 2 1 2 0 r2 -- -- -- -- -- -- -- -- 86 2 3 -- data 2 1 2 0 r2 -- -- -- -- -- -- -- -- 87 2 3 -- data 2 1 2 0 r2 -- -- -- -- -- -- -- -- 88 -- -- data 2 2 2 0 r2 -- -- -- -- -- -- -- -- 89 -- -- data 2 2 2 1 r2 -- -- -- -- -- -- -- -- 90 -- -- data 2 2 2 1 r2 -- -- -- -- -- -- -- -- 91 -- -- data 2 2 2 1 r2 -- -- -- -- -- -- -- -- 92 -- term 2 data 2 3 2 1 r2 -- -- -- -- -- -- -- -- 93 -- -- data 2 3 2 2 -- -- -- -- -- -- -- -- -- 94 -- -- data 2 3 2 2 -- -- -- -- -- -- -- -- -- 95 -- -- data 2 3 2 2 -- -- -- -- -- -- -- -- -- 96 -- -- -- 2 2 -- -- -- -- -- -- -- -- -- 97 -- -- -- 2 3 -- -- -- -- -- -- -- -- -- 98 -- -- -- 2 3 -- -- -- -- -- -- -- -- -- 99 -- wakeup 3 -- 2 3 -- -- -- -- -- -- -- -- -- 100 -- -- -- 2 3 -- -- -- -- -- -- -- -- -- 101 -- -- -- -- p2 -- -- -- -- -- -- -- -- 102 -- -- -- -- p2 -- -- -- -- -- -- -- -- 103 -- req 3 open -- p2 -- -- -- -- -- -- -- -- 104 -- read close -- p2 -- -- -- -- -- -- -- -- 105 -- pend 0 precharged 0 -- p2 -- -- -- -- -- -- -- -- 106 -- -- -- -- p2 -- -- -- -- -- -- -- -- 107 -- -- -- -- p2 -- -- -- -- -- -- -- -- 108 -- -- -- -- p2 -- -- -- -- -- -- -- -- 109 -- -- -- -- s3 -- -- -- -- -- -- -- -- 110 -- -- -- -- s3 -- -- -- -- -- -- -- -- 111 -- -- -- -- s3 -- -- -- -- -- -- -- -- 112 -- -- -- -- s3 -- -- -- -- -- -- -- -- 113 -- -- -- -- s3 -- -- -- -- -- -- -- -- 114 3 1 -- -- -- s3 -- -- -- -- -- -- -- -- 115 3 1 -- -- -- s3 -- -- -- -- -- -- -- -- 116 3 1 strobe 3 -- -- s3 -- -- -- -- -- -- -- -- 117 3 1 -- -- 3 0 r3 -- -- -- -- -- -- -- -- 118 3 2 -- -- 3 0 r3 -- -- -- -- -- -- -- -- 119 3 2 -- -- 3 0 r3 -- -- -- -- -- -- -- -- 120 3 2 -- -- 3 0 r3 -- -- -- -- -- -- -- -- 121 3 2 -- turn 3 1 r3 -- -- -- -- -- -- -- -- 122 3 3 -- data 3 0 3 1 r3 -- -- -- -- -- -- -- -- 123 3 3 -- data 3 0 3 1 r3 -- -- -- -- -- -- -- -- 124 3 3 -- data 3 0 3 1 r3 -- -- -- -- -- -- -- -- 125 3 3 -- data 3 0 3 2 -- -- -- -- -- -- -- -- -- 126 -- -- data 3 1 3 2 -- -- -- -- -- -- -- -- -- 127 -- -- data 3 1 3 2 -- -- -- -- -- -- -- -- -- 128 -- -- data 3 1 3 2 -- -- -- -- -- -- -- -- -- 129 -- term 3 data 3 1 3 3 -- -- -- -- -- -- -- -- -- 130 -- -- data 3 2 3 3 -- -- -- -- -- -- -- -- -- 131 -- -- data 3 2 3 3 -- -- -- -- -- -- -- -- -- 132 -- -- data 3 2 3 3 -- -- -- -- -- -- -- -- -- 133 -- -- data 3 2 ---- -- -- -- -- -- -- -- -- 134 -- wakeup 4 data 3 3 -- p3 -- -- -- -- -- -- -- -- 135 -- -- data 3 3 -- p3 -- -- -- -- -- -- -- -- 136 -- -- data 3 3 -- p3 -- -- -- -- -- -- -- -- 137 -- -- data 3 3 -- p3 -- -- -- -- -- -- -- -- 138 -- req 4 open -- p3 -- -- -- -- -- -- -- -- 139 -- read close -- p3 -- -- -- -- -- -- -- -- 140 -- pend 0 precharged 0 -- p3 -- -- -- -- -- -- -- -- 141 -- -- -- -- p3 -- -- -- -- -- -- -- -- 142 -- -- -- -- -- -- -- -- -- -- -- -- -- 143 -- -- -- -- -- -- -- -- -- -- -- -- -- 144 -- -- -- -- s4 -- -- -- -- -- -- -- -- 145 -- -- -- -- s4 -- -- -- -- -- -- -- -- 146 -- -- -- -- s4 -- -- -- -- -- -- -- -- 147 -- -- -- -- s4 -- -- -- -- -- -- -- -- 148 -- -- -- -- s4 -- -- -- -- -- -- -- -- 149 4 1 -- -- -- s4 -- -- -- -- -- -- -- -- 150 4 1 -- -- -- s4 -- -- -- -- -- -- -- -- 151 4 1 strobe 4 -- -- s4 -- -- -- -- -- -- -- -- 152 4 1
|
//
// Created by kb on 18/01/2021.
//
#include <iostream>
#include <sre/Resource.hpp>
#include "Scriptable.hpp"
#include "../scenes/GameObject.hpp"
#include "../components/TransformComponent.hpp"
Scriptable::Scriptable(bool enabled)
: enabled(enabled) {
lua.open_libraries(sol::lib::base, sol::lib::string, sol::lib::package, sol::lib::math);
//Incomplete implementation of GameObject
auto gameObject_type = lua.new_usertype<GameObject>( "GameObject",
"setName", &GameObject::setName,
"getName", &GameObject::getName,
"getParent", &GameObject::getParent,
"getChildren", &GameObject::getChildren,
"getChildByName", &GameObject::getChildByName
);
auto component_type = lua.new_usertype<Component>("Component",
"getGameObject", &Component::getGameObject);
// i'm hella impressed with the guy who developed sol
auto vec3_type = lua.new_usertype<glm::vec3> ("vec3",
sol::constructors<glm::vec3(float, float, float)>(),
sol::meta_function::addition, sol::resolve<glm::vec<3, float, glm::highp>(glm::vec<3, float, glm::highp> const&, glm::vec<3, float, glm::highp> const&)>(&glm::operator+),
sol::meta_function::subtraction, sol::resolve<glm::vec<3, float, glm::highp>(glm::vec<3, float, glm::highp> const&, glm::vec<3, float, glm::highp> const&)>(&glm::operator-),
sol::meta_function::multiplication, sol::overload(
sol::resolve<glm::vec<3, float, glm::highp>(glm::vec<3, float, glm::highp> const&, glm::vec<3, float, glm::highp> const&)>(&glm::operator*),
sol::resolve<glm::vec<3, float, glm::highp>(glm::vec<3, float, glm::highp> const&, float)>(&glm::operator*),
sol::resolve<glm::vec<3, float, glm::highp>(float, glm::vec<3, float, glm::highp> const&)>(&glm::operator*)),
"x", &glm::vec3::x,
"y", &glm::vec3::y,
"z", &glm::vec3::z,
"normalize", sol::resolve<glm::vec<3, float, glm::highp>(glm::vec<3, float, glm::highp> const&)>(&glm::normalize),
"length", sol::resolve<float(glm::vec<3, float, glm::highp> const&)>(&glm::length)
);
auto vec2_type = lua.new_usertype<glm::vec2> ("vec2",
sol::constructors<glm::vec2(float, float)>(),
"x", &glm::vec2::x,
"y", &glm::vec2::y
);
}
// loads a script, overwriting an existing one with the same name
bool Scriptable::loadScript(const std::string& name, const std::string& scriptSource, bool isFilename) {
// creates shared pointer to new script
auto script = std::make_shared<Script>();
// if it's a file name, load from file; otherwise use directly the string
script->data = (isFilename) ? sre::Resource::loadText(scriptSource) : script->data = scriptSource;
//load the script
auto result = lua.safe_script(script->data, [](lua_State* L, sol::protected_function_result pfr) {
// pfr will contain things that went wrong, for either loading or executing the script
return pfr;}
); // evaluate lua script
script->isLoaded = result.valid();
// stops if script doesn't load
if(!script->isLoaded)
{
sol::error err = result;
std::cerr << "FAILED TO LOAD LUA SCRIPT: " << name << "\n";
std::cerr << err.what() << std::endl;
// stops function to avoid halting execution completely
return false;
}
script->function = lua[name];
script->isLoaded = true;
scripts[name] = script;
return true;
}
bool Scriptable::isEnabled() const {
return enabled;
}
void Scriptable::setEnabled(bool _enabled) {
enabled = _enabled;
}
Scriptable::~Scriptable() {
lua.collect_garbage();
}
|
User:Mahmood rock
mahmood khan i live in delhi.but i born in uttar paedesh in(bahraich) my fathers name is AYYUB KHAN i have 5 4 brothers 1sr meraj khan 2nd mahfuz khan 3rd maqsood khan 4th altaf khan
|
using System;
using System.Diagnostics.CodeAnalysis;
using System.Runtime.Serialization;
namespace PrtgAPI.Exceptions.Internal
{
/// <summary>
/// The exception that is thrown when a type or property is missing a required attribute.
/// </summary>
[Serializable]
[ExcludeFromCodeCoverage]
public class MissingAttributeException : Exception
{
/// <summary>
/// Initializes a new instance of the <see cref="MissingAttributeException"/> class.
/// </summary>
public MissingAttributeException()
{
}
/// <summary>
/// Initializes a new instance of the <see cref="MissingAttributeException"/> with the attribute that was missing and the type it was missing from.
/// </summary>
/// <param name="type">The type that was missing an attribute.</param>
/// <param name="attribute">The attribute that was missing.</param>
public MissingAttributeException(Type type, Type attribute) : base(GetTypeMessage(type, attribute))
{
}
/// <summary>
/// Initializes a new instance of the <see cref="MissingAttributeException"/> class with the attribute that was missing, the property it was missing from, and the type the property belonged to.
/// </summary>
/// <param name="type">The type whose property was missing an attribute.</param>
/// <param name="property">The property that was missing an attribute.</param>
/// <param name="attribute">The attribute that was missing.</param>
public MissingAttributeException(Type type, string property, Type attribute) : base(GetPropertyMessage(type, property, attribute))
{
}
/// <summary>
/// Initializes a new instance of the <see cref="MissingAttributeException"/> class with the attribute that was missing, the property it was missing from, and the type the property belonged to and a reference to the inner exception that is the cause of this exception.
/// </summary>
/// <param name="type">The type whose property was missing an attribute.</param>
/// <param name="property">The property that was missing an attribute.</param>
/// <param name="attribute">The attribute that was missing.</param>
/// <param name="inner">The exception that is the cause of the current exception. If the <paramref name="inner"/> parameter is not null, the current exception is raised in a catch block that handles the inner exception.</param>
public MissingAttributeException(Type type, string property, Type attribute, Exception inner) : base(GetPropertyMessage(type, property, attribute), inner)
{
}
/// <summary>
/// Initializes a new instance of the <see cref="MissingAttributeException"/> class with serialized data.
/// </summary>
/// <param name="info">The <see cref="SerializationInfo"/> that holds the serialized object data about the exception being thrown.</param>
/// <param name="context">The <see cref="StreamingContext"/> that contains contextual information about the source or destination.</param>
protected MissingAttributeException(SerializationInfo info, StreamingContext context) : base(info, context)
{
}
private static string GetTypeMessage(Type type, Type attribute)
{
return $"Type '{type}' is missing a {attribute}";
}
private static string GetPropertyMessage(Type type, string property, Type attribute)
{
return $"Property '{property}' of type '{type}' is missing a {attribute}.";
}
}
}
|
(129 App. Div. 514.)
VALETT et al. v. BAKER et al.
(Supreme Court, Appellate Division, Second Department.
December 30, 1908.)
1. Tender (§ 26)—Payment into Court—Operation and Effect.
The nature of an action to foreclose a mechanic’s lien is not changed by a payment into court in discharge of such lien, but it continues to be a suit in equity.
[Ed. Note.—For other cases, see Tender, Dec. Dig. § 26.*]
2. Mechanics’ Liens (§ 245*)—Nature of Action to Foreclose.
Where plaintiff prays that a mechanic’s lien be adjudged, that the money paid into court in discharge of the lien be applied on the amount due, and that plaintiff have judgment for the deficiency, if any, the action is similar to a suit to foreclose a mortgage, and the procedure is conformable thereto.
[Ed. Note.—For other cases, see Mechanics’ Liens, Dec. Dig. § 245.*]
3. Set-Off and Counterclaim (§ 42*)—Demands of Codefendant.
Under.Code Civ. Proc. § 3416, providing that if, on the sale of property under judgment of a court of record, there is a deficiency of proceeds to pay plaintiff’s claim, judgment may be docketed for the deficiency against any person liable therefor, who should be adjudged to pay the same in' like manner as in judgments ■’’or deficiency in foreclosure cases, one of several joint defendants in an action to foreclose a mechanic’s lien may by separate answer interpose a counterclaim arising from a contract between plaintiff and such defendant.
[Ed. Note.—For other cases, see Set-Off and Counterclaim, Cent. Dig. § 80; Dec. Dig. § 42.*]
Appeal from Kings County Court.
Action by Meyer Valett and another against Joseph J. Baker and another. From a judgment for plaintiffs, defendants appeal. Reversed.
Argued before JENKS, HOOKER, GAYNOR, RICH, and MILLER, JJ.
James A. Sheehan, for appellant Finberg.
Charles B. Barfield, for respondents.
For other oases see same topic & § number in Dec. & Am. Digs. 1907 to date, & Rep’r Indexes
JENKS, J.
This is an appeal from a judgment of the County Court in an action to foreclose a mechanic’s lien brought against the tenants in common. One of the defendants by separate answer pleaded ■ a counterclaim arising out of a contract between the plaintiffs and that defendant. The learned County Court found that the counterclaim could not be sustained in this action, and dismissed it without prejudice. Although the defendants had paid money into court in discharge of said lien, the character of the action was not changed. It continued as a suit in equity to enforce a mechanic’s lien. Schillinger Cement Co. v. Arnott, 152 N. Y. 584, 46 N. E. 956., The plaintiffs prayed that the lien be adjudged, that the money in court be applied so far as it would discharge the lien, and that the plaintiffs have judgment against the defendants for any deficiency that might remain after such application. Such a suit is like unto a suit for the foreclosure of a mortgage, and the procedure is made conformable thereto. Cody v. Turn Verein, 48 App. Div. 279, 64 N. Y. Supp. 219, affirmed 167 N. Y. 607, 60 N. E. 1108. Section 3416 of the Code of Civil Procedure provides:
“If upon the sale of the property under judgment in a court of record there is a deficiency of proceeds to pay the plaintiff’s claim, judgment may be docketed for the deficiency against any person liable therefor, who shall be adjudged to pay the same in like manner and with like effect as in judgments for deficiency in foreclosure cases.”
In Hunt v. Chapman, 51 N. Y. 555, an action to foreclose a mortgage on realty, the Court of Appeals held that it was not only an action against the defendant Chapman, impleaded, upon his contract to pay the amount specified in his bond, but it was one in which, under the Code, a several judgment might be had as between the plaintiff and the defendant Chapman, and hence was subject to a counterclaim of any other cause of action arising also on contract which Chapman had against the plaintiff at the time of the commencement of the action. This doctrine was approved and reasserted in American Guild v. Damon, 186 N. Y. 360, 78 N. E. 1081. In that case the court, per Cullen, C. J., said that the action was not only to foreclose a mortgage, but to recover a judgment against each defendant for any deficiency which might arise on the sale of the mortgaged property, and further said:
“There is nothing in the case to show that the loan was not made to both defendants, and on the face of the bond and mortgage the debt appears to be that of both. However that may be, the plaintiff has sought to recover on a personal claim against the defendant Joseph, and by seeking such relief it subjected its whole cause of action to any valid counterclaim that Joseph might have.”
I think that the judgment must be reversed, and a new trial must be ordered; costs to abide the final award of costs. All concur.
|
from talon.ui import active_app
from talon.voice import Context, Key
from ..utils import delay, text
enabled = True
def is_tridactyl(app, _):
global enabled
return enabled and app.name == "Firefox"
# noinspection PyPep8Naming
def tKey(key):
"""Key(), but for conflicts with Tridactyl commands"""
global enabled
def tKeyM(m):
if is_tridactyl(active_app(), None):
return Key("shift-escape " + key + " shift-escape")(m)
else:
return Key(key)(m)
return tKeyM
ctx = Context("tridactyl", func=is_tridactyl)
ctx.keymap(
{
"(follow | go link)": "f",
"go background": "F",
"go back": "H",
"go forward": "L",
"clear tab": "d",
"restore tab": "u",
"jump [<dgndictation>] [over]": ["B", delay(0.1), text], # Alltabs is more useful
"open here [<dgndictation>] [over]": ["o", delay(0.1), text],
"open tab [<dgndictation>] [over]": ["t", delay(0.1), text],
"search [<dgndictation>] [over]": ["s", delay(0.1), text],
"tab search [<dgndictation>] [over]": ["S", delay(0.1), text],
"go next tab": "gt",
"go last tab": "gT",
"search": "/",
"toggle mark": "A",
"toggle ignore": Key("shift-escape"),
"toggle reader": "gr",
"copy URL": "yy",
"copy location": "yy",
"go next page": "]]",
"go last page": "[[",
"zoom out": "zo",
"zoom in": "zi",
"zoom clear": "zz",
"go edit": Key("ctrl-i"),
"detach tab": [":", delay(0.1), "tabdetach", delay(0.1), "\n"],
}
)
|
How can I retry scrapy operations before spider finish?
I built sprider by scrapy and python3.6.8 and record uncompleted urls during sprider running:
self.urls.append(url)
item=myItem()
item["mylink"]=url
yield scrapy.Request(
url="myurl",
method='GET',
headers=self.headers,
callback=self.parse_detail,
errback=self.make_new_request,
meta={"item":item})
and I try to retry uncompleted urls before spider clsss destroy:
def __del__(self):
print("\033[31myielded:",len(self.yielded),"scrapying:",len(self.urls),"\033[0m")
if len(self.urls)>0:
print(self.urls)
print("\033[31mretry uncompleted\033[0m")
self.RetryUncompletedUrls()
But spider just do print and exist! How can I do retry operations before spider finish? Thanks!
The retry middleware is enabled by default and is set to retry a URL twice.
You can adjust this in your settings.py file.
RETRY_ENABLED = True
RETRY_TIMES = 2
RETRY_HTTP_CODES = [500, 502, 503, 504, 522, 524, 408, 429]
|
In this article we construct a family of domains $\Omega \subset
\mathbb{R}^2$ with infinite volume such that the Dirichlet Laplacian $\Delta^D$
has purely discrete spectrum and give precise spectral asymptotics for the
eigenvalue counting function in terms of the geometry of $\Omega$. This
generalizes the well-known asymptotic formula of Hermann Weyl to this class of
infinite volume domains. The construction is elementary, uses only the
bracketing technique invented by Weyl himself and it is extendable to arbitrary
dimensions.
|
import * as R from 'ramda';
import { IUSerInterfaceTooltip, ITableStaticTooltips, IVirtualizedDerivedData, DataTooltips } from 'dash-table/components/Table/props';
import { ifColumnId, ifRowIndex, ifFilter } from 'dash-table/conditional';
import { ConditionalTooltip, TooltipSyntax } from 'dash-table/tooltips/props';
import { memoizeOne } from 'core/memoizer';
// 2^32-1 the largest value setTimout can take safely
export const MAX_32BITS = 2147483647;
function getSelectedTooltip(
currentTooltip: IUSerInterfaceTooltip,
tooltip_data: DataTooltips,
tooltip_conditional: ConditionalTooltip[],
tooltip_static: ITableStaticTooltips,
virtualized: IVirtualizedDerivedData
) {
if (!currentTooltip) {
return undefined;
}
const { id, row } = currentTooltip;
if (id === undefined || row === undefined) {
return undefined;
}
const appliedStaticTooltip = (
tooltip_data &&
tooltip_data.length > row &&
tooltip_data[row] &&
tooltip_data[row][id]
) || tooltip_static[id];
const conditionalTooltips = R.filter(tt => {
return !tt.if ||
(
ifColumnId(tt.if, id) &&
ifRowIndex(tt.if, row) &&
ifFilter(tt.if, virtualized.data[row - virtualized.offset.rows])
);
}, tooltip_conditional);
return conditionalTooltips.length ?
conditionalTooltips.slice(-1)[0] :
appliedStaticTooltip;
}
function convertDelay(delay: number | null) {
return typeof delay === 'number' ?
delay :
0;
}
function convertDuration(duration: number | null) {
return typeof duration === 'number' ?
duration :
MAX_32BITS;
}
function getDelay(delay: number | null | undefined, defaultTo: number) {
return typeof delay === 'number' || delay === null ?
convertDelay(delay) :
defaultTo;
}
function getDuration(duration: number | null | undefined, defaultTo: number) {
return typeof duration === 'number' || duration === null ?
convertDuration(duration) :
defaultTo;
}
export default memoizeOne((
currentTooltip: IUSerInterfaceTooltip,
tooltip_data: DataTooltips,
tooltip_conditional: ConditionalTooltip[],
tooltip_static: ITableStaticTooltips,
virtualized: IVirtualizedDerivedData,
defaultDelay: number | null,
defaultDuration: number | null
) => {
const selectedTooltip = getSelectedTooltip(
currentTooltip,
tooltip_data,
tooltip_conditional,
tooltip_static,
virtualized
);
let delay = convertDelay(defaultDelay) as number;
let duration = convertDuration(defaultDuration) as number;
let type: TooltipSyntax = TooltipSyntax.Text;
let value: string | undefined;
if (selectedTooltip) {
if (typeof selectedTooltip === 'string') {
value = selectedTooltip;
} else {
delay = getDelay(selectedTooltip.delay, delay);
duration = getDuration(selectedTooltip.duration, duration);
type = selectedTooltip.type || TooltipSyntax.Text;
value = selectedTooltip.value;
}
}
return { delay, duration, type, value };
});
|
# SimpleImport
The SimpleImport module offers a command line tool to import joboffers from feeds using a fix defined structure. It's usefull, if you plan to use
YAWIK as a jobportal and if you would like to import jobs from customers.
The CLI offers the following functionalisites.
```
imple import operations
yawik simpleimport import [--limit] [--name] [--id] Executes a data import for all registered crawlers
yawik simpleimport add-crawler Adds a new import crawler
--limit=INT Number of crawlers to check per run. Default 3. 0 means no limit
--name=STRING The name of a crawler
--id=STRING The Mongo object id of a crawler
--organization==STRING The ID of an organization
--feed-uri=STRING The URI pointing to a data to import
--runDelay=INT The number of minutes the next import run will be proceeded again
--type=STRING The type of an import (e.g. job)
--jobInitialState=STRING The initial state of an imported job
--jobRecoverState=STRING The state a job gets, if it was deleted, but found again in later runs.
yawik simpleimport info Displays a list of all available crawlers.
yawik simpleimport info [--id] <name> Shows information for a crawler
yawik simpleimport update-crawler [--id] <name> [--rename] [--limit] [--organization] [--feed-uri] [--runDelay] [--type] [--jobInitalState] [--jobRecoverState] Updates configuration for a crawler.
yawik simpleimport delete-crawler [--id] <name> Deletes an import crawler
<name> The name of the crawler to delete.
--id Treat <name> as the MongoID of the crawler
--rename=STRING Set a new name for the crawler.
yawik simpleimport guess-language [--limit] Find jobs without language set and pushes a guess-language job into the queue for each.
--limit=INT Maximum number of jobs to fetch. 0 means fetch all.
yawik simpleimport check-classifications <root> <categories> [<query>] Check job classifications.
<root> Root category ("industrues", "professions" or "employmentTypes")
<categories> Required categories, comma separated. E.g. "Fulltime, Internship"
<query> Search query for selecting jobs.
--force Do not ignore already checked jobs.
```
Feeds have to be formatted as defined in :ref:`the scrapy docs<scrapy:format>`.
Example: Add a feed to a an organization
You need an organizationId in order to add a crawler job. So at first you have to create a company in your yawik. The organizationId
appears in an URL, if you try to edit the organization.
```
root@yawik:/var/www/YAWIK# ./vendor/bin/yawik simpleimport add-crawler --name=example-crawler \
--organization=59e4b53e7bb2b553412f9be9 \
--feed-uri=http://ftp.yawik.org/example.json
A new crawler with the ID "59e4b5a87bb2b567468b4567" has been successfully added.
```
This command created a crawler in the mongo collection ``simpleimport.crawler`` and returns the ObjectId.
```
> db.simpleimport.crawler.find({"_id":ObjectId("59e4b5a87bb2b567468b4567")}).pretty();
{
"_id" : ObjectId("59e4b5a87bb2b567468b4567"),
"name" : "example-crawler",
"organization" : ObjectId("59e4b53e7bb2b553412f9be9"),
"type" : "job",
"feedUri" : "http://ftp.yawik.org/example.json",
"runDelay" : NumberLong(1440),
"dateLastRun" : {
"date" : ISODate("1970-01-01T00:00:00Z"),
"tz" : "+00:00"
},
"options" : {
"initialState" : "active",
"_doctrine_class_name" : "SimpleImport\\Entity\\JobOptions"
}
}
```
!!! note
if you execute the command twice, the crawler will be added twice. If you want to remove a crawler, you have to
do so on the mongo cli.
|
<?php
use PHPUnit\Framework\TestCase;
use Forever2077\PhpHelper\Helper;
use Forever2077\PhpHelper\IdentityHelper;
class IdentityHelperTest extends TestCase
{
public function testInstance()
{
$this->assertInstanceOf(IdentityHelper::class, Helper::identity());
}
public function testChineseIdentityCard()
{
$ID = IdentityHelper::parseChineseID();
$pid = '42032319930606629x';
$passed = $ID->validateIDCard($pid);
$area = $ID->getArea($pid);
$gender = $ID->getGender($pid);
$birthday = $ID->getBirth($pid);
$age = $ID->getAge($pid);
$constellation = $ID->getConstellation($pid);
$this->assertIsBool($passed);
$this->assertIsArray($area);
$this->assertEquals('m', $gender);
$this->assertEquals('1993-06-06', $birthday);
$this->assertEquals(30, $age);
$this->assertEquals('双子座', $constellation);
}
}
|
User talk:ChurchRocks101
* Please sign in every time you edit, so that we can recognise an established user.
I'm really happy to have you here, and look forward to working with you!
-- Anythingspossibleforapossible (Talk) 19:38, July 26, 2011
|
Validate XML with loading schemas at runtime, failure depending on schema order
I am trying to do xml validation. I am being given a list of schemas at run-time (possibly wrapped in a jar). Validation passes or failes based on the order in which I provide the schemas to the SchemaFactory.
Here is what I am doing:
private void validateXml(String xml, List<URI> schemas){
Source[] source = new StreamSource[schemas.size()];
int i=0;
for (URI f : schemas){
source[i++] = new StreamSource(f.openStream());
}
SchemaFactory sf = SchemaFactory.newInstance(XMLConstants.W3C_XML_SCHEMA_NA_URI);
sf.setResourceResolver(new MyClassPathResourceResolver());
Schema schema = schemaFactory.newSchema(source);
Validator validator = schema.newValidator();
validator.validate(new StreamSource(new ByteArrayInputStream(xml.getBytes()));
again, this fails if the passed set of schema do not start with the schema to which the root element of the xml referrs. Is there a fix to this or am I doing something wrong?
Can you post the schemas and XML somewhere?
@davidfmatheson Unfortunately that is not possible, I can say that it is a set of schemas, the root schema and a second schema that allows for the replacement of the body of the first schema with a different tag.
By default Xerces will ignore a schema document if it already has a schema document for the same namespace. This behaviour can be changed using the factory option
http://apache.org/xml/features/validation/schema/handle-multiple-imports
I am getting an HTTP 404 in this link, could you provide some additional details?
Also, I need to load 2 schemas (each of which import additionals schemas). If I load these in the correct order, all's well. Otherwise, no joy. The two schemas have different target namspaces.
Try searching for it instead of using it as a URL. It's a JAXP option name not a URL. (OK, some browsers make that difficult by combining the address bar and the search bar. Do it the old way by going to google.com).
When I attempt to set the above feature on the factory I get: SAXNotRecognizedException: Feature "http://apache.org/xml/features/validation/schema/handle-multiple-imports" is not recognized
Perhaps you're using the JDK version of Xerces rather than the Apache version? But sorry, I've pointed you in the right direction, but I can't go any further than this is providing support for my competitors' products!
The class of the SchemaFactory is: com.sun.org.apache.xerces.internal.jaxp.validation.XMLSchemaFactory, so this IS apache, right? With it (using version 2.0.2 of xml-apis) I still get the SAXNotRecognizedException for the above feature.
Firstly, you must set an instance of org.xml.sax.ErrorHandler object on XML reader by calling registerErrorHandler() method. You might receive warnings which would give you clue about issue.
Secondly, you must know which xml library you are using. Call schemaFactory.getClass().getName() in your code and print it. Once you know library, you can refer its documentation if it supports feature to turn on/off multiple schema imports.
Class is com.sun.org.apache.xerces.internal.jaxp.validation.XMLSchemaFactory
|
package org.rril.bungeelogin;
import java.security.MessageDigest;
import java.security.NoSuchAlgorithmException;
/**
* MD5 basic encryption
* Used to encrypt passwords
*
* @author Stakzz
* @version 0.9.0
*/
public class MD5 {
/** */
private static MessageDigest digester;
static {
try {
digester = MessageDigest.getInstance("MD5");
}
catch (NoSuchAlgorithmException e) {
e.printStackTrace();
}
}
/**
* Main method to encrypt a string in md5
*
* @param string String to encrypt
* @return string String encrypted in MD5
*/
public static String crypt(String string) {
if (string == null || string.length() == 0) {
throw new IllegalArgumentException("String to encript cannot be null or zero length");
}
digester.update(string.getBytes());
byte[] hash = digester.digest();
StringBuffer hexString = new StringBuffer();
for (int i = 0; i < hash.length; i++) {
if ((0xff & hash[i]) < 0x10) {
hexString.append("0" + Integer.toHexString((0xFF & hash[i])));
}
else {
hexString.append(Integer.toHexString(0xFF & hash[i]));
}
}
return hexString.toString();
}
}
|
America's Wetland Foundation
Cooperating organizations
A few of the many include:
* American Fisheries Society
* Earth Island Institute
* Federal Highway Administration
* National Audubon Society
* National Park Service
* National Wildlife Federation
* U.S. Fish and Wildlife Service
Use of Marmillion & Company PR firm
The results according to the Marmillion PR website:
* Over 3.5 million hits a year on campaign website americaswetland.com
* Establishment of the America's WETLAND Conservation Corps an AmeriCorps program
* Won more than 40 awards for campaign partnership, print, broadcast, and electronic advertising
Services provided:
* Ad development/placement
* Coalition building
* Design and branding
* Focus groups and surveys
* Grassroots organizing
* Media relations
* Promotion and publicity
* Publications/Newsletters
Staff
* R. King Milling Chairman
Contact details
Their website also contains contact info for their PR firm Marmillion & Company.
Related SourceWatch articles
* Greenwashing
External articles
|
Talk:General Discussion/@comment-25196231-20141014061212/@comment-25289127-20141014065738
It's all a matter priority, I really wanted to buy those slots so I did.
|
using System.IO;
namespace TestServer
{
public static class FileIO
{
/// <summary>
/// Reads the specified file's contents
/// Returns null on errors
/// </summary>
/// <param name="path">Path to a file</param>
/// <returns>File contents string / null</returns>
public static string ReadFromFile(string path)
{
string toReturn = null;
try
{
using (StreamReader sr = new StreamReader(path, true))
toReturn = sr.ReadToEnd();
}
catch { }
return toReturn;
}
}
}
|
Images: Alaska soldiers challenge local hockey team [Image 5 of 7]
Photo by Sgt. Thomas Duval
Hockey players from the University of Alaska Fairbanks pull a SKEDCO with a 200-pound simulated casualty as part of a leadership challenge held at Fort Wainwright, Alaska, Sept 14. The 1st Stryker Brigade Combat Team, 25th Infantry Division, hosted the event which pitted the college hockey players against common Army challenges like the Humvee pull, litter carry and SKEDCO drag.
Web Views
56
Downloads
2
Podcast Hits
0
This work, Alaska soldiers challenge local hockey team [Image 5 of 7], by SGT Thomas Duval, identified by DVIDS, is free of known copyright restrictions under U.S. copyright law.
Date Taken:09.14.2012
Date Posted:09.21.2012 19:10
Photo ID:669677
VIRIN:120919-A-BE343-006
Resolution:5150x3250
Size:9.2 MB
Location:FORT WAINWRIGHT, AK, US
Gallery Images
Associated News
Alaska soldiers challenge local hockey team
Options
HOLIDAY GREETINGS
SELECT A HOLIDAY:
VIDEO ON DEMAND
|
package it.fabioformosa.quartzmanager.api.controllers;
import it.fabioformosa.quartzmanager.api.exceptions.ResourceConflictException;
import org.springframework.web.bind.annotation.PostMapping;
import org.springframework.web.bind.annotation.RequestMapping;
import org.springframework.web.bind.annotation.RestController;
@RequestMapping(TestController.TEST_CONTROLLER_BASE_URL)
@RestController
public class TestController {
public static final String TEST_CONTROLLER_BASE_URL = "/test-controller";
@PostMapping("/test-conflict")
public void raiseConflictException(){
throw new ResourceConflictException(1000L, "another entity has found with the same ID");
}
}
|
within the enlarged base of the leaves, those of the inner leaves filled with minute powdery grannies, those of the outer leaves containing larger grains, at first cohering in fours.
A small genus, widely spread over the greater part of the globe.
1. I. lacustris, Linn. (fig. 1265). European Q. A perennial, of a bright green, forming dense tufts under the water. Leaves narrow linear, thick, and nearly terete or 4 -angled, much like those of several Monocotyledons, varying from 2 to 6 inches long, their enlarged bases giving the plant often a bulbous appearance.
In mountain pools, and shallow lakes, in central and northern Europe, northern and Arctic Asia, and North America. In Britain, in the moun tainous parts of Scotland, northern England, Wales, and Ireland. Fr. summer and autumn. [/. Morci, Moore, is a variety with leaves 18 inches long, found in Wicklow.] Modern botanists distinguish as 7. echinospora, Durieu, a form found in our mountain lakes, often growing with the common one, but said to be only where the soil is peaty. It differs chiefly in the larger spores covered with acute tubercles instead of being granulate only or smooth on the surface. A more distinct form referred to /. ITystrix, Durieu (fig. 1266), occurs in moist sandy hollows on Laucresse Common in Guernsey. The rootstock is covered, outside the tuft of leaves, with a number of small, imbricate, toothed or jagged brown scales, which are the persistent remains of old leaves, and which are never observed in the common under-water forms. It remains to be seen how far this difference may be owing to situation.
No true leaves. Fronds, as in Filices, proceeding from the rootstock and rolled inwards at the top, barren ones either reduced to a narrow-linear stipes, or in an exotic genus bearing 4 digitate leaflets ; fertile ones sessile or on a short stipes, bearing a globular or ovoid utricle, usually called an involucre, and formerly considered as analogous to the spore-cases of Lycopodiacece, but which is really the recurved fertile lamina with the margins united. Ifcal spore-cases of two kinds, larger and smaller, as in Selaginacece, but arranged, as in Filices, inside the involucre, that is, on the under surface of the recurved frond, in sori enclosed in membranous indusia, dividing the involucre into as many cells.
The Order was formerly supposed to be closely connected with Lyco podiacece, in which the only British genus was included in our first editions, but its still nearer relation to Filices has been well pointed out chiefly by German botanists. " It contains only one genus besides the British one.
|
//
// TestManager.swift
// MongoKitten
//
// Created by Robbert Brandsma on 01-03-16.
// Copyright © 2016 PlanTeam. All rights reserved.
//
import MongoKitten
import BSON
import Foundation
final class TestManager {
static var server: Server = try! Server(host: "127.0.0.1", port: 27017, authentication: (username: "mongokitten-unittest-user", password: "mongokitten-unittest-password"), autoConnect: false)
static var testDatabase: Database { return server["mongokitten-unittest"] }
static var testCollection: Collection { return testDatabase["testcol"] }
static var testingUsers = [Document]()
static func connect() throws {
if !server.connected {
try server.connect()
}
}
static func dropAllTestingCollections() throws {
// Erase the testing database:
for aCollection in try! testDatabase.getCollections() {
if !aCollection.name.containsString("system") {
try! aCollection.drop()
}
}
}
static func disconnect() throws {
try server.disconnect()
}
static func fillCollectionWithSampleUsers(randomAmountBetween amount: Range<Int> = 2..<5000) throws {
// erase first
try self.dropAllTestingCollections()
testingUsers.removeAll()
// generate
for _ in 0..<Int.random(amount) {
testingUsers.append(*[
"name": Randoms.randomFakeName(),
"gender": Randoms.randomFakeGender(),
"slogan": Randoms.randomFakeConversation(),
"registered": NSDate.randomWithinDaysBeforeToday(180)
])
}
// insert
testingUsers = try testCollection.insert(testingUsers)
}
}
|
Carroll County, New Hampshire Genealogy
Description
County Courthouse
Populated Places
History Timeline
Biographies
Church Records
List of Churches and Church Parishes
* FamilySearch Places: Map of cities and towns in this county - How to Use FS Places
Court Records
Online Court Indexes and Records
* at FamilySearch Catalog(*)
* 1861-1876 and 1876-1901: Supreme Court, 1861-1876 and 1876-1901
* 1874-1876: Circuit Court 1874-1876
* 1901-1916: Superior Court 1901-1916
* 1861-1916: Court Judgements 1861-1916
Directories
Genealogies
* Conway - There is an alphabetical genealogical collection of six microfilms.
* Eaton - There is the Keith Henney Family Records Card File, 1760-1947 on one film.
Land and Property Records
Online Land Indexes and Records
* 1841-1901 (*) at FamilySearch Catalog — images
* 1841-1909 (*) at FamilySearch Catalog — images
Local Histories
* History of Carroll County, New Hampshire at New Hampshire Genealogy Trails
* New Hampshire Indexes at EveryNameIndex.com — Select the county.
Maps and Gazetteers
* 1817 Carroll County Town Descriptions from Merrill's Gazetteer of New Hampshire (1817)
* 1861 Map of Carroll County, New Hampshire 1861, You can purchase 1861 maps at this site.
* FamilySearch Places: Map of cities and towns in this county - How to Use FS Places
Military Records
American Revolution
* 1675-1835 at FamilySearch — How to Use this Collection; Index and images
Civil War
* 1861-1866 at FamilySearch - How to Use this Collection; index and images; Also at: Ancestry ($)
* - 1st Regiment, New Hampshire Heavy Artillery, Company K.
* - 2nd Regiment, New Hampshire Infantry, Company F.
* - 3rd Regiment, New Hampshire Infantry, Company G.
* - 4th Regiment, New Hampshire Infantry, Company D.
* - 5th Regiment, New Hampshire Infantry, Company H.
* - 6th Regiment, New Hampshire Infantry, Company D.
* - 8th Regiment, New Hampshire Infantry, Company I.
* - 11th Regiment, New Hampshire Infantry, Company C.
* - 12th Regiment, New Hampshire Infantry, Companies G and K.
* - 13th Regiment, New Hampshire Infantry, Company A.
* - 16th Regiment, New Hampshire Infantry, Company B.
* - 18th Regiment, New Hampshire Infantry, Companies A, C, and E.
World War I
* 1917-1918 U.S., World War I Draft Registration Cards, 1917-1918 at Ancestry - index & images ($)
World War II
* 1938-1946 U.S., World War II Army Enlistment Records, 1938-1946 at Ancestry - index & images ($)
* 1942 U.S., World War II Draft Registration Cards, 1942 at Ancestry - index & images ($)
* Carroll County, New Hampshire World War II Casualties Army and Air Force at AccessGenealogy
Naturalization and Citizenship
Online Naturalization Indexes and Records
* 1906-1993 at FamilySearch — How to Use this Collection; Index and images
Newspapers
Other Records
* 1898-2003 Carroll County Annual Reports from 1898-2003 at Internet Archive - images
Probate Records
* 1635-1753 New Hampshire Probate Records 1635-1753 at Ancestry — index & images ($)
* 1643-1982 New Hampshire Wills and Probate Records 1643-1982 at Ancestry — index & images ($)
* 1840-1936 (*) at FamilySearch Catalog — images
* 1840-1936 (*) at FamilySearch Catalog — images
* 1840-1870 (*) at FamilySearch Catalog — images
* 1840-1990 (*) at FamilySearch Catalog — images
Social Security Records
* 1936-2007 at FamilySearch - How to Use this Collection; index
Tax Records
Town Records
* 1636-1947 at FamilySearch — How to Use this Collection; Index and images
Vital Records
Birth
* Early-1900 at FamilySearch — How to Use this Collection; Index and images
* 1656-1938 at FamilySearch — How to Use this Collection; index
* 1901-1915 at FamilySearch — How to Use this Collection; Index and images
Marriage
* 1637-1964 New Hampshire, United States Marriages at Findmypast — index ($)
* 1637-1947 at FamilySearch — How to Use this Collection; Index and images
* 1656-1938 at FamilySearch — How to Use this Collection; index
* 1948-1959 at FamilySearch — How to Use this Collection; Index and images
Death
* 1654-1947 at FamilySearch — How to Use this Collection; Index and images
* 1656-1938 at FamilySearch — How to Use this Collection; index
* 1880-2010 Deaths at Conway Public Libray. Begins in 1880 - 2010
Archives
FamilySearch Centers
* Lebanon New Hampshire FamilySearch Center
* Oxford Maine FamilySearch Center
* Portland Maine FamilySearch Center
* Wolfeboro New Hampshire FamilySearch Center
* Bath Public Library - an affiliate library
* Meredith Public Library - an affiliate library
* Thornton Public Library - New Hampshire - an affiliate library
Libraries
Carroll County Public Libraries Website
Societies
Carroll County Historical Societies as listed by CountyOffice.orgWebsite
Websites
* The Carroll County NHGenWeb Project, an affiliate of The USGenWeb Project.
* The USGenWeb Archives Project for Carroll County
* Carroll County, New Hampshire Genealogy and Family History (Linkpendium)
Research Guides
|
Talk:High Voltage/@comment-<IP_ADDRESS>-20161227150502/@comment-27893266-20161227214319
It comes from obsession and anxiety.
Days 1-4 may be done with PR 38.4 (1111111), no GC upgrades.
|
You will be given a definition of a task first, then an example. Follow the example to solve a new instance of the task.
In this task, you are given two natural language statements with similar wording. You must choose the statement that makes less sense based on common sense knowledge. A '
' separates the statements. Use "first" or "second" to indicate which sentence makes less sense.
A mosquito stings me
I sting a mosquito
Solution: second
Why? The second statement doesn't make sense.
New input: You may find a caterpillar in the soil
You may find a lion in the soil
Solution:
second
|
Board Thread:Fun and Games/@comment-25999112-20160707160344/@comment-32398828-20160729142559
Skirt: Aw man, we really screwed her up, didn't we?
High Heels: She's acting wierd lately.
|
In Silico Study of the Active Compound of the Sambiloto Plant ( Andrographis Paniculata Ness. ) on Hiv-1 Protease Receptors
: Human Immunodeficiency Virus (HIV) is a virus that attacks the immune system. Sambiloto ( Andrographis Paniculata Ness) is a medicinal plant that has some active coumpunds and is used to prevent and treat some diseases. The purpose of this study was to determine candidate active compounds from sambiloto plant that able to inhibit the work of HIV-1 protease enzyme using the Insilico method. The data of chemical compound of sambiloto was obtained from pubchem site and the structure of HIV-1 protease receptor got from Protein Data Bank with the code PDB 1D4H. The molecular docking results showed bisandrographolide and phytol have potential as anti-HIV drugs compared to amprenavir as a comparison ligand.
INTRODUCTION
HIV (Human Immunodeficiency Virus) is a virus that attacks white blood cells which causes a decrease of human immunity (Zubair et al., 2020). Data on cases of Human Immunodeficiency Virus / Acquired Immuno Deficiency Syndrome (HIV / AIDS) in Indonesiacontinously increase from year upon year it looks that during last eleven years the number of HIV cases in Indonesia reached its peak in 2019, there were 78% of new HIV infections in the Asia Pacific region. The highest of AIDS case during last eleven years was in 2013, totaled 12.214 cases (Anonim, 2020).
At this time the treatment for HIV is using high activity antiretroviral therapy. The administration of antiretroviral drugs (ARV) so far hasn't been effective for killing HIV. Antiretroviral therapy is only able to inhibit the development of virus. ARV drugs work by pressurizes replication of virus sufferer, and inhibiting the progression of infection. One of work mechanisms of ARV drugs is by inhibiting the action of protease enzymes that play a role in virus maturation. Inhibition of protease enzymes affects the immature virus so that the virus becomes a non infectious form. Therefore, the importance of HIV protease enzymes in the virus life cycle makes protease enzymes the main target for the treeatment of HIV disease (Zubair et al., 2020).
Andrographis paniculata (Burm f.) Nees (Acanthacease) is a medicinal plant used in many countries, including Indonesia, known as Sambiloto. Among the single compounds extracted from Andrographis paniculata, andrographolide was the main compound in terms of a bioactive properties and abundance. Phase 1 of andrographolide clinical trial, with increasing doses in HIV-POSITIVE patients showed a significant increase in the average CD4+ lymphocyte levels of HIV patients. Andrographolide inhibits HIV induced cell cycle disregulation, leading to increased levels of CD4+ limphocytes in HIV-1 individuals (Churiyah et al., 2015). In this study, an insilico test was carried from the bitter plant as many as 22 compounds.
Molecular Docking
Molecular Docking is a genetic based method that can be used to looking for the most precise and implicated pattern of interaction between two molecules, it is receptor and ligand. Ligand is signal molecul involved in both inorganic and biochemical processes. Docking is belay interaction between a ligand and a protein that is used to predict the position and ligand orientation when it is bound to the protein receptor. And the docking process will obtain bond energy (∆G) which is a parameter of conformational stability between the ligand and the receptor.
Protein Strucuture Preparation
The preparation of target protein was carried out by downloading the 1D4H protein through the website (https://www.rcsb.org/). Proteins are separated from non standard ligands or residues using YASARA application (edit >all>residue), removing water molecules (edit>delete>water>) and adding hydrogen (edit>all>hydrogen to all). The results of separation are stored with the name protein with format .mol2.
Ligand Structure Preparation
The ligand structure is downloaded on the site (https://pubchem.ncbi.nlm.nih.gov/) in 2D form, protonated at Ph 7,4 using Marvinsketsch software, the data obtained is saved in mrv format, the file is reopened and a search is carried out conformation into 20 structures for each compound (Tools>>conformation>conformer) and then saved in .mol2 format (Manalu, Safitri, et al., 2021).
Molecular Docking with PLANTS
Docking was carried out on the Windows operating system, the result of ligand and protein preparation were transfered in .mol2 format. In the next step to find the binding side obtained with the command "plants -mode bind ref_ligand.mol2 5 protein.mol2". for run the docking process, enter the command "plants -mode screen pc_kodepdb.txt". the results of the docking can be viewed in the terminal by entering the command "cd results" followed by "more bestranking.csv". The ligands used in this study were negative control, positive control, and ligand from 22 compounds of bittter plant (Andrographis paniculata Ness). Each ligand compund was docked with 1D4H protein using PLANTS.
Docking Analysis and Visualization
To view the relationship of the ligand and receptor used the software that able to visualize the structure either in two dimensions or three dimensions so that observations are easier to do. The result of molecular docking of the best compounds were combined with YASARA, file that has been prepared by YASARA then loaded on Discovery Studio 2021 in .pdf format.
Lipinski's Rule of Five Analysis
Lipinski's Rule of Five was carried out to determine the physicochemical properties of a ligand when it crosses cell membraines in the body. Analysis can be done with plant compound files and then uploaded to Lipinski's Rule of Five webserver.
Pre-ADMET Test
Prediction of pharmacokinetic properties (ADMET: absorption, distribution, metabolism, excretion and toxicity) was performed using the pkCSM online tool.
RESULTS
The initial stage of the docking process is the preparation of protein structures, the selection of proteins at the PDB site is based on the protein to be tested. The structure with the downloaded 1D4H identity is the original homodimer structure, the HIV-1 protoase available in PDB is a macromolecular structure bound to ligands, water and other residues.
Molecular Docking
Based on the results of the docking score between the ligand and the receptor, the ligand conformation with the smallest energy can be seen in table 1. The results of docking score. The less of free energy of a molecul, so the more stable the molecule and reaction will proceed spontaneously. This is called thermodinamic equilibrium, the more negative of free energy, the more spontaneous the reaction or will quickly from a stable corformation (Manalu, Meheda, et al., 2021;Suhadi et al., 2019). Docking scores of two best compounds, is bisandrographolide and phytol had docking scores of -98,238 and -88,522, it is means that the score is close to the score of the positive control -101.217.
Docking Result Visualization
Visualization of docking results using Discovery Studio 2019 was carried out to see amino acid recidues that bind to proteins. Figure 1 shows the interaction between protein and bisandrographolide ligands with one amino acid recidue on hydrogen bonds. The presence of hydrogen bonds provides conformmational stability in the interaction between the ligand and the receptor. Molecular weight that excend 500 daltons will be difficult to penetrate through membranes either in the skin or digestion. Based on Table 2, it can be seen that all the test ligands met the molecular weihgt limit requirements. However, in order to be used orally, the drug should have a log P value of more than 1 and less 5 (Kelutur et al., 2020). So it can be said that three are four test ligands that are not suitable to be given or need modification for oral use. Log P value more than 5 also have the potential to cause toxic effects because of their low solubility in water, so that they are difficult to excrete and accumulate, easily bind to ludriphobic targets compared to their intended targets, and are difficult to metabolize (Kelutur et al., 2020).
Pre-ADMET Test
In developing a new drug, it is necessary to study absorption, distribution, metabolism, excretion, and toxicity aspects before conducting clinical trials. Pameters that can be predicted through in silico include pharmacokinetic properties and predictionof toxicity. According to Chander et al. (2017), a compound is said to have good absorption if the absorption value is >80% and the absorption is not good when <30%. The intestine is the main place for absorption of drugs given orally. And Table 3 can be seen that the intestinal absorption (human) value of bisandrographolide and phytol compounds can be predicted that bisandrographolide and phytol compounds will be absorbed very well in the intestine.
East Asian Journal of Multidisciplinary Research (EAJMR) Vol. 1, No. 6, 2022: 1147-11561153 The parameters of skin permeability are very important in the drug delivery. According to Pires et al. (2015), the compound is said to have relatively skin permeability low if it has a log value of Kp> -2.5 in table 3 that bisandrographolide and phytol compounds have skin permeability (log Kp) values of -2.2826 and -2,576. So it can be predicted that bisandrographolide compounds have good skin permeability.
Caco2 cell monolayer permeability is often used as an in vitro model of the intestinal mucosa so that it can predict the absorption of orally administred drugs. According to Pires et al. (2015) compounds are considered to have high Caco2 permeability if Papp> 8x10 6 cm/s. However, in the predictions using pkCSM permeability will be translated into Papp log which is declared high if it has a value > 0,90. The log P values for bisandrographolide and phytol compounds were 0,451 and 1,515 which means that phytol compounds have high Caco2 permeability. Prediction of P glycoprotein subtrates and inhibitors I and II states that bisandrographolide compounds will be absorbed through Pglycoprotein and P-glycoprotein inhibitors I and II. In phytol compounds will only be absorbed through P-glycoprotein II only. Bisandrographolide compounds have good single layer cell permeability and bisandrographolide compounds show that they can be absobed through P-glycoprotein and Pglycoprotein I and II.
Volume of distibution (VDss) is the theoritical volume that the total dose of drug needs to be distribused to give the same concentration as on blood plasma. The higher the VD value, the more drugs are consumed distributed than plasma (Hardjono, 2017). The compound is said to have distribution volume is low when the Log VD value ia <-0,15, and high when >0,45. From both these compounds do nnot bind to the drug fraction in plasma. Compound said able to penetrate the BBB (Blood Brain Barrier) of the brain well when it has value Log BB > 0,3 and not well distributed when Log BB <-1 phytol. Compound able to penetrate the brain's Blood Brain Barrier well. Compound bisandrographolide has a log value of PS -2,984 and phytol -1,563 which means bisandrographolide compounds can penetrate the Central Nervous System (CNS) where as phytol compounds do not, compound can be said to penetrate with Central Nervous System (CNS) when the PS log is >2 and if the PS log <3 is considered not penetrate the CNS.
Metabolisms is a chemical process in which drugs are converted in the body to form a metabolite. The organ responsible is the liver. Bisandrographolide compound can only be metabolized on CYP3A4 (cytochrome P450) subtrates while phytol compounds can be metabolized by CYP3A4 subtates and CYP1A2 inhibitors. To predict the process of compound excretion, it can be done by measuring the Total Clearance constant (CLTOT) and Renal Organic Cation Transporter 2 (OCT)2 subtrate. CLTOT is a combination of hepatic clearance (metabolism in the liver and bile) and renal clearance (excretion through flop). This is related to bioavailability, and it is important to determine the dose level to achieve steady-state concentrations. From Table 3, it can be seen that the compound bisandrographolide 0,221 and the phytol compound 1,686. It can be predicted that phytol compounds have the highest value so that they are excreted the fastest from the body.
Ames Toxicity test is a widely used method for assessing the mutagenic compound potential using bacteria. Ames toxicity in these two compouunds that are not mutagenic. Both compounds are categorized as low because they have a value <0,447 safe dose limit for humans (Hasnaa et al., 2022). hERG gene is one of the important factors in the discovery ofnew drugs. If the hERG gene is inhibited, cardiac arrhythmias will occur which can be fatal. Acute toxicity is exposure to a substance in less than 24 hours. One method pf measuring the level of acute toxicity is to determinethe value of the Oral Rate Acute Toxicity (LD50). Based on the results in Table 3, the LD50 value of the bisandrographolide compound is 2,715 indicating a relatively low toxicity and for the phytol compound 1,607. The higher the LD50 value, the lower the toxicity. So that bisandrographolide compouns have lower toxicity than phytol compounds.
CONCLUSIONS
Based on the results of molecular anchoring using 22 active compounds from sambiloto plant to the HIV-1 protease target, it showed that two compounds with the best affinity, namely bisandrographolide and phytol with docking scores of 98,238 adn 88,522 which were found in conformation 20 and conformation 10. This indicates that these compounds have potential for activity asan anti-HIV drug. The results of protein-ligand visualization showed that bisandrographolide compounds has good stability interactions. ADMET prediction shows that bisandrographolide compounds better than phytol compounds.
|
User talk:<IP_ADDRESS>
Welcome
Hi, welcome to. Thanks for your edit to the Alex Fuentes page.
All of these links are a great way to start exploring Wikia.
Happy editing, DaNASCAT (help forum | blog) 06:05, January 18, 2015 (UTC)
|
SQL Server could not find a login matching the name provided
I have SQL Serer 2012 up and running. I created a new login (SQL Server authentication with password expiration, requires change, etc. turned off).
I can start SQL Server Management Studio as the user. But when I try to connect in code I get the error 'could not find a login matching the name provided'. I know the code works because it can connect to another instance on the same machine.
But the name is there, and I'm actually logged in as that user.
Note, I cannot use integrated security either, just the same error message.
What's wrong? Many thanks.
I refactored your wording. I found the sentence structure difficult to follow. If I have mangled your intent, apologies. You can undo my edit, or edit it further yourself.
I had the wrong port number. There was a third database instance with this port....
so it seems when you connect using 'SERVER\INSTANCE,port' it completely ignores INSTANCE if you specify port and instead of saying you have the wrong instance you get user not found.
thanks.
|
162 SEVENTEENTH REPORT.
weijilit. Thev were then placed in closed, but not sealed, fruit jars and kep( in llio laboratory where the temperature averaged about 22° C. and the relative humidity about 47.5%. On the 1st of April, 1914, the moisture content, in ])er cent of the weight, varied, with species, between 7 and 26.
The fourth part was stored in closed glass fruit jars in the laboratory where the above stated laborator\' conditions prevailed. On April 1, 1914, the moisture content, in per cent of the weight, varied with species, between 7 and 13.
Ten seeds of each species from each condition were planted each month from October to April inclusive. The seeds were planted in loam in the greenhouse and were kept moist and under good conditions for germination. The ungerminated seeds were ex iimined each week for signs of germination and when a seed had germinated it was not further disturbed.
The detailed tables of germination show that the results may be expressed fairly accurately by making three groups, i. e. hickories, white oaks and black oaks. A table of the results for each group under each condition follows. The figures give the average per cent of germination of the species in the group from the given condition.
As seen by the above table the seeds of all the species tested kept better in the ice box than in any of the other conditions. The germination per cent of the seeds from this condition was fairly constant throughout the series of tests. With the liickories and the black oaks the length of time it took them to germinate, or period of germination, decreased steadily as the tests proceeded.
The seeds from the pit showed the next highest germination per cent. Here, too, the! germin.ation remained fairly constant throughout the tests and the period of geraiination decreased in the case of the hickories and black oaks as the season progressed. In the case of the white oaks this decrease was preceded by an increase.
The seeds that had been artificially dried showed uj) rather poorly. The germination per cent was very low in all species and in all except the Quercus bicolor, Carya cordiformis and Carya ovata the gennination dr()]ii)pd to after the first few i)lantings. The j)eriod of germinati<iii was more erratic than in the two preced ing cases but was normally longer than in either.
|
Add cloud-init support for the network-config file.
This allows creating static and custom networking configurations.
Re-opening #270 with documentation added.
This should be rebased; all tests passing and documentation added. Hopefully this is gtg.
My question to the reviewers is if we want to go this path, and starting to add support for all the cloudinit schema.
My question to the reviewers is if we want to go this path, and starting to add support for all the cloudinit schema.
Not sure about this. On one hand, the network configuration seems to be a top-level element of the cloud-init schema, and it is important enough for being managed by the terraform/libvirt provider. On the other hand, this could open a can of worms where we would end up having all the possible cloud-init stuff...
My personal view would be to go for the network configuration, but nothing else.
My understanding is that there are only 3 files that can exist in the ISO?
meta-data
user-data
network-config
I don't think you need to add the entire cloud-init schema. At least allowing folks to place those 3 files avoids having to implement the schema and the user can source those files as they see fit (I use terraform templates).
I would really like if we improve also the tests coverage for this feature
https://github.com/dmacvicar/terraform-provider-libvirt/pull/267
Closing this pr because it will be adressed on https://github.com/dmacvicar/terraform-provider-libvirt/pull/410, were we allow the new field, were the user can add cloud init network data. Thank you for contributing and your time spend on this pr ( reviewer and contributors). Have a nice day
|
/* Generated by ts-generator ver. 0.0.8 */
/* tslint:disable */
import { Contract, ContractTransaction, EventFilter } from "ethers";
import { Provider } from "ethers/providers";
import { BigNumber } from "ethers/utils";
import { TransactionOverrides } from ".";
export class ERC1155X extends Contract {
functions: {
balanceOf(
_address: string,
_id: number | string | BigNumber
): Promise<BigNumber>;
supportsInterface(_interfaceID: string): Promise<boolean>;
balanceOfBatch(
_owners: (string)[],
_ids: (number | string | BigNumber)[]
): Promise<(BigNumber)[]>;
writeValueInBin(
_binValue: number | string | BigNumber,
_index: number | string | BigNumber,
_value: number | string | BigNumber
): Promise<BigNumber>;
getIDBinIndex(
_id: number | string | BigNumber
): Promise<{
bin: BigNumber;
index: BigNumber;
0: BigNumber;
1: BigNumber;
}>;
isApprovedForAll(_owner: string, _operator: string): Promise<boolean>;
getValueInBin(
_binValue: number | string | BigNumber,
_index: number | string | BigNumber
): Promise<BigNumber>;
recoverTransferSigner(
_from: string,
_to: string,
_id: number | string | BigNumber,
_value: number | string | BigNumber,
_data: (string)[],
_nonce: number | string | BigNumber,
_sig: {
v: number | string | BigNumber;
r: string;
s: string;
nonce: number | string | BigNumber;
sigPrefix: string;
}
): Promise<string>;
recoverApprovalSigner(
_operator: string,
_approved: boolean,
_nonce: number | string | BigNumber,
_sig: {
v: number | string | BigNumber;
r: string;
s: string;
nonce: number | string | BigNumber;
sigPrefix: string;
}
): Promise<string>;
recoverHashSigner(
_hash: string,
_r: string,
_s: string,
_v: number | string | BigNumber
): Promise<string>;
getNonce(_signer: string): Promise<BigNumber>;
safeBatchTransferFrom(
_from: string,
_to: string,
_ids: (number | string | BigNumber)[],
_values: (number | string | BigNumber)[],
_data: (string)[],
overrides?: TransactionOverrides
): Promise<ContractTransaction>;
renounceOwnership(
overrides?: TransactionOverrides
): Promise<ContractTransaction>;
setApprovalForAll(
_operator: string,
_approved: boolean,
overrides?: TransactionOverrides
): Promise<ContractTransaction>;
safeTransferFrom(
_from: string,
_to: string,
_id: number | string | BigNumber,
_value: number | string | BigNumber,
_data: (string)[],
overrides?: TransactionOverrides
): Promise<ContractTransaction>;
transferOwnership(
newOwner: string,
overrides?: TransactionOverrides
): Promise<ContractTransaction>;
sigSetApprovalForAll(
_owner: string,
_operator: string,
_approved: boolean,
_sig: {
v: number | string | BigNumber;
r: string;
s: string;
nonce: number | string | BigNumber;
sigPrefix: string;
},
overrides?: TransactionOverrides
): Promise<ContractTransaction>;
mint(
_to: string,
_id: number | string | BigNumber,
_value: number | string | BigNumber,
overrides?: TransactionOverrides
): Promise<ContractTransaction>;
batchMint(
_to: string,
_ids: (number | string | BigNumber)[],
_values: (number | string | BigNumber)[],
overrides?: TransactionOverrides
): Promise<ContractTransaction>;
ERC1155_BATCH_RECEIVED_VALUE(): Promise<string>;
ERC1155_RECEIVED_VALUE(): Promise<string>;
owner(): Promise<string>;
isOwner(): Promise<boolean>;
};
filters: {
OwnershipTransferred(
previousOwner: string | null,
newOwner: string | null
): EventFilter;
TransferSingle(
_operator: string | null,
_from: string | null,
_to: string | null,
_id: null,
_value: null
): EventFilter;
TransferBatch(
_operator: string | null,
_from: string | null,
_to: string | null,
_ids: null,
_values: null
): EventFilter;
ApprovalForAll(
_owner: string | null,
_operator: string | null,
_approved: null
): EventFilter;
};
}
|
Martin BROOKS, as Guardian ad Litem of the Estate of Vito Sturiano, Deceased, Appellant, v. Josephine STURIANO, Appellee.
No. 85-2177.
District Court of Appeal of Florida, Fourth District.
Nov. 19, 1986.
Nancy Little Hoffmann of Nancy Little Hoffmann, P.A., and. Steven Billing of Billing, Cochran & Heath, P.A., Fort Lauder-dale, for appellant.
Leonard Robbins & Linda Raspolich Pratt of Abrams, Anton, Robbins, Resnick, Schneider & Mager, P.A., Hollywood, for appellee.
STONE, Judge.
There are two issues raised by this appeal. The first is whether the wife’s claim is barred by the doctrine of interspousal immunity. The trial judge concluded it was not, and entered final judgment against the guardian ad litem appointed for the decedent husband’s estate. We affirm as to this. The second is whether there is liability coverage under the terms of the insurance policy issued in New York. The policy lacks a clause, required by New York law in order to include coverage, insuring one spouse against the negligence of the other. This requires that we reverse, as New York law is applicable.
As to the first issue, the facts of this case are uniquely different from those found in any prior cases involving the inter-spousal immunity defense. This case contains what may be the final unresolved matter in the legal life of this issue. Here, the negligent spouse, who was insured, died as a result of the accident. The automobile he was driving struck a tree. His wife, the plaintiff, was injured in the accident. She is free of negligence, is her husband’s sole survivor, and is the only party interested in the estate. A guardian ad litem was appointed by the court to represent the interests of the defense. The appellee recovered a jury verdict in excess of the insurance policy limits, but the trial court, without objection, has reduced it to those policy limits.
The appellant contends that the final word on this subject has already been spoken by our supreme court and relies on Snowten, 475 So.2d at 1211, Roberts v. Roberts, 414 So.2d 190 (Fla.1982), and Raisen v. Raisen, 379 So.2d 352 (Fla.1979), cert. denied, 449 U.S. 886, 101 S.Ct. 240, 66 L.Ed.2d 111 (1980).
The appellee claims that Dressier v. Tubbs, 435 So.2d 792 (Fla.1983), and Ard v. Ard, 414 So.2d 1066 (Fla.1982), point to an exception under these facts.
In each case relied on by appellant, the supreme court has relied on appropriate public policy in reaching its judgment. However, in this case none of those policy considerations are applicable. Here there is no reason to be concerned about family harmony, children, interspousal friction, divorce, fraud, collusion, nor any other social nor legal policy concerns that are normally protected by this defense. In Raisen, both parties were alive. In Roberts, the plaintiff sued the estate of her deceased husband, but the act was intentional, there was no insurance issue and there was a potential loss to be borne by another family member.
In Dressier, the wife’s estate brought suit against the estate of the husband for wrongful death caused by his negligence. The court found that the doctrine of inter-spousal immunity did not apply because the wrongful death statute created a separate and distinct right in the wife’s survivors. The supreme court reasoned, in distinguishing Raisen, that:
Raisen was decided on the grounds that allowing such a suit would be disruptive of marital unity and harmony. Obviously, Raisen cannot be applied to the factual situation here. Husband and wife are dead. There is no suit between spouses, just as there is no longer any marital unit to serve.
435 So.2d at 794. However, notwithstanding the analysis of Raisen in Dressier, it is clear, as defendant points out, that the court in Dressier was not ruling on the immunity issue, but was recognizing the statutory right of the survivors.
In Ard v. Ard, decided on the same day as Roberts, the court recognized that parental immunity was waived to the extent of available insurance coverage. But in Snowten the court held that interspousal immunity was not waived, even to the extent of available insurance. In Snowten the court considered Dressier and Ard, and made it clear that they did not signal a departure from Raisen. However, in Snowten, unlike this case, the negligent spouse had not died prior to suit, and the court again recited the traditional policy considerations in declaring that the inter-spousal immunity defense, unlike parental immunity, would not be waived even to the extent of insurance coverage.
The issue, then, is whether the supreme court in Snowten completely closed the door to a spouse injured by a spouse regardless of the facts and lack of policy considerations, or whether the facts dictated the result, just as in Dressier the facts permitted recovery.
We conclude that Snowten is distinguishable and the otherwise emphatic language in that case does not prevent the result reached here. In this case none of the policy considerations supporting inter-spousal immunity exist: the negligent spouse died in the accident, there are no children or other adverse estate interests, there is insurance, a guardian ad litem has been appointed, and no other public policy issue is served by barring recovery to the injured party, who would be otherwise entitled to compensation from the carrier.
However, as to the second issue, appellant correctly points out that the insurance policy here did not provide coverage to a marital partner injured by that partner’s insured spouse. The policy was issued in New York under a statute which specifically provided that there would be no coverage in such a case, unless it was specifically provided for in the insurance contract. N.Y. Ins. Law, § 3420(g) (McKinney 1985).
Appellee argues that Florida courts, in a choice of laws context, apply the law of the state having the most significant relationship to the transaction — in this case, Florida. See Bishop v. Florida Specialty Paint Co., 389 So.2d 999 (Fla.1980). In Bishop the court did adopt the significant relationship test of the Restatement (Second) of Conflict of Laws §§ 145-146 (1971). However, the test adopted by Bishop applied only to the law of torts, not to contracts such as the one here.
In Gillen v. United Services Automobile Association, 300 So.2d 3 (Fla.1974), the Florida Supreme Court declined to adopt Restatement (Second) of Conflict of Laws § 188 (1969) — the significant relationship test as applied to contracts. In determining which state’s law applied to an automobile liability policy, this court in New Jersey Manufacturers Insurance Co. v. Robertazzi, 473 So.2d 235 (Fla. 4th DCA 1985), rev. denied, 484 So.2d 9 (Fla.1986), refused to substitute the most significant relationship test with the traditional lex loci con-tractus rule, noting that the substitution in Bishop applied only to torts, and not to contracts. See Jemco, Inc. v. United Par cel Service, Inc., 400 So.2d 499 (Fla. 3d DCA 1981), rev. denied, 412 So.2d 466 (Fla.1982); Eagle Star Insurance Co. v. Parker, 365 So.2d 780 (Fla. 4th DCA 1978); State-Wide Insurance Co. v. Flaks, 233 So.2d 400 (Fla. 3d DCA), cert. dismissed, 238 So.2d 427 (Fla.1970).
We must therefore reverse the trial court’s ruling that the appellee could recover under the policy. Despite the significant contacts present between Florida and this insurance contract, New Jersey Manufacturers requires application of the law of New York, where the contract was made.
The appellant contends that only a substantial public policy, such as that found in uninsured motorist provisions, will permit Florida law to be applied to a contract consummated in another state. Gillen v. United Services Automobile Association, 300 So.2d at 3; Arnica Mutual Insurance Co. v. Gifford, 434 So.2d 1015 (Fla. 5th DCA 1983); Safeco Insurance Co. of America v. Ware, 424 So.2d 907 (Fla. 4th DCA 1982); Decker v. Great American Insurance Co., 392 So.2d 965 (Fla. 2d DCA 1980), rev. denied, 399 So.2d 1143 (Fla.1981). However, that is not correct. Florida courts have applied Florida law in interpreting an insurance contract, using the significant relationship test under facts similar to those in this case. Petrik v. New Hampshire Insurance Co., 379 So.2d 1287 (Fla. 1st DCA 1979), cert. denied, 400 So.2d 8 (Fla.1981).
The facts of this case show significant contacts between Florida and this insurance transaction. However, since this court in New Jersey Manufacturers expressly refutes the significant relationship test in favor of the lex loci contractus rule, the trial court’s ruling on the issue must be reversed. We certify the following questions to the Supreme Court as a matter of great public importance:
I. DOES THE LEX LOCI CONTRAC-TUS RULE GOVERN THE RIGHTS AND LIABILITIES OF THE PARTIES IN DETERMINING THE APPLICABLE LAW ON AN ISSUE OF INSURANCE COVERAGE, PRECLUDING CONSIDERATION BY THE FLORIDA COURTS OF OTHER RELEVANT FACTORS, SUCH AS THE SIGNIFICANT RELATIONSHIP BETWEEN FLORIDA AND THE PARTIES AND/OR THE TRANSACTION?
II.
REVERSED.
ANSTEAD, J., concurs.
GLICKSTEIN, J., concurs in part and dissents in part with opinion.
GLICKSTEIN, Judge,
concurring in part and dissenting in part.
I agree with the majority’s analysis of the issue whether New York or Florida law governs the disposition of the case, albeit I have some concerns that certain facts we do not know may bear on the choice of laws question. There is case law which suggests the question may depend on whether the insurer had adequate notice that the covered vehicle was housed in Florida, and whether the insured had taken affirmative steps to establish residence here. See Gillen v. United Services Automobile Association, 300 So.2d 3 (Fla.1974). In my view, it would be wise to rule upon that issue and decline to rule upon the issue of interspousal immunity.
Upon the issue of interspousal immunity, I think it wise to certify appropriate questions as was done in Jones v. Hoffman, 272 So.2d 529 (Fla. 4th DCA 1973), upon significant issues but I would prefer that we avoid the criticism that followed in Hoffman v. Jones, 280 So.2d 431 (Fla.1973), which we can avoid here by expressing our value judgments without ruling.
Recently, this writer was given the opportunity to view Judge Aldisert’s The Judicial Process (1976), wherein eloquent essays describe the anatomy of judge-made law. In less than eloquent fashion, this writer has often described our work as appellate judges to be, more often than not, a verbalizing of our individual value judgments, however relative and nonabsolute they may be.
The majority helre recites, in a logical manner, its reasons for not applying inter-spousal immunity to the facts of this case. By the time this case is reviewed by the supreme court, two of the majority in Snowten will have been replaced by new justices, with their own value judgments. It seems fitting for them now to say what this state’s law shall be. See also, in this vein, Glick & Emmert, Stability and Change: Characteristics of State Supreme Court Judges, 70 Judicature 107 (1986).
In this court, we might not be as busy as Hercules in cleaning up things; but we do an abundance of janitorial work. While it is pleasurable, when the supreme court has not established policy, for us to establish it in a given case — pending that court’s subsequent consideration — I would be satisfied if we spoke our mind without establishing policy.
. We note, however, that this judgment preceded the decision of the supreme court in Snowten v. United States Fidelity and Guaranty Co., 475 So.2d 1211 (Fla.1985).
|
using System.Collections;
using System.Collections.Generic;
using UnityEngine;
public class EmitPartical : MonoBehaviour
{
public ParticleSystem mParticleSystem;
int mMaxParticles = 0;
public int maxParticles
{
get
{
return mMaxParticles;
}
set
{
mMaxParticles = value;
}
}
void Awake()
{
mMaxParticles = mParticleSystem.main.maxParticles;
mParticleSystem.Clear();
}
void Update()
{
if (mParticleSystem != null)
{
if (mParticleSystem.particleCount < mMaxParticles)
{
mParticleSystem.Emit(mMaxParticles - mParticleSystem.particleCount);
}
}
}
}
|
import React, { Component } from 'react';
import { Button, Table } from 'react-bootstrap';
import Insurances from './Insurances';
import InsuranceForm from '../../container/forms/InsuranceForm'
class UserInsurance extends Component {
render(){
return (
<div className="UserInsurances">
<div className="AttrTitle">
<h3>Insurance</h3>
</div>
<div className="AttrIndex">
<div className="AttrTable">
<Table striped bordered condensed hover>
<thead>
<tr>
<th>Insurance Name</th>
<th>Address</th>
<th>Phone</th>
<th>Notes</th>
<th>Edit</th>
<th>Delete</th>
</tr>
</thead>
<Insurances
insurances={this.props.insurances}
editIns={this.props.editIns} deleteIns={this.props.deleteIns}/>
</Table>
</div>
{!this.props.isEditMed && this.props.isEditIns && !this.props.isEditProv ?
<div className="InsForm">
<h3>Edit {this.props.selectedIns.name}</h3>
<InsuranceForm insurance={this.props.selectedIns}/>
<Button bsStyle="link" onClick={this.props.editIns}>Cancel</Button>
</div>
:
<div className="AttrNew">
<Button bsStyle="primary" onClick={this.props.addIns}>Add New Insurance</Button>
</div>
}
{this.props.isAddIns &&
<div className="AttrForm">
<h3>Add New Insurance</h3>
<InsuranceForm />
<Button bsStyle="link" onClick={this.props.addIns}>Cancel</Button>
</div>
}
<br />
</div>
</div>
)
}
};
export default UserInsurance;
|
namespace JTUtility.Interactables
{
public interface IInteractable
{
/// <summary>
/// Wether this object is being interacting.
/// </summary>
bool IsInteracting { get; }
/// <summary>
/// Wether this object is Activated.
/// </summary>
bool IsActivated { get; }
/// <summary>
/// Calls when interaction start.
/// </summary>
event Action OnStartInteracting;
/// <summary>
/// Calls when interaction keep on.
/// </summary>
event Action OnKeepInteracting;
/// <summary>
/// Calls when interaction end.
/// </summary>
event Action OnStopInteracting;
/// <summary>
/// Calls when this object is activated.
/// </summary>
event Action OnActivated;
/// <summary>
/// Calls when while this object is deactivated.
/// </summary>
event Action OnDeactivated;
/// <summary>
/// Starts interacting with this object.
/// </summary>
void StartInteracting();
/// <summary>
/// Stop interacting with this object.
/// </summary>
void StopInteracting();
}
}
|
SGE Auto configured consumable resource?
I am using a tool called starcluster http://star.mit.edu/cluster to boot up an SGE configured cluster in the amazon cloud. The problem is that it doesn't seem to be configured with any pre-set consumable resources, excepts for SLOTS, which I don't seem to be able to request directly with a qsub -l slots=X. Each time I boot up a cluster, I may ask for a different type of EC2 node, so the fact that this slot resource is preconfigured is really nice. I can request a certain number of slots using a pre-configured parallel environment, but the problem is that it was set up for MPI, so requesting slots using that parallel environment sometimes grants the job slots spread out across several compute nodes.
Is there a way to either 1) make a parallel environment that takes advantage of the existing pre-configured HOST=X slots settings that starcluster sets up where you are requesting slots on a single node, or 2) uses some kind of resource that SGE is automatically aware of? Running qhost makes me think that even though the NCPU and MEMTOT are not defined anywhere I can see, that SGE is somehow aware of those resources, are there settings where I can make those resources requestable without explicitely defining how much of each are available?
Thanks for your time!
qhost output:
HOSTNAME ARCH NCPU LOAD MEMTOT MEMUSE SWAPTO SWAPUS
-------------------------------------------------------------------------------
global - - - - - - -
master linux-x64 2 0.01 7.3G 167.4M 0.0 0.0
node001 linux-x64 2 0.01 7.3G 139.6M 0.0 0.0
qconf -mc output:
#name shortcut type relop requestable consumable default urgency
#----------------------------------------------------------------------------------------
arch a RESTRING == YES NO NONE 0
calendar c RESTRING == YES NO NONE 0
cpu cpu DOUBLE >= YES NO 0 0
display_win_gui dwg BOOL == YES NO 0 0
h_core h_core MEMORY <= YES NO 0 0
h_cpu h_cpu TIME <= YES NO 0:0:0 0
h_data h_data MEMORY <= YES NO 0 0
h_fsize h_fsize MEMORY <= YES NO 0 0
h_rss h_rss MEMORY <= YES NO 0 0
h_rt h_rt TIME <= YES NO 0:0:0 0
h_stack h_stack MEMORY <= YES NO 0 0
h_vmem h_vmem MEMORY <= YES NO 0 0
hostname h HOST == YES NO NONE 0
load_avg la DOUBLE >= NO NO 0 0
load_long ll DOUBLE >= NO NO 0 0
load_medium lm DOUBLE >= NO NO 0 0
load_short ls DOUBLE >= NO NO 0 0
m_core core INT <= YES NO 0 0
m_socket socket INT <= YES NO 0 0
m_topology topo RESTRING == YES NO NONE 0
m_topology_inuse utopo RESTRING == YES NO NONE 0
mem_free mf MEMORY <= YES NO 0 0
mem_total mt MEMORY <= YES NO 0 0
mem_used mu MEMORY >= YES NO 0 0
min_cpu_interval mci TIME <= NO NO 0:0:0 0
np_load_avg nla DOUBLE >= NO NO 0 0
np_load_long nll DOUBLE >= NO NO 0 0
np_load_medium nlm DOUBLE >= NO NO 0 0
np_load_short nls DOUBLE >= NO NO 0 0
num_proc p INT == YES NO 0 0
qname q RESTRING == YES NO NONE 0
rerun re BOOL == NO NO 0 0
s_core s_core MEMORY <= YES NO 0 0
s_cpu s_cpu TIME <= YES NO 0:0:0 0
s_data s_data MEMORY <= YES NO 0 0
s_fsize s_fsize MEMORY <= YES NO 0 0
s_rss s_rss MEMORY <= YES NO 0 0
s_rt s_rt TIME <= YES NO 0:0:0 0
s_stack s_stack MEMORY <= YES NO 0 0
s_vmem s_vmem MEMORY <= YES NO 0 0
seq_no seq INT == NO NO 0 0
slots s INT <= YES YES 1 1000
swap_free sf MEMORY <= YES NO 0 0
swap_rate sr MEMORY >= YES NO 0 0
swap_rsvd srsv MEMORY >= YES NO 0 0
qconf -me master output (one of the nodes as an example):
hostname master
load_scaling NONE
complex_values NONE
user_lists NONE
xuser_lists NONE
projects NONE
xprojects NONE
usage_scaling NONE
report_variables NONE
qconf -msconf output:
algorithm default
schedule_interval 0:0:15
maxujobs 0
queue_sort_method load
job_load_adjustments np_load_avg=0.50
load_adjustment_decay_time 0:7:30
load_formula np_load_avg
schedd_job_info false
flush_submit_sec 0
flush_finish_sec 0
params none
reprioritize_interval 0:0:0
halftime 168
usage_weight_list cpu=1.000000,mem=0.000000,io=0.000000
compensation_factor 5.000000
weight_user 0.250000
weight_project 0.250000
weight_department 0.250000
weight_job 0.250000
weight_tickets_functional 0
weight_tickets_share 0
share_override_tickets TRUE
share_functional_shares TRUE
max_functional_jobs_to_schedule 200
report_pjob_tickets TRUE
max_pending_tasks_per_job 50
halflife_decay_list none
policy_hierarchy OFS
weight_ticket 0.010000
weight_waiting_time 0.000000
weight_deadline 3600000.000000
weight_urgency 0.100000
weight_priority 1.000000
max_reservation 0
default_duration INFINITY
qconf -mq all.q output:
qname all.q
hostlist @allhosts
seq_no 0
load_thresholds np_load_avg=1.75
suspend_thresholds NONE
nsuspend 1
suspend_interval 00:05:00
priority 0
min_cpu_interval 00:05:00
processors UNDEFINED
qtype BATCH INTERACTIVE
ckpt_list NONE
pe_list make orte
rerun FALSE
slots 1,[master=2],[node001=2]
tmpdir /tmp
shell /bin/bash
prolog NONE
epilog NONE
shell_start_mode posix_compliant
starter_method NONE
suspend_method NONE
resume_method NONE
terminate_method NONE
notify 00:00:60
owner_list NONE
user_lists NONE
xuser_lists NONE
subordinate_list NONE
complex_values NONE
projects NONE
xprojects NONE
calendar NONE
initial_state default
s_rt INFINITY
h_rt INFINITY
s_cpu INFINITY
h_cpu INFINITY
s_fsize INFINITY
h_fsize INFINITY
s_data INFINITY
h_data INFINITY
s_stack INFINITY
h_stack INFINITY
s_core INFINITY
h_core INFINITY
s_rss INFINITY
The solution I found is to make a new parallel environment that has the $pe_slots allocation rule (see man sge_pe). I set the number of slots available to that parallel environment to be equal to the max since $pe_slots limits the slot usage to per-node. Since starcluster sets up the slots at cluster bootup time, this seems to do the trick nicely. You also need to add the new parallel environment to the queue. So just to make this dead simple:
qconf -ap by_node
and here are the contents after I edited the file:
pe_name by_node
slots 9999999
user_lists NONE
xuser_lists NONE
start_proc_args /bin/true
stop_proc_args /bin/true
allocation_rule $pe_slots
control_slaves TRUE
job_is_first_task TRUE
urgency_slots min
accounting_summary FALSE
Also modify the queue (called all.q by starcluster) to add this new parallel environment to the list.
qconf -mq all.q
and change this line:
pe_list make orte
to this:
pe_list make orte by_node
I was concerned that jobs spawned from a given job would be limited to a single node, but this doesn't seem to be the case. I have a cluster with two nodes, and two slots each.
I made a test file that looks like this:
#!/bin/bash
qsub -b y -pe by_node 2 -cwd sleep 100
sleep 100
and executed it like this:
qsub -V -pe by_node 2 test.sh
After a little while, qstat shows both jobs running on different nodes:
job-ID prior name user state submit/start at queue slots ja-task-ID
-----------------------------------------------------------------------------------------------------------------
25 0.55500 test root r 10/17/2012 21:42:57 all.q@master 2
26 0.55500 sleep root r 10/17/2012 21:43:12 all.q@node001 2
I also tested submitting 3 jobs at once requesting the same number of slots on a single node, and only two run at a time, one per node. So this seems to be properly set up!
|
The Distance Training Application to Improve the Literacy Ability of Mathematical Teacher on Madrasah Tsanawiyah
DOI: https://doi.org/10.33258/biolae.v3i3.522 Abstract: The pandemic covid-19 and the development of information technology and communication is a resistance and challenge for those who are trained to innovate the training pattern. In practice, the distance training as multimedia based learning becomes an alternative implementation pattern that is widely applied by training institutions. In the implementation of this distance training, literacy skills of the participants are required. This study aims to explain the increase in literacy skills of Madrasah Tsanawiyah mathematics teachers through the application of distance training. This study is a quantitative descriptive study on a sample of mathematics teacher training participants at the Surabaya Religious Education and Training Center in 2021. The research design used a one sample pre test-post test with a test as a data collection technique. Then the data was processed using N-Gain analysis techniques and using t-test's SPSS paired sample test method. The results showed that there was an increase in literacy ability in general by 0.842 (high Gain category) with ttest results at = 0.05, df = 34 of 16, 952 > t table (very significant category). Meanwhile, the literacy ability of mathematical content in the geometry aspect showed an increase of 0.618 (medium gain category) with t-test results at = 0.05, df = 34 of 11,153 > t table (very significant category). From the results of this study, it can be concluded that the application of distance training can improve the literacy skills of Madrasah Tsanawiyah mathematics teachers.
I. Introduction
The ongoing training implementation process raises various obstacles. The current Covid-19 pandemic can be one of the obstacles due to the spread of the corona virusvery influential on the pattern of connectivity between humans and all aspects of life including the process of learning activities in the implementation of training. The development of technology and information, which has had a positive impact on the implementation of the training, has also become a challenge to continue to be able to carry out learning activities in the training program optimally. (Triyono; Febriani, RD; Hidayat, H.; Putri, Besti ND, 2019) (Susilo, 2019). In line with the adult learning strategy, online multimedia-based learning can be used as a solution. Organizing multimedia-based learning that is carried out online is one of the innovations in the training implementation system. Therefore, during the Covid-19 pandemic, such as the current distance training (PJJ) is mostly carried out by educational and training institutions. One of the skills that need to be developed in distance training is literacy skills. This literacy is the ability to access, understand, and use various learning resources intelligently to improve competence. Activities in this literacy include reading, viewing, listening, writing, and communicating activities with various learning resources, both in print, visual and digital forms.
Judging from the applied aspect, literacy is also the ability to use the knowledge possessed to solve problems through critical thinking skills, analysis, creativity in finding solutions to problems, and communicating both orally and in writing. So literacy skills are absolutely mastered and developed by everyone, including the trainees.
The results of a survey conducted by the International Student Assessment PISA found that literacy culture in Indonesia ranks 64 out of 65 countries in the world, among students, literacy culture in Indonesia ranks 57 out of 65 countries. (Suranggaga, 2017), literacy skills have not become a culture among students both at the elementary school level (Akbar, 2017), the mathematical literacy ability level 3 in class IX students in Bandung is moderate and at level 4 is low (Purwasih, R.;Sari, NR;Agustina, S., 2018) literacy skills oriented to the scientific approach of high school students in biology learning are included in the medium category (Setiawan, 2019). The research results as stated above tend to focus on research conducted on students. So far, there are still few research results related to literacy skills involving teachers both in schools and madrasas. For this reason, research is needed that involves teachers as research subjects, especially with regard to their literacy skills. This paper specifically seeks to explain the improvement of the literacy skills of mathematics teachers in madrasahs through the application of distance training. The literacy skills described include general literacy skills and mathematical literacy skills on geometric material. In addition, this paper also describes the level of significance of increasing teacher literacy skills after the implementation of distance training. These three elements are discussed sequentially in the discussion of this study. Furthermore, from the results obtained, an analysis was carried out on several matters relating to the two literacy skills of teachers, both general literacy and mathematical literacy in geometry material. This paper is based on the hypothesis that there is an increase in the literacy ability of mathematics teachers after the implementation of distance training. This increase can be seen in general literacy skills and mathematical literacy skills. This paper also assumes that the distance training implemented can accommodate the various things needed by mathematics teachers to be able to improve their literacy skills.
Distance Training (PJJ)
Training is a series of activities designed to change very specific behaviors in predetermined ways. If the activity is done well, then participants are expected to reproduce the targeted behavior (Mustaji;Sugiarso, 2017). There is a view of social interaction in new media theory that categorizes media according to their proximity to face-to-face interaction (Antony et al in Syakur, 2020). Khairiyyah (2021) state that mathematics is an important part of the field of science. According to Irhamna (2020) mathematics is a universal science. Mathematics is also seen as the queen of science. The expected results from the implementation of a short-term oriented training, are instant, and easy to measure and the implementation of the training is not only related to the implementation of face-to-face or online learning processes, but also guarantees that what the trainees learn can be applied in the workplace and have an impact on improving the performance of employees who have attended the training. Generally, blended learning is considered as learning that combines faceto-face systems with mediation technology instruction (Hamid K, 2019). So training is learning that is specifically designed to improve employee performance in the current job that must be mastered. Therefore, the training delivery system should cover the instructional aspects in the classroom, the results of training in the workplace, and the benefits derived from training activities or better known as return on investment (ROI) (Ratna, 2016).
The system for organizing training during the Covid-19 pandemic that has been widely developed is distance training (PJJ) and is carried out online. This remote training system is able to create equal opportunities for employees to improve their competencies, expand participants' opportunities for literacy in the form of activities to access and utilize training materials, and increase participants' active participation in participating in learning activities during the training. (Nugraha, Firman;Restendi, Dedi;Triyanto, Agus, 2020). Distance training is implemented by applying the following principles: 1) individual differences; 2) work related; 3) motivation of training participants; 4) the activeness of the training participants; 5) selection of organizers and resource persons; 6) training implementation methods; and 7) principles of learning in training (Ratna, 2016). In addition, the implementation of distance training must also pay attention to aspects of independence in learning and the availability of learning materials. So distance training must be able to accommodate various matters relating to an effective training system to improve the competence of participants.
Mathematical Literacy Ability
Mathematical literacy is the knowledge and skills needed to understand the material, use numbers, apply appropriate mathematical operations in solving problems, and the ability to apply mathematical concepts in everyday life. Mathematical literacy ability supports the development of mathematical power, namely a person's ability to deal with mathematical problems and other contextual problems that are solved by applying their mathematical knowledge (Abidin; Yunus; Mulyati; Tita; Yunansah; Hana, 2017). In the notes of the National Council of Teachers Mathematics (NCTM, 2000) there are five competencies that teachers should develop in learning mathematics, namely: (1) mathematical problem solving; (2) mathematical communication; (3) mathematical reasoning; (4) mathematical connections; and (5) mathematical representation. Mathematical literacy skills combine these five abilities so that students can use their mathematical knowledge to solve contextual problems in everyday life.
In relation to distance training, mathematical literacy ability is the ability of individual trainees to access, formulate, use, and interpret mathematics training materials in various problem solving contexts. The literacy ability of the participants for the entire training material is hereinafter referred to as general literacy ability. Meanwhile, the literacy skills of the trainees towards mastery of mathematical content represented by one of the mathematical materials, namely the aspect of geometry, are hereinafter referred to as content literacy of geometry material.
Material Objects
The object of the material studied in this paper is the literacy ability of the mathematics teacher training participants at Madrasah Tsanawiyah in the province of East Java. The literacy ability in question includes general literacy skills because it covers all training materials and literacy skills in mathematics content, especially geometry material. The two literacy skills were described and further explained the significance level of the increase after the remote training was carried out at the Surabaya Religious Education and Training Center.
Research Type and Data Type
This research is quantitative descriptive. The types of data described are quantitative data obtained based on phenomena that occur and describe the literacy skills of Madrasah < g > = Tsanawiyah mathematics teachers before and after the implementation of distance training. Data taken from training participants prior to the implementation of the training hereinafter referred to as pre-test data. While the data taken after the next training is called post-test data.
Participants
Respondents in this study were mathematics teachers who participated in remote training at the Substantive Technical Training for Madrasah Tsanawiyah Mathematics Teachers at the Surabaya Religious Education and Training Center in 2021. The mathematics teachers were delegates from each district/city throughout the province of East Java.
Data Collection Procedures and Techniques
The research procedure carried out applies the design"One"-group Pretest-Posttest" ( S u g i y o n o , 2 0 1 0 ) to compare the situation before and after being given treatment in the form of delivering training materials that all of which can be accessed on the Moodle application PJJ Religious Education and Training Center Surabaya. designn this research as shown in Figure 1 below.
Figure 1. Desain "One-group Pretest-Posttest"
Information: X = Petreatment in the form of remote delivery of training materials O 1 = Result of pretest before being given treatment O 2 = Result of posttest after being given treatment A complete picture of the variables studied, data collection techniques and instruments required for data collection can be seen in Table 3.1 below. Note: to ensure the accuracy of the resulting data, the validity of the instrument will be tested first
Data Analysis
Quantitative data in the form of numbers from the results of the mathematical literacy ability test of the trainees were analyzed by comparing the pretest and posttest value data using the N-Gain test (normalized gain). (Meltzer, 2002), that is: Quantitative descriptive analysis is based on the N-Gain criteria, namely: 1) learning outcomes with "High gain" if 0.7 <g> 2) learning outcomes with "Medium gain" if 0.3 <g> < 0.7 3) learning outcomes with "Low gain" if <g> < 0.3 Meanwhile, to test the research hypothesis in order to know how high the significance level of increasing the literacy ability of participants is, a t-test is carried out using SPSSpaired sample test methods, with steps following.
1) Meformulate a hypothesis
H 0 : pretest = posttest : there is no increase in participants' literacy skills before and after the implementation of distance training for MTs mathematics teachers at the Surabaya Religious Education and Training Center H1: pretest posttest : there is an increase in participants' literacy skills before and after the implementation of distance training for MTs mathematics teachers at the Surabaya Religious Education and Training Center 2) Determine the level of significance = 0.05
3) Testi Statistics
This statistic is carried out using the SPSS paired sample test method program 4) Ktest Criteria The test criteria are data from the results of the SPSS program with the following criteria: H0 is accepted if t count < t table for = 0.05 H 1 accepted if t count > t table for = 0.05
Results
The data from the results of research on the application of online learning in distance training of Madrasah Tsanawiyah mathematics teachers are as follows.
a. Literacy Ability Data for Distance Training Participants
The data on the literacy skills of the distance training participants for Madrasah Tsanawiyah mathematics teachers are in the form of pre-test scores and post-test scores. The pre-test value is the value obtained from the training participants before they receive treatment, while the post-test value is the value obtained after the participants receive treatment in the form of remote training using the Moodle application. Researchers also took supporting data in the form of pre-test and post-test scores for Geometry Materials training. This data collection was intended to determine whether or not there was an increase in the participants' mathematical literacy skills, especially with regard to substantive mathematics. The data that has been obtained, then processed by calculating the average in each of the existing data. TEST TEST PRE TEST TEST POST POST 1 Respondent1 34 90 42 80 2 Respondent2 48 88 61 70 3 Respondent3 42 90 42 80 4 Respondent4 70 90 70 80 5 Respondent5 50 96 60 75 6 Respondent6 46 94 59 75 7 Respondent7 38 88 60 75 8 Respondent8 62 90 62 80 9 Respondent9 62
b. Data Analysis of Distance Training Participants' Mathematical Literacy Ability
Based on the data as contained in Table 4.1, further analysis was carried out based on the N-Gain formula and the following results were obtained. 1. The literacy skills of the Madrasah Tsanawiyah mathematics teacher training participants are as follows. Furthermore, the researchers conducted a significance test (t-test using the SPSS paired sample test method) on improving the literacy skills of participants before and after the implementation of distance training for Madrasah Tsanawiyah mathematics teachers. This ttest is also intended to test the research hypothesis and the following results are obtained. In this case, it can be seen that H0 is rejected and H1 is accepted. That is, pretest posttest or there is an increase in the literacy skills of participants in the Mathematics teacher training of Madrasah Tsanawiyah before and after the implementation of distance training. While the results of the t-test on the participants' mathematical literacy skills after following the essential geometry material obtained the results of t arithmetic at = 0.05, df = 34 at 11,153 > t table at = 0.05, df = 34 at 1.689. In this case, it can be seen that H0 is rejected and H1 is accepted.
Based on the results of the analysis of research data, it can be stated that the distance training held at the Surabaya Religious Education and Training Center has been able to improve the literacy skills of Madrasah Tsanawiyah mathematics teachers, both general literacy and mathematical content literacy. This is certainly inseparable from various factors that influence it either directly or indirectly. These factors can be described in the following discussion.
Discussion
a. The increase in literacy skills in general for distance training participants for Madrasah Tsanawiyah mathematics teachers is 0.842 with the "high" category based on the N-Gain analysis criteria, because0.7 <g> (Meltzer, 2002). This upgradeinfluenced by several factors. Based on the results of filling out a google form questionnaire conducted by the training participants, the factors that directly affect the improvement of literacy skills include: the high motivation of participants in participating in the training, the ease of participants in accessing and utilizing training materials that have been prepared by resource persons in a learning management system based on the Moodle application. , the level of novelty of the uploaded material so that it becomes an attraction for participants to learn and master it because this is certainly in accordance with their needs; there is a training task that must be done so that participants must learn and master the material that has been delivered. Meanwhile, factors that indirectly affect the improvement of participants' literacy skills include: the availability of networks that make it easier for participants to access and utilize all sources of information and training materials, assistance and support from peers and other teachers who do not attend the training. and complete all tasks during the training, the completeness of the content uploaded by widyaiswara in the Moodle learning management system also makes it easier for participants to find ways to solve problems raised during the training. The results of this analysis are in line with the results of research proposed by previous researchers with different research subjects (Imran, AP;Kadir;Anggo, M., 2017), (Pakpahan, 2016), (Mahdiansyah & Rahmawati, 2014). b. The increase in mathematical literacy skills in geometry material for distance training participants for Madrasah Tsanawiyah mathematics teachers is 0.618 with the "medium" category based on the N-Gain analysis criteria, because 0.3 <g> < 0.7 (Meltzer, 2002), influenced by several factors. Based on the results of the questionnaire submitted by the training participants, it was found that the factors that became a problem in solving geometry problems included: the level of material difficulty, where geometry material is one of the mathematical materials with a high level of complexity and requires a high level of ability to be able to solve the problem. the problem. The time provided by the committee in solving the problems or geometry questions submitted is too little, it takes a long time to solve these problems. Based on the statement above, it can be stated that the factors that affect the literacy level of the geometry content of the Madsarah Tsanawiyah mathematics teacher are more on the problem of the level of complexity of the material so that it takes more than enough time to be able to solve these problems. This is in accordance with the results of previous studies on geometry material (Budiarto, 2002), (Azhar, WS;Senjayawati E., 2021), (Nanna, A. Wilda Indra; Pratiwi, E.; Anggraeni, C., 2020) (Hadiyanto, 2019). c. The high level of significance of increasing literacy skills both in general and in the content of mathematical material aspects of geometry shows a tendency that the implementation of distance training by utilizing information and communication technology and utilizing the learning management system with the help of the Moodle application makes it easy for participants to access the material and use it to improve competence. This is what supports the heightthe results of t arithmetic at = 0.05, df = 34 of 16.952 > t table for general literacy skills, and the results of t arithmetic at = 0.05, df = 34 of 11.153 > t table at = 0, 05, df = 34 of 1.689 for the mathematical literacy ability of the essential material of geometry. Madrasah Tsanawiyah mathematics teachers tend to access and utilize all available teaching materials and materials. Because the problems posed are in accordance with the material provided, so that it can support the high level of significance in improving literacy skills. This motivation should continue to be developed by teachers to always carry out literacy by utilizing other learning resources so that they can improve performance and competence in implementing mathematics learning in madrasas.
V. Conclusion
The results of the research and discussion show that the application of distance training can improve the literacy skills of Madrasah Tsanawiyah mathematics teachers. Literacy ability in general increased in the high category according to the N-gain analysis criteria of 0.842 with a t-count significance level of 16.952. This increase is supported by the convenience of participants to access training materials, making it easier for participants to find appropriate references in solving the problems posed. Literacy ability in mathematical content increased in the medium category according to the N-gain analysis criteria of 0.618 with a t-count significance level of 11.153. This increase in mathematical content literacy is certainly influenced by the high level of complexity of the geometric material used as the measured variable. This is a new finding in this study, because so far there has been no research that has focused on mathematical content literacy for mathematics teachers at Madrasah Tsanawiyah.
The weakness of literacy research on mathematical content is only limited to geometry material, it is still necessary to develop research on other mathematical material content, so that a complete picture of the literacy skills of Madrasah Tasawiyah teachers in all aspects of the material can be obtained. Therefore, further research is needed to complete this research.
|
Add evaluate and test code for SlowFast_FasterRCNN based on AVA dataset
SlowFast+FasterRCNN模型新增评估和测试代码以及中英文docs
Thank you for your submission! We really appreciate it. Like many open source projects, we ask that you sign our Contributor License Agreement before we can accept your contribution.XYZ916829 seems not to be a GitHub user. You need a GitHub account to be able to sign the CLA. If you have already a GitHub account, please add the email address used for this commit to your account.You have signed the CLA already but the status is still pending? Let us recheck it.
LGTM
|
---
canonical: https://grafana.com/docs/agent/latest/flow/reference/components/prometheus.exporter.mongodb/
title: prometheus.exporter.mongodb
---
# prometheus.exporter.mongodb
The `prometheus.exporter.mongodb` component embeds percona's [`mongodb_exporter`](https://github.com/percona/mongodb_exporter).
{{% admonition type="note" %}}
For this integration to work properly, you must have connect each node of your MongoDB cluster to an agent instance.
That's because this exporter does not collect metrics from multiple nodes.
{{% /admonition %}}
We strongly recommend configuring a separate user for the Grafana Agent, giving it only the strictly mandatory security privileges necessary for monitoring your node.
Refer to the [Percona documentation](https://github.com/percona/mongodb_exporter#permissions) for more information.
## Usage
```river
prometheus.exporter.mongodb "LABEL" {
mongodb_uri = "MONGODB_URI"
}
```
## Arguments
You can use the following arguments to configure the exporter's behavior.
Omitted fields take their default values.
Name | Type | Description | Default | Required
---- | ---- | ----------- | ------- | --------
`mongodb_uri` | `string` | MongoDB node connection URI. | | yes
`direct_connect` | `boolean` | Whether or not a direct connect should be made. Direct connections are not valid if multiple hosts are specified or an SRV URI is used. | false | no
`discovering_mode` | `boolean` | Wheter or not to enable autodiscover collections. | false | no
`tls_basic_auth_config_path` | `string` | Path to the file having Prometheus TLS config for basic auth. Only enable if you want to use TLS based authentication. | | no
MongoDB node connection URI must be in the [`Standard Connection String Format`](https://docs.mongodb.com/manual/reference/connection-string/#std-label-connections-standard-connection-string-format)
For `tls_basic_auth_config_path`, check [`tls_config`](https://prometheus.io/docs/prometheus/latest/configuration/configuration/#tls_config) for reference on the file format to be used.
## Exported fields
{{< docs/shared lookup="flow/reference/components/exporters-component-exports.md" source="agent" version="<AGENT VERSION>" >}}
## Component health
`prometheus.exporter.mongodb` is only reported as unhealthy if given
an invalid configuration. In those cases, exported fields retain their last
healthy values.
## Debug information
`prometheus.exporter.mongodb` does not expose any component-specific
debug information.
## Debug metrics
`prometheus.exporter.mongodb` does not expose any component-specific
debug metrics.
## Example
This example uses a [`prometheus.scrape` component][scrape] to collect metrics
from `prometheus.exporter.mongodb`:
```river
prometheus.exporter.mongodb "example" {
mongodb_uri = "mongodb://<IP_ADDRESS>:27017"
}
// Configure a prometheus.scrape component to collect MongoDB metrics.
prometheus.scrape "demo" {
targets = prometheus.exporter.mongodb.example.targets
forward_to = [ prometheus.remote_write.default.receiver ]
}
prometheus.remote_write "default" {
endpoint {
url = "REMOTE_WRITE_URL"
}
}
```
[scrape]: {{< relref "./prometheus.scrape.md" >}}
|
D20 System v3.0 SRD/Arcane Spells
ARCANE SPELLS
Preparing Arcane Spells
One exception: A wizard can prepare a read magic spell even without a spellbook.
Arcane Magical Writings
Wizard Spells and Borrowed Spellbooks
Adding Spells to a Wizard's Spellbook
Writing a New Spell into a Spellbook
Once a wizard understands a new spell, the wizard can record it into his or her spellbook.
Materials and Costs: Materials for writing the spell cost 100 gp per page.
Replacing and Copying Spellbooks
Arcane Spellcasters Who Are Not Wizards
|
Need to install a fresh copy of windows 7 without an optical drive or USB
I had a computer running windows 7. I then upgraded all my hardware except my hard drive, and I'm trying to reinstall windows 7. I believe this is the recommended thing to do.
With the new hardware installed, I am able to run my previous Windows 7 installation at the moment. I have a windows 7 iso file to use, but the problem is I do not have an optical drive. I appear to have missed that latest motherboards abandoned the IDE interface in favour of SATA so I'm waiting on the delivery of some new parts which could take 3-4 weeks.
I also am aware you can use a USB stick. Unfortuntely, I only have several 2GB sticks, which are too small.
I have tried running the setup from within windows. However, I am unable to partition the hard drive during installation and I end up keeping all my files after a 'fresh' install.
I was wondering if anyone had some ideas that I could try.
edit- does anyone know If I run the installation from a different hard drive, that I can partition and format the other one?
Go buy a CD drive that plugs into the USB port.
It would be a lot cheaper to go buy a $4GB flash drive.
possible duplicate of Install Windows XP/7 without a CD drive when the BIOS does not support booting from USB devices also see Install Windows 7 x64 from a separate partition on same hard drive (no DVD/USB)?
Surely you have a usb floppy drive and 6 disks laying around? I have a method using that, but its a bit complicated.
Grab all the old hardware, and assemble your computer as it used to be.
Follow these instructions for prepping your existing Windows 7 installation for the move.
Install the hard drive in the new hardware.
Since you do not have an optical drive, and thus you won't be able to use any of the installation discs for any of the new hardware (including a motherboard driver disc that probably has network drivers) you might want to download all the driver installation packages for all your new hardware BEFORE you prep the system for the move.
Essentially, following those sysprep instructions will remove all hardware-specific drivers that could cause BSODs and conflicts when you connect the new hardware. It will also remove the existing activation to avoid your installation from being tagged as a pirated install. It will keep you from having to reinstall all your software too. So, all you will have to do after the move is activate the installation again, and install all the new drivers.
EDIT adding the actual instructions to the answer...
Start with the hard drive in the original computer and hardware.
Run Command Prompt as Administrator (all programs, accessories, right click on Command Prompt and choose Run As Administrator)
Type "%windir%\System32\Sysprep\Sysprep.exe" without the quotes and hit enter
In the Dialog box that comes up, for System Cleanup Action select Enter System Out-of-Box-Experience (OOBE), check the box next to Generalize, for Shutdown Options select Shutdown and click OK.
Wait till the computer shuts down.
Move the hard drive to the new computer/hardware.
Since it will treat this as if it is a new installation (it's not, but that doesn't matter) you nave to create a new account. No big deal. Nothing happened to your old account. Just create a test account, and delete it later.
Windows 7 does not need to be re-installed when you replace the hardware. Unlike previous iterations of Windows such as XP, Windows 7 properly migrates when hardware is switched. Your best bet is to simply go through "uninstall a program" in control panel, remove all software and drivers associated with your old motherboard and devices, and then install the new ones. It is also recommended you re-test your Windows Experience Index once all the drivers are set back up.
Not all hardware (even in Windows 7) provides a simple and easy Uninstallation routine like that. Windows 7 provides access to easier migration with it's Sysprep tool.
@Bon Gart That's what device manager is for, you can also uninstall devices that way! Although the old devices shouldn't initialize any more as they aren't even present, so the drivers in turn shouldn't even load, and in turn shouldn't cause a problem. However resident software such as I mention previously, is more of what could cause a problem.
While I agree that it might be possible to locate all the relevant hardware that needs to be uninstalled through Device Manager, it is far easier to use the tool made for this that is included with Windows 7... namely Sysprep. All it takes is failure to remove one piece of hardware from Device manager that could make the installation BSOD after the move, even to the point where you can't boot to Safe Mode on the new hardware to remove it from there. Something like the chipset drivers, etc.
@Bon Gart Sysprep is far more complex than most people want to deal with. What the OP has done is a much more elegant solution with arguably no repercussions.
So you didn't even click the link provided in my answer to see that it is far LESS complex to use sysprep, than the manual method you are suggesting? Because you run the command prompt as administrator (as shown) and type one command. You click three times, and sit back. You are saying that this is more complex than hunting down all the hardware drivers that need to be uninstalled in Device Manager... when you have no master list to work from to know what to uninstall?
You can use a utility like RT7Lite to reduce the actual installation size of Windows. This is accomplished by removing unnecessary components and features from the operating system, and removing them from the installation itself.
Depending on what you want/need to remove, you can drastically reduce the size of the install media. I have successfully shrank the 64-bit edition of Windows 7 to less than 1.7 GB, albeit by removing certain components that I don't need (especially other languages, unnecessary drivers, the tablet PC components, and media center/player that are in the original install media).
Bon Gart has the easiest and best solution imho.
But if you want a clean install in your situation,
Partition the hard drive before running setup within windows, there are plenty of partition tools out there that will do this without having to boot from anything, essentially set up the partition job then reboot, the partition software will load and partition the drive. Be sure to make the partition tool rescue usb boot stick first. Once this is done boot back into Windows, run windows setup and install to that partition.
But this has problems also, if you remove the original W7 install the new one will not boot, but this can be fixed.
|
let close_error_message = document.querySelector('#closeErrorMessage');
let error_message = document.querySelector('#errorMessage');
close_error_message.addEventListener('click', () => {
error_message.parentNode.removeChild(error_message);
close_error_message = null;
error_message = null;
});
|
## NeuroSky/ThinkGear Go Driver
Parser for the NeuroSky ThinkGear protocol used by NeuroSky devices.
Copyright (c) 2012. Jake Brukhman. ([email protected]).
All rights reserved. See the LICENSE file for BSD-style
license.
------------
### Installation
You need at least the following weekly version of Go:
go version weekly.2012-02-07 +52ba9506bd99
You can then use the 'go' command to obtain the package:
$ go get github.com/jbrukh/goneuro
To install the package and all of the executables, use:
$ go install -v github.com/jbrukh/goneuro/...
$ ls $GOPATH/bin
### Documentation
See the [gopkgdocs](http://gopkgdoc.appspot.com/pkg/github.com/jbrukh/goneuro).
------------
### Notes
NeuroSky devices stream several kinds of data. First, the device
delivers "raw signal" at approximately 512 Hz and processed "black box"
data at 1 Hz. Using `goneuro`, you can connect to both kinds of
data from the device.
The first step is pairing your device with your Bluetooth interface
and giving it a serial port. On the Mac, you can do this without any
extra hardware, as a port is built-in. Using the Bluetooth preferences,
you can set the serial port manually. It will usually look something
like this:
/dev/tty.JakeMindBand
First, you must obtain a `Device` and connect to it.
d := goneuro.NewDevice("/dev/tty.JakeMindBand")
There are two ways of streaming data with `goneuro`. If you wish to
pick and choose your black box data, you will need a `ThinkGearListener`
as follows:
listener := &goneuro.ThinkGearListener{
Meditation: func(b byte) {
// do something
},
Attention: func(b byte) {
// do something else
},
}
You can then connect to the device and check for connection errors:
if err := d.Connect(listener); err != nil {
fmt.Println("could not connect: ", err)
os.Exit(1)
}
Alternatively, you may be interesting in only a raw data signal coming
from the device. In that case, you should create a channel for receiving
the raw data.
data := make(chan float64, 512)
Note that the channel is asynchronous, or else you may hold up
processing. All parsing of the data stream is done serially to calling
back listeners and placing the raw signal on the channel.
Here is the way to connect to raw data:
if err := d.ConnectRaw(data); err != nil {
fmt.Println("could not connect: ", err)
os.Exit(1)
}
Raw signal will be delivered to the given channel when
processing starts.
This brings us to the last and final point: in order for `goneuro`
to actually start processing the data and delivering it to listeners
and raw signal channels, you must call
d.Engage()
If you wish to disconnect from the device gracefully without turning
off your program, you can call:
d.Disconnect()
|
// Package types contains the various types for metric values.
package types
import (
"fmt"
"github.com/Symantec/tricorder/go/tricorder/duration"
"time"
)
// Type represents the type of a metric value
type Type string
const (
Unknown Type = ""
Bool Type = "bool"
Int8 Type = "int8"
Int16 Type = "int16"
Int32 Type = "int32"
Int64 Type = "int64"
Uint8 Type = "uint8"
Uint16 Type = "uint16"
Uint32 Type = "uint32"
Uint64 Type = "uint64"
Float32 Type = "float32"
Float64 Type = "float64"
String Type = "string"
GoTime Type = "goTime"
GoDuration Type = "goDuration"
Dist Type = "distribution"
List Type = "list"
// for JSON RPC only
Time Type = "time"
// for JSON RPC only
Duration Type = "duration"
)
// FromGoValue returns the type of a value found in the GoRPC API.
// FromGoValue returns Unknown if it cannot determine the type.
// In case value is a slice of unknown type, FromGoValue returns Unknown
// rather than List.
func FromGoValue(value interface{}) Type {
kind, _ := FromGoValueWithSubType(value)
return kind
}
// FromGoValueWithSubType returns both the type and sub-type of the value
// found in the GoRPC API.
// FromGoValueWithSubType returns Unknown, Unknown if it cannot determine the
// type.
// In case value is a slice of an unknown type, FromGoValueWithSubType returns
// Unknown, Unknown rather than List, Unknown.
func FromGoValueWithSubType(value interface{}) (kind, subType Type) {
switch i := value.(type) {
case bool:
kind = Bool
case int8:
kind = Int8
case int16:
kind = Int16
case int32:
kind = Int32
case int64:
kind = Int64
case uint8:
kind = Uint8
case uint16:
kind = Uint16
case uint32:
kind = Uint32
case uint64:
kind = Uint64
case float32:
kind = Float32
case float64:
kind = Float64
case string:
kind = String
case time.Time:
kind = GoTime
case time.Duration:
kind = GoDuration
case goValue:
kind = i.Type()
case []bool:
kind = List
subType = Bool
case []int8:
kind = List
subType = Int8
case []int16:
kind = List
subType = Int16
case []int32:
kind = List
subType = Int32
case []int64:
kind = List
subType = Int64
case []uint8:
kind = List
subType = Uint8
case []uint16:
kind = List
subType = Uint16
case []uint32:
kind = List
subType = Uint32
case []uint64:
kind = List
subType = Uint64
case []float32:
kind = List
subType = Float32
case []float64:
kind = List
subType = Float64
case []string:
kind = List
subType = String
case []time.Time:
kind = List
subType = GoTime
case []time.Duration:
kind = List
subType = GoDuration
default:
}
return
}
// SafeZeroValue is like ZeroValue except it returns an error instead of
// panicing
func (t Type) SafeZeroValue() (interface{}, error) {
switch t {
case Bool:
return false, nil
case Int8:
return int8(0), nil
case Int16:
return int16(0), nil
case Int32:
return int32(0), nil
case Int64:
return int64(0), nil
case Uint8:
return uint8(0), nil
case Uint16:
return uint16(0), nil
case Uint32:
return uint32(0), nil
case Uint64:
return uint64(0), nil
case Float32:
return float32(0), nil
case Float64:
return float64(0), nil
case String:
return "", nil
case Time, Duration:
return "0.000000000", nil
case GoTime:
return time.Time{}, nil
case GoDuration:
return time.Duration(0), nil
default:
return nil, fmt.Errorf("Cannot create zero value for type '%s'", t)
}
}
// ZeroValue returns the zero value for this type.
// ZeroValue panics if this type is Dist, List, or Unknown.
func (t Type) ZeroValue() interface{} {
result, err := t.SafeZeroValue()
if err != nil {
panic(err)
}
return result
}
// SafeNilSlice is like NilSlice except it returns an error instead of
// panicing
func (t Type) SafeNilSlice() (interface{}, error) {
switch t {
case Bool:
return ([]bool)(nil), nil
case Int8:
return ([]int8)(nil), nil
case Int16:
return ([]int16)(nil), nil
case Int32:
return ([]int32)(nil), nil
case Int64:
return ([]int64)(nil), nil
case Uint8:
return ([]uint8)(nil), nil
case Uint16:
return ([]uint16)(nil), nil
case Uint32:
return ([]uint32)(nil), nil
case Uint64:
return ([]uint64)(nil), nil
case Float32:
return ([]float32)(nil), nil
case Float64:
return ([]float64)(nil), nil
case String, Time, Duration:
return ([]string)(nil), nil
case GoTime:
return ([]time.Time)(nil), nil
case GoDuration:
return ([]time.Duration)(nil), nil
default:
return nil, fmt.Errorf("Cannot create nil slice of type '%s'", t)
}
}
// NilSlice returns the nil slice of this type.
// NilSlice panics if this type is Dist, List or Unknown.
func (t Type) NilSlice() interface{} {
result, err := t.SafeNilSlice()
if err != nil {
panic(err)
}
return result
}
// CanToFromFloat returns true if this type supports conversion to/from float64
func (t Type) CanToFromFloat() bool {
switch t {
case Int8, Int16, Int32, Int64, Uint8, Uint16, Uint32, Uint64, Float32, Float64, GoTime, GoDuration:
return true
default:
return false
}
}
// FromFloat converts a float64 to a value according to this type
// FromFloat panics if this type doesn't support conversion from float64
func (t Type) FromFloat(value float64) interface{} {
switch t {
case Int8:
return int8(round(value))
case Int16:
return int16(round(value))
case Int32:
return int32(round(value))
case Int64:
return int64(round(value))
case Uint8:
return uint8(round(value))
case Uint16:
return uint16(round(value))
case Uint32:
return uint32(round(value))
case Uint64:
return uint64(round(value))
case Float32:
return float32(value)
case Float64:
return value
case GoTime:
return duration.FloatToTime(value)
case GoDuration:
return duration.FromFloat(value)
default:
panic("Type doesn't support converstion from a float")
}
}
// ToFloat converts a value of this type to a float64
// ToFloat panics if this type doesn't support conversion to float64
func (t Type) ToFloat(x interface{}) float64 {
switch t {
case Int8:
return float64(x.(int8))
case Int16:
return float64(x.(int16))
case Int32:
return float64(x.(int32))
case Int64:
return float64(x.(int64))
case Uint8:
return float64(x.(uint8))
case Uint16:
return float64(x.(uint16))
case Uint32:
return float64(x.(uint32))
case Uint64:
return float64(x.(uint64))
case Float32:
return float64(x.(float32))
case Float64:
return x.(float64)
case GoTime:
return duration.TimeToFloat(x.(time.Time))
case GoDuration:
return duration.ToFloat(x.(time.Duration))
default:
panic("Type doesn't support conversion to float")
}
}
func (t Type) IsInt() bool {
return t == Int8 || t == Int16 || t == Int32 || t == Int64
}
func (t Type) IsUint() bool {
return t == Uint8 || t == Uint16 || t == Uint32 || t == Uint64
}
func (t Type) IsFloat() bool {
return t == Float32 || t == Float64
}
func (t Type) Bits() int {
switch t {
case Int8, Uint8:
return 8
case Int16, Uint16:
return 16
case Int32, Uint32, Float32:
return 32
case Int64, Uint64, Float64:
return 64
default:
return 0
}
}
// UsesSubType returns true if this type uses a sub-type.
func (t Type) UsesSubType() bool {
return t == List
}
// SupportsEquality returns true if this type supports equality.
func (t Type) SupportsEquality() bool {
return t != List && t != Dist && t != Unknown
}
|
Novelty shoe tree for children
Jan. 1, 1952 FELDMAN 2,580,746
NOVELTY SHOE TREE FOR CHILDREN Filed NOV. 18, 1949 INVENTOR.
k I HERMAN FELDMAN Patented Jan. 1, 1952 NOVELTY SHOE TREE FOR CHILDREN Herman Feldman, Forest Hills, N. Y., assignor to Jules Golden, Bronxville, N. Y.
h Application November 18, 1949, Serial No. 128,056
1 Claim. (01. 12-1284) This invention relates to novelty shoe tree means for training children to care for their shoes.
The principal object of the invention is the provision of novelty shoe tree means which will assist in the training of children to use the same by making the usage thereof pleasurable.
One other object of the invention is the provision of a novelty figure such as an animal or clown having mounted thereon shoe trees for childrens shoes.
Another object of the invention is to construct said shoe trees so that the heel portions thereof comprisenthe feet of the figure so that when shoes are mounted thereon they encase the feet of the figure and it appears that the figure is wearing the shoes.
A further object of the invention is to construct said figure so as to permit the same standing erect on any suitable surface whether or not shoes are mounted on the shoe trees thereof.
Still another object of the invention is to construct said figure in such manner and of such materials as to provide for the facile and economical manufacture thereof.
For further comprehension of the invention, and of the objects and advantages thereof, reference will be had to the following description and accompanying drawings, and to the appended claim in which the various novel features of the invention are more particularly set forth.
In the accompanying drawings forming a material part of this disclosure:
Fig. 1 is a perspective view of the novelty shoe tree means of the invention with certain parts removed more clearly to show the construction.
Fig. 2 is an edge view of said means.
Fig. 3 is a perspective view similanto Fig. 1, but with a shOe held in place on the shoe tree, said shoe being shown diagrammatically in dash lines.
Fig 4 is a perspective detail view of a portion of the device.
Fig. 5 is an edge view similar to Fig. 2 but with a shoe held in place on the shoe tree, said shoe being illustrated in phantom.
Fig. 6 is a sectional view of a modification of one of the elements of the device.
Before entering into a detailed description of the means of the invention it is deemed desirable first to describe the problem solved thereby.
It has been found that shoes retain their shape longer and consequently are usable for a longer period of time when they are mounted on shoe trees during those periods of time in which they are not worn on the feet. Children's shoes are Q particularly-prone to becoming misshapen due to the strains placed thereon-in playing. It is therefore of special importance that children's shoes be given the protection aiforded by mounting them on shoe trees when they are not in use.
fore, the task of training children in this regard is'considerably lightened.
To this end the shoe trees of the invention are so designed that when a pair of shoes is mounted on them the shoes seem to be on the feet of an animal or a bear or the like. In the illustrated instance of the invention the shoe trees are mounted on and form part of a body ID in the form of a figurine (Fig. 1) of pressed board, plywood, sheet metal, plastic or the like cut out in the form of an upright elephant, the features, etc. of the elephant either being painted on the figurine or applied thereon by means of a plastic decalcomania, or by embossing.
Whereas in the present instance the figure of an elephant is utilized, it will be realized that any other figure pleasing to children could be utilized. However, it is necessary that the figure chosen terminate at its lower end in a pair of relatively narrow leg or foot portions H. These narrow portions H each fit into a lateral slot or notch l3 in a block l2 (see also Figs. 2 and 4) of wood or the like which forms a foot of the figure and also is an integral part of a shoe tree as will appear hereinafter. Also fitted into the notch [3 in each of the foot blocks 12 in front of the figurine is a leaf spring is (Figs. 1 and 2) of suitable material, said spring having secured to the surface of its upper end the usual shoe tree toe piece IS. The springs l4 each may be secured at its lower end by glue, rivets, screws or nails to one of the na row leg pieces I I and said leg piece and spring wedged into the notch I3 in a block I 2, or, the springs may be free of the figurine save for the compressing effect of the notches l3. To form the heel pieces for the shoe trees, the rear ends of the blocks 12 are rounded as at l8 (Fig. 4).
It is to be understood that the figurine including the toe piece may also be molded as one unit in three dimensions.
The construction is such that the figurine can, by means of the blocks 12, stand on any flat surface without additional support. The figurine may, however, be provided with a hole I! (Fig. 1) in the upper part thereof to allow its being suspended in some convenient location such as the inner face of a closet door.
When it is desired, to mount shoes on the shoe trees the toe pieces 15- are placed in the toes of the shoes and the springs l3 bent to the position shown in-Figs. 3 and 5 to allow the rounded edges I6 of the blocks I2 being slipped into the heels In this osition. the. sprin s it of the shoes. tension the blocks 12 and the toe pieces 15 in opposite directions into engagement with, the heel and toe portions respectively of the shoes. Thus the shoes are held rigidly in pkmegand the figurine can he stood upright on said shoes providing an slots opening to the top faces thereof, said slots being of a width corresponding to the combined thickness of the, material of said depending leg portions and the material of said leaf springs, said depending leg portions having their bottom ends secured in position in said slots against the material of said blocks defining the rear walls of said slot, said leaf springs having their rear ends appearance that the shoes are being worn by the figurine.
It-will be seen, therefore, that the invention has provided novelty shoe tree means which will assist in the training of children to. use; the same by making the usage thereof pleasurable.
In a modified form, the toe pieces: 15, instead of being positioned on the surface of the leaf spring M may each have: a notch or bore therein to receive the spring. It as shown in Fig. 6, the two parts being held together by means of a force fit, glue or; any other suitable means.
While I have illustrated and described the preferred embodiments. or my invention, it is to be understood that I do not. limit. myself 'to the precise constructions herein disclosed and the right is reserved to all changes and modifications coming within the scope of the invention as defined in the appended claim.
Having thus described my invention, what I secured in position in said slots between the front faces of said depending leg portions and the material of said blocks defining the front walls of said slots.
HERMAN FELDMAN.
' REFERENCES. CITED The following references are of record in the file of this patent:
UNITED STATES PATENTS Number Name Date 1,000,250 Fraser Aug. 8, 1911 1,095,917 Nick l'ess May 5, 1914 1,429,506 Herr Sept. 19,1922 1,506,519 England Aug. 26, 1924 1,784,181 Demoucron Dec. 9. 1930 2,362,662 I Petersen et a1. Nov. 14, 1944 2,416,587 Lyngby Feb. 25, 1947
|
Muzic Masters
Videos
Note:
* * = duet.
* ** = sung by Quentin.
* *** = sung by Bethany.
* 1) Witch Shuffle***
* 2) [KP]***
* 3) [TDP]*
* 4) [SpongeBob, obviously not called Ocean Man]*
* 5) [DuckTales, Rescue Rangers, Winnie the Pooh, Darkwing Duck, Gargoyles or TBD]*, ** or ***
* 6) [TMNT]**
* 8) [song about how much they love each other]*
* 1) [song about how much they love each other]*
|
1. Introduction {#sec1-jcdd-10-00073}
Postoperative complications are prevalent after cardiovascular surgery, and a postoperative tracheostomy (POT) is often required to strengthen airway management when respiratory failure, circulatory failure, multiple organ dysfunction, and other critical adverse events develop \[[@B1-jcdd-10-00073],[@B2-jcdd-10-00073],[@B3-jcdd-10-00073]\]. As an important indicator of poor prognoses, POT operations often indicate a higher risk of mortality, prolonged hospital stay, increased medical burden, and declined quality of life \[[@B4-jcdd-10-00073],[@B5-jcdd-10-00073],[@B6-jcdd-10-00073],[@B7-jcdd-10-00073]\]. The incidence of POTs varies widely in the previous literature due to the different surgical populations in different studies \[[@B3-jcdd-10-00073],[@B7-jcdd-10-00073],[@B8-jcdd-10-00073],[@B9-jcdd-10-00073],[@B10-jcdd-10-00073],[@B11-jcdd-10-00073]\]. Compared to other surgical types, patients undergoing cardiovascular surgery have been reported to have a relatively higher POT rate, mostly in the range of 1.4--11.8% \[[@B3-jcdd-10-00073],[@B12-jcdd-10-00073],[@B13-jcdd-10-00073]\].
For patients who are expected to be unable to escape from mechanical ventilation in the short term, a tracheostomy is a routine operation to effectively relieve airway obstruction, reduce airway resistance, reduce airway dead space, and increase effective ventilation volume \[[@B10-jcdd-10-00073],[@B14-jcdd-10-00073]\]. Previous studies have reported that among critical patients requiring prolonged mechanical ventilation in intensive care unit (ICU) settings, compared with patients who did not receive a tracheostomy, patients who received a tracheostomy had significantly declined mortality and improved prognoses, despite a longer duration of mechanical ventilation and hospitalization \[[@B14-jcdd-10-00073],[@B15-jcdd-10-00073],[@B16-jcdd-10-00073],[@B17-jcdd-10-00073],[@B18-jcdd-10-00073]\]. In some major operations, such as liver transplantation and heart surgery, patients requiring a tracheostomy have a significantly longer hospital stay and lower overall survival rate compared with patients who do not require a tracheostomy \[[@B4-jcdd-10-00073],[@B10-jcdd-10-00073]\]. Several studies focused on POTs have been conducted in patients undergoing cardiovascular surgery due to the high prevalence and significantly poorer outcomes \[[@B3-jcdd-10-00073],[@B5-jcdd-10-00073],[@B10-jcdd-10-00073],[@B19-jcdd-10-00073],[@B20-jcdd-10-00073]\]. Some significant risk factors for POTs have been reported and several predictive systems have been established in previous studies \[[@B4-jcdd-10-00073],[@B5-jcdd-10-00073],[@B21-jcdd-10-00073],[@B22-jcdd-10-00073]\]. However, relevant clinical studies conducted in this field are still currently limited, and none of these previous studies were carried out specifically in patients undergoing heart valve surgery (HVS). Therefore, our understanding of the risk factors for POTs after HVS needs to be deepened and the construction of a credible and convenient risk prediction model is still urgently needed.
The primary objective of this study was to identify independent risk factors, develop a risk prediction model for POTs after HVS, and perform risk stratification according to the established model. The second objective of this study was to clarify the relationship between POTs and in-hospital clinical outcomes, and thus to provide evidence-based support for clinical practice.
2. Methods {#sec2-jcdd-10-00073}
2.1. Ethical Statement {#sec2dot1-jcdd-10-00073}
This study was conducted based on the Declaration of Helsinki's ethical principles. The Ethics Committee of Union Hospital, Tongji Medical College, Huazhong University of Science and Technology approved this study. Due to its observational and retrospective nature, patients' signed informed consent was not needed.
2.2. Study Population {#sec2dot2-jcdd-10-00073}
This was a retrospective, observational single-center cohort study. From January 2016 to December 2019, consecutive adult patients undergoing HVS in our hospital were identified and analyzed. A number of conditions were excluded from the current study, including: (1) younger than 18 years; (2) immunodeficiency, immunosuppression, or organ transplant history; (3) intraoperative death, early postoperative death or discharge (within the first 48 h after surgery); and (4) incomplete data in medical records.
2.3. Data Collection {#sec2dot3-jcdd-10-00073}
Clinical data were extracted from the hospital's electronic medical record system, including preoperative, intraoperative, and postoperative variables. Preoperative data included demographics (gender, age, body mass index, smoking and drinking history), underlying conditions (hypertension, diabetes mellitus, chronic obstructive pulmonary disease, cerebrovascular disease, peripheral vascular disease, renal insufficiency, gastrointestinal tract disease, atrial fibrillation, pulmonary edema, New York Heart Association (NYHA) class, cardiac surgery history, and general surgery history), ultrasound results (pulmonary artery hypertension, pericardial effusion, left ventricular ejection fraction, diameters of the left atrium, left ventricle, right atrium, and right ventricle), and laboratory values (white blood cell count, red blood cell count, hemoglobin, platelet count, serum creatinine, serum albumin, and serum globulin). Intraoperative data included cardiopulmonary bypass time, aortic cross clamp time, surgical types (isolated valve surgery, combined coronary artery bypass grafting (CABG), and combined aortic surgery), and transfusion of red blood cells (RBCs). Postoperative data included the rates of readmission to ICU and in-hospital mortality, as well as the lengths of patients' ICU and hospital stays.
2.4. Endpoints {#sec2dot4-jcdd-10-00073}
The primary endpoint was tracheostomy operations after HVS in this study. All the operations were performed via a percutaneous route using disposable sterile percutaneous tracheostomy surgical instrument package at patients' bedsides by experienced operators. In this study, tracheostomy was indicated for the following reasons: repeated intubation, predicted difficult reintubation, one or more failed trials of extubation, bypass of upper airway obstruction, prolonged mechanical ventilation, and tracheal access that was necessary for removing thick pulmonary secretions.
2.5. Statistical Analysis {#sec2dot5-jcdd-10-00073}
Statistical analysis of the data was performed with IBM SPSS (version 26.0) and R software (version 4.0.5). Differences were considered to be statistically significant if the two-tailed *p* values were less than 0.05.
Categorical data were presented as numbers (proportions) and continuous variables were presented as means ± standard deviations or medians (interquartile ranges) according to whether they were normally distributed. For univariate analysis, categorical data were analyzed using chi-square test or Fisher's exact test, and continuous variables were analyzed using Student's *t*-test or Mann--Whitney U test, as appropriate. Factors initially screened by univariate analysis (*p* values less than 0.1) were then entered into a forward stepwise multivariate logistic regression procedure to identify significant risk factors for POTs after HVS. The results of multivariate analysis were presented as *p* values, coefficients, and odds ratios (ORs) with 95% confidence intervals (CIs). A nomogram and a web-based risk calculator were then constructed based on the multivariate logistic regression model. Finally, risk stratification was performed to further facilitate the clinical application based on the nomogram model.
The performance of the model was assessed with discrimination, calibration, and clinical utility. Bootstrap method with 1000 replicates was used for internal validation. The area under the receiver operating characteristic (ROC) curve (AUC) was used to assess the discrimination. The Hosmer--Lemeshow goodness-of-fit test and calibration plot were used to assess the calibration. The decision and clinical impact curves were used to assess the clinical utility.
3. Results {#sec3-jcdd-10-00073}
3.1. Demographic Characteristics {#sec3dot1-jcdd-10-00073}
A total of 3853 adult patients undergoing HVS met the inclusion criteria and were analyzed in the current study. The average age of these patients was 51.3 ± 12.5 years. Female patients accounted for 46.2% of the patients. The incidence rate for POTs in this population was 1.8% (68/3853).
The average body mass index of this study population was 23.0 ± 3.3 kg/m^2^. A total of 20.1% of the patients had a history of drinking and 26.7% had a history of smoking. A significant proportion of patients had at least one underlying disease, including pulmonary artery hypertension (32.1%), general surgery history (29.7%), hypertension (24.2%), atrial fibrillation (23.3%), pericardial effusion (15.6%), chronic obstructive pulmonary disease (12.9%), renal insufficiency (8.2%), gastrointestinal tract disease (8.2%), cardiac surgery history (8.0%), pulmonary edema (6.0%), and diabetes mellitus (5.7%).
Isolated valve surgeries were performed on 75.2% of the patients, combined CABG on 12.5%, and combined aortic surgeries on 12.3%. The median cardiopulmonary bypass time was 108 (86, 139) minutes, the aortic cross clamp time was 72 (54, 95) minutes, and the transfusion of intraoperative RBC was 1 (1, 3) units, respectively. The incidence rate for POTs was 0.9% in the patients undergoing isolated valve surgeries, 3.7% in those undergoing concomitant CABG, and 5.1% in those undergoing concomitant aortic surgeries.
The types of HVS are as follows: isolated aortic valve surgeries accounted for 26.8%, isolated mitral valve surgeries 25.1%, isolated tricuspid valve surgeries 8.1%, combined aortic and mitral valve surgeries 15.8%, combined aortic and tricuspid valve surgeries 1.2%, combined mitral and tricuspid valve surgeryies 15.8%, and combined aortic, mitral, and tricuspid valve surgeries 7.2%. Their corresponding POT rates were, respectively, 2.4%, 1.2%, 1.0%, 1.6%, 2.2%, 2.1%, and 1.1%.
3.2. Development of the Nomogram and Risk Calculator {#sec3dot2-jcdd-10-00073}
A univariate analysis was first conducted to explore possible risk factors for POTs after HVS ([Table 1](#jcdd-10-00073-t001){ref-type="table"}).
The factors screened (*p* values less than 0.1) by the univariate analysis were then entered into a forward stepwise multivariate logistic regression procedure to further identify independent risk factors, including gender, age, smoking history, hypertension, diabetes mellitus, chronic obstructive pulmonary disease, cerebrovascular disease, renal insufficiency, pulmonary edema, cardiac surgery history, NYHA class, white blood cell count, red blood cell count, platelet count, serum creatinine, serum albumin, surgical types, cardiopulmonary bypass, and intraoperative transfusion of RBCs. A multicollinearity test was conducted before the regression analysis in order to exclude confounded variables with potential multicollinearity. Finally, five independent risk factors for POT after HVS were identified in the multivariate logistic regression analysis, including being of an older age, diabetes mellitus, pulmonary edema, combined aortic surgeries, and more transfusions of intraoperative RBCs ([Table 2](#jcdd-10-00073-t002){ref-type="table"}).
Based on the logistic regression model established using the above five risk factors, we constructed a graphical nomogram for convenience in clinical use ([Figure 1](#jcdd-10-00073-f001){ref-type="fig"}). The nomogram can proportionally convert each regression coefficient in the multivariate analysis to a scale of 0--100 points, reflecting their relative importance. The individualized POT risk of each patient can be easily obtained by summing the points of all the five risk factors and then identifying the corresponding probability at the bottom of the nomogram. Older patients who have had diabetes mellitus, pulmonary edema, combined aortic surgeries, and more intraoperative transfusions of RBCs may obtain more points and thus are at a higher risk of POTs after HVS. An example showing the usage of the nomogram is given in [Figure 1](#jcdd-10-00073-f001){ref-type="fig"}.
To facilitate the usage of this system in modern clinical work, we further created an internet-based risk calculator (available at <https://pothvs.shinyapps.io/dynnomapp/>, accessed on 7 December 2022). When using this online predictive system, we only need to choose the information of the patient and then click the "Predict" button; the estimated risk of POTs after HVS is calculated in the "Graphical summary" area on the right ([Figure 2](#jcdd-10-00073-f002){ref-type="fig"}). When calculating the risk of another patient, one can simply change the information on the left. This makes it possible to assess the risks of multiple patients simultaneously, as well as the risk comparison among different patients. The specific information of the patients and the model can also be obtained by clicking the "Numerical summary" and "Model summary" on the right. When a user cannot log in with a new device, we recommend logging out first by pressing the "Quit" button at the left bottom and then reloading the procedure.
3.3. Validation and Assessment of the Model {#sec3dot3-jcdd-10-00073}
The model was well validated internally by the bootstrap method with 1000 replicates. By plotting the ROC curves and calculating the AUC, the model demonstrated excellent discrimination, with an AUC of 0.938 (95% CI, (0.912--0.964), [Figure 3](#jcdd-10-00073-f003){ref-type="fig"}A). By plotting the calibration curves and the goodness-of-fit test, the model demonstrated good consistency between the predicted and the actual probabilities, with a Hosmer--Lemershow chi-square value of 3.260 (*p* = 0.860, [Figure 3](#jcdd-10-00073-f003){ref-type="fig"}B). By plotting the decision and clinical impact curves, the model demonstrated good clinical utility ([Figure 3](#jcdd-10-00073-f003){ref-type="fig"}C,D), which may bring more clinical net benefits compared to the "treat-all/none" strategies.
3.4. Risk Stratification {#sec3dot4-jcdd-10-00073}
To facilitate clinical applications, we further propose a more concise risk stratification for POTs after HVS on the basis of the nomogram and clinical practice ([Table 3](#jcdd-10-00073-t003){ref-type="table"}).
We stratified all the patients into three risk intervals: low-risk, medium-risk, and high-risk groups. The selected cutoffs of the estimated probabilities were, respectively, 0.01 and 0.05, corresponding to scores of 127 and152 points on the nomogram. In the current study, 81.5% of the patients were stratified into the low-risk group, 10.9% into the medium-risk group, and 7.6% into the high-risk group. Both the estimated and observed probabilities demonstrated a significant difference across the three risk intervals and the estimated and observed probabilities showed good consistency within each risk interval, indicating the rationality of the risk stratification ([Figure 4](#jcdd-10-00073-f004){ref-type="fig"}).
3.5. Clinical Outcomes {#sec3dot5-jcdd-10-00073}
The overall mortality rate was 2.9% (111/3853) in the current study, with a significant increase in patients who experienced POTs (57.4% versus 1.9%, *p* \< 0.001). In addition, the rate of readmission to ICU was significantly higher in patients with POTs, and the lengths of their ICU and hospital stays were significantly longer compared to those of patients who did not require POTs. The comparison details of these outcomes between patients with and without POTs are presented in [Table 4](#jcdd-10-00073-t004){ref-type="table"}.
For the 68 patients who underwent POTs after HVS, five patients were operated on within the first postoperative week, with a mortality rate of 20.0% (1/5); forty-one patients were operated on between the first and the second postoperative week, with a mortality rate of 58.5% (24/41); and twenty-two patients were operated on after two postoperative weeks, with a mortality rate of 63.6% (14/22).
4. Discussion {#sec4-jcdd-10-00073}
Undergoing a tracheostomy is an important indicator of the increased risk of poor prognoses in patients undergoing cardiovascular surgeries \[[@B3-jcdd-10-00073],[@B7-jcdd-10-00073],[@B9-jcdd-10-00073],[@B20-jcdd-10-00073]\], which was again confirmed in the current study. Due to the difference of surgical populations in different studies, the reported rates of POTs in the previous literature were quite different \[[@B3-jcdd-10-00073],[@B7-jcdd-10-00073],[@B8-jcdd-10-00073],[@B9-jcdd-10-00073],[@B10-jcdd-10-00073],[@B11-jcdd-10-00073]\]. The overall incidence rate of POTs after HVS was 1.8% in our analysis, falling within the range of incidence rates reported in the previous literature \[[@B3-jcdd-10-00073],[@B12-jcdd-10-00073],[@B13-jcdd-10-00073]\]. The overall mortality rate was 2.9%; however, patients with POTs had a significantly higher rate of mortality compared with patients without POTs. Moreover, a higher rate of readmission to the ICU, as well as prolonged ICU and hospital stays were also observed in patients with POTs. The increased risk of multiple poor clinical outcomes in patients with POTs stressed the importance of identifying significant risk factors for POTs after HVS and developing a compelling risk prediction model.
In the current study, using clinical data of 3853 adult patients who underwent HVS at a single cardiovascular center, we analyzed the risk factors of POTs after HVS and developed a parsimonious risk prediction model. Through a univariate and multivariate analysis, we identified five independent risk factors for POT after HVS, including being of an older age, having diabetes mellitus, pulmonary edema, combined aortic surgery, and more transfusions of intraoperative RBCs. To facilitate the clinical application of the logistic regression model, we further constructed a visual nomogram and an internet-based risk calculator. The model demonstrated excellent discrimination, calibration, and clinical utility, and was well validated internally. On the basis of the nomogram and clinical practice, we defined three risk intervals: low-risk, medium-risk, and high-risk groups. To the best of our knowledge, this is the first report that has targeted the risk factors of POTs after HVS and the first attempt to construct a nomogram model and an internet-based risk calculator worldwide, which may have certain clinical guiding significance.
Numerous studies have been conducted on POTs after various surgical procedures due to the adverse outcomes, and the risk factors identified in our analysis have also been reported in different reports \[[@B3-jcdd-10-00073],[@B4-jcdd-10-00073],[@B5-jcdd-10-00073],[@B19-jcdd-10-00073],[@B20-jcdd-10-00073],[@B21-jcdd-10-00073],[@B22-jcdd-10-00073]\]. Being of an older age was identified to associate with a higher risk of POTs in the current study; however, the results of whether the risk of POTs would increase with age were inconsistent in previous studies, which may be due to the difference in disease types and study populations \[[@B4-jcdd-10-00073],[@B22-jcdd-10-00073],[@B23-jcdd-10-00073]\]. Diabetes mellitus and pulmonary edema as risk factors for POTs have also been reported in previous studies, which may be mainly associated with higher risks of various pulmonary complications \[[@B7-jcdd-10-00073],[@B24-jcdd-10-00073],[@B25-jcdd-10-00073]\]. The relationship between combined aortic surgery and ventilation dependence was reported a long time ago, and patients undergoing aortic procedures have been identified to have a higher risk of respiratory failure \[[@B26-jcdd-10-00073],[@B27-jcdd-10-00073]\]. Intraoperative transfusions of RBCs may significantly increase the risk of transfusion-related acute lung injury and systemic inflammatory response syndrome, which may lead to prolonged hospitalization, increased medical costs, and a higher risk of mortality \[[@B28-jcdd-10-00073],[@B29-jcdd-10-00073],[@B30-jcdd-10-00073]\]. Although RBC transfusions are routine in traditional cardiovascular surgery to deal with bleeding and improve tissue oxygen delivery, there is growing evidence that the restrictive RBC transfusion strategy is safe and effective, which has been recommended by practice guidelines \[[@B31-jcdd-10-00073],[@B32-jcdd-10-00073],[@B33-jcdd-10-00073],[@B34-jcdd-10-00073]\]. In addition, previous studies have found that the risk factors identified in this study are related to the development of various postoperative respiratory complications, such as pneumonia to some extent, which may indirectly increase the risk of the need for POTs \[[@B35-jcdd-10-00073],[@B36-jcdd-10-00073],[@B37-jcdd-10-00073],[@B38-jcdd-10-00073],[@B39-jcdd-10-00073],[@B40-jcdd-10-00073],[@B41-jcdd-10-00073],[@B42-jcdd-10-00073]\].
Several other factors have also been reported to be related to an increased risk of POTs in previous studies but were not identified in the current study, including renal insufficiency, chronic obstructive pulmonary disease, white blood cell count, smoking history, body mass index, and platelet transfusion \[[@B4-jcdd-10-00073],[@B5-jcdd-10-00073],[@B7-jcdd-10-00073],[@B9-jcdd-10-00073],[@B43-jcdd-10-00073]\]. Additionally, although some postoperative variables have been identified to be related to POTs in the literature \[[@B44-jcdd-10-00073]\], we did not include these variables in our analysis. This was because the inclusion of these variables would not achieve the purpose of early prediction as they were not available early. Nonetheless, the results of our analysis demonstrated that a model constructed using only the preoperative and intraoperative variables identified in this study could also perform well.
Using the nomogram and risk calculator, we can accurately and easily estimate personalized POT risks, identify high-risk subsets and then take early and appropriate intervention measures. In the past few years, some measures have been proposed to be effective in reducing the risk of POTs, such as prophylactic administration of sivelestat at the beginning of cardiopulmonary bypasses. Taking appropriate measures targeting high-risk patients identified by our risk prediction model may significantly improve prognoses and achieve greater financial success.
Tracheostomies have been proven to be an effective treatment for various critically ill patients in recent years \[[@B15-jcdd-10-00073],[@B17-jcdd-10-00073],[@B45-jcdd-10-00073]\]. For patients undergoing high-risk surgeries, such as cardiovascular procedures, performing tracheostomies at an optimal time point when needed may significantly improve their prognoses \[[@B3-jcdd-10-00073],[@B8-jcdd-10-00073],[@B19-jcdd-10-00073],[@B20-jcdd-10-00073]\]. However, the optimal timing is still unclear and controversial even though a lot of effort has been made by scientists and clinicians \[[@B1-jcdd-10-00073],[@B8-jcdd-10-00073],[@B16-jcdd-10-00073]\]. The results of this study showed that the in-hospital mortality rate increased in patients undergoing late POTs compared to patients undergoing early POT, consistent with the majority of the published reports \[[@B3-jcdd-10-00073],[@B8-jcdd-10-00073],[@B11-jcdd-10-00073],[@B16-jcdd-10-00073],[@B20-jcdd-10-00073]\]. However, we cannot simply conclude that the earlier the POT is performed, the better the prognosis will be. We must realize that this result was only based on a small sample which only included 68 patients who underwent POTs, and we cannot guarantee that all these patients had the same basic conditions when the POTs were performed, which may also have a significant impact on patients' outcomes. Therefore, a prospective large sample study is still needed to further determine the timing of POTs after cardiovascular surgery.
There are several limitations in the current study that should be noted. First, this was a single-center study and was not validated externally in an independent dataset, which may limit the generalizability of our findings. Second, some possible risk factors, such as the N-terminal fragment of B-type natriuretic propeptide \[[@B46-jcdd-10-00073]\], were not collected and included in our analysis, even though the established model performed well. Third, the data we collected were limited to hospitalization, and long-term prognoses after discharge were not followed or analyzed, which needs to be strengthened in future studies. Fourth, due to the nature of the retrospective observational real-world study, we cannot accurately judge whether there were some patients who needed POTs theoretically but POTs were not performed actually among the dead patients, and therefore we did not know whether a POT would reduce the expected mortality in this subset of the patients, which may lead to some difference between the actual situation and the ideal judgment.
5. Conclusions {#sec5-jcdd-10-00073}
A POT after HVS is not uncommon, and is associated with poorer outcomes. In a multivariate analysis, five independent risk factors for POTs after HVS were identified, including being of an older age, having diabetes mellitus, pulmonary edema, combined aortic surgery, and more transfusions of intraoperative RBCs. The prediction model constructed using the above five risk factors demonstrated excellent discrimination, calibration, and clinical utility, which may be helpful for early risk assessment and perioperative management. A graphical nomogram and an internet-based risk calculator were constructed to facilitate clinical applications on the basis of the multivariate model, and three risk groups were defined based on the nomogram and clinical practice. To our knowledge, this is the first report that has targeted the risk factors of POTs after HVS and the first attempt to construct a nomogram model and an internet-based risk calculator worldwide, which may have certain clinical guiding significance.
The authors sincerely thank the entire staff of the Department of cardiovascular surgery, Union Hospital, Tongji Medical College, Huazhong University of Science and Technology for offering their assistance with medical services and administrative, technical, and logistic support.
X.D. and B.S. collected the data and drafted the manuscript. L.L. analyzed the data and performed all statistical analyses. Y.L. and Y.S. conceived of the study and made critical revisions to the manuscript. All authors have read and agreed to the published version of the manuscript.
This study was conducted based on the Declaration of Helsinki's ethical principles. The Ethics Committee of Union Hospital, Tongji Medical College, Huazhong University of Science and Technology approved this study.
Patient consent was waived due to the retrospective nature of data analysis and complete anonymization.
The data presented in this study are available on request from the corresponding author.
The authors declare no conflict of interest.
area under the receiver operating characteristic curve
coronary artery bypass grafting
heart valve surgery
intensive care unit
New York Heart Association
red blood cell
receiver operating characteristic curve
::: {#jcdd-10-00073-f001 .fig}
Nomogram for the prediction of postoperative tracheostomy after heart valve surgery. A specific patient was presented to show the usage of the nomogram. This was a 55-year-old patient with diabetes mellitus and without pulmonary edema. He underwent isolated valve surgery and was transfused with 3 units of RBCs intraoperatively. The individual item points corresponding to each variable are shown at the top, and the total scores are obtained from the sum of the points corresponding to each variable by a red dot. Given values of the five variables, the patient can be intuitively mapped onto the nomogram. It can be clearly seen from the nomogram that the total score of this patient was 132 points and the corresponding probability of POT was 0.013. RBC, red blood cell. The squares of each color represent a single variable: orange squares indicate diabetes mellitus, yellow squares indicate pulmonary edema, and blue squares indicate surgical types.
::: {#jcdd-10-00073-f002 .fig}
The usage of the internet-based risk calculator for POTs after HVS. (**A**) The estimated probabilities and corresponding 95% CIs of POT of 11 different patients are presented. The squares represent the estimates and the bars reflect their 95% CIs. (**B**) The detailed information of a patient and the corresponding estimated risk with 95% CI will appear when the square is clicked. (**C**) All the information of the patients can be acquired by clicking the "Numerical Summary". (**D**) The information of the model can be acquired by clicking the "Model Summary". CI, confidence interval; HVS, heart valve surgery; RBC, red blood cell; POT, postoperative tracheostomy. The lines of each color represent the risk in one case.
::: {#jcdd-10-00073-f003 .fig}
Assessment of the risk prediction model for postoperative tracheostomy after heart valve surgery. (**A**) ROC curve and the corresponding AUC, (**B**) calibration curves, (**C**) decision curve, and (**D**) clinical impact curve of the model. AUC, area under the receiver operating characteristic curve; CI, confidence interval; ROC, receiver operating characteristic curve.
::: {#jcdd-10-00073-f004 .fig}
Bar chart showing the consistency between the observed and estimated probabilities. The difference between the observed and estimated probabilities in the same risk interval was not significant (*p* \> 0.05) but the difference was significant between different risk intervals (*p* \< 0.05), demonstrating good consistency and reasonable division.
::: {#jcdd-10-00073-t001 .table-wrap}
Univariate analysis of possible risk factors for POTs after HVS.
Characteristic Without POT\ With POT\ χ^2^/Z/t *p* Value
n = 3785 (%) n = 68 (%)
---------------------------------------- ------------------- -------------------- ---------- -----------
Male 2028 (53.6) 45 (66.2) 4.264 0.039
Age (years) 51.12 ± 12.53 58.82 ± 11.10 5.035 \<0.001
Body mass index (kg/m^2^) 23.02 ± 3.26 23.19 ± 4.16 0.323 0.748
Smoking history 1003 (26.5) 26 (38.2) 4.700 0.030
Drinking history 759 (20.1) 14 (20.6) 0.012 0.913
Hypertension 899 (23.8) 34 (50.0) 25.079 \<0.001
Diabetes mellitus 209 (5.5) 11 (16.2) 14.085 \<0.001
Chronic obstructive pulmonary disease 481 (12.7) 17 (25.0) 8.968 0.003
Cerebrovascular disease 1325 (35.0) 36 (52.9) 9.405 0.002
Peripheral vascular disease 1582 (41.8) 34 (50.0) 1.846 0.174
Renal insufficiency 296 (7.8) 19 (27.9) 36.024 \<0.001
Gastrointestinal tract disease 307 (8.1) 9 (13.2) 2.330 0.127
Atrial fibrillation 882 (23.3) 14 (20.6) 0.276 0.599
Pulmonary edema 221 (5.8) 11 (16.2) 12.615 \<0.001
Cardiac surgery history 299 (7.9) 11 (16.2) 6.185 0.013
General surgery history 1124 (29.7) 19 (27.9) 0.099 0.754
NYHA class III--IV 679 (17.9) 18 (26.5) 3.281 0.070
Pulmonary artery hypertension 1218 (32.2) 19 (27.9) 0.551 0.458
Pericardial effusion 587 (15.5) 15 (22.1) 2.174 0.140
Diameter of the left atrium (cm) 4.5 (3.9, 5.3) 4.6 (3.9, 5.1) 0.337 0.736
Diameter of the left ventricle (cm) 5.3 (4.6, 6.0) 5.0 (4.6, 5.8) 0.563 0.574
Diameter of the right atrium (cm) 3.9 (3.5, 4.5) 4.1 (3.6, 4.9) 1.635 0.102
Diameter of the right ventricle (cm) 3.6 (3.3, 4.0) 3.7 (3.4, 4.4) 1.557 0.120
Left ventricular ejection fraction (%) 62 (58, 66) 62 (57, 66) 0.144 0.866
White blood cell count (×109/L) 5.6 (4.7, 6.8) 6.0 (4.9, 8.7) 2.307 0.021
Red blood cell count (×1012/L) 4.3 (3.9, 4.6) 4.1 (3.7, 4.7) 1.787 0.074
Hemoglobin (g/L) 129 (118, 141) 124 (114, 141) 1.216 0.224
Platelet count (×109/L) 176 (142, 215) 152 (107, 209) 2.677 0.007
Serum creatinine (μmol/L) 71.7 (61.0, 84.4) 80.6 (66.6, 101.6) 3.701 \<0.001
Serum albumin (g/L) 40.5 (38.0, 42.7) 39.3 (36.7, 41.7) 2.824 0.005
Serum globulin (g/L) 24.3 (21.6, 27.1) 24.9 (21.2, 29.5) 0.803 0.422
Surgical types 53.035 \<0.001
Isolated valve surgery 2871 (75.9) 26 (38.2)
Combined CABG 463 (12.2) 18 (26.5)
Combined aortic surgery 451 (11.9) 24 (35.3)
Cardiopulmonary bypass time (minutes) 108 (85, 138) 153 (105, 236) 5.128 \<0.001
Aortic cross clamp time (minutes) 72 (53, 95) 92 (58, 137) 4.003 \<0.001
Transfusion of red blood cells (units) 1 (1, 3) 8 (5, 9) 12.326 \<0.001
CABG, coronary artery bypass grafting; HVS, heart valve surgery; NYHA, New York Heart Association; POT, postoperative tracheotomy.
::: {#jcdd-10-00073-t002 .table-wrap}
Multivariate analysis of independent risk factors for POTs after HVS.
Characteristic Coefficient Standard Error OR (95% CI) *p* Value
--------------------------------------- ------------- ---------------- ---------------------- -----------
Age (years) 0.042 0.015 1.043 (1.014--1.073) 0.004
Diabetes mellitus 1.074 0.385 2.927 (1.376--6.229) 0.005
Pulmonary edema 1.078 0.401 2.940 (1.338--6.457) 0.007
Transfusion of red blood cell (units) 0.675 0.058 1.964 (1.752--2.201) \<0.001
Surgical types 0.004
Isolated valve surgery Reference Reference Reference Reference
Combined CABG 0.003 0.356 1.003 (0.499--2.013) 0.994
Combined aortic surgery 1.028 0.334 2.794 (1.453--5.375) 0.002
Intercept −9.722 0.948 \<0.001 \<0.001
HVS, heart valve surgery; CI, confidence interval; OR, odds ratio; POT, postoperative tracheotomy.
::: {#jcdd-10-00073-t003 .table-wrap}
Risk intervals of POT based on the nomogram.
Risk Intervals Low Risk\ Medium Risk\ High Risk\
(\<127 Points) (127--152 Points) (\>152 Points)
---------------------------------- ------------------- ------------------- ----------------------
Estimated probability (%) \<1 1--5 \>5
Observed probability, % (95% CI) 0.16 (0.02--0.30) 2.87 (1.26--4.48) 17.35 (12.99--21.70)
No. of patients (%) 3141 (81.5) 418 (10.9) 294 (7.6)
Abbreviations: CI, confidence interval; POT, postoperative tracheotomy.
::: {#jcdd-10-00073-t004 .table-wrap}
Postoperative variables in patients with and without POTs after HVS.
Variables Without POT\ With POT\ χ^2^/Z *p* Value
n = 3785 (%) n = 68 (%)
---------------------- ---------------- ------------------- --------- -----------
Readmission to ICU 119 (3.1) 26 (38.2) 227.125 \<0.001
ICU stay (days) 2.8 (1.9, 3.9) 18.8 (11.4, 27.1) 12.611 \<0.001
Hospital stay (days) 14 (11, 19) 37 (25, 48) 11.839 \<0.001
Mortality 72 (1.9) 39 (57.4) 734.110 \<0.001
HVS, heart valve surgery; ICU, intensive care unit; POT, postoperative tracheotomy.
These authors contributed equally to this work.
|
namespace Aplication.UnitTests.Common.Mappings
{
using System;
using MapsterMapper;
using Xunit;
using Application.Dto;
using Domain.Entities;
using FluentAssertions;
using Mapster;
using Microsoft.Extensions.DependencyInjection;
public class MappingTests
{
private readonly IMapper _mapper;
public MappingTests()
{
TypeAdapterConfig typeAdapterConfig = new TypeAdapterConfig();
IServiceCollection services = new ServiceCollection();
services.AddSingleton(typeAdapterConfig);
services.AddScoped<IMapper, ServiceMapper>();
var sp = services.BuildServiceProvider();
using var scope = sp.CreateScope();
_mapper = scope.ServiceProvider.GetService<IMapper>();
}
[Theory]
[InlineData(typeof(City), typeof(CityDto))]
[InlineData(typeof(District), typeof(DistrictDto))]
public void ShouldSupportMappingFromSourceToDestination(Type source, Type destination)
{
var instance = Activator.CreateInstance(source);
_mapper.Map(instance, source, destination);
}
[Fact]
public void ShouldMappingCorrectly()
{
var city = new City { Id = 1, Name = "Bursa" };
var cityDto = _mapper.Map<City, CityDto>(city);
cityDto.Name.Should().Be("Bursa");
}
}
}
|
Sanna (dish)
A sanna is a spongy, steamed, and savoury unfilled dumpling originally made of red rice, black lentil and coconut in the Konkan region, by the western coast of the Indian subcontinent. They originated in Goa and Damaon, Mangalore, Bombay and Bassein (Vasai), and are especially popular among Goans, both the Goan Hindus and Goan Christians, and also among the Konkani migrants outside Konkan in Karachi, Sindh, Gujarat, Karnataka and Kerala. They are also loved by the people of the Konkan division, such as the Kuparis of the Bombay East Indian community.
Hindus normally use urad dal, coconut water and coconut milk for fermentation. Catholic sannas consist of two types: Those made from the toddy of coconut flowers, and those sannas made using the sap-toddy of the coconut palm. Though both of them require the same varieties of rice, sannas are commonly made with coconut for fermentation, unlike idlis that are commonly made by adding yeast. They are made on special days such as Ganesh Chaturthi, Sonsar Padvo/Yugadi and Makar Sankranti, Catholics generally prepare them for church feasts, christenings and weddings. Sometimes a sweet version is made with jaggery, known as godachi sanna.
Mangalorean Catholic cuisine on special days is incomplete without sannas. They are a much-loved delicacy and are served with bafat, a spicy pork curry prepared with a medley of powdered spices. Sannas are also served alongside chicken or mutton curries, and also with beef. They can be eaten for breakfast with coconut chutney or saambhar, or with coconut milk sweetened with jaggery and flavoured with cardamom.
In the present day, the unavailability or ban of toddy in certain places and the difficult and lengthy process of extracting fresh coconut milk have made the dish an occasional delicacy, prepared during Konkani celebrations only. Sometimes the dish is completely substituted by idlis, made of white rice and yeast-based batter.
|
#!/usr/bin/env python
# Tags: phoenix-port, py3-port
import wx
import numpy as np
import pandas as pd
import DataFrameViewCtrl
import Config
import Format
import morningstar
#---------------------------------------------------------------------------
#----------------------------------------------------------------------
def GetWindow(frame, nb, log):
# Create the dataframe. First get the tickers.
if Config.holdingsDf is None:
Config.GetHoldings()
# Make an account list
accountList = list()
for i in range(Config.accountsDf.shape[0]):
account = Config.accountsDf.ix[i, "Account Name"]
if account in accountList:
continue
accountList.append(account)
# Make list of per-account tickers
tickerList = list()
# For each ticker in the config...
for i in range(Config.holdingsDf.shape[0]):
ticker = Config.holdingsDf.ix[i, "Ticker"]
if ticker in tickerList:
continue
tickerList.append(ticker)
# Create a performance dataframe
pf = pd.DataFrame(index = np.arange(0, len(accountList) + len(tickerList)),
columns = ["Ticker", "Last Price", "Units", "Current Value", "Cost Basis"])
row = 0
for account in accountList:
pf.ix[row, "Ticker"] = account
pf.ix[row, "Last Price"] = ""
pf.ix[row, "Units"] = ""
pf.ix[row, "Current Value"] = ""
pf.ix[row, "Cost Basis"] = ""
row = row+1
for i in range(Config.holdingsDf.shape[0]):
if Config.holdingsDf.ix[i, "Account"] != account:
continue
pf.ix[row, "Ticker"] = ticker
pf.ix[row+1, "Ticker"] = " " + morningstar.ticker_name(ticker.upper())
# Compute the units
units = 0
unitsSet = True
costBasis = 0
costBasisSet = True
for j in range(Config.holdingsDf.shape[0]):
if Config.holdingsDf.ix[j, "Ticker"] != ticker:
continue
if Config.holdingsDf.ix[j, "Account"] != account:
continue
units1 = Config.holdingsDf.ix[j, "Units"]
costBasis1 = Config.holdingsDf.ix[j, "Cost Basis"]
if units1:
units = units + Format.StringToFloat(units1)
else:
unitsSet = False
if costBasis1:
costBasis = costBasis + Format.StringToFloat(costBasis1)
else:
costBasisSet = False
if unitsSet:
pf.ix[row, "Units"] = "{:,.3f}".format(units)
else:
pf.ix[row, "Units"] = ""
pf.ix[row+1, "Units"] = ""
pf.ix[row, "Last Price"] = ""
pf.ix[row+1, "Last Price"] = ""
pf.ix[row, "Current Value"] = ""
pf.ix[row+1, "Current Value"] = ""
if unitsSet and units and costBasisSet:
pf.ix[row, "Cost Basis"] = "$" + "{:,.2f}".format(costBasis/units) + "/Share"
pf.ix[row+1, "Cost Basis"] = " $" + "{:,.2f}".format(costBasis, 2)
else:
pf.ix[row, "Cost Basis"] = ""
row = row+2
pf.ix[row, "Ticker"] = ""
pf.ix[row, "Last Price"] = ""
pf.ix[row, "Units"] = ""
pf.ix[row, "Current Value"] = ""
pf.ix[row, "Cost Basis"] = ""
row = row+1
# Promote 1st column as new index
pf2 = pf.set_index("Ticker")
pf = pf2
pf.index.name = "Ticker"
win = DataFrameViewCtrl.Panel(nb, pf, log)
return win
#----------------------------------------------------------------------
overview = """<html><body>
<h2><center>DataViewCtrl with DataViewIndexListModel</center></h2>
This sample shows how to derive a class from PyDataViewIndexListModel and use
it to interface with a list of data items. (This model does not have any
hierarchical relationships in the data.)
<p> See the comments in the source for lots of details.
</body></html>
"""
if __name__ == '__main__':
import sys,os
import run
run.main(['', os.path.basename(sys.argv[0])] + sys.argv[1:])
|
<?php
namespace ReviewBundle\Controller;
use AppBundle\Entity\article;
use AppBundle\Entity\competition;
use AppBundle\Entity\complaint;
use AppBundle\Entity\event;
use AppBundle\Entity\orders;
use AppBundle\Entity\review;
use blackknight467\StarRatingBundle\Form\RatingType;
use Symfony\Bridge\Doctrine\Form\Type\EntityType;
use Symfony\Bundle\FrameworkBundle\Controller\Controller;
use Symfony\Component\Form\Extension\Core\Type\ChoiceType;
use Symfony\Component\Form\Extension\Core\Type\SubmitType;
use Symfony\Component\Form\Extension\Core\Type\TextareaType;
use Symfony\Component\Form\Extension\Core\Type\TextType;
use Symfony\Component\HttpFoundation\Request;
class ReviewUseerController extends Controller
{
public function AddReviewUserAction(Request $request){
$review = new review();
$form = $this->createFormBuilder($review)
->add('rating', RatingType::class, [
'stars' => 5
])
->add('category',ChoiceType::class,["choices"=>["Events"=>"Events","Orders"=>"Orders"
,"Competition"=>"Competition","Articles"=>"Articles"]])
->add('title',TextType::class)
->add('content',TextareaType::class)
->add('submit',SubmitType::class)
->getForm();
$form->handleRequest($request);
if($form->isSubmitted() && $form->isValid())
{ $review->setUser($this->getUser());
$em = $this->getDoctrine()->getManager();
$em->persist($review);
$em->flush();
return $this->redirectToRoute('homepage');
}
return $this->render("@Review/Default/ajout_review_user.html.twig",array('form'=>$form->createView()));
}
}
|
Finding the impulse response from the integral
I'm trying to solve the part (a) of the following:
I know that:
$$
y(t) = \int_0^1 \! \delta (t-\lambda ) \mathrm{d}\lambda
$$
But I'm not sure how to proceed from that.
Yes but first of all I need to figure out h(t)
You are trying to solve for
$$y(t) = \int_0^1 \! \delta (t-\lambda ) \mathrm{d}\lambda$$
But notice that
$$\int_0^1 \! \delta (t) \mathrm{d}t =1,$$
and also
$$\int_0^1 \! \delta (T-t) \mathrm{d}t = \begin{cases}&1,& 0 \leq T \leq 1\\ & 0,&\text{otherwise.}\end{cases}$$
Since you have that \$T\$ term varying in your equation
$$y(t) = \int_0^1 \! \delta (t-\lambda ) \mathrm{d}\lambda$$
it will depend on \$t\$ the same way as it depended on \$T\$.
Your 2nd equation (integral 0..1 of impulse) is improper. The initial limit of 0 falls "at" the impulse function. Sometimes you'll see limits of "0+" or "0-" to disambiguate. In either case, what's meant is "the limit as A approaches 0 from the left" or "...from the right" -- if that limit exists.
In general, the limits on the integrals should be -infinity to +infinity. This will give you y(t) vs. x(t) for all t. That said, this problem is trying to confuse you by using 0 and 1 as the integral limits. "No problem" -- change the limits to -inf and +inf, and insert a "window" function in the integrand:
$$
y(t) = \int_{-\infty}^\infty x(t-\lambda) W(\lambda)d\lambda\,.
$$
where the "window" function W(.) is zero everywhere except within [0,1] where it is 1 (unity). Now that it's in a familiar (canonical) form, we can realize:
The transfer function is just W(.) as I have described above! (mentally substitute the letter h for the W and you see it's just the general formula for any LTI network).
Since h(t) (which we now know) is zero for t within -infinity to zero, the network is clearly causal. A non-causal network is always recognizable as its transfer function would have a nonzero response prior to t = 0 (which our h(t) does not exhibit).
Because the transfer function h(t) has finite area (is time bounded); i.e., after t=1 it becomes zero), the network is BIBO stable. (Think: Suppose I tried to make this network blow up -- I can't because no matter what input you send to this network, it will only respond for 1 second to your input [the width of the nonzero portion of h(t)]. Thus, to make its output diverge, you would have to present an input that is infinite "energy" within a 1-second interval, which is not a BI (bounded input) by definition.
To directly answer your actual query: Remember always always always, by definition:
$$ \int_{-\infty}^\infty \delta(t-\lambda) ANY(\lambda) d\lambda\ = ANY(t) $$
That is, the integral disappears completely (this is called the "sifting" property of the (Dirac) impulse function). This is ONLY true for the integral limits -infinity to +infinity.
So your equation
$$ y(t) = \int_0^1 \delta(t-\lambda) d\lambda $$
is just
$$ y(t) = \int_{-\infty}^{+\infty} \delta(t-\lambda) W(\lambda) d\lambda = W(t) $$
I always found it beneficial to do whatever is needed to make the integral limits the entire real axis. So many of these types of problems simplify when you do that.
A further benefit of the (doubly-infinite axis of integration) is that you can interchange the functions in the integrand like so:
$$
\int_{-\infty}^{+\infty}\delta(t-\lambda)W(\lambda) d\lambda = \int_{-\infty}^{+\infty}\delta(\lambda)W(t-\lambda) d\lambda
$$
without changing variables (just do it mentally). This can help too.
|
The problem of finding a solution of nonlinear inclusion problems in Banach
space is considered in this paper. Using convex optimization techniques
introduced by Robinson (Numer. Math., Vol. 19, 1972, pp. 341-347), a robust
convergence theorem for inexact Newton's method is proved. As an application,
an affine invariant version of Kantorovich's theorem and Smale's \alpha-theorem
for inexact Newton's method is obtained.
|
Created centralised header file with all includes added
Thank you for your submission, we really appreciate it. Like many open source projects, we ask that you sign our Contributor License Agreement before we can accept your contribution.You have signed the CLA already but the status is still pending? Let us recheck it.
|
synchronized method for accessing database with spring and hibernate
I have a table that maintains a sequence number that is used as an identifier for multiple tables (multiple invoice tables all the tables are using single sequence).
Whenever i want to insert a new record in invoice table I read the current sequence number from the table and update it with +1.
The problem is when there are multiple requests for new invoice numbers the sequence number returns duplicate numbers.I tried synchronized block but still it returning duplicate values when multiple requests are hitting at same time.
Here is the method to retrieve the sequence number
synchronized public int getSequence(){
Sequence sequence = getCurrentSession().get(Sequence.class,1); //here 1 is the id of the row
int number = sequence.getSequenceNumber();
sequence.setSequenceNumber(number+1);
getCurrentSession().saveOrUpdate(sequence);
return number;
}
Is there something I am missing?
You should get the next number in the sequence in a separate transaction. But to make it extra save, have a look into @GeneratedValue(strategy = GenerationType.SEQUENCE)
synchronized is useless when you have a server application that will be running multiple copies. Use proper transactions (which Spring makes ridiculously easy).
Never update a sequence manually. Use db sewuence, autogenerate, or with jpa consider uuid as solution (maybe the best)
My case is different.The sequence number is maintained on all the three tables.it is unique for all the 3 tables.!
i think Even transactions also not help in that case.Ex: Take 2 transactions T1 and T2.both are open at different instances. Both are started at same time. T1 is not aware of the T2 changes until it commits. So, Both transaction will read the same sequence number and write the same sequence number.! @chrylis
And then transaction T2 will get rolled back because of the conflict and have to restart.
First of all I won't recommend you to use table implementation of the sequence. Explanation why
But if you have to - hibernate knows how to manage it. Take a look
And one more thing. I strongly recommend you to implement synchronization on the data base side. Imagine you have 2 instances of your application connected to the same database instance and working simultaneously.
Using transactions also not worked for me. I tried all the isolations in mysql but nothing helps me. I solved it with below solution.
synchronized public int getSequence(){
Sequence sequence = getCurrentSession().get(Sequence.class,1); //here 1 is the id of the row
int prevNumber = sequence.getSequenceNumber();
Query<Sequence> query = getCurrentSession().createQuery("UPDATE Sequence SET sequenceNumber = :number WHERE sequenceNumber = :prevNumber",Sequence.class);
query.setParameter("number",prevNumber+1);
query.setParameter("prevNumber",prevNumber);
int affectedRows = query.executeUpdate();
if(accectedRows > 0)
return number;
else
throw new Exception();
}
So whenever a conflict happens it will throw an exception.
|
Incorrect solution in limits
$$
\lim_{n\to \infty}\left(\frac{1}{n^4}{+3^{\frac{2}{2+n}}}\right)^{n}
$$
So i re-write it like:
$\lim_{n\to \infty}e^{n\ln{\frac{1}{n^4}\ln3^{\frac{2}{2+n}}}}$ $=$ $e^{\frac{2n}{2+n}\ln{\frac{1}{n^4}\ln3}}=e^{{2}\ln{\frac{1}{n^4}\ln3}}$
So here, $\ln{\frac{1}{n^4}}$ give us minus infinity, but i think that somewhere i lost a way, so i need some hints
It looks like you incorrectly assumed the log of a sum is the product of the logs.
@GEdgar, i find it thx
Put $n=\frac{1}{y}$ .The limit reduces to
$L=\lim_{y\to 0}\left(y^4+3^{\frac{2y}{2y+1}}\right)^{\frac{1}{y}}$
Take log on both sides
$\log_{e}L=\lim_{y\to 0} \log_{e}\left(y^4+3^{\frac{2y}{2y+1}}\right)^{\frac{1}{y}}$
$\log_{e}L=\lim_{y\to 0}\frac{1}{y} \log_{e}\left(y^4+3^{\frac{2y}{2y+1}}\right)$
$\log_{e}L=\lim_{y\to 0}\frac{ \log_{e}\left(1+y^4+3^{\frac{2y}{2y+1}}-1\right)}{y^4+3^{\frac{2y}{2y+1}}-1}\frac{y^4+3^{\frac{2y}{2y+1}}-1}{y}$
$\log_{e}L=\lim_{y\to 0}\frac{ \log_{e}\left(1+y^4+3^{\frac{2y}{2y+1}}-1\right)}{y^4+3^{\frac{2y}{2y+1}}-1}\left(y^3+\frac{3^{\frac{2y}{2y+1}}-1}{\frac{2y}{2y+1}}\frac{2}{2y+1}\right)=1\left(2\log_{e}3\right)=\log_{e}9$
As $y\to 0$ it is obvious that $y^4+3^{\frac{2y}{2y+1}}-1\to 0$.
So here the standard result $\lim_{x\to 0}\frac{\log_{e}(1+x)}{x}=1$ has been used.
Also as $y\to 0$ it is obvious that $\frac{2y}{2y+1}\to 0$
so the standard limit $\lim_{x\to 0}\frac{a^x-1}{x}=\log_{e}a$ can be used.
Hence,$L=9$
Can u show more information how did u get 2*ln3
I have edited my answer
Note that
$$
\mathop {\lim }\limits_{n\; \to \;\infty } \left( {1 + \frac{a}
{n}} \right)^{\,n} = e^{\,a} \quad \quad \mathop {\lim }\limits_{n\; \to \;\infty } \left( {1 + \frac{{f(n)}}
{n}} \right)^{\,n} \ne \mathop {\lim }\limits_{n\; \to \;\infty } e^{\,f(n)}
$$
that's the fault in your derivation. Consider instead that we have:
$$
\mathop {\lim }\limits_{n\; \to \;\infty } \left( {1 + \frac{a}
{{\left( {n + \alpha } \right)}} + \frac{b}
{{\left( {n + \beta } \right)^{\,2} }} + \cdots } \right)^{\,n + \gamma } = e^{\,a}
$$
Therefore we shall try and expand $3^{2/(2+n)}$ in powers of the exponent, i.e. Taylor of $3^x \quad | \, x=2/(2+n) \approx 0$
$$
\begin{gathered}
\mathop {\lim }\limits_{n\; \to \;\infty } \left( {\frac{1}
{{n^{\,4} }} + 3^{\,\frac{2}
{{2 + n}}} } \right)^{\,n} = \mathop {\lim }\limits_{n\; \to \;\infty } \left( {e^{\frac{{2\ln 3}}
{{2 + n}}} + \frac{1}
{{n^{\,4} }}} \right)^{\,n} = \mathop {\lim }\limits_{n\; \to \;\infty } \left( {1 + \frac{{2\ln 3}}
{{2 + n}} + \frac{{\left( {2\ln 3} \right)^2 }}
{2}\frac{1}
{{\left( {2 + n} \right)^2 }} + \cdots + \frac{1}
{{n^{\,4} }}} \right)^{\,n} = \hfill \\
= \mathop {\lim }\limits_{n\; \to \;\infty } \left( {1 + \frac{{2\ln 3}}
{{2 + n}}} \right)^{\,n} = e^{2\ln 3} = 9 \hfill \\
\end{gathered}
$$
U have used Taylor expansion? I didnt understand why u plus and minus 2 in last 1/(2+n-2) is it should be just look like last term , and about that -2 in power u canceled by adding +2 to the n in the n→inf? Is it ok? Sorr if the question kind of stupid
@МузаффарШакаров Well, I tried and make more readable my answer. It should solve now your questions, if not do not hesitate to ask again.
We can see that it is " tending to one" raised to the power "tending to infinity" then we can use this as a shortcut
Then use L'Hospital rule to simplify
|
1957 San Francisco State Gators football team
The 1957 San Francisco State Gators football team represented San Francisco State College—now known as San Francisco State University—as a member of the Far Western Conference (FWC) during the 1957 college football season. Led by eighth-year head coach Joe Verducci, San Francisco State compiled an overall record of 7–3 with a mark of 5–0 in conference play, winning the FWC title for the second consecutive season. For the season the team outscored its opponents 256 to 124. The Gators played home games at Cox Stadium in San Francisco.
|
#Supporting Libraries
import numpy as np
import pandas as pd
#Keras
from keras.layers import Dense
from keras.utils import to_categorical
from keras.models import Sequential
from keras.callbacks import EarlyStopping
#Model
class Model():
def __init__(self, predictors, targets):
self.model = Sequential()
self.model_name = ''
self.targets = to_categorical(targets)
self.predictors = predictors.as_matrix()
self.predictors = np.multiply(self.predictors, 1/255)
def build_model(self, layers = 1, nodes = 10):
#layers
for layer in range(layers):
if layer==0:
self.model.add(Dense(nodes, activation='relu', input_shape=(self.predictors.shape[1],)))
else:
self.model.add(Dense(nodes, activation='relu'))
#Output Layer
self.model.add(Dense(self.targets.shape[1], activation='softmax'))
self.model_name = 'model {}layers and {}nodes.h5'.format(layers, nodes)
print('Model has been created, ready for training!')
def train_model(self, patience = 1, epochs = 10, val_predictors=0, val_targets=0):
#Compile
self.model.compile(optimizer='adam', loss='categorical_crossentropy', metrics=['accuracy'])
#Training
early_stopping_monitor = EarlyStopping(patience=patience)
val_targets = to_categorical(val_targets)
self.model.fit(self.predictors, self.targets, validation_data=(val_predictors, val_targets), epochs=epochs, callbacks=[early_stopping_monitor])
print(self.model.summary())
print('Model has been trained, validated, and saved!')
self.model.save('Trained Models/{}'.format(self.model_name))
|
Combination single-phase line frequency welder and impulse welder
Dec. 20, 1955 clA KY D. 8 2,728,046 COMBINATION SINGLE-PHASE LINE FREQUENCY WELDER AND IMPULSE WELDER Filed J m. 22, 1953 4 Sheets-Sheet 2 UN/D/fZ FC 7/04 41 CUR/PEAN- M Wag/N6 P046755 HHHIHH HHIH 1H HHHHH HHIH HH POL/YP/ZEO /?E y M 47 j 55 0 I INVEN TOR.
Dec. 20, 1955 D. SCIAKY 2,728,046 COMBINATION SINGLE-PHASE LINE FREQUENCY WELDER AND IMPULSE WELDER Filed Jan. 22, 1953 4 Sheets-Sheet 4 fl/VD PHASE 6fl/F77/V6 C/fi CU/T 1 I 5 50 I 55 I INVENTOR. 64
United States Patent ce Patented Dec. 20, 1955 therefor and wherein said discharge valves will rectify the alternating supply current dui ing operation of the 2,728 046 system as an impulse welder, and which will act as electronic cont actors during conven tional six ty-cycle opera- COMBINATION SINGLE-PHASE LINE FREQUENCY tion.
WELDER AND IMPULSE WELDER With these and various other objects in view, the int ven tion may consist of certain novel features of con- David z fi gg gi fi jg fi g gg g xfi fli fi g struction and operation, as will be more fully described App lication January 22, 1953, Serial No. 332,714" ],0 d l i a 14 Claium (CL 323 58) In the drawings which illustrate an embodiment of the designate like parts- Figure 1 is a schematic wiring diagram of a weld ing tion relates to Weld ing Systems for the reslstsystem incorporating the combination features of the pres metals and has reference in particular to inv n tion;
a novel system which will supply several types of WClGlHP igures 2 3 nd 4 are h m n vi w illustrat ng POSI- Ptllses 1n the Secondary 103d clfchit whereby to Provide tions of the cont actors for producing respectively a pos ia versatile welder having utility for many different weld tive pulse of uni-direc tional current, a negative pulse of ing app lications. such current and a current of conven tional six ty-cycle For the weld ing of certain metals the conven tional type frequency; of alternating current welder is entirely satisfactory. Dur- Figure 5 graphically illustrates a positive and a negaing operation of these A. C. welders, as they are generally tive pulse of uni-direc tional current as produced in the termed, a conven tional six ty-cycle alternating current is load circuit of the welder when operating as an impulse passed through the work and current flow is maintained welder for a selected number of cycles, as determined by the Figure 6 graphically illustrates timed pulses of conventimer of the welder; Weld ing devices of this type employ tional six ty-cycle current which the present welder is also electric discharge valves connected inversely or in back capable of delivering; to back relation and the conductivity of the discharge Figure 7 is a fragmentary schematic wiring diagram valve is controlled by the timer through firing valves illustrating certain circuit elements incorporated in the having electrical connection with the discharge valves. present combination welder;
The conven tional A. C. welders have a number of oper- Figure 8 is a wiring diagram illustrating schematically ating disadvantages due largely to the high frequency of the relay mechanism for automatically actuating the con t e current caused to flow in the weld ing circuit The t actors to effect reversals in the weld ing current on suc above disadvantages are eliminated by the single phase cessive pulses; low frequency converters which produce in the weld ing igure 9 is a schematic wiring diagram showing the circuit three types of power output namely, a single uni circuit connections for controlling and timing a weld ing direc tional current pulse of relatively long duration a operation such as may be produced by the present com series of such uni-direc tional current pulses of the same ination welder;
polarity, or a series of such current pulses, each being Figure 10 is a view showing the re and so comprising a form of low frequency alternatin in Figures 2 and 3;
current In such a system the magnitude of the secondary Figure 11 is a schematic wiring diagram similar to that current pulses and the duration of each pulse can be con of Figure 1 but showing the manually actuated switch trolled by the voltage of the power supply and by its means in position for conven tional six ty-cycle weld ing;
time of app lication across the primary wind ings Figure 12 is a schematic wiiing diagram of the primary general ob ect of the inven tion is to provide a com- Winding of the weld ing transformer showing the same ini nation welder which will include a relatively simple eleceluding four coils in series relation trical circuit and which will operate as a conven tional Figure 13 is a schematic wiring diagram similar to F1 h and current for weld ing, and in the latter case producing igure 14 is a wiring diagram illustrating schematically pulses of unidirec tional current such as many comprise a modified form of combination welder coming within any one of the three types of power output above de the inven tion scribe eferring to the form of the inven tion shown in Figure A more particular object is to provide a combination l of the drawings, the numeral 10 indicates a weld ing welder which will operate as a conven tional six ty-cycle transformer including an iron Core Secondary Wind welder or an impulse welder employing the uni-direc tional l'hgs and P y wind ings 13 and The Secondary current impulses for weld ing, and wherein saidcombinawind ings 12 Connected y means of conductor 15 t0 tion welder will incoiporate switch means adapted to be the k circuit or Secondary cll'clllt 0f the Weldlhg trans manually actuated for switching from one mode of o performer and which y Include the Work Pieces to be ation to the other. welded and indicated by numeral 16 e primary wind- A further ob ect is to provide a combination welder of h1g5 13 all 14 are essehtlally one Wlhdlhg and y the character described wherein mechanical cont actors Prise the Primary load clfchlt of the transformer although are employed for reversing current flow when the machine as illustrated 1h 1, It cohvehleht to Center p is operated as an impulse welder, the said cont actors being the P load Circhlt 80 that wind ings 13 are located actuated automatically by relay means responsive to curto one Side, Whereas wind ings 14 are disposed on the ient flow in the wind ings of the weld ing transformer Opposite Side- The Center tapplhg 0f thh P y load Another and more spec fic ob ect s to prov de a com. cll'cult 1S efiectfid the Conductor Whlch electrically bination welder as described which will incorporate a Connec ts with 0116 terminal of the Single Phase alternating weld ing system employing two electric discharge valves current source indicated by lines L1 and L2. Said source of the asymmetrically conducting type with timing means supp lies the conven tional six ty-cycle alternating curr and since all industrial plants are provided with such alter- 'possible position of the switching means is also shown nating current the terminals of such a source are frein Figure 4 for operation as a conven tional si gty cycle quently referred to as a first andsecond bus; Ac'cord welder, wherein cont actor 43 connec ts terminals A and ingly, it will be seen that conductor 18 is connected at B1 with cont actor 44 connecting terminals D and B. 19 to the first bus. 5 The timer has operation in a manner as previously ex- The primary Winding 13 is connected by conductor 29 plained to control the duration of the weld ing pulse by to terminal C. In a similar manner primary wind ing controlling the grid bias app lied to the grids of the firing 14 is connected by conductors 21 and 22, to terminal B valves. Accordingly, with the system operating as a A mechanical cont actor 23 electrically connec ts terminal converter to produce a pulse of uni-direc tional current, C with terminal A and a similar mechanical cont actor either positive or negative, the duration of each pulse is 24 connec ts terminal B to terminal D. in accordance timed by the weld timer 40 so that the pulses may have with the inven tion terminals A and D are each connected the shape and character istics as shown in Figure 5. With to the second bus of the alternating current supply source the system operating as a conven tional welder the timing by means of their respective conductors 25 and 26. An; of the alternating'current is such as to produce weld ing electric discharge valve is interposed in each of the pulses such as shown in Figure 6. conductors Z5 and 26, the said valve being oflthe asyrn- With the cont actors 23: and'24 positioned as shown in metrically conducting type, and including an anode, a Figure l the weld ing system operates as a full wave cathode and an igniter. The electric discharge valve 27 rectifier of the single phase alternating current. When is interposed in the conductor and the igniter of said, Ll of the alternating current source is positive the. valve 'is connected by conductor 28 to the cathode of a Positive half Cycle Will flow hrough q ii iq :31 firing valve such as 30, The anode of said tiring valve through primary wind ing 14, through cont actor 2,4, re is connected through the current limiting resistor 31 to turning through valve 3,2 to line Lz- When hi PQ Si YC conductor 25. The electric discharge valve 312 is icon the pulse will flow through valve 27, through cont actor nected to conductor 26 and the igniter of said valve 23, primary wind ing 13, and through conductor. .18 to joined by conductor 33 to the cathode of the firing valve ID t0 h rc cc r i y both-tile P iP Y h 34. The anode of said firing valve is connected through y l n l n g l YQ na n F?!- currentllimiting resistor 35 to conductor 26. it will he rent ar us 0 w li l h Pi'i y win ings n observed "that the electric discharge valves 27 and $2 a e ti v from l ft o igh Th f st pul e. n flowing are inversely connected to the alternating current source, g l w di g Will g ra a magnetic flux iii since conductor 25 connec ts the anode of .valve 27. to'the 30 transformer and this flux is incr a e n m gnitude by second bus, whereas, conductor 26 connec ts the cathode the action f I161 Pu of u nfl ins h l g l of valve'32'to the second bus. nd ng The succeeding current p e wh ch wi A third terminal is provided withrespectto terminals now" hrough h nd i the a di sct icn :W
Aan dC and this third terminal is indicated by Bl since have the eff ct of bu ld ing up this magnet fill}; with the same is electrically connected through .condu f w the result that a steady rise in the flux takes place-in;
36 and 22 to the terminal,B, previouslyjreferred to, and li ng- 2 0f niirec tional current in th WEld's Y having association with terminal, D. The said-pair of W ng wh 1 i Ql g l S B 9 5 9 terminals-D and B alsohavea third terminal associated circuit @ii ect 3 W in of the workpieces i therewith, namely, C1, which is connected by-rne ans of a i of tilt? e ng P1115e is coniifoiiedr y l WfilQ conductor 37 to terminal C. Each of the contaetors 23 m u 5 w c y s incofPofaie 9 3.56. andZ may accordingly have two positions,,one o f whi h shifting circuit in order to control the magnitude ofis illustrated in Figure '2, wherein thefco'nt actor .23 cps h S QQQ Y pu se and thus its, heating fi fi li nec ts terminals Aan'd c with cont actor J24, connecting c c 'd sj a a e 27v n 32 a e e e c a terminals D and B. The second, position of the conductive by the firing valves 39 n 34. which a e fii'fi t actors is .shown'in'Figure 3, wherein cont actor 23- con- 5 6. b S- D Qg Q i- Qg .3 a are changed nec ts terminals A and B1 with cont actor l l connecting 1 fi v ,ii old'ofi i l0 a PQ l p ent a D and C1, The weld ing system will produce apo'sitive E C i Q W9 Q 11113611? Caused toriioiw h h in pulse of uni-direc tional current in the secondary Il 'd lugs 13' and 14 produces a rise in the magnetic flu); as circuit 15 h h mechanic: '1 n g 'j 'ds md described which results in the pips or ripple in the inas hown i Fi f 2, d'vg' i f' 5Q duced uni-direc tional current pulse, all as clearly shown tional current is produced in the secondary load circuit in ul i 11 Order to'iel'mi Date ha na P9 IS when the mechanical 'cont actors are positioned .as tion" h ne a iv l -Q i i is pp li again t gt d shown in Figure 3. Each pulse or uni-direc tional cur 2am 4, r n eri the electric discharge valves Ha rent, whether positive. or negative, willrper form la weld- 32 nz nd c e, land. e comp su ismissal ing operation an ld'for timing-the pulse the grids of tne 5,5. eis in spu ss wi l a l l pi char c er ist cs fi i g Valves 34) andfiQar'e connected to. a ive ld. timer hPW l id fi l i' i fif i ih fi ii'? ris is s a v For example, the grid aha cathedeotfiriiig vaiyfaaam e pe k ma i um and then de ys fabr p fly o I er'e, connected "by means of the conductors 39 to fthe iwe ld A5 shown in-Figmie ju thee n l; r a i'se' tim i di d by 1, 9 In a similar ij fii. consists of twenty pips so that the duration of'the pulse thegridan'd cathode of the ff i Tng Valli/e54;areEconneQted i) may e said to consist of ten cycles of alternating'ciirby 'means of'conductors1'42 to said weld time i lill i t mi i Before 'deseribing'th'e mode of operation-of m pm ge For the 2 i W ld creati t Q 3,. l weld ing system for producing the ,positii 'eand negative. 24 are Switched, to the Show in i pulses of uni-direc tional current git is desirable, to pQ int w i' im valve t Y i connected/9ft out that'the'weld in y am' ma c c' fim d pgllxsgs wmdmgdS and valve '32 was connected to the t minal inal of six ty-cycle alternating current and thus operate as a of wind ing F the connections are nqwrtrfiveisdiviiiiil conven tional welder. .For this purpose it;isvnecessary-ito Valve being connemed to h ieimmai of wind ing 14,
and valve 32 being connected to the terminal of wind ing 24. It may be preferable to provide additional switching E .second Wading Operation" the i isyisi'i means such as the cont'actorsfiiiand. iltfand.saidtswitching 7.0 tam qlierates manner as abm/Q i fidi p l m means may'be positioned as. shown in F-igure .-4finiorder changegthe position of the meChaDiCal-.C,0I1i a(;tOlS;23 and to cause the welder to operate as .a s x ty-cycle Welder. a Such mode of operation ,can be achieved w-ith cont actor W9 3 w w i t qu ti err ma y wind i g mt h t m 43 connecting terminals'A'and Cfwbil'ei atthe same time w ih l. m t r? item F 1. ei .ED xample cont actor 44 connec ts terminals D andfCil, second il i ii fit i8 .PQ i VO ib fi i i PlllSF w ll lw.
current source by causing thetposit'ive and negative' .hal
a full wave rectification of the single phase alternating;
being controlled wind ings of the transformer.
nected across 13 and 14 by conductor A cont actor B3 is interposed in conductor relay includes an armature 48 result of current The relay wind ings X and Y are cont actors X3 armature 48 so that the armature again cont actor B4 closed the relay through armature 48. cont actor X1 will close and cont actor X2 w1ll open. Also cont actor X3 will be closed, thus connecting terminals AC and DB relay has such a mode of operation that armature 48 is accordingly the relay wind ing X becomes de energized, allowing cont actors X1 and X2 to return to normal position and effecting actuation of X3 to open the cont actors 23 and 24. The terminals AC and DB are thus disconnected.
For the next weld ing operation the same sequence of Relay wind ing Y result of the dotted line position now assumed by armature 43. Accordingly, cont actor Y1 opens, cont actor Y2 DCI of the weld ing system. Here again the actuation of the polarized relay is to reverse line position. However, relay wind ing energized through its by-pass circuit since both cont actors cont actors return to normal posi- 1 are disconnected.
in Figures 2 and 3. of uni-direc tional current accordingly reversed in polarity.
In order for the weld ing system to operate as a con shown in Figure 4. that the operator will manually connect 4 and'll.
connect terminals AC through wind ing the pulse will flow through conductor 18 through wind ing 14, from left to right, through valve 32, returning to the sou rce. When L2 is positive the pulse flows through valve 2 7,--through conductors 36 and 21, through wind ing 14 from right to leftpreturningby way of conductor 18. The second weld ing pulse of alternating current is similar to the first weld ing pulse and may have the same duration, depending on the setting of the weld timer. Sincefonly a half section ofthe primary wind ing was employed for each operation of the system as a conven tion el welder, it is necessary for the weld ing transformer of the same to be somewhat larger in capacity than normally required for a single phase six ty-cycle machine.
-Figure 9 illustrates schematically an electric circuit for controlling'the various operations for weld ing, beginning with the'actuation of the foot switch by the operator to the end of the Hold time period. Referring to said figure, the conductors Li and L represent a source of alternating current and the several timing devices are connected across the terminals of said source in parallel relation with each other. The conductor 56 is provided with afoot switch, with the cont actor D1, and with the relay wind ing A. The by-pass circuit formed by conductor 57 by-passes the foot switch and has the cont actor B1 interposedtherein. When the operator closes the foot switch it will be seen that the relay wind ing A will he energized since cont actor D1 is normally closed. The relay wind ing A has a cont actor A1 interposed in the conductor '58, which conductor additionally includes the relay wind ing=59 having associated relation with an electro valve forming one of the elements of the weld ing machine. When relay wind ing A is energized cont actor A1 closes and the wind ing 59 of the electro valve is energized. Operation of the electro valve effects a closing of the electrodes ot the weld ing machine whereby they grip the work-pieces to be welded.
The electro valve also controls the app lication of a predetermined pressure to the workpieces to cause a closing of the cont actor PS, located in the circuit provided by conductor. 60. The circuit includes the squeeze timer so that the workpieces have a predetermined pressure app lied thereto for a definite period of time as determined by said timer. Eventually relay wind ing B will be energized and cont actors B1, B2, B3 and B4 are closed simultaneously. Closing of cont actor B1 lay-passes the foot switch so that the operator can now release his foot and the weld ing operation will be continued automatically. Clos' ing of cont actor B2 initiates the actuation of the weld timer such. as 40, identified in Figures 1 and 11. The closing of cont actors B3 and B4 has been described in connectiori with Figures 7 and 8. At the end of the weld period-the relay Winding C is energized, which causes closing of cont actor C1 in circuit with the hold timer and. the relay wind ing D. Actuation of the hold timer maintains the electrodes in closed position on the workpiecesfor-a predetermined interval following termination of the weld period. Upon termination of the hold time the. wind ing D will be energized and by energizing this wind ing the cont actor D1 will be caused to open. The
' circuit to the relay wind ing A is accordingly opened so that the wind ing is de-energized and the effect is such as to cause opening of cont act orAl and actuation of the electro valve to release the electrodes from the workpiece.
The above sequence of events takes place for each weld ing operation and it is immaterial whether the cont actors are set tor generating a positive or a negative pulse of unidirec tional current in the secondary load circuit or for generating a pulse of six ty cycle alternating current. The inven tion accordingly provides a combination welder which will be useful for many different weld ing operations.
When used as a conven tional A. C. spot welder it will have utility in all normal app lications, requiring relatively low current with longer weld ing periods. As. for example, such a machine could deliver a maximum of 19,009 ampereswith a weld time extending to perhaps two seconds,. .and .based=on a twenty-four inch throat depth and an eight inh gap. between the arms a demand 0t approximate- 131 116 lg va. would be made on the power system. When the combination welder is converted to uni-direc tional weld ing pulses said machine will operate to deliver a weld ing pulse o t 43,090 amperesmaxirnum, with a weld time odtheorder of from five to approximately ten cycles of the alternating current source. In this latter case the demand on the power system would approximate only 9 3 kva. ,Thus, although the secondary current is 2.25 times higher than when delivering six ty-cycle secondary current, the demand from the power system is reduced to eight-tenths of that required to deliver the lower secondary current. In the weld ing of aluminum higher currents lasting approximately five cycles are required, whereas for weld ing steel longer periods with lower currents are required, such as are obtained with the conven tional single phase six ty cycle operation.
Figures 12 and 13 illustrate a preferred arrangement for the primary wind ing of the weld ing transformer disclosed in Figures 1 and 11. Although said Figures l and 1.1.illustrate the principle of the present inven tion, it is neces sary to utilize for the A. C. welder less than the full numberof turns 1 the primary wind ing for either half section thereof. It, for example, on a certain welder there were 144 turns for each half section of the primary wind ing, such a primary wind ing would produce a maxi current of approximately 43,000 amperes with the machine operating as an impulse welder. However, with the welder converted for use as an A. C. welder, it is required thatusebe made of only 72 turns of the primary wind ing in order to produce" a secondary current of 19,000 ampere s. The wiring arrangement/for the primary wind ing is accordingly based on the foregoing since the complete wind ing for the primary is illustrated as composed of four primary coils identified by numerals 65, e6, 67 and 68. For illustrative purposes each primary coil may be considered as having seventy-two turns and all four coils are utilize din series, as shown in Figure 12, when the welder is connected for operation as an impulse welder. However, when operating asa conven tional A. C. welder, and assuming that the cont actors are so positioned as to energize the right half of the primary wind ing, it will be observed that a parallel connection of the two primary coils 67 and 68 are resorted to in order to provide a seventy-two to one turn ratio for the transformer. Thus, with the two coils connected in parallel by conductors 69 and 70 this entire right half of the primary wind ing is employed, although the turn ratio is maintained sufliciently'low enough to induce the proper voltage and amperage in the secondary current. There are many conven tional switching devices on the market for effecting a series parallel switching operation and any of these may be employed to produce the necessary switching of coils 6 7 and 6S as above explained.
"The impulse welder and single phase line frequency welder of the inven tion may be embodied in a system such as shown in Figure 14, wherein the QQ nt actors em: ployed in the devices of Figures 1 and 11 are eliminated; and current flow is controlled instead by four electric dis charge valves disposed in pairs, with each pair being connected in back to back relation. system of figure 14 is disclosed and claimed in the Far sons et al. Patent No. 2,510,652, granted June 6, 195i). The weld ing transformer 86 consists of a primary wind ing including a left hand wind ing 8t and a righthand wind ing 82. A secondary wind ing 33 is wound on the same iron core so as to have inducti e relation withthe primary ,wind ings. The current supply for the weld ing transformer is the conven tional single phase six ty-cycle alternating current as delivered by the first and second buses L1 and L2, respectively. The first bus is connected by conductor 5 to the primary wind ing, the said conductor pro; viding a center tap for the wind ing, which divides the into the left hand wind ing 81 and the right hand wind ing 82, as described. The second bus is connected .by con- The basic weld ing 2,728,048 ductor 86 to the terminal of wind ing 81 and the second for the following weld ing operation; and whereby said bus is also connected by conductor 87 to the terminal of groups alternate to produce alternating positive and negaand said valves are connected in back to back relation a conven tional six ty-cycle welder, switch 102 is opened,
90, and with the anode of 88 being connected to the figure. Also divider 103 is rotated to m cathode of 90. The electric discharge valve 88 has ass oat 104 with conductor 105. The et fec ciated therewith a firing valve 91 and in a similar manner is to reduce the number of t firing valve 92 is associated with electric discharge valve 81, which, as explained, is ne The grids and cathodes of the firing valves 91 and the system as an A. C. welder. 92 are connected by conductors 93 and 94, with a weld renders the discharge valves 96 timer generally indicated by numeral 95. The weld timer that the A. C. welder employs only valves 88 and 90, the
normally app lies a biasing potential to the grids of the same functioning as cont actors to pass the six ty-cycle ing valves 91 and 92, thus hold ing the firing valves and alternating current of the source through wind ing 81 the electric discharge valves in a non-conductive state Instead of using the divider 103 the primary wind ing of to thereby render their respective discharge valves con center tap conductor. When the ductive. The second group of electric discharge valves impulse welder the four primary coils are connected in is interposed in conductor 87, the same consisting of series. However, for operation as a conven tional A C valves 96 and 97 connected in back to back relation and welder the turn ratio is reduced by connecting the two each having associated therewith a firing valve such as 98 coils on either half of the primary in parallel relation and 99, respectively. The conductors 100 and 101 con with each other.
nect the grids and cathodes of the firing valves to the The inven tion is not to be limited to nor by details 01 weld timer which controls the firing of said valves and construction of the particular embodiment thereof illus thus the conductivity of the electiic discharge valves 96 trated by the drawings as various other forms of the and 97 in a manner as herein describe device will of course be apparent to those skilled in the For operation as an impulse Welder the electric dis art without departing from the spirit charge valves 88 and 97 are rendered conductive, for the scope of the claims.
which purpose the switch 102 is closed and the primary What is claimed is: wind ing is center-tapped by the divider 103 provided by 1. In a combination weld ing system, a source of alter conductor 85. When the first bus is positive the current nating current comprising a first and a second bus, a
pulse is transmitted through conductor 85 and divider 4 transformer including a primary wind in which flux is increased in magnitude by the action of the and connections between the electric disch arge valves and next pulse of current in flowing through wind ing 82, also the terminals of the primary wind ing,
said connections in a direction from right to left. The succeeding current having a plurality of positions to cause the current to flow pulses which flow through the wind ings in a manner as through the primary wind ing in a difierent manner for described have the effect of buildin' up this magnetic each position, whereby either positive or ne ative pulses flux so that a steady rise in the flux takes place, inducing of uni-direc tional current are induced in the secondary effect rectify the alternating current of the source and source, supply a uni-direc tional current to each primary wind ing 2 In a combination weld ing system a source of alter and which have the same polarity since they flow in the nating current comprising a first and a second bus, a same direction as regards both wind ings. When the elec- 0 transformer including a primary wind ing on an iron core trio discharge valves 88 and 97 are rendered non-conducand having inductive relation with a secondary load an tive the weld ing operation is completed and the impulse cuit, a center tap conductor connecting the primary wind of uni-d rec tional current induced in the secondary such ing to the first bus whereby said wind ing consists of two as shown in Figure 5, performs the desired Weld ing as sections on respect ve sides of the center tap with each herein described, section providing a terminal, a pair of asymmetrically If it is assumed that electric discharge valves 88 and 97 conducting electric discharge valves connected inversely produce a positive impulse of uni-direc tional current in to the second bus, whereby one electric discharge valve the secondary, then a negative impulse can be induced for when conductive will pass the positive half cycles of the the next weld ing operation by rendering valves and alternating current and the other electric discharge valve conductive. The action is the same as above described 70 when conductive will pass the negative halt cycles, and except that current flow takes place in the wind ings 81 connections between the electric discharge valves and the tional current will; be induced. in. the. secondary load. .cir.-
circuit? having the same frequency as the. source.-
3. A combination-weld ing ,system as-defined. in claim2, additionally .including a timer for controlling-the. conductivity of the. electric. discharge valves .to :time the duration of currentfiowthroughthe primary wind ingqfor all positions of the connections.
4; In a combinationiweld ing system, a source of alternating current comprising a first bus and: a'second bus, a transformer including.a primary wind ing on anxiron core and-having inductive relation with .as secondary load cir-. cui't, a center tap. conductor. connecting the primary .wind ingrto the firstbuswhereby.saidlwind ing,consists of two sections on respective. sides of the center tap with each section providing. a terminal, a..pair. of asymmetrically conducting electric discharge valves connected inversely to. the, second bus, whereby one. electric. discharge valve when conductive will .pass the. positive half cycles ofthe alternating. current and theother electric discharge valve when conductive will. pass .thenegative half cycles, and switching ele rn ents for each scctionoithe primary wind irigprovidingconnections between its respective electric discharge valve. and the terminals of the primary wind ing, said switching el'ern ents having .a -plurality of positions. to cause the current to flow through the primary wind ing inadifierent manner for. each position, whereby for certain positions either a positive or a negative pulse of uni-direc tional current will be induced 'in the secondary loadllcir'cuit, and for other positions .an alternating current, will be induced in said. secondary load. circuit having the. same frequency as .the source.
5i A combination weld ing sy stern-z as defined inclairn 2. additionally including atirner for controlling-the conductivity of the electric discharge valves to time the duration of current flow through the primary wind ing for all positions of the connections.
'6. In a combination weld ing-system, a source of alternating current comprising a first bus and a second bus, a load circuit comprising aprirnary wind ing second and third terminal, a conductor. connecting the second terminal to the first bus, a first electric discharge valve including an anode, a cathode and an igniter, a conductor. connecting the anode of the first valve-to the second bus; a second electric discharge valve, including. an anode, a cathode and an igniter, a conductor connecting;
the cathode of the second. valve to the second bus, switching'means for. the first electric discharge valve. for con.-
nectirig the cathode of the valve to either the first or third.
terminal of the load circuit, other switching means for the second electric discharge. valve, for. connecting the anode of the valve to either the first .or third terminal .or" the load circuit, and a timer in electrical connection with the i'gnitefrs ot the electric discharge. valves v uncontrolliiig the conductivity of the valves.
7. In. a combination weld ing system, nating current comprising a a load"circuit' comprising a primary first, second and third terminal, a conductor=connecting the second terminal'to the first bus, a first and a second electric discharge valve each including an, anode, av cathode and ian igniter, said valves being connected to the a. source of altersecond bus in inverse relation so that one valve when.
conductive will'pass the positive half cycles of the. alternating current and the other val-ve when conductive. will pass the-negative halt cycles, first switching means for the first electric discharge valve for connecting the valve to either the first or third'terminal of the. load circuit, and second switching means for the. second electric. discharge valve for connecting the first. or third terminal of said load circuits 8i A combination weld ing system'as defined by. claim 7} additionally including means responsive to current .fiow
having a first,
first bus and a second bus, wind ing. having. a.
said second valve. to. either.
-valve, said. valves each having nating current cally. conducting electric inthe load;circuit toractuating both said switching ne ans whereby toswitchthe connection of the, first valve fron i the.first-to thethirdterminal and to switch the-connec.- tionrofnthe second valve from the third to the;first termi.. nal. and vice-versa, and timing means in electrical connection with the ignitersof the electric discharge valves for controlling the conductivity of the valves.
9=- In a' combination weld ing system, a source of alternating current comprising a first bus and a second bus, a.
weld ing,transtorrner providing a primary wind ing said;
primary wind ing having a center tap connected to the first bus and which divides the wind ing into. two sections each; having a terminal, means connecting. the terminalstothe secondfbus including a first and second electric discharge an. anode, a cathode and; an igniter and said .valves being inverselyconnected to, the. second bus so that-one valve when conductive will; pass the positive half cycles of the alternating-current; and the other valve when conductive will pass-thenega; tive half cycles, and cont actors connecting the valves with, said terminals and having a plurality of positions .to cause the.current to how through the primary wind ing in a different manner for each position.
10. .In a combination weld ing system, a source. of-alt cr:
comprising a. first bus and a second bus, a. weld ing transformer providing a. primary wind ing, said. primary wind ing having a center tap connected to, the. first bus and which divides the wind ing into two sections, each v having a terminal, means. connecting the terminals, to the second bus including a first and second electric discharge. valve, said v valves each having an anode, a cathode and an igniter and said valves being inversely, connected to the second. bus so' that one valve when: conductive will pass the positive half cycles of the alten. nating current and the other, valve. when conductive will pass the negative half cycles, a cont actor for connect-. ing the first electric discharge valve. to either termiual, and a second cont actor for connecting the second electric discharge. valve to either terminal, each ,cont actor'therefor having two different positions, and forthe plurality i of possible positions for said cont actors the current will u flow through the primary wind ingin a different manner for each such position.
11. In a combination weld ing sy stern, nating. current comprising a first bus and-a second bus, awe ld ing transformer providing a primary wind ing and, a secondary load. circuit, said primary wind ing having a center tap terminal and a first and second. endterrninal,w
av conductor connecting the center tap. terminal to the av source of alter first .bus, first and second electric discharge valves jn as.
. when, conductive v will pass the positive vhalficyclcs of the:
alternating; current andthe. other valve when conductive will pass, the negative half cycles, a, first.cont actor, for connecting the first electric. discharge, valve. to. either. the first or second terminal, a. second.cont actorforconnecting, the second electric discharge valve to. either. thefirst or second terminal, whereby current, flows through the; primary. wind ing in av different manner for. the sev-. eral difierent positions of the cont actors, and.- a timer. in electrical connection with the igniters ofv the elec.-. tric discharge valves for controlling the conductivity of the valves.
12. In a combination weld ing system, a source. of alternating current comprising a-first bus; and ia second bus, a. transformer. in-luding a primary Winding. on an iron. core and having inductive relation with a secondary. load. circuit, a center tap conductor. connecting. the primary wind ing to the first bus. whereby said wind ing consists. of two. sections on respective. sides of the. center. tap with each section providing a terminal, a pair; of asymmetridischarge valves connected: in:
a cathode and an igniter and said valves being inversely connected to the second bus so that one valve When concluctive Will pass the positive half cycles of the alternating current and the other valve When conductive will pass parallel circuit arrangement when the switching elements are located in certain other positions.
References Cited in the file of this patent UNITED STATES PATENTS Da Rosa et al Nov. 4, 1947 Dawson May 23? 1950
|
Page:Federal Reporter, 1st Series, Volume 9.djvu/490
THE WALTER M. FLEMING. 475, �the boat was delivered to him, since which the libellant bas seen nothing of the boat or the buyer until the commeiicenient of thia suit, and bas received no part of the purchase money except the $150. Wbat the foll consideration was agreed to be libellant does not recollect, but he thinks it waa over $500, and he thinks that no bill of sale of the boat was ever given by him. �Nothing of all this appears in the libel, which contains no allusion to either Charles or Cornelius M. Vanolinda, and makes one Wright the party defendant, with wbom it is evident the libellant bas no con- , troversy. But assuming the libellant's recollection to be aocurate, which evidently it is not in all respects, and assuming that the state of facts sought to be made by the libellant's testimony is admissible under his libel, his action cannot be maintained ; for, according to the libellant's testimony, at the expiration of 30 days from his deliv- ery of the boat to Charles Vanolinda, in July, 1874, he had the right to resume possession of the boat, and from that time to this he bas made no attempt to exercise this right. The fact conceded in this case, that no bill of sale of the boat was given at the time of the delivery of the boat to Charles Vanolinda, is deprived of much of its ordinary signiucance as bearing upon the question whether the title was intended to be transferred by the circumstance that the libellant bas no bill of sale. The only bill of sale proved is from William D. Callister to the libellant and one Mr. William H. Crennel. The libel- lant, doubtless, became possessed of Crennel's interest in the boat, but he bas no bill of sale from Crennel. Assuming, however, that the omission to deliver a bill of sale to Charles Vanolinda, under these circumstances, be sufficient to compel the conclusion that there was no intention to part with the title to this boat at the time of the bar- gain with Charles Vanolinda, still it must in equity be held that any right to reclaim possession of the boat, upon failure of the buyer to perform his agreement, has been waived by thia long and unexcused delay of some seven years. And this, certainly, when, as the claim- ant bas proved, the boat was during this long period running upon the Erie canal, and both Charles Vanolinda and the present pos- sessor, Cornelius Vanolinda, had been seen by the libellant ou more than one occasion without any demand of the possession ever being made, and when no obstacle existed to prevent the libellant from resuming the possession at any time. It was the libellant's duty, if he intended to reclaim possesion of the boat, to do so within a reason- able time after the default ; and he cannot be permitted to wait seven years, and then without demand apply to have the court put him in ��� �
|
XML INSERT INTO Query
I wish to populate a SQL table with a single call using an XML param string.
My code to build the XML follows :
Loop through the list
' update string for reserved character (ampersand)
Dim descStr As String = allMarkets(0).result(j).event.name.Replace("&", "&&")
(NOTE : the ampersand reference text shown is not displaying correctly in this browser, where I put the correct string reference it is displaying incorrectly)
strBuffer.Append(" <ID>""" & allMarkets(0).result(j).event.id.ToString & """ </ID><DESC>""" & descStr & """</DESC>")
Next
My stored procedure :
ALTER PROC [dbo].[PriceDataXMLEVENTInsert1]
(@ValidXMLInput XML)
AS
BEGIN
INSERT INTO PRICEDATA (EventID, EventDesc)
SELECT
x.v.value('@ID', 'INT'),
x.v.value('@DESC', 'nvarchar(50)')
FROM
@ValidXMLInput.nodes('//ROOT/ROW') x(v)
The XML string passed to the function holds valid data and the code runs fine... but when there should a few hundred records in the table PRICEDATA - there are none..... what is wrong with the above...?
Thanks in advance for any help you can offer...
G
Can you provide us with the actual string being passed to the stored procedure?
I did try to .. but because it is XML itself when I attmped to post earlier it displayed incorrectly , Its a long string, so here a piece of it...
"27748379" "Garbarnia v KS Spartakus Daleszyce" "27748239" "H Petach Tikva Youth v H Rishon Lezion Youth" .....
If I simply insert a single value with an XML string to match.. this ....
ALTER PROC [dbo].[PriceDataXMLEVENTInsert](@ValidXMLInput XML)
AS BEGIN
INSERT INTO PRICEDATA(EventID)
SELECT Col.value('@ID','INT')
FROM @ValidXMLInput.nodes('//Events/Event') Tab(Col)
END
works fine...
Can you put up the full string on Pastebin?
You try to query your data as attributes (with @ID) but you build your XML with your data as elements (<ID>value</ID>). You make it even worse when you put your values in " signs...
In your example data the ID value is the same for both rows. Really?
To answer your original question: What is wrong with
SELECT x.v.value('@ID','INT'), x.v.value('@DESC','nvarchar(50)')
FROM @ValidXMLInput.nodes('//ROOT/ROW') x(v)
Your sample data do not show a ROW element, neither are there attributes @ID or @DESC. This will return nothing...
A solution for your bad data
DECLARE @x XML=
'<ROOT>
<ID>"27748379" </ID>
<DESC>"Garbarnia v KS Spartakus Daleszyce"</DESC>
<ID>"27748239" </ID>
<DESC>"H Peta8h Tikva Youth v H Rishon Lezion Youth"</DESC>
</ROOT>';
There are several flaws:
Do not separate your elements this way. Use either <element><ID>gfjha</ID><DESC>sfasdf</DESC></element> to bind them together (both within one node), or - what would be my choice - use <element ID="fasdf" DESC="fsdfdaf">
If you put your values in attributes (<element attr="value">) you need the quotation marks. But in elements they are disturbing!
If you want to escape characters you must at least escape the < with < the > with > and the & with & (no doubled && as in your example!)
Anyway, this was a way to get table like data out of your XML to have an easy insert. But you really should change your structure!
WITH IDNodes AS
(
SELECT ROW_NUMBER() OVER(ORDER BY (SELECT NULL)) AS Nr
,B.value('.','varchar(max)') AS ID
FROM @x.nodes('/ROOT/ID') AS A(B)
)
, DESCNodes AS
(
SELECT ROW_NUMBER() OVER(ORDER BY (SELECT NULL)) AS Nr
,B.value('.','varchar(max)') AS [DESC]
FROM @x.nodes('/ROOT/DESC') AS A(B)
)
SELECT IDNodes.ID,DESCNodes.[DESC]
FROM IDNodes
INNER JOIN DESCNodes ON IDNodes.Nr=DESCNodes.Nr
The result (you should let the " away...)
ID DESC
"27748379" "Garbarnia v KS Spartakus Daleszyce"
"27748239" "H Peta8h Tikva Youth v H Rishon Lezion Youth"
And finally this is what you probably really wanted to achieve:
DECLARE @ValidXMLInput XML=
'<ROOT>
<element ID="27748379" DESC="Garbarnia v KS Spartakus Daleszyce"/>
<element ID="27748239" DESC="H Peta8h Tikva Youth v H Rishon Lezion Youth"/>
</ROOT>';
SELECT A.B.value('@ID','int') AS ID
,A.B.value('@DESC','varchar(max)') AS [DESC]
FROM @ValidXMLInput.nodes('/ROOT/element') AS A(B)
Shnugo - thank you for your prompt response!
The prposed solution works a treat.. I take on board what you say about my bad coding structure.... I used to code SQL Server many many years back .... so have forgotten much and getting back into these things can take some time... particularly as the grey matter gets less inclined...! THANKS AGAIN, a great help.
|
package ml.alternet.misc;
import static ml.alternet.misc.CharRange.*;
import static org.assertj.core.api.Assertions.assertThat;
import java.util.List;
import java.util.stream.Collectors;
import org.testng.annotations.Test;
import ml.alternet.misc.CharRange;
import ml.alternet.misc.CharRange.BoundRange;
import ml.alternet.misc.CharRange$.Ranges;
@Test
public class CharRangeCombine {
public void anyCharsExceptAChar_Shoud_haveTheSameIntervalsThanNotAChar() {
CharRange a = CharRange.is('a');
CharRange anyExceptA = ANY.except(a);
CharRange notA = CharRange.isNot('a');
assertThat(anyExceptA.asIntervals().findFirst().get()).isEqualTo(notA.asIntervals().findFirst().get());
assertThat(notA).usingComparator(CHAR_RANGE_COMPARATOR).isEqualTo(anyExceptA);
}
public void doubleNegateForChar_Shoud_giveTheSame() {
CharRange a = CharRange.is('a');
CharRange anyExceptA = ANY.except(a);
CharRange aAgain = ANY.except(anyExceptA);
assertThat(a).isEqualTo(aAgain);
}
public void doubleNegateForNotChar_Shoud_giveTheSame() {
CharRange a = CharRange.isNot('a');
CharRange anyExceptA = ANY.except(a);
CharRange aAgain = ANY.except(anyExceptA);
assertThat(CHAR_RANGE_COMPARATOR.compare(a, aAgain)).isEqualTo(0);
assertThat(a).usingComparator(CHAR_RANGE_COMPARATOR).isEqualTo(aAgain);
}
public void rangesWithExclusions_Shoud_beCut() {
CharRange range = CharRange.range('A', 'Z')
.union(CharRange.isOneOf("9287315"))
.union(CharRange.is('a'))
.union(CharRange.is('h'))
.union(CharRange.range('m', 'x'))
.except(CharRange.is('M'))
.except(CharRange.range('w', 'z'))
.except(CharRange.range('f', 'p'))
.except(CharRange.is('0'));
assertThat(range.getClass()).isAssignableFrom(Ranges.class);
List<BoundRange> charRanges = range.asIntervals().collect(Collectors.toList());
assertThat(charRanges).containsExactly(
CharRange.range('1', '3'),
CharRange.is('5'),
CharRange.range('7', '9'),
CharRange.range('A', 'L'),
CharRange.range('N', 'Z'),
CharRange.is('a'),
CharRange.range('q', 'v')
);
}
public void rangesWithExclusionsAtOnce_Shoud_beCut() {
CharRange range = CharRange.range('A', 'Z')
.union(CharRange.isOneOf("9287315"), CharRange.is('a'), CharRange.is('h'), CharRange.range('m', 'x'))
.except(CharRange.is('M'), CharRange.range('w', 'z'), CharRange.range('f', 'p'), CharRange.is('0'));
assertThat(range.getClass()).isAssignableFrom(Ranges.class);
List<BoundRange> charRanges = range.asIntervals().collect(Collectors.toList());
assertThat(charRanges).containsExactly(
CharRange.range('1', '3'),
CharRange.is('5'),
CharRange.range('7', '9'),
CharRange.range('A', 'L'),
CharRange.range('N', 'Z'),
CharRange.is('a'),
CharRange.range('q', 'v')
);
}
}
|
User:Vulpes Foxnik
Opening comments
I feel it is conceded to talk about myself.
You may even see me in town asking for a runner to Drascir when I am bored out of my mind.
I am a proud member of the Order of Lyssa.
Characters
{| width="100%" style="background: transparent;"
Vulpes Foxnik
* Me/E 20
* Tyrian Born
* Grandmaster Tyrian Cartographer
* Protector of Tyria.
* Name Origin: Vulpes Foxnik is a Redundant name; Vulpes in latin means fox.
The Mighty Kwin
* W/R 20
* Tyrian Born
* Grandmaster Tyrian Cartographer
* Protector of Tyria
* Name Origin: A Perversion of the spelling of Quinn, from the the song of the same title.
Izyania Vixenspawn
* E/R & E/W 20
* Tyrian Born
* Protector of Tyria
* Name Origin: None! I liked the way it sounded.
* Izy has no image because her current armor is simply embarrassing and I'm poor.
Kitsune no Yemeiri
* A/R 20
* Canthan Born
* Canthan Cartographer.
* Name Origin:Kitsune wedding
Henshou No Aziz
* Rt/N 20
* Canthan Born
* Name Origin: The reflected sunlight of Aziz. AZIZ! LIGHT!
Tomahna No Yeesha
* Mo/Me 20
* Canthan Born
* Name Origins:Yeesha of Tomohna
Ainuzoku No Tenjin
* R/Rt 20
* Canthan Born
* Name Origin: The Celestial Maiden of the Ainu
Tsukeru Zenji
* N 2
* Canthan Born
* Name Origins: Giving Courage to the Monks.
* }
My Pets
Adding pictures soon!
Working Breeds
* In My Way, The Mighty Kwin's Black Moa.
* Elder Chikap, the Crane. Owner Ainuzoku No Tenjin.
* -Retired- General Duke, The Dune Lizard. Former owner, The Mighty Kwin. I still Love you Duke!
* -Retired- I ate Gwen, Pre-Searing wolf. Deleted Ranger Char.
* -Retired- McJagger, The Strider. Deleted Ranger Char.
Toy Breeds
* Mini-Joe. Vulpes Foxnik's Minature Devourer.
|
O’Quinn v. State.
May 12, 1952.
No. 38435
(58 So. (2d) 670)
Armstrong & Hoffman, and Henley, Jones & Woodliff, for appellant.
W. M. Broome, and Joe T. Patterson, Assistant Attorney General, for appellee.
Lee, J.
Charlie Will O’Qiuinn was convicted of an assault and battery with intent to kill and murder Robert Stamps. From a judgment and sentence of 7 years in the state penitentiary, he appeals.
The victim was 11 years of age when the assault occurred and 12 at the time of the trial. According to his version, on December 16, 1950, he went to the home of Boquet O’Quinn, where appellant lived, for the purpose of going rabbit hunting. He and several other small boys were at the woodpile about 15 feet from the house. The dogs got to fighting. Appellant came out of the house and said to Robert, “Boy, don’t put them dogs to fighting”. Robert replied, “I didn’t have them fig’hting.” ’ ’ He thereupon picked up a stick, walked behind Robert, drew back, and struck him on the head. The blow not only knocked him unconscious but the boy remained in that condition for several weeks.
Robert’s stepmother heard of the trouble and went to the scene in about 15 minutes. She found the boy, lying on the ground, bleeding from his nose. She saw the appellant in the house at the window, and went to get a quilt to lay the boy on the porch. But appellant would not let her in the house. A car was obtained, and the injured boy was carried to the Baptist Hospital where Dr. C. L. Neill examined and treated him. At that time the boy was unconscious, in a deep coma, and his lower extremities were paralyzed. There was a fracture which extended all the way around the skull, and at the top, the bone was driven in and against the brain. When his condition finally permitted, the depressed bone was lifted and a blood clot removed. The boy’s injury was a serious and disabling one, and, in the doctor’s opinion, he will never be any better than he was at the time of the trial.
The defense was that the injury arose from an accident. Appellant testified that he brought from the pasture, on his shoulder, a small pole that he intended to cut into wood. As he started to drop it at the woodpile, he stumbled and the pole fell on Robert. His wife hollered to him that the end of the pole tapped the boy. He did not know that the doy was near until his wife’s outcry. The pole was 6 or 8 inches, but his evidence is confused as to whether it was such size in diameter or circumference. The dogs were not fighting. He admitted that he went in the the house without doing anything for the boy; and that it was about 10 or 15 minutes before the boy’s stepmother came and picked him up. The sole excuse for failure to give aid or succor was fright — he was scared nearly to death. He said that Robert was standing and that the pole fell not over 2 or 3 feet. He could give no reason for the boy’s telling a falsehood on him, as he said they had never had a cross word. Appellant’s wife, who was in the house, corroborated his version. She said that they were both scared, and it was on that account that they did nothing by way of aid to the boy. She also said that the pole did not have much force when it struck. A brother saw appellant carrying the pole on his shoulder and saw him throw it down, but was too far away to see exactly what happened.
The little boys, who, according to Robert’s statement, were present, were called as witnesses by the appellant. S. B. Stamps was found to be incompetent as a witness, and, by agreement, was withdrawn. Joe Louis O’Quinn, a nephew of appellant, testified that he was not present. Eddie C. Stamps, a cousin of the appellant, said that he was up the road, catching his dog, and that he did not see what happened; nor did he see any dogs fighting.
These boys were young. They were kin to the appellant; and their failure to corroborate Robert Stamps, does not, under the circumstances, necessitate the conclusion that his story was untrue.
Appellant contends that the nature of Robert Stamp’s injury, his youth, and the.possibility of his being coached stamp his evidence as unreasonable and improbable.
The boy’s narrative of the events was clearcut and straightforward. The doctor’s description of the fracture undoubtedly compelled the conclusion that terrific force was necessary to effect such a result. Obviously he could not remember events which occurred during the time he was in a coma. But there was no proof either that he sustained an impairment of his mental faculties or that he experienced a loss of memory as regards events prior to the injury. The appellant did not seek to elicit information on either of those subjects from the doctor, who is an expert. In fact, the appellant did not cross-examine the doctor at all.
The victim was 12 years old and in the fifth grade at the time of the trial. The judge determined, and was satisfied with, the boy’s intelligence. Compare McNally v. State, Miss., 56 So. (2d) 834. Besides, he had the whole picture before him on the motion for a new trial. Suffice it to say, this boy was thoroughly grilled on cross-examination, and his answers indicate an intelligence quotient far above the average 12 year old Negro boy.
There was no proof that the boy was coached into telling his story. "When appellant asked, on cross-examination, who told him to tell that story in court, he replied, “Nobody. That is what happened.” His answers on such examination went into the most minute details and constitute irrefutable proof that his tale was not memorized.
Against the State’s version, which the jury were well warranted in finding to be reasonable, the appellant contended that the pole fell only 2' or 3 feet and without much force. If it was only '6 or 8 inches in circumference, it seems impossible that such a direful result could have occurred; and if 6 or 8 inches in diameter, such a result was highly improbable. Besides, failing to administer relief after the claimed accident, leaving the boy where he had fallen, refusing to let him be brought into the house — such acts were sufficient to warrant the jury in believing that no accident had occurred, but that, on the other hand, the blow was struck out of a spirit of malice toward the victim. •
Complaint is also made in connection with the effort of the State to introduce a stick as the one used in the assault.
The prosecuting witness was asked if he saw the stick with which appellant struck him. When a certain stick was handed to him, he said, “that looks like it”. Objection was made and sustained. The court then stated that he would let counsel examine the witness, under a •reserved ruling', to see if the stick could be identified. When there was no further effort in that direction, the court instructed the jury to disregard the evidence about the stick. He thereupon polled the jurors, and asked if they would obey his instructions. Each promised that he would.
In Warren v. State, 174 Miss. 63, 164 So. 234, 235, it was said that “the proper practice in jury trials is that the judge shall rule positively one way or the other when the evidence is offered and the objection thereto is made. ’ ’ But it was also there said that £ £ this, however, is not to be laid down as an inflexible rule, there being several appropriate circumstances for its reasonable relaxation. ’ ’ In Henley v. State, 202 Miss. 37, 30 So. (2d) 423, the introduction of a large stick in evidence, in the absence of a showing that such stick was used in the assault, was held to be reversible error.
But, in this case, the stick was not admitted.
We do not see how this incident resulted in prejudice to the appellant.
The case has been thoroughly considered and we find no reversible error in the record.
Affirmed.
McG-ehee, O. J., and Alexander, Kyle and Ethridge, JJ., concur.
|
Nowadays Knowledge Graphs constitute a mainstream approach for the
representation of relational information on big heterogeneous data, however,
they may contain a big amount of imputed noise when constructed automatically.
To address this problem, different error detection methodologies have been
proposed, mainly focusing on path ranking and representation learning. This
work presents various mainstream approaches and proposes a hybrid and modular
methodology for the task. We compare different methods on two benchmarks and
one real-world biomedical publications dataset, showcasing the potential of our
approach and providing insights on graph embeddings when dealing with noisy
Knowledge Graphs.
|
User talk:<IP_ADDRESS>
Welcome
Hi, welcome to. Thanks for your edit to the David Triptow page.
All of these links are a great way to start exploring Wikia.
Happy editing, Sannse (help forum | blog)
|
// Copyright (c) 2013-2021 Jean-Philippe Bruyère <[email protected]>
//
// This code is licensed under the MIT license (MIT) (http://opensource.org/licenses/MIT)
using System.Diagnostics;
namespace CrowEditBase
{
[DebuggerDisplay("{" + nameof(GetDebuggerDisplay) + "(),nq}")]
public class BreakPoint : CrowEditComponent
{
int index = -1;
public string Function;
string fileFullPath;
int line;
bool isEnabled;
string type;
string disp;
string warning;
public int Index {
get => index;
set {
if (index == value)
return;
index = value;
NotifyValueChanged(index);
}
}
public int Line {
get => line;
set {
if (line == value)
return;
line = value;
NotifyValueChanged (line);
}
}
public bool IsEnabled {
get => isEnabled;
set {
if (isEnabled == value)
return;
isEnabled = value;
NotifyValueChanged (isEnabled);
}
}
public string Type {
get => type;
set {
if (type == value)
return;
type = value;
NotifyValueChanged (type);
}
}
public string Disp {
get => disp;
set {
if (disp == value)
return;
disp = value;
NotifyValueChanged (disp);
}
}
public string Warning {
get => warning;
set {
if (warning == value)
return;
warning = value;
NotifyValueChanged (warning);
}
}
public string FileFullPath {
get => fileFullPath;
set {
if (fileFullPath == value)
return;
fileFullPath = value;
NotifyValueChanged (fileFullPath);
}
}
protected BreakPoint(string fileFullPath, int line, bool isEnabled = true)
{
FileFullPath = fileFullPath;
Line = line;
IsEnabled = isEnabled;
}
public void UpdateLocation (StackFrame frame) {
//FileName = frame.File;
FileFullPath = frame.FileFullPath;
Function = frame.Function;
Line = frame.Line - 1;
}
public override string ToString() => $"{Index}:{Type} {FileFullPath}:{Line} enabled:{IsEnabled}";
private string GetDebuggerDisplay() => ToString();
}
}
|
UNITED STATES of America, Appellee, v. Marlon Dale SUN BEAR, a/k/a Dale Sun Bear, a/k/a Ben James, Appellant.
No. 02-1196.
United States Court of Appeals, Eighth Circuit.
Submitted: Aug. 21, 2002.
Filed: Oct. 17, 2002.
Rehearing and Rehearing En Banc Denied: Dec. 4, 2002.
William A. Delaney, argued, Sioux Falls, SD (Robert Van Norman and Janna Miner, on the brief), for appellant.
Jeannine Huber, argued, Sioux Falls, SD (Randolph J. Seiler, on the brief), for appellee.
Before WOLLMAN, RILEY, and MELLOY, Circuit Judges.
Judge McMillian, Judge Bye, Judge Melloy, and Judge Smith would grant the petition for rehearing en banc. Chief Judge Hansen would grant the petition for rehearing en banc, limited to the issue whether attempted theft of an operable motor vehicle constitutes a crime of violence.
RILEY, Circuit Judge.
Marlon Dale Sun Bear (Sun Bear) was charged with committing and aiding and abetting second degree murder, a violation of 18 U.S.C. §§ 1111, 1153 & 2. After Sun Bear pled guilty, the district court determined he qualified as a career offender and sentenced him to 360 months in prison. On appeal,' Sun Bear argues that he should not have been sentenced as a career offender. We affirm.
I. BACKGROUND
On May 9, 2001, Sun Bear spent the day drinking beer and smoking marijuana. In the evening, he began arguing with his uncle, Cordell Sun Bear (Cordell), over which of them would get to drink a can of beer. The argument turned into a fight. With the help of a friend, Lambert Gun-hammer (Gunhammer), Sun Bear got the better of his uncle. Sun Bear and Gunhammer continued to beat Cordell after he was unconscious. Sun Bear then placed his uncle on a basement mattress where Cordell died of multiple injuries.
After Sun Bear pled guilty, the probation office issued a presentence investigation report (PSR) listing a total offense level of 32 and a criminal history category VI. The government objected that the PSR did not apply the career offender guideline, U.S.S.G. § 4B1.1 (2000). The district court then notified the parties that it would consider sentencing Sun Bear as a career offender and would also consider departing upward based on the inadequacy of Sun Bear’s criminal history category.
At sentencing, the district court determined that three of Sun Bear’s prior adult convictions were felony crimes of violence. The three offenses were (1) an attempted escape in 1995 in Sheridan County, Nebraska; (2) an attempted theft in 1997 of an operable vehicle in Cedar City, Utah; and (3) an attempted burglary in 1995 of a commercial building in Gordon County, Nebraska. Based on these convictions, the district court found that Sun Bear is a career offender and increased his offense level to 37. See U.S.S.G. § 4B1.1.
After decreasing Sun Bear’s offense level for acceptance of responsibility, the district court departed upward, back to an offense level of 37, based on its determination that criminal history category VI understated the seriousness of Sun Bear’s criminal history. The district court then sentenced Sun Bear at the bottom of the guideline range to 360 months in prison.
On appeal, Sun Bear challenges only the district court’s application of the career offender guideline. He argues that none of the three prior convictions relied upon by the district court is a felony crime of violence.
II. DISCUSSION
We review a district court’s factual findings for clear error and its application of the sentencing guidelines de novo. United States v. Randolph Valentino Kills in Water, 293 F.3d 432, 435 (8th Cir.2002). If a sentencing argument was not properly presented below, we review the district court’s decision related to that argument for plain error. United States v. Robinson, 20 F.3d 320, 323 (8th Cir.1994).
Under the sentencing guidelines, a “career offender” receives a higher offense level than defendants who are otherwise similarly situated. See U.S.S.G. § 4B1.1. A defendant is a career offender if: (1) he was at least eighteen years old at the time of the instant offense; (2) the instant offense is a felony crime of violence or a felony controlled substance offense; and (3) he has been convicted at least twice before for a felony crime of violence or a felony controlled substance offense. Id. The first two of these elements plainly apply to Sun Bear’s case. The overriding issue presented on appeal is whether at least two of Sun Bear’s prior convictions were for felony crimes of violence.
A. Attempted Escape
On August 4, 1995, Sun Bear pled guilty to attempted escape in Sheridan County, Nebraska. His offense involved running from law enforcement officers who were investigating him for criminal mischief. The only document the government produced as evidence of this conviction was the criminal complaint filed against Sun Bear in Sheridan County. The complaint alleged that Sun Bear did “employ force and threat in an attempt to unlawfully remove himself from official detention,” and listed the violation as a “Class I Misdemeanor.” According to the PSR, Sun Bear pled guilty to this offense and was sentenced to 180 days in jail.
In the Eighth Circuit, we have held that every escape from custody is a crime of violence. See United States v. Nation, 243 F.3d 467, 472 (8th Cir.2001)’(following cases from other circuits). Under the career offender guideline, if a completed offense is a crime of violence, then an attempt to commit that offense is also a crime of violence. See U.S.S.G. § 4B1.2, cmt. n.l. Sun Bear does not contend that his attempted escape was not a crime of violence. Instead, he argues that the attempted escape he was charged with was only a misdemeanor under Nebraska law.
Under Nebraska law, escape itself is a felony. Generally, it is a Class IV felony' — the lowest felony class under Nebraska law. See Neb.Rev.Stat. § 28-912(4). However, when the escapee “employs force, threat, deadly weapon, or other dangerous instrumentality to effect the escape,” the crime becomes a Class III felony. See Neb.Rev.Stat. § 28-912(5)(b).
Sun Bear was charged only with attempted escape. In Nebraska, an attempt to commit a crime is generally classified one level below the actual crime attempted. See Neb.Rev.Stat. § 28-201(4). Thus, if Sun Bear was charged with attempting a Class III felony escape, his attempted escape would be a Class IV felony. If Sun Bear was charged only with attempting a Class IV felony escape, his attempted escape would be a Class I misdemeanor.
The best place to learn what a defendant was charged with is ordinarily the charging document itself. See United States v. Smith, 171 F.3d 617, 620-21 (8th Cir.1999). In this case, though, the complaint filed against Sun Bear is equivocal. In charging that Sun Bear did “employ force and threat in an unlawful attempt to remove himself from official detention,” the complaint suggests that Sun Bear attempted to commit a Class III felony, and that his attempt was therefore a Class TV felony. However, the complaint goes on to identify Sun Bear’s crime as a “Class I Misdemeanor,” which would have been appropriate if Sun Bear were charged with attempting to commit a Class TV felony escape.
The government had the burden of proving the facts to support a career offender enhancement by a preponderance of the evidence. See United States v. Williams, 905 F.2d 217, 218 (8th Cir.1990). The government might have met this burden by producing the judgment of conviction from Sheridan County, Nebraska. The judgment presumably identifies the offense to which Sun Bear ultimately pled guilty and whether that offense was a felony or a misdemeanor. If the judgment had been produced, it would likely have clarified the serious ambiguity in the record before the district court.
In the absence of such evidence, and given the government’s burden of proof, it is impossible to conclude that Sun Bear’s attempted escape was a felony. In light of the complaint’s ambiguous language, it is at least as likely that Sun Bear was charged with a misdemeanor as with a felony. Even if Sun Bear was charged with a felony attempted escape, he may have pled guilty to a misdemeanor under a plea agreement. The sentence Sun Bear actually received — 180 days in prison — is consistent with either a misdemeanor or a felony. Given the wholly inconclusive state of the record before the district court, Sun Bear’s conviction for attempted escape cannot be treated as a felony for purposes of the career offender enhancement.
The issues surrounding this conviction were not well presented at Sun Bear’s sentencing hearing. The attorneys who handled the case below (both different lawyers than those who argued the appeal) did not inform the district court about Nebraska’s criminal classification scheme. As a result, the district court was led to believe, erroneously, that Sun Bear’s attempted escape was punishable as if it were a completed offense. Because the district court was not presented with this crucial aspect of Nebraska law, its ruling may be subject to review only for plain error. See Robinson, 20 F.3d at 323. Even under the de novo standard we must affirm Sun Bear’s sentence. As we explain below, Sun Bear’s two remaining convictions were felony crimes of violence and thus support the district court’s determination that Sun Bear is a career offender.
B. Attempted Theft
On November 10, 1997, Sun Bear pled guilty to attempted theft of an operable vehicle in Cedar City, Utah, and was sentenced to prison for zero to five years. This offense was a violation of section 76-6^404 of the Utah Code and an undisputed felony. We need only determine whether it was a crime of violence.
The guidelines divide “crimes of violence” into two categories. An offense falls into the first category if it “has as an element the use, attempted use, or threatened use of physical force against the person of another.” U.S.S.G. § 4B1.2(a)(l). An offense falls into the second category if it “is burglary of a dwelling, arson, or extortion, involves use of explosives, or otherwise involves conduct that presents a serious potential risk of physical injury to another.” U.S.S.G. § 4B1.2(a)(2). The commentary to section 4B1.2 lists several additional offenses as crimes of violence, but does not list vehicle theft. U.S.S.G. § 4B1.2, cmt. n.l. However, as the commentary explains, an unlisted offense is a crime of violence when the conduct with which the defendant has expressly been charged, “by its nature, presented a serious potential risk of physical injury to another.” Id.
Although we have never addressed whether vehicle theft is a crime of violence, two other courts of appeal have considered the issue. The Fifth Circuit, sitting en banc, recently held that a defendant’s conviction for motor vehicle theft in Texas was not a crime of violence. United States v. Charles, 301 F.3d 309, 313-14 (5th Cir.2002) (en banc). After examining the indictment, which charged the defendant with appropriating and operating an automobile without the owner’s consent, the Fifth Circuit found a risk of injury to property, but no serious potential risk of injury to another person. Id. Similarly, the Sixth Circuit has held that an aggravated motor vehicle theft, as defined by Colorado law, may not be a crime of violence. United States v. Crowell, 997 F.2d 146, 149 (6th Cir.1993).
Simple theft of a motor vehicle does not have injury or potential injury to others as one of its essential elements. However, in evaluating the risks entailed by a crime, we must also examine the likely consequences of its commission. See United States v. Griffith, 301 F.3d 880, 885 (8th Cir.2002) (holding that theft from a person is a crime of violence). And we must examine these likely consequences in the light of common sense. See Charles, 301 F.3d at 315 (Barksdale, J., dissenting).
Our Eighth Circuit precedents reflect this common sense approach to determining whether a given offense is a crime of violence. For example, we have held that burglary of a commercial building is a crime of violence under the guidelines. See United States v. Peltier, 276 F.3d 1003, 1006 (8th Cir.2002). In reaching this conclusion, we relied on United States v. Solomon, 998 F.2d 587, 590 (8th Cir.1993), a case decided under 18 U.S.C. § 924(e)(2)(B), which held that such a burglary “imposes a serious risk of harm to occupants, returning occupants, or interested passersby.” See United States v. Hascall, 76 F.3d 902, 904 (8th Cir.1996). In addition, we have held that “every escape, even a so-called ‘walkaway’ escape,” “is a crime of violence.” Nation, 243 F.3d at 472. The “variety of supercharged emotions” an escapee is likely to experience, including the fear of being captured, have led us to conclude that every escape is “a powder keg” with “the serious potential” to “explode into violence.” Id. (citing United States v. Gosling, 39 F.3d 1140, 1142 (10th Cir.1994)).
Theft of a vehicle presents a likelihood of confrontation as great, if not greater, than burglary of commercial property, and it adds many of the dangerous elements of escape. The crime begins when a thief enters and appropriates a vehicle, a time when he is likely to encounter a returning driver or passenger, a passerby, or a police officer, any of whom may be intent on stopping the crime in progress. As we observed in Solomon, an encounter between the thief and such a person carries a serious risk of violent confrontation. See Solomon, 998 F.2d at 589. Once the thief drives away with the vehicle, he is unlawfully in possession of a potentially deadly or dangerous weapon. See United States v. Yates, 304 F.3d 818, 823 (8th Cir.2002). While he is absconding in the vehicle, with which he will probably be unfamiliar, the thief may be pursued or perceive a threat of pursuit. Under the stress and urgency which will naturally attend his situation, the thief will likely drive recklessly and turn any pursuit into a high-speed chase with the potential for serious harm to police or innocent bystanders. Under the precedents in our Circuit, these serious potential risks compel a holding that the theft or attempted theft of an operable vehicle is a crime of violence under section 4B1.2 of the guidelines.
The Supreme Court’s decision in Taylor v. United States, 495 U.S. 575, 110 S.Ct. 2143, 109 L.Ed.2d 607 (1990), does not change our analysis. In Taylor, the Court was interpreting 18 U.S.C. § 924(e)(2)(B), a statute with language almost identical to U.S.S.G. § 4B1.2. In so doing, the Court reasoned that the term “burglary” in 18 U.S.C. § 924(e) does not include crimes which involve breaking into an automobile. See Taylor, 495 U.S. at 599, 602, 110 S.Ct. 2143. The decision in Taylor, however, left the government “free to argue that any offense — including offenses similar to generic burglary — should count toward enhancement as one that ‘otherwise involves conduct that presents a serious potential risk of physical injury to another’ under § 924(e)(2)(B)(ii).” Id. at 600 n. 9, 110 S.Ct. 2143. Today we decide that vehicle theft meets the similar definition in section 4B1.2.
C. Attempted Burglary
On January 6, 1995, Sun Bear pled guilty to the attempted burglary in Gordon County, Nebraska, in violation of section 28-507 of the Nebraska Revised Statutes. There is no dispute that this offense was a felony. Although the building Sun Bear attempted to enter was a laundry and not a residence, burglary of commercial property is a crime of violence in this Circuit. Peltier, 276 F.3d at 1006; Hascall, 76 F.3d at 906. Sun Bear invites us to reconsider this rule, but we cannot overrule the decision of a prior panel. Peltier, 276 F.3d at 1006. His conviction for attempted burglary thus qualifies as a crime of violence.
III. CONCLUSION
Two of the three convictions the district court used to enhance Sun Bear’s sentence — the attempted theft of a vehicle in Cedar City, Utah, and the attempted burglary in Gordon County, Nebraska — are crimes of violence under U.S.S.G. § 4B1.2. With these two convictions in his past, Sun Bear qualifies as a career offender under U.S.S.G. § 4B1.1. Accordingly, the judgment of the district court is affirmed.
MELLOY, Circuit Judge,
dissenting.
I agree with the majority’s treatment of Sun Bear’s prior convictions for attempted escape and attempted burglary of a commercial building. I disagree, however, with the majority’s conclusion that Sun Bear’s prior conviction for attempted auto theft is a crime of violence under U.S.S.G. § 4B1.2. Accordingly, I would reverse the district court and find the government failed to prove Sun Bear should be sentenced as a career offender.
A “crime of violence” is defined in U.S.S.G. § 4B1.2 as:
(a) ... any offense under federal or state law, punishable by imprisonment for a term exceeding one year, that—
(1) has as an element the use, attempted use, or threatened use of physical force against the person of another, or
(2) is burglary of a dwelling, arson, or extortion, involves use of explosives, or otherwise involves conduct that presents a serious potential risk of physical injury to another.
U.S.S.G. § 4B1.2. The Utah statute under which Sun Bear was convicted does not require the use of physical force for a conviction. Compare Utah Code Ann. §§ 76-6-404 (theft statute) with Utah Code Ann. § 76-6-301(1) (robbery statute, which requires force). Thus, U.S.S.G. § 4B1.2(a)(l) is not implicated. At issue is whether Sun Bear’s attempted theft of an operable vehicle falls within U.S.S.G. § 4B1.2(a)(2) as a crime “otherwise in-volv[ing] conduct that presents a serious potential risk of physical injury to another.” See also U.S.S.G. § 4B1.2, cmt. n.l (“[Ojffenses are included as ‘crimes of violence’ if ... the conduct set forth (i.e., expressly charged) in the count of which the defendant was convieted[,] ... by its nature, presented a serious potential risk of physical injury to another.”).
In Utah, attempted theft of an operable motor vehicle is a third degree felony punishable by up to five years imprisonment. Utah Code Ann. §§ 76-6-404, 76-6-412(l)(a)(ii), 76-4-102, 76-3-203(3). The Utah theft statute provides that “[a] person commits theft if he obtains or exercises unauthorized control over the property of another with a purpose to deprive him thereof.” Utah Code Ann. § 76-6-404. Theft of an operable motor vehicle is not a separate crime under Utah law. Rather, it is a category that is used to define the penalty. Utah Code Ann. § 76-6-412(l)(a)(ii). The district court relied solely on these statutes when it determined that Sun Bear’s attempted theft offense qualified as a crime of violence for purposes of U.S.S.G. § 4B1.1. Other information, such as the charge or indictment, the judgment, or police report, was not provided to the district court.
In support of the district court, the Government argues, and the majority agrees, that when a defendant attempts to steal an operable motor vehicle the risk of physical injury to others is the same as in the case of escape or burglary. See United States v. Nation, 243 F.3d 467, 472 (8th Cir.2001) (concluding that all escapes present a potential risk of injury to others such that they should be classified as crimes of violence); United States v. Hascall, 76 F.3d 902, 904 (8th Cir.1996) (finding that second degree burglary of a commercial building is a crime of violence because of the serious potential risk of physical injury to others). Based on circuit precedent, the majority adopts a rule which provides that attempted theft of an operable motor vehicle is always a crime of violence because the conduct underlying the offense presents a serious potential risk of physical injury to another. I do not agree that our prior holdings mandate this conclusion and I believe such a rule extends this court’s reasoning in Nation and Hascall too far.
While comparison in this area is a speculative enterprise, I do not believe that attempted auto theft presents the same risk of injury to others as those offenses we have previously designated crimes of violence. See United States v. Griffith, 301 F.3d 880, 885 (8th Cir.2002) (concluding that the offense of theft from a person is a “violent felony” which “involves conduct that presents a serious risk that a person may be physically injured”); Nation, 243 F.3d at 472 (stating that all escapes should be classified as crimes of violence); Hascall, 76 F.3d at 904 (characterizing burglary of a commercial building as a crime of violence). In a commercial burglary there is always a risk that, unknown to the burglar, the building is occupied. Such surprise is unlikely in an attempted auto theft and, if present, would typically result in a more serious charge. Cf. United States v. Jernigan, 257 F.3d 865, 866-67 (8th Cir.2001) (holding that negligent homicide conviction for operating a vehicle while intoxicated or under the influence constitutes a crime of violence). The risks attendant to attempted auto theft are also distinguishable from those associated with theft from a person which, by its nature, requires close proximity to a victim. See Griffith, 301 F.3d at 885 (quoting with approval the Sixth Circuit’s observation that “[a]ny person falling victim to a crime involving such an invasion of personal space would likely resist or defend in a manner that could lead to immediate violence” (citation omitted)). And finally, attempted auto theft does not necessarily implicate law enforcement response in the same way that attempted escape does.
All felons fear apprehension in the midst of, and following, their criminal conduct, and all may act recklessly when attempting to evade capture. But not all felonies may be read into the “otherwise” clause of section 4B1.2(a)(2). Significantly, even felonies which present a “potential risk” of injury to others are expressly excluded from the definition. Instead, only those which present a “serious potential risk” warrant designation as crimes of violence for career offender purposes. Under Utah’s criminal code, scenarios involving theft but not violence are unlimited. See, e.g., State v. Larocco, 794 P.2d 460 (Utah 1990) (defendant convicted under Utah Code Ann. § 76-6-404 where a car salesman allowed the defendant to take a car for an unaccompanied test drive and the defendant failed to return the car or pay for it); State v. Seekford, 638 P.2d 525 (Utah 1981) (defendant convicted under Utah’s general theft statute where he failed to return rental car). Given this, I do not believe it should be categorically held that every attempted auto theft presents the serious potential risk mandated by U.S.S.G. § 4B1.2(a)(2).
In a recent decision, a majority of the Fifth Circuit held that “simple motor vehicle theft,” by its nature, does not involve conduct that presents a serious potential risk of physical injury to another. United States v. Charles, 301 F.3d 309, 312-14 (5th Cir.2002) (en banc). The facts of Charles are nearly identical to those at issue here. The defendant appealed the district court’s determination that theft of a vehicle is a crime of violence under § 4B1.2(a)(2). Id. at 311. The general statute under which the defendant was convicted defined theft as “unlawfully appropriating] property with the intent to deprive the owner of property.” Id. at 313 (citing Tex. Pen.Code § 31.03(a)). In addition, the defendant’s indictment from his motor vehicle theft offense was made available. Id.
Before making a determination as to the theft offense, the Fifth Circuit held:
Based on the language in § 4B1.2(a)(2) and in Application Note 1, ... a crime is a crime of violence under § 4B1.2(a)(2) only if, from the face of the indictment, the crime charged or the conduct charged presents a serious potential risk of injury to a person. Injury to another person need not be a certain result, but it must be clear from the indictment that the crime itself or the conduct specifically charged posed this serious potential risk.
Id. at 314. The Fifth Circuit then reviewed the defendant’s prior theft offense. It concluded that although the defendant’s conduct presented a risk of injury to property, there was “no suggestion in the indictment that [the defendant’s] conduct in stealing the car presented a serious potential risk of physical injury to another person.” Id. Thus, it found that the defendant’s prior theft offense was not a crime of violence. Id. In so finding, the Fifth Circuit offered the following explanation: “Application Note 1, by requiring that other crimes must ‘by [their] nature’ present a ‘serious potential risk of physical injury to another,’ calls for a categorical inclusion or exclusion of crimes and/or conduct. Simple motor vehicle theft does not, by its nature, present this risk.” Id.
I agree with the Fifth Circuit’s reasoning in Charles and would hold that attempted theft of an operable motor vehicle is not a crime of violence. See also United States v. Crowell, 997 F.2d 146, 149 (6th Cir.1993) (holding that aggravated motor vehicle theft, as defined by Colorado law, is not, per se, a crime of violence).
For these reasons, I respectfully dissent.
. The Honorable Charles B. Kornmann, United States District Judge for the District of South Dakota.
|
import {ADD_ADDITION_LIST, ADDITION_LIST} from "../const";
const INITIAL_STATE = {
additionList: []
};
export default (state = INITIAL_STATE, action) => {
switch (action.type) {
case ADDITION_LIST:
return {
...state,
additionList: action.payload
};
case ADD_ADDITION_LIST:
return {
...state,
additionList: [...state.additionList, ...action.payload]
};
default:
return state;
}
}
|
For loop not reading the entire file
I am trying to read a file and I am printing the content out in alphabetical order. it is only reading 6 items from the file and no more. I am not asking someone to do it for me , if someone can just guide me in the direction of what I am doing wrong here is my code so far.
infile = open("unsorted_fruits.txt", "r")
outfile=open("sorted_fruits.txt","w")
fruit=infile.read(50).split()
#outfile.write(fruit)
fruit.sort()
for numbers in range(len(fruit)):
print(fruit[numbers])
infile.close()
outfile.close()
You're only reading 50 bytes...
thank you so much that was it.
While we're at it, for i in range(len(fruit)): is an anti-pattern from recidivist C programmers. Just iterate directly instead of generating indices and indexing: for afruit in fruit: print(afruit). It's faster (indexing is surprisingly costly compared to direct iteration) and self-documenting (no anonymous i names, you're naming the item being populated on each loop).
Ahh ok I see, it makes sense and it works. So it is better to do it that way every time? I am not sure I undertand why afruit prints the items
Try .read() to set fruit to the entire file split.
Also, try using context managers so you don't have to call close() by yourself:
with open("unsorted_fruits.txt", "r") as infile:
#... do your stuff
#close will be called automatically
If you're concerned about massive files, then consider other questions that read large files in batches: Lazy Method for Reading Big File in Python?
In the code sample you provided outfile is not used (commented out) but you can use nested context managers.
Try describing a better approach using a buffer, to make sure we're able to process bigger files.
|
Ure a Liability/Confessionals
Day 7
"zambezi"
"zambezi"
"zambezi"
"zambezi"
"zambezi"
Plus being immune it’ll give me time to figure out who has who. I already know Becky has me and I told her who I have, and I do trust her with that information for now. Ben has told me he has Augusto and he hasn’t told anyone so I felt like building trust with him by saying I wouldn’t tell anyone. Funnily enough that was a cover up for me accidently telling him Jake was my target, which I had to try cover up by making a deal that we wouldn’t tell anyone our targets and it’s great that he has Augusto as a target because Me, Augusto and Ben have an alliance so Ben therefore has a incentive to keep his promise.
"zambezi"
ALSO target developments
"hwadze"
- I have no idea where I am with and what with this bunch on tribe lol
"hwadze"
"zambezi"
Day 8
"hwadze"
- are u fucking kidding my kiley and glo not evne 100k.. god ure a liability.
"zambezi"
"hwadze"
- I've decided this is the season of Drew's problems magically disappearing.
|
单体SpringBoot引入Knife4j之后可以正常访问,但是当该单体应用被其他SpringBoot通过Maven方式引入之后,Knife4j无法正常展示
Please take the time to search the repository, if your question has already been asked or answered.
[ ] What version of the library are you using? Is it the latest version? The latest released version is
What kind of issue is this?
[ ] Question. Is this a question about how to do a certain thing?
[ ] Bug report. If you’ve found a bug, spend the time to write a failing test. Bugs with tests or
steps to reproduce get fixed faster. Here’s an example: https://gist.github.com/swankjesse/6608b4713ad80988cdc9
[ ] spring xml/java config that is relevant
[ ] springfox specific configuration if it makes sense
[ ] include any output you've received; logs, json snippets etc.; and what the expected output should be
[ ] if you have a repo that demonstrates the issue for bonus points! See this example
[ ] Feature Request. Start by telling us what problem you’re trying to solve. Often a solution
already exists! Don’t send pull requests to implement new features without first getting our
support. Sometimes we leave features out on purpose to keep the project small.
Please do consider starring this repository if you do like this project and find it useful.
我估计中文开发者可能看不懂
我不知道关于knife4j,请您描述一下您的问题,以便我可以帮助您?
|
<?php
include_once "../librari/inc.koneksidb.php";
# Baca, jika ada variabel URL
if($_GET) {
// Perintah Hapus data
$sqlHapus = "DELETE FROM kelas WHERE kd_kelas='".$_GET['Kode']."'";
mysql_query($sqlHapus, $koneksiDbs) or die ("Query hapus salah : ".mysql_error());
// Jika berhasil dihapus, pesan ini ditampilkan
echo "Data Kelas berhasil dihapus";
// Daftar jurusan dipanggil kembali setelah berhasil menghapus
include "kelasTampil.php";
}
else {
// Jika tidak ada variabel URL, pesan ini ditampilkan
echo "Tidak ada kelas yang dihapus";
}
?>
|
<?php
// ------------> 最原生的 CURD,无关联其他数据。
// hook model_modlog_start.php
function modlog__create($arr) {
// hook model_modlog__create_start.php
$r = db_create('modlog', $arr);
// hook model_modlog__create_end.php
return $r;
}
function modlog__update($logid, $arr) {
// hook model_modlog__update_start.php
$r = db_update('modlog', array('logid'=>$logid), $arr);
// hook model_modlog__update_end.php
return $r;
}
function modlog__read($logid) {
// hook model_modlog__read_start.php
$modlog = db_find_one('modlog', array('logid'=>$logid));
// hook model_modlog__read_end.php
return $modlog;
}
function modlog__delete($logid) {
// hook model_modlog__delete_start.php
$r = db_delete('modlog', array('logid'=>$logid));
// hook model_modlog__delete_end.php
return $r;
}
function modlog__find($cond = array(), $orderby = array(), $page = 1, $pagesize = 20) {
// hook model_modlog__find_start.php
$modloglist = db_find('modlog', $cond, $orderby, $page, $pagesize);
// hook model_modlog__find_end.php
return $modloglist;
}
// ------------> 关联 CURD,主要是强相关的数据,比如缓存。弱相关的大量数据需要另外处理。
function modlog_create($arr) {
// hook model_modlog_create_start.php
$r = modlog__create($arr);
// hook model_modlog_create_end.php
return $r;
}
function modlog_update($logid, $arr) {
// hook model_modlog_update_start.php
$r = modlog__update($logid, $arr);
// hook model_modlog_update_end.php
return $r;
}
function modlog_read($logid) {
// hook model_modlog_read_start.php
$modlog = modlog__read($logid);
$modlog AND modlog_format($modlog);
// hook model_modlog_read_end.php
return $modlog;
}
function modlog_delete($logid) {
// hook model_modlog_delete_start.php
$r = modlog__delete($logid);
// hook model_modlog_delete_end.php
return $r;
}
function modlog_find($cond = array(), $orderby = array(), $page = 1, $pagesize = 20) {
// hook model_modlog_find_start.php
$modloglist = modlog__find($cond, $orderby, $page, $pagesize);
if($modloglist) foreach ($modloglist as &$modlog) modlog_format($modlog);
// hook model_modlog_find_end.php
return $modloglist;
}
// ----------------> 其他方法
function modlog_format(&$modlog) {
// hook model_modlog_format_start.php
global $conf;
$modlog['create_date_fmt'] = date('Y-n-j', $modlog['create_date']);
// hook model_modlog_format_end.php
}
function modlog_count($cond = array()) {
// hook model_modlog_count_start.php
$n = db_count('modlog', $cond);
// hook model_modlog_count_end.php
return $n;
}
function modlog_maxid() {
// hook model_modlog_maxid_start.php
$n = db_maxid('modlog', 'logid');
// hook model_modlog_maxid_end.php
return $n;
}
// hook model_modlog_end.php
?>
|
Board Thread:General Discussion/@comment-24652012-20160109183719/@comment-33154547-20160117104822
Stars, I... I feel you should go back to your original Kig-Yar profile pic.
If you need it, it's always on your "Lord of the Stars" page :)
|
Metal oxide
ABSTRACT
Provided is a piezoelectric material excellent in piezoelectricity. The piezoelectric material includes a perovskite-type complex oxide represented by the following General Formula (1).
A (Zn x Ti 1-x) ) y M (1-y) O 3 (1)
wherein A represents at least one kind of element containing at least a Bi element and selected from a trivalent metal element; M represents at least one kind of element of Fe, Al, Sc, Mn, Y, Ga, and Yb; x represents a numerical value satisfying 0.4≦x≦0.6; and y represents a numerical value satisfying 0.1≦y≦0.9.
BACKGROUND OF THE INVENTION
1. Field of the Invention
The present invention relates to a metal oxide having piezoelectricity. In particular, the present invention relates to a novel piezoelectric material made of a lead-free metal oxide.
2. Description of the Related Art
As piezoelectric ceramics, ABO₃-type ceramics such as lead zirconate titanate (hereinafter, referred to as “PZT”) is generally used.
However, PZT contains lead as an A-site element, and hence its effect on the environment is considered as a problem. Therefore, a piezoelectric material using a perovskite-type oxide containing no lead has been proposed.
For example, as a piezoelectric material made of a perovskite-type oxide containing no lead, “Chemistry of Materials” 2006, Vol. 18, No. 21, pp. 4987-4989 describes Bi(Zn_(0.5)Ti_(0.5))O₃ as a Bi-based material. Bi(Zn_(0.5)Ti_(0.5))O₃ is expected to exhibit piezoelectric performance excellent in terms of theory. However, it is difficult to polarize Bi(Zn_(0.5)Ti_(0.5))O₃ due to a high Curie temperature, and hence the piezoelectric performance thereof has not been clarified.
Further, a piezoelectric material containing BiFeO₃ as a main component has been proposed. For example, Japanese Patent Application Laid-Open No. 2007-287739 discloses a BiFeO₃-based material containing La in an A-site. BiFeO₃ is a satisfactory ferroelectric material, and reportedly exhibits a high remnant polarization amount at a low temperature. However, BiFeO₃ has a problem in that the displacement range cannot be kept large under an electric field application due to its low insulation performance.
Further, “Chemistry of Materials” 2007, Vol. 19, No. 26, pp. 6385-6390 discloses a BiAlO₃ piezoelectric material obtained by a high-pressure synthesis method. However, the piezoelectricity of BiAlO₃ has not reached a practically applicable range yet.
The present invention has been achieved in order to solve the above problems, and an object thereof is to provide a Bi-based piezoelectric material excellent in performance as a piezoelectric material.
SUMMARY OF THE INVENTION
A compound to solve the above problem is a metal oxide including a perovskite-type oxide represented by the following General Formula (1):
A (Zn_(x)Ti_((1-x)))_(y)M_((1-y))O₃ (1)
wherein A represents at least one kind of element containing at least a Bi element and selected from a trivalent metal element; M represents at least one kind of element of Fe, Al, Sc, Mn, Y, Ga, and Yb; x represents a numerical value satisfying 0.4≦x≦0.6; and y represents a numerical value satisfying 0.1≦y≦0.9.
According to the present invention, a metal oxide having satisfactory piezoelectricity can be provided.
Further, the metal oxide of the present invention has no effect on the environment because the metal oxide does not use lead. Further, the metal oxide of the present invention is advantageous in terms of durability when used for a piezoelectric dev ive because the metal oxide does not use alkali metal.
BRIEF DESCRIPTION OF THE DRAWINGS
FIGURE is an X-ray diffraction chart showing crystalline states of piezoelectric materials in Examples 2 to 5 and 7 of the present invention and a metal oxide material in Comparative Example 1.
DESCRIPTION OF THE EMBODIMENTS
Hereinafter, embodiments for carrying out the present invention are described.
The present invention provides a novel piezoelectric material having satisfactory piezoelectricity and containing a Bi-based piezoelectric body excellent in performance as a piezoelectric body. Note that the piezoelectric material of the present invention may be used for various applications, such as the use for a capacitor material utilizing dielectric properties. Hereinafter, the present invention is described as a piezoelectric material, but it goes without saying that the application of the metal oxide of the present invention is not limited to a piezoelectric material.
A piezoelectric material according to the present invention is a metal oxide including a perovskite-type oxide represented by the following General Formula (1):
A (Zn_(x)Ti_((1-x)))_(y)M_((1-y))O₃ (1)
wherein A represents at least one kind of element containing at least a Bi element and selected from a trivalent metal element; M represents at least one kind of element of Fe, Al, Sc, Mn, Y, Ga, and Yb; x represents a numerical value satisfying 0.4≦x≦0.6; and y represents a numerical value satisfying 0.1≦y≦0.9.
The perovskite-type oxide is generally expressed by a chemical formula: ABO₃. In the perovskite-type oxide, elements A and B in the shape of an ion occupy particular positions of a unit crystal lattice called an A-site and a B-site, respectively. For example, in a unit crystal lattice of a cubic system, the A-element is positioned at a vertex of the cube and the B-element is positioned at a body-center position. An O element occupies a face-centered position as an anion of oxygen.
Metal oxide represented by the above General Formula (1) refer to a solid solution of a plurality of perovskite-type oxides represented by A(Zn_(x)Ti_((1-x)))O₃ and AMO₃. In General Formula (1), A is a metal element mainly positioned at the A-site and (Zn_(x)Ti_((1-x))) and M are elements positioned mainly at the B-site.
In General Formula (1), the number of metals is the same between the A-site and the B-side in terms of an ideal composition ratio. When the number of metals at the A-site is excessively larger or smaller than that at the B-site, excessive amounts of metals are precipitated at a crystal grain boundary and a deficient content becomes a defective site, for example, which may have an adverse effect on insulation performance. The allowable range of a molar ratio of the amount of metals at the A-site with respect to that at the B-site, i.e. A site/B site is 0.95 or more to 1.30 or less. When the amount of metals at the A-site departs from the above range, piezoelectricity as well as insulation performances are degraded remarkably.
A is formed of a trivalent metal element containing Bi as a main component. In this case, a single substance of A(Zn_(x)Ti_((1-x)))O₃ has a tetragonal structure with a large aspect ratio.
A most preferred value of x representing the ratio of Zn to Ti is 0.5. If Zn is present as a divalent cation and Ti is present as a tetravalent cation in a crystal lattice, because the balance of charge is good when x is 0.5, the insulation performance of the entire oxide is enhanced. Depending upon the B-site element and the kind of a dopant, x may be changed in a range of 0.4 to 0.6 for the purpose of enhancing insulation properties.
M is selected from any of Fe, Al, Sc, Mn, Y, Ga, and Yb in General Formula (1), or a combination thereof. More preferably, in General Formula (1), M is formed of at least one of Fe and Al, or both the elements.
The metal ion is selected as M, whereby a single substance of AMO₃ takes a non-tetragonal structure such as a rhombohedral structure or a monoclinic structure. The reason is as follows.
In general, the crystal structure of a perovskite-type oxide ABO₃ is related to a tolerance factor. The tolerance factor t is a parameter defined by the following mathematical expression (1).
t=(r _(A) +r _(O))/√{square root over (2)}(r _(B) +r _(O)) MATHEMATICAL EXPRESSION (1)
In the expression, r_(A), r_(B), and r_(O) represent ion radii of A, B, and O. Regarding a value of each ion radius, several kinds of values have already been obtained for almost all the elements. In the case where A and B are composed of a plurality of elements, an averaged ion radius is obtained using an ion radius of each constituent element and its composition ratio, and the value is defined as r_(A) or r_(B).
In the case where A is Bi, the crystal structure of ABO₃ and the tolerant factor t have a close relationship. Herein, if the above element of M, i.e., any of Fe, Al, Sc, Mn, Y, Ga, and Yb, or a combination thereof is selected as B, the value of t is less than 1.006. And a rhombohedral structure, and then, a monoclinic structure become the most stable structures. In the case where M is Fe or Al, in particular, the valence of ions is stable and the insulation performances are high, and hence a more stable rhombohedral structure is obtained.
A(Zn_(x)Ti_((1-x)))O₃ that is a tetragonal structure individually and AMO₃ that is a non-tetragonal structure are formed into a solid solution, whereby the piezoelectric effect of the solid solution with respect to an external electric field increases. At this time, when the range of y representing a solid solution ratio between both the structures is 0.1≦y≦0.9, better than the piezoelectric performance of a single substance of A(Zn_(x)Ti_((1-x)))O₃ or AMO₃ is obtained. When the value of y is smaller than 0.1, the influence of the properties of an AMO₃ becomes large, with the result that a dielectric loss may be increased. On the contrary, when the value of y is smaller than 0.9, the influence of properties of an A(Zn_(x)Ti_((1-x)))O₃ becomes larger, with the result that a sintering density may be decreased.
Further, when the range of y is 0.2≦y≦0.65, which is close to a morphotropic phase boundary between a tetragonal structure and a non-tetragonal structure, a large piezoelectric effect can be expected.
The reason why the above range of y is a preferable range is that a morphotropic phase boundary is present in such a range. This is also shown by the result of electronic state calculation called first principles calculation. Hereinafter, the outline and result of the electronic state calculation are described.
The electronic state calculation including structure optimization using a tetragonal structure and a rhombohedral structure as an initial structure is performed with respect to BiFeO₃ and Bi(Zn_(0.5)Ti_(0.5))O₃, and each of the differences in entire energy obtained from the electronic state calculation is obtained. When the difference in entire energy is defined as the function of y in Bi(Zn_(0.5)Ti_(0.5))_(y)Fe_((1-y))O₃, the differences in entire energy of BiFeO₃ and Bi(Zn_(0.5)Ti_(0.5))O₃ correspond to the differences in entire energy of y=0 and y=1, respectively. Then, y, which is obtained when both of them are connected with a straight line and the difference in entire energy becomes zero, is expected as y at which a morphotropic phase boundary appears.
According to the result of the electronic state calculation, the value of a difference obtained by subtracting the entire energy of the rhombohedral structure from the entire energy of the tetragonal structure of BiFeO₃ was 0.261 eV/unit lattice. Similarly, the difference in entire energy of Bi(Zn_(0.5)Ti_(0.5))O₃ was −0.28 eV/unit lattice. It was found from the above that the value of y, when both the metal oxides were mixed and the difference in entire energy became zero, was 0.48.
The result of the above electronic state calculation shows that y in the vicinity of 0.48, for example, 0.2≦y≦0.65, is preferred in a bulk solid of the present invention.
It is preferred that A in General Formula (1) contain only a Bi element, or a Bi element and at least one element selected from trivalent lanthanoid.
A is made of only a trivalent Bi-based metal element, whereby a perovskite skeleton composed of an A-site element and an O element becomes stable electrically.
When A is made of only a Bi element, the symmetry of a perovskite skeleton composed of an A-site element and an O element increases, whereby the stability of a piezoelectric material with respect to the external stimulus is enhanced. Further, the effects of raising the Curie temperature of the piezoelectric material and enlarging a fluctuation range of internal polarization due to the strong bonding peculiar to the Bi element are obtained.
In the case where the piezoelectric material is subjected to polarization treatment from outside, it is preferred that A also contains a trivalent lanthanoide element for the purpose of adjusting the Curie temperature. Further, because A contains a lanthanoide element, the piezoelectric material of the present invention can be easily synthesized at an ambient pressure.
Examples of the lanthanoide elements that can become trivalent include La, Ce, Pr, Tm, and Yb. Of those, La is most preferred out of the lanthanoide elements to be contained in A, and an La element is excellent in a solid solubility into other components.
When A contains at least Bi element and a lanthanoide element, for example, a La element, the ratio of Bi occupying A is preferably 70 mol % or more to 99.9 mol % or less, and in particular, 90 mol % or more to 99.9 mol % or less. If the ratio of Bi occupying A is less than 70 mol %, the insulation performances of the piezoelectric material of the present invention may be degraded. On the contrary, when the ratio of Bi occupying A exceeds 99.9 mol %, the performance almost equal to that in the case where a lanthanoide element is not added is obtained. Further, when the lanthanoide is added, in addition to the effect of adjusting the Curie temperature, there is an advantage in that a system that is synthesized only by high-pressure synthesis and in a thin film system with a stress applied thereto can be synthesized at an ambient pressure. Even in this case, the above addition amounts are preferred in terms of the effect.
It should be noted that, in the present invention, mol % refers to the amount of substance of a specified element with respect to the total amount of substance occupying a specified site by a percentage.
The Curie temperature desired in the piezoelectric material of the present invention is 200° C. or higher to lower than 600° C., and more preferably 200° C. or higher to 500° C. or lower. If the Curie temperature is equal to or higher than 200° C., when the piezoelectric material is used in a device, a material with less fluctuation in characteristics depending upon temperature can be provided. Further, if the Curie temperature is equal to or lower than 600° C., a material that can be polarized easily during the formation of a device can be provided.
Generally, as the ratio of the lanthanoid element contained in A is larger, the Curie temperature tends to decrease.
Further, it is preferred that M contain an Mn element in an amount of 0.1 mol % or more to 5 mol % or less, and in particular, 0.1 mol % or more to 1 mol % or less.
When the piezoelectric material of the present invention contains an appropriate amount of Mn, the insulation performances of the piezoelectric material are enhanced. A highly insulative piezoelectric material has an advantage in that it can withstand polarization treatment under a high voltage, and is also excellent in conversion efficiency between electric energy and mechanical energy.
Further, when the piezoelectric material of the present invention contains an appropriate amount of Mn, a piezoelectric material may be polarized by a lower voltage.
A material to be contained in the piezoelectric material of the present invention, Mn may be bivalent Mn or quadrivalent Mn.
The same effects can be expected when an Mn element is contained in a crystal grain boundary as an oxide, as well as when an Mn element is contained in the B-site of the perovskite structure.
When the content of Mn contained in M is smaller than 0.1 mol %, the enhancement range of the insulation performances decrease. On the contrary, when the content of Mn contained in the B-site is larger than 5 mol %, the piezoelectric effect of the piezoelectric material may be decreased.
It is desired that the piezoelectric material be a film having a thickness of 200 nm or more to 10 μm or less, and more preferably 300 nm or more to 3 μm or less and provided on a substrate.
By setting the film thickness of the piezoelectric material to be 200 nm or more to 10 μm or less, an electromechanical conversion function sufficient as a piezoelectric device is obtained and the increase in density of the piezoelectric device can be expected.
There is no particular limit to a method for stacking the film. Examples of the method include a chemical solution deposition method (CSD method, may be called sol-gel method), a sputtering method, a pulse laser deposition method (PLD method), a hydrothermal synthesis method, and an aerosol deposition method (AD method). Of those, the most preferred stack method is the chemical solution deposition method. The chemical solution deposition method is a film-formation method excellent in precise control of a metal composition.
The chemical solution deposition method in the present invention collectively refers to a film-formation method of obtaining intended metal oxides by applying a precursor solution of the intended metal oxides to a substrate, followed by heating and crystallization. Generally, the chemical solution deposition method includes film-formation methods called a CSD method, a sol-gel method, and an organic metal decomposition method.
Examples of a metal compound to be contained in the precursor solution include a hydrolysable or pyrolyzable organic metal compound. Typical examples thereof include a metal alkoxide of metal contained in an intended material, an organic acid salt, and a metal complex such as a β-diketone complex.
Although there is no particular limit to a material for a substrate on which a film-shaped piezoelectric material is provided, a material that is not deformed or melted during a sintering step conducted usually at 800° C. or lower is preferred. For example, a single crystal substrate made of magnesium oxide, strontium titanate, or the like, a ceramic substrate made of zirconia, alumina, silica, or the like, a semiconductor substrate made of silicon (Si), tungsten (W), or the like, or a heat-resistant stainless (SUS) substrate is used preferably. These materials may be combined in a plurality of kinds or may be laminated to form a multi-layered configuration. Conductive metal may be doped in a substrate or stacked on the surface of a substrate for the purpose of allowing the conductive metal to additionally function as one of the electrodes of the piezoelectric device.
Of these substrates, it is preferred that a substrate used in the piezoelectric material of the present invention be a single crystal substrate selectively (001) oriented or (111) oriented.
By using a single crystal substrate with particular orientation, a film-shaped piezoelectric material provided on the surface of the substrate can also be oriented strongly in the same orientation. When the piezoelectric material has (001) orientation or (111) orientation, the moment of polarization is aligned in a direction perpendicular to the film, and hence the enhancement of the piezoelectric effect can be expected.
In the film-shaped piezoelectric material, the range of y is preferably 0.2≦y≦0.35. In a composition range in which y is smaller than 0.2, the properties of ABO₃ that has a non-tetragonal structure become prevalent. On the contrary, in a composition range in which y is larger than 0.35, the properties of A(Zn_(x)Ti_((1-x)))O₃ become prevalent. When the range of y is 0.2≦y≦0.35, the effect of a morphotropic phase boundary of ABO₃ and A(Zn_(x)Ti_((1-x)))O₃ is exhibited, with the result that piezoelectricity and di electricity increase. It can be confirmed from the mixing of a tetragonal structure and a non-tetragonal structure in X-ray diffraction measurement or the like that the composition range is in the vicinity of the morphotropic phase boundary.
It is preferred that the piezoelectric material is a bulk solid, and the range of y is 0.35≦y≦0.65.
In the present invention, the term “bulk solid” is used for expressing the shape of the piezoelectric material, and refers to a massive substance in which powder is aggregated. The specific surface area with respect to a volume and a weight of the bulk body is smaller than that of the film-shaped piezoelectric material. The piezoelectric material of a lamination type in which a plurality of layers of the piezoelectric material and an internal electrode are laminated is also dealt with as the bulk solid in the present invention.
In the case where the piezoelectric material of the present invention is a bulk solid, in the composition range in which y is smaller than 0.35, the properties of ABO₃ that has a non-tetragonal structure become dominant. Conversely, in the composition range in which y is larger than 0.65, the properties of A(Zn_(x)Ti_((1-x)))O₃ become dominant. On the contrary, when the range of y is 0.35≦y≦0.65, the effect of a morphotropic phase boundary of ABO₃ and A(Zn_(x)Ti_((1-x)))O₃ is exhibited, with the result that piezoelectricity and di electricity increase. It can be confirmed from the mixing of a tetragonal structure and a non-tetragonal structure in X-ray diffraction measurement or the like that the composition range is in the vicinity of the morphotropic phase boundary.
The preferred range of y particularly varies between when the piezoelectric material of the present invention is a bulk solid and when the piezoelectric material is a thin film. This may be caused by the influence of a stress present inside a thin film for the adhesion to a substrate.
The method of producing the bulk solid is not particularly limited. For example, a general method of producing ceramics, in which material powder is sintered at an ambient pressure, can be adopted.
In the case where A in General Formula (1) is composed of only a Bi element, the crystallization may become insufficient during sintering at an ambient pressure. In this case, if another kind of energy as used in a high-pressure synthesis method of sintering material powder under pressure is adopted, an intended substance is obtained. In addition, a conductive heating method, a micro wave sintering method, a millimeter wave sintering method, and the like can be used.
The piezoelectric material of the present invention can be used in devices such as an ultrasonic vibrator, a piezoelectric actuator, a piezoelectric sensor, and a ferroelectric memory.
Hereinafter, the present invention is described more specifically by way of examples. Of course, it should be noted that the present invention is not limited to the following examples. Tables 1 and 2 show the presence and absence of ferro electricity, a Curie temperature, a dielectric constant, and a dielectric loss together with the compositions in the respective examples.
In the following, the piezoelectric materials of the present invention as a bulk solid (Examples 1 to 13) are described in the successive order.
EXAMPLES 1 TO 11
As oxide materials, Bi₂O₃, ZnO, TiO₂, Fe₂O₃, and Al₂O₃ were weighed, mixed, and crushed in the same molar ratios as those of intended compositions shown in Table 1. The powder thus produced was sealed in a capsule made of platinum, and the capsule was pressurized to 6 GPa by a cubic anvil-type high-pressure generating apparatus. The capsule was heated to 1,100° C. under pressure, and held at this temperature for 30 minutes. After that, the capsule was quenched and the pressure was removed. The samples were taken out and piezoelectric materials of the present invention were obtained.
According to the X-ray diffraction measurement, it was found that any of the piezoelectric materials had a perovskite structure. Further, the crystal system thereof was any of a tetragonal system and a rhombohedral system, or a mixed system. FIG. 1 shows the results obtained by performing the X-ray diffraction measurement in a 2θ/θ direction of the piezoelectric materials in Examples 2, 3, 4, 5, and 7.
The surface of each piezoelectric material was polished to form a disk shape with a diameter of 2.5 mm and a thickness of 0.5 mm. Electrodes were formed on both surfaces of the disk by ion coater of gold and used for electric measurement. Table 1 shows the results together with the compositions.
Regarding the ferro electricity shown in Table 1, a symbol o is described in the case where a P-E hysteresis measurement was conducted in a temperature range of −60° C. to 30° C. and such a hysteresis loop particular to a ferro dielectric material that a self-polarization was inverted by changing the magnitude of an external electric field to be positive or negative was observed. A symbol x is described in the case where a hysteresis loop as a ferroelectric material was not obtained. A symbol - is described in the case where a sample for measurement was not obtained.
The Curie temperature was measured by an X-ray diffraction apparatus equipped with a heating/cooling unit and an impedance analyzer. The Curie temperature described in Table 1 was specified by the temperature at which a crystal phase was transited or the dielectric constant showed local maximum when the X-ray diffraction measurement and dielectric constant measurement were conducted in a range of −150° C. to 600° C.
The dielectric constant and dielectric loss were measured by an impedance analyzer. As the dielectric constant and the dielectric loss described in Table 1, numerical values at 25° C. and 1 kHz were used. As the dielectric constant described in the present specification, values of relative permittivity, which are ratios with respect to a vacuum dielectric constant, are described. The symbol - is described in the case where no sample for the measurement was obtained.
When a voltage of 1 kV/mm was applied to the piezoelectric material of Example 4, and the strain of the piezoelectric material was observed with a laser-Doppler velocimeter, and the strain of 0.1% or more was confirmed. The piezoelectric material of Example 5 was also subjected to the measurement under the same conditions. As a result, a strain of 0.1% or more was observed. Regarding the piezoelectric materials of Examples 1 to 3 and Examples 6 to 11, a strain of 0.05% or more was observed by the same measurement. These strains are displacement ranges sufficient as the piezoelectric materials to be applied to piezoelectric actuators and the like.
EXAMPLES 12 AND 13
As oxide materials, Bi₂O₃, ZnO, TiO₂, Fe₂O₃, La₂O₃, and MnO were weighed, mixed, and crushed in the same molar ratios as those of intended compositions shown in Table 1. To the powder thus produced, 10 wt % of polyvinyl butyral (PVB) was added as a binder, and mixed in a mortar. The mixture was molded into a circular disk shape with a diameter of 10 mm, and calcined in an electric furnace at 700° C. for 2 hours. Then, the mixture was sintered in an electric furnace at 1,100° C. to 1,350° C. for 2 hours, whereby piezoelectric materials of the present invention were obtained.
According to the X-ray diffraction measurement, it was found that any of the piezoelectric materials had a perovskite structure. Both surfaces of these disk-shaped piezoelectric materials were polished and electrodes were provided thereon with a silver paste and used for electric measurement. Table 1 shows the results together with compositions. The Curie temperature, the dielectric constant, and the dielectric loss described in Table 1 were specified in the same way as in Example 1.
The piezoelectric strains of the piezoelectric materials of Examples 12 and 13 were obtained in the same way as in Example 4, and a strain of 0.08% or more was confirmed in any example.
Hereinafter, production examples of film-shaped piezoelectric materials in Examples 14 to 23 are described successively from production examples of precursor solutions.
EXAMPLES 14 TO 23 Production Example of Precursor Solution
As materials for a precursor solution, tri-t-amyloxybismuth(Bi(O·t-Am)₃), zinc acetate dihydrate (Zn(OAc)₂·2H₂O), tetra-n-butoxytitanium (Ti(O·n-Bu)₄), iron acetylacetonate (Fe(acac)₃), tri-sec-butoxyaluminum Al₂O₃(Al(O·sec-Bu)₄) , tri-i-propoxylanthanum(La(O·i-Pr)₃), and di-i-propoxymanganese(II) (Mn(O·i-Pr)₂) were used.
To 2-methoxyethanol as a solvent, the above materials in the same molar ratio as that of intended compositions shown in Table 2 were added in terms of metal and dissolved by stirring.
Regarding a system using zinc acetate dihydrate, equimolar mono ethanol amine was added for the purpose of aiding and promoting for the solubility of a zinc component.
2-methoxyethanol was added in an appropriate amount and hence the concentration of any solution was 0.1 mol/L, whereby coating solutions used in Examples 14 to 23 were obtained.
Production Example of Film-shaped Piezoelectric Material
As a substrate on which a thin film was formed, conductive strontium titanate single crystal substrate doped with niobium with (111) orientation was obtained.
The precursor solution corresponding to each example in Table 1 was applied to the above substrate with a spin coater (3,000 rpm). The coated layer was dried by heating at 150° C. for 1 minute with a hot plate to remove the solvent, and thereafter, the coated layer was sintered in a rapid thermal-type infrared annealing (hereinafter, referred to as RTA) furnace at 500° C. for 1 minute, whereby a first layer was formed. Then, a second layer and a third layer were repeatedly stacked on the first layer similarly to obtain a stacked film including 20 layers in total. Finally, the stacked film was sintered and crystallized by RTA at 700° C. for 5 minutes in a nitrogen atmosphere, whereby a piezoelectric material thin film with a film thickness of 400 nm±100 nm of the present invention was obtained.
According to the X-ray diffraction measurement, it was found that any of the piezoelectric materials had a perovskite structure. A platinum electrode with Φ100 μm was provided on the surface of each thin film shaped piezoelectric material by sputtering for electric measurement. Table 2 shows the results together with compositions.
The Curie temperature described in Table 2 was specified by the temperature at which a dielectric constant showed local maximum when dielectric constant measurement was conducted in a range of −150° C. to 330° C. A symbol - was described in the case where no sample for measurement was obtained.
COMPARATIVE EXAMPLES 1 TO 3
Metal oxide materials were produced for comparison with the present invention.
Metal oxides having the intended compositions shown in Table 1 were produced by a high-pressure synthesis method in the same way as in Example 1.
The composition of Comparative Example 1 was Bi(Zn_(0.5)Ti_(0.5))O₃ and was found to have a tetragonal perovskite structure from the X-ray diffraction measurement. FIG. 1 shows the results obtained by the X-ray diffraction measurement in a 2θ/θ direction of the piezoelectric material of Comparative Example 1.
Only powdery sample was obtained from the oxide material in Comparative Example 1. This may be caused by the insufficient sintering density. Therefore, ferro electricity, Curie temperature, and a dielectric constant could not be evaluated.
The composition of Comparative Example 2 was BiAlO₃, and was found to have a rhombohedral perovskite structure, which was slightly stretched in a c-axis direction from the X-ray diffraction measurement.
The composition of Comparative Example 3 was BiFeO₃, and was found to have a rhombohedral perovskite structure from the X-ray diffraction measurement.
Electrodes were formed on materials for metal oxides of Comparative Examples 2 and 3 in the same way as in Example 1 for electric measurement. Table 1 shows the results together with the compositions. The materials for metal oxides of Comparative Examples 2 and 3 had a dielectric constant smaller than that of the piezoelectric material of the examples and had a dielectric loss larger than that of the examples.
Table 1 shows that the Curie temperature of the metal oxide material of Comparative Example 2 is 600° C. or higher, which means that there is no Curie temperature in a range of 600° C. or lower. The above-mentioned “Chemistry of Materials” 2007, Vol. 19, No. 26, pp. 6385 to 6390 describe that BiAlO₃ has no Curie temperature at least in a temperature range of 520° C. or lower, and is decomposed at 550° C. or higher.
Further, Table 1 shows that the Curie temperature of the metal oxide material of Comparative Example 3 is 600° C. or higher. However, there is described that the Curie temperature of BiFeO₃ is about 830° C. (for example, Science 299, 1719 (2003)).
The piezoelectric strain of the piezoelectric materials of Comparative Examples 2 and 3 were observed in the same way as in Example 4. However, a strain of 0.01% or more that is a limit value of measurement precision was not confirmed.
COMPARATIVE EXAMPLES 4 AND 5
Metal oxide films having the intended compositions shown in Table 2 were produced by a chemical solution deposition method in the same way as in Example 11.
The intended composition of Comparative Example 4 is Bi(Zn_(0.5)Ti_(0.5))O₃. However, it was found by the X-ray diffraction measurement that an intended compound was not obtained, and the obtained substance had no perovskite structure.
The composition of Comparative Example 5 was BiFeO₃, and was found to have a rhombohedral perovskite structure from the X-ray diffraction measurement.
Electrodes were formed on the metal oxide films in the same way as in Example 11 for electric measurement. Table 2 shows the results together with the compositions.
TABLE 1 Curie Dielectric Dielectric A element M element x y Crystal System Ferro electricity temperature constant loss Example 1 Bi 100% Fe 100% 0.5 0.1 Rhombohedral ∘ 550° C. 700 7.6% Example 2 Bi 100% Fe 100% 0.5 0.2 Rhombohedral ∘ 480° C. 1,000 4.8% Example 3 Bi 100% Fe 100% 0.5 0.4 Rhombohedral ∘ 400° C. 1,200 4.5% Example 4 Bi 100% Fe 100% 0.5 0.5 Rhombohedral ∘ 380° C. 1,600 4.7% Example 5 Bi 100% Fe 100% 0.5 0.6 Rhombohedral + ∘ 360° C. 1,500 5.2% Tetragonal Example 6 Bi 100% Fe 100% 0.5 0.7 Tetragonal ∘ 500° C. 1,000 3.6% Example 7 Bi 100% Fe 100% 0.5 0.9 Tetragonal ∘ 600° C. or higher 900 2.8% Example 8 Bi 100% Al 100% 0.5 0.2 Rhombohedral ∘ 460° C. 600 3.5% Example 9 Bi 100% Al 100% 0.5 0.35 Rhombohedral ∘ 440° C. 700 3.1% Example 10 Bi 100% Al 100% 0.5 0.5 Rhombohedral + ∘ 380° C. 1,100 3.9% Tetragonal Example 11 Bi 100% Al 100% 0.5 0.8 Tetragonal ∘ 550° C. 500 2.5% Example 12 Bi 99% Fe 99% 0.5 0.65 Rhombohedral + ∘ 300° C. 1,200 5.8% La 1% Mn 1% Tetragonal Example 13 Bi 90% Fe 70% 0.5 0.35 Rhombohedral ∘ 220° C. 800 4.1% La 10% Al 30% Comparative Bi 100% — 0.5 1 Tetragonal — — — — Example 1 Comparative Bi 100% Al 100% — 0 Rhombohedral ∘ 600° C. or higher 100 10% Example 2 Comparative Bi 100% Fe 100% — 0 Rhombohedral ∘ 600° C. or higher 100 16% Example 3
TABLE 2 Dielectric Dielectric A element M element x y Crystal System Ferro electricity Curie temperature constant loss Example 14 Bi 100% Fe 100% 0.5 0.1 Rhombohedral ∘ 330° C. or higher 600 4.6% Example 15 Bi 100% Fe 100% 0.5 0.2 Rhombohedral ∘ 330° C. or higher 1,000 2.4% Example 16 Bi 100% Fe 100% 0.5 0.3 Rhombohedral + ∘ 330° C. or higher 1,400 3.1% Tetragonal Example 17 Bi 100% Fe 100% 0.5 0.5 Tetragonal ∘ 330° C. or higher 1,300 1.7% Example 18 Bi 100% Fe 100% 0.5 0.7 Tetragonal ∘ 330° C. or higher 900 1.3% Example 19 Bi 100% Fe 100% 0.5 0.9 Tetragonal ∘ 330° C. or higher 400 1.1% Example 20 Bi 100% Al 100% 0.4 0.3 Rhombohedral + ∘ 330° C. or higher 600 0.8% Tetragonal Example 21 Bi 99.9% Fe 50% 0.5 0.35 Rhombohedral + ∘ 320° C. 1,200 1.0% La 0.1% Al 50% Tetragonal Example 22 Bi 100% Fe 99.9% 0.6 0.3 Rhombohedral + ∘ 330° C. or higher 600 2.0% Mn 0.1% Tetragonal Example 23 Bi 70% Fe 95% 0.5 0.25 Rhombohedral + ∘ 200° C. 1,100 3.7% La 30% Mn 5% Tetragonal Comparative Bi 100% — 0.5 1 Non-Perovskite x — — — Example 4 Comparative Bi 100% Fe 100% — 0 Rhombohedral ∘ 330° C. or higher 200 8.8% Example 5
According to Tables 1 and 2, all the piezoelectric materials of the present invention exhibit ferro electricity. More specifically, it is understood that any of the materials in Examples 1 to 23 have piezoelectricity. Further, all the piezoelectric materials of the present invention have a Curie temperature of 200° C. or higher, and exhibit stable electric characteristics in a temperature range of −150° C. to 200° C.
Further, the piezoelectric materials of the present invention exhibit a dielectric constant larger than and a dielectric loss smaller than those of metal oxides of the comparative examples, which suggests that the piezoelectric materials of the present invention are also more excellent in piezoelectricity.
The piezoelectric material of the present invention is also applicable to an MEMS technique, exhibits satisfactory piezoelectricity even at a high temperature, and is clean to the environment. Therefore, the piezoelectric material of the present invention can be used for appliances using many piezoelectric materials such as an ultrasonic motor and a piezoelectric element without any problems.
This application claims the benefit of Japanese Patent Application No. 2008-196903, filed Jul. 30, 2008, which is hereby incorporated by reference herein in its entirety.
1. A metal oxide comprising a perovskite-type oxide represented by the following General Formula (1): A (Zn_(x)Ti_((1-x)))_(y)M_((1-y))O₃ (1) wherein A represents at least one kind of element containing at least a Bi element and selected from a trivalent metal element; M represents at least one kind of element of Fe, Al, Sc, Mn, Y, Ga, and Yb; x represents a numerical value satisfying 0.4≦x≦0.6; and y represents a numerical value satisfying 0.1≦y≦0.9.
2. The metal oxide according to claim 1, wherein A is made of only the Bi element.
3. The metal oxide according to claim 1, wherein A includes at least one element selected from trivalent lanthanoids in addition to the Bi element.
4. The metal oxide according to claim 3, wherein an element contained in A is an La element.
5. The metal oxide according to claim 3, wherein a ratio of the Bi element accounting for A is 70 mol % or more to 99.9 mol % or less.
6. The metal oxide according to claim 1, wherein M is made of at least one of Fe and Al or both of Fe and Al.
7. The metal oxide according to claim 3, wherein M contains an Mn element in an amount of 0.1 mol % or more to 5 mol % or less.
8. The metal oxide according to claim 1, wherein y satisfies 0.2≦y≦0.65.
9. A piezoelectric material comprising the metal oxide according to claim
1. 10. The metal oxide according to claim 1, which is a film with a thickness of 200 nm or more to 10 μm or less provided on a substrate.
11. The metal oxide according to claim 10, which is a film formed by a chemical solution deposition method.
12. The metal oxide according to claim 10, wherein the substrate is a single crystal substrate selectively (001) oriented or (111) oriented.
13. The metal oxide according to claim 10, which has a film shape, and y satisfies 0.2≦y≦0.35.
14. The metal oxide according to claim 1, which is a bulk solid, and y satisfies 0.35≦y≦0.65.
|
<?php
/**
* User: Sen
* Date: 2018/11/19
* Time: 20:30
*/
namespace app\admin\controller;
use think\Request;
/**
* Class Category
* @package app\admin\controller
* 分类管理
*/
class Category extends Base {
public function index()
{
$list = $this->category->select();
$list = infinite($list, 0, 0, 'p_id');
return $this->fetch('index', [
'list' => $list,
'count' => count($list)
]);
}
/**
* @return mixed|\think\response\Json
* 添加修改分类
*/
public function categoryAdd()
{
if(Request::instance()->isPost()){
try{
$file = Request::instance()->file('icon');
if(!empty($file)){
$urls = \app\server\Alioss::get_instance()->upload_file($file);
$this->params['icon'] = $urls[0];
}
if($this->params['id']){
$this->category->update($this->params);
}else{
$this->category->insert($this->params);
}
}catch(\Exception $e){
return _error($e->getMessage(), $e->getCode());
}
return _success();
}
$top_category = $this->category->where(['p_id' => 0])->select();
$row = $this->category->where(['id' => $this->params['id']])->find();
return $this->fetch('category_add', [
'top_category' => $top_category,
'row' => $row
]);
}
public function del()
{
if(Request::instance()->isPost()){
try{
$row = $this->category->where(['p_id' => $this->params['id']])->find();
if($row){
return _error('请先删除子分类');
}
$this->category->where(['id' => $this->params['id']])->delete();
}catch(\Exception $e){
return _error($e->getMessage(), $e->getCode());
}
return _success();
}
}
}
|
Composition for skin anti-inflammation and skin moisturizing comprising artemisia extract extracted with skin cosmetic solution as a solvent
ABSTRACT
The present disclosure discloses a composition for skin anti-inflammation and skin moisturizing, which contains an Artemisia extract extracted using a skin cosmetic solution as an extraction solvent as an active ingredient. Specifically, the composition according to the present disclosure, which contains the Artemisia extract obtained using an effective and safe extraction solvent, may exhibit superior skin safety and usability as well as superior anti-inflammatory and moisturizing effects. In addition, the composition according to the present disclosure, which contains the Artemisia extract extracted using the skin cosmetic solution that can be used as a cosmetic ingredient as an extraction solvent, may superbly maintain Artemisia flavor without an additional flavoring agent.
CROSS-REFERENCE TO RELATED APPLICATION
This application claims the priority of Korean Patent Application No. 10-2019-0063802, filed on May 30, 2019 and all the benefits accruing therefrom under 35 U.S.C. § 119, the contents of which in its entirety are herein incorporated by reference.
BACKGROUND 1. Field
The present disclosure relates to a composition for skin anti-inflammation and skin moisturizing, which contains an Artemisia extract extracted using a skin cosmetic solution as an extraction solvent as an active ingredient.
2. Description of the Related Art
Extraction is a process of dissolving and separating a specific component in a solid or liquid mixture mainly using a liquid solvent. It is a very important separation method not only in chemical and biological experiments but also in industrial applications. The extraction can be achieved using chemical reactions such as acid-base reaction, chelation, etc. or simply using the difference in solubility. Solid-liquid extraction refers to extraction from solid, and liquid-liquid extraction refers to extraction from liquid. The solid-liquid extraction is often called leaching.
Among the extraction methods, solvent extraction refers to separation of a component (sometimes, two or more components) from a solid or liquid sample by dissolving using a solvent. When a mixture is subjected to chemical analysis or application, a specific component may dissolve well in a particular solvent, whereas other components does not.
An extraction solvent refers to a liquid solvent used to dissolve and separate a specific substance from a solid mixture or a liquid mixture, such as water, alcohols, ethers, petroleum ether, benzene, ethyl acetate, chloroform, etc. Recently, supercritical fluids (SCFs) are frequently used as solvents for extraction.
Although extraction can be performed using solvents only as described above, it can be achieved through chemical reactions such as acid-base reaction or chelation from a mixture. A Soxhlet extractor is used for extraction of a solid mixture using a solvent, and a separatory funnel is used for extraction of a liquid mixture.
The existing cosmetic compositions containing plant extracts are prepared by extracting raw materials using generally used extractions and then reducing the same. In general, after conducting extraction using an organic solvent, water or a mixture thereof as a solvent and removing the solvent through evaporation, the obtained extract is processed into a form suitable for use in a cosmetic composition.
Although the use of the common extraction method is effective in terms of cost or time, it may be problematic in that only the components soluble in the solvent are extracted from among the components of the raw material and some of the components may be lost after the extraction. In addition, a small amount of the organic solvent remaining after the extraction may cause undesired reactions when the cosmetic composition is applied onto skin, which lowers the effect of the extract on the skin and makes it difficult for the function of the cosmetic composition to be exerted. In addition, there may occur a skin-related safety problem.
SUMMARY
The present disclosure is directed to providing a composition exhibiting superior skin safety and usability and superior anti-inflammatory and moisturizing effects by containing an Artemisia extract obtained using an effective and safe extraction solvent.
The present disclosure is also directed to providing a composition containing an Artemisia extract extracted using a skin cosmetic solution that can be used as a cosmetic ingredient as an extraction solvent, which superbly maintains Artemisia flavor without an additional flavoring agent.
An exemplary embodiment of the present disclosure provides a composition for skin moisturizing containing an Artemisia extract extracted using a skin cosmetic solution as an extraction solvent as an active ingredient.
In addition, an exemplary embodiment of the present disclosure provides a composition for skin anti-inflammation containing an Artemisia extract extracted using a skin cosmetic solution as an extraction solvent as an active ingredient.
The composition according to the present disclosure, which contains the Artemisia extract obtained using an effective and safe extraction solvent, may exhibit superior skin safety and usability as well as superior anti-inflammatory and moisturizing effects.
In addition, the composition according to the present disclosure, which contains the Artemisia extract obtained using an effective and safe extraction solvent, may superbly maintain Artemisia flavor without an additional flavoring agent.
BRIEF DESCRIPTION OF THE DRAWINGS
FIG. 1 shows a result of evaluating the skin moisturizing effect of an Artemisia extract according to the present disclosure in Test Example 2.
FIG. 2 shows a result of evaluating the skin anti-inflammation effect of an Artemisia extract according to the present disclosure in Test Example 3.
DETAILED DESCRIPTION
As used herein, a “skin cosmetic solution” collectively refers to a composition with fluidity, which can be applied to skin for various beauty care purposes. It mainly includes a liquid or essence formulation such as a softening lotion, a nourishing lotion, an emulsion, etc. and may contain an emulsifier, a solubilizer, a humectant, water and a drug.
As used herein, an “extract” includes any substance extracted from a natural product, regardless of extraction method, extraction solvent, extracted ingredients or type of extract the extract. It is used in a broad concept, including any substance that can be obtained by otherwise processing or treating the extracted substance. Specifically, the processing or treatment may be fermentation or enzymatic treatment of the extract. Accordingly, in the present specification, the term extract is used in a broad concept, including a fermentation product, a concentrate and a dried product.
As used herein, a “glycerin derivative” refers to a compound similar to glycerin, which is obtained as a portion of glycerin is chemically modified. It refers to a compound in which a hydrogen atom or a specific radical of glycerin is replaced by another atom or radical.
Hereinafter, the present disclosure is described in detail.
In an aspect, the present disclosure may relate to a composition for skin moisturizing or a composition for skin anti-inflammation, which contains an Artemisia extract extracted using a skin cosmetic solution as an extraction solvent as an active ingredient.
In another aspect, the present disclosure may relate to a method for skin moisturizing, which comprises administering an Artemisia extract extracted using a skin cosmetic solution as an extraction solvent to a subject in need thereof.
In another aspect, the present disclosure may relate to a method for skin anti-inflammation, which comprises administering an Artemisia extract extracted using a skin cosmetic solution as an extraction solvent to a subject in need thereof.
In an exemplary embodiment, the Artemisia may be Artemisia arg yi, Artemisia princeps, Artemisia montana, Artemisia capillaris, Artemisia annua, Artemisia vulgaris, Artemisia scoparia, Artemisia sieversiana, Artemisia dracunculus, Artemisia absinthium, Artemisia abrotanum or Artemisia umbelliformis, although not being limited thereto. Specifically, it may be Artemisia arg yi, Artemisia princeps, Artemisia montana, Artemisia capillaris, Artemisia annua or Artemisia vulgaris.
In an exemplary embodiment, the skin cosmetic solution may contain one or more selected from a group consisting of a C₂-C₂₀ dihydric alcohol and a C₂-C₂₀ trihydric alcohol.
In another exemplary embodiment, the dihydric alcohol may be one or more selected from a group consisting of butylene glycol, propanediol and hexanediol. In addition, the trihydric alcohol may be one or more of glycerin and a glycerin derivative.
In another exemplary embodiment, the butylene glycol may be 1,3-butylene glycol, the propanediol may be 1,3-propanediol, and the hexanediol may be 1,2-hexanediol.
In another exemplary embodiment, the glycerin derivative may be ethylhexylglycerin.
In another exemplary embodiment, the skin cosmetic solution may contain glycerin, butylene glycol, propanediol, hexanediol and ethylhexylglycerin.
In another exemplary embodiment, the skin cosmetic solution may further contain at least one of D-glucose and betaine.
In an exemplary embodiment, the content of the butylene glycol may be 10-25 wt % based on the total weight of the skin cosmetic solution. If the content exceeds 25 wt %, usability may be poor due to increased viscosity, difficulty of filtration, etc. If the content is below 10 wt %, the effect of extraction may decrease remarkably. In an aspect, the content of the butylene glycol may be 10 wt % or higher, 12 wt % or higher, 14 wt % or higher, 16 wt % or higher, 18 wt % or higher, 20 wt % or higher, 22 wt % or higher, or 24 wt % or higher, and 25 wt % or lower, 22 wt % or lower, 20 wt % or lower, 18 wt % or lower, 16 wt % or lower, 14 wt % or lower, or 12 wt % or lower, based on the total weight of the skin cosmetic solution.
In another exemplary embodiment, the content of the propanediol may be 1-20 wt % based on the total weight of the skin cosmetic solution. If the content exceeds 20 wt %, usability may be poor due to increased viscosity, difficulty of filtration, etc. If the content is below 1 wt %, the effect of extraction may decrease remarkably. In an aspect, the content may be 1 wt % or higher, 4 wt % or higher, 6 wt % or higher, 8 wt % or higher, 10 wt % or higher, 12 wt % or higher, 14 wt % or higher, 16 wt % or higher, or 18 wt % or higher. In addition, the content may be 20 wt % or lower, 18 wt % or lower, 16 wt % or lower, 14 wt % or lower, 12 wt % or lower, 10 wt % or lower, 8 wt % or lower, 6 wt % or lower, 4 wt % or lower, or 2 wt % or lower.
In another exemplary embodiment, the content of the hexanediol may be 0.1-5 wt % based on the total weight of the skin cosmetic solution. If the content exceeds 5 wt %, usability may be poor due to increased viscosity, difficulty of filtration, etc. If the content is below 0.1 wt %, the effect of extraction may decrease remarkably. In an aspect, the content may be 0.1 wt % or higher, 0.4 wt % or higher, 0.6 wt % or higher, 0.8 wt % or higher, 1 wt % or higher, 1.2 wt % or higher, 1.5 wt % or higher, 2 wt % or higher, 2.5 wt % or higher, 3 wt % or higher, 3.5 wt % or higher, 4 wt % or higher, or 4.5 wt % or higher. In addition, the content may be 5 wt % or lower, 4.5 wt % or lower, 4 wt % or lower, 3.5 wt % or lower, 3 wt % or lower, 2.5 wt % or lower, 2 wt % or lower, 1.5 wt % or lower, 1.2 wt % or lower, 1 wt % or lower, 0.8 wt % or lower, 0.6 wt % or lower, 0.4 wt % or lower, or 0.2 wt % or lower.
In another exemplary embodiment, the content of the glycerin may be 5-20 wt % based on the total weight of the skin cosmetic solution. If the content exceeds 20 wt %, usability may be poor due to increased viscosity, difficulty of filtration, etc. If the content is below 5 wt %, the effect of extraction may decrease remarkably. In an aspect, the content may be 5 wt % or higher, 7 wt % or higher, 9 wt % or higher, 11 wt % or higher, 13 wt % or higher, 15 wt % or higher, 17 wt % or higher, or 19 wt % or higher. In addition, the content may be 20 wt % or lower, 18 wt % or lower, 16 wt % or lower, 14 wt % or lower, 12 wt % or lower, 10 wt % or lower, 8 wt % or lower, or 6 wt % or lower.
In another exemplary embodiment, the content of the glycerin derivative may be 0.01-10 wt % based on the total weight of the skin cosmetic solution. If the content exceeds 10 wt %, usability may be poor due to increased viscosity, difficulty of filtration, etc. If the content is below 0.01 wt %, the effect of extraction may decrease remarkably. In an aspect, the content may be 0.01 wt % or higher, 0.05 wt % or higher, 0.08 wt % or higher, 0.1 wt % or higher, 0.12 wt % or higher, 0.14 wt % or higher, 0.2 wt % or higher, 0.4 wt % or higher, 0.6 wt % or higher, 0.8 wt % or higher, 1 wt % or higher, 4 wt % or higher, 6 wt % or higher, or 8 wt % or higher. In addition, the content may be 8 wt % or lower, 6 wt % or lower, 4 wt % or lower, 1 wt % or lower, 0.8 wt % or lower, 0.6 wt % or lower, 0.4 wt % or lower, 0.2 wt % or lower, 0.14 wt % or lower, 0.12 wt % or lower, 0.1 wt % or lower, 0.08 wt % or lower, 0.05 wt % or lower, or 0.02 wt % or lower.
According to an aspect of the present disclosure, a weight ratio of glycerin:butylene glycol may be 1:0.5-5 or higher. In an aspect, the ratio may be 1:0.5 or higher, 1:0.7 or higher, 1:0.9 or higher, 1:1.0 or higher, 1:1.2 or higher, 1:1.4 or higher, 1:1.6 or higher, 1:1.8 or higher, 1:2 or higher, 1:2.5 or higher, 1:2.8 or higher, 1:3 or higher, 1:3.5 or higher, 1:4 or higher, or 1:4.5 or higher. In addition, the ratio may be 1:5 or lower, 1:4.5 or lower, 1:4 or lower, 1:3.5 or lower, 1:3 or lower, 1:2.5 or lower, 1:2 or lower, 1:1.5 or lower, 1:1.2 or lower, 1:1 or lower, 1:0.8 or lower, or 1:0.6 or lower.
In an exemplary embodiment, a weight ratio of butylene glycol:propanediol may be 1:0.04-2. In an aspect, the ratio may be 1:0.04 or higher, 1:0.06 or higher, 1:0.08 or higher, 1:0.1 or higher, 1:0.2 or higher, 1:0.4 or higher, 1:0.6 or higher, 1:0.8 or higher, 1:1 or higher, 1:1.2 or higher, 1:1.4 or higher, 1:1.6 or higher, or 1:1.8 or higher. In addition, the ratio may be 1:2 or lower, 1:1.8 or lower, 1:1.6 or lower, 1:1.4 or lower, 1:1.2 or lower, 1:1 or lower, 1:0.8 or lower, 1:0.6 or lower, 1:0.4 or lower, 1:0.2 or lower, 1:0.1 or lower, 1:0.08 or lower, or 1:0.06 or lower.
In another exemplary embodiment, a weight ratio of propanediol:hexanediol may be 1:0.005-5. In an aspect, the ratio may be 1:0.005 or higher, 1:0.01 or higher, 1:0.05 or higher, 1:0.1 or higher, 1:0.5 or higher, 1:1 or higher, 1:2 or higher, 1:3 or higher, or 1:4 or higher. In addition, the ratio may be 1:5 or lower, 1:4 or lower, 1:3 or lower, 1:2 or lower, 1:1 or lower, 1:0.5 or lower, 1:0.1 or lower, 1:0.05 or lower, 1:0.01 or lower, or 1:0.008 or lower.
In another exemplary embodiment a weight ratio of hexanediol:glycerin derivative may be 1:0.002-100. In an aspect, the ratio may be 1:0.002 or higher, 1:0.005 or higher, 1:0.01 or higher, 1:0.05 or higher, 1:0.1 or higher, 1:0.5 or higher, 1:1 or higher, 1:5 or higher, 1:10 or higher, 1:20 or higher, 1:30 or higher, 1:40 or higher, 1:50 or higher, or 1:80 or higher. In addition, the ratio may be 1:100 or lower, 1:80 or lower, 1:60 or lower, 1:40 or lower, 1:30 or lower, 1:20 or lower, 1:10 or lower, 1:5 or lower, 1:1 or lower, 1:0.5 or lower, 1:0.1 or lower, 1:0.05 or lower, 1:0.01 or lower, or 1:0.005 or lower.
In another exemplary embodiment, the content of the D-glucose may be 0.1-10 wt % based on the total weight of the skin cosmetic solution. If the content exceeds 10 wt %, usability may be poor due to increased viscosity, difficulty of filtration, etc. If the content is below 0.1 wt %, the effect of extraction may decrease remarkably. In an aspect the content of the D-glucose may be 0.1 wt % or higher, 0.5 wt % or higher, 1 wt % or higher, 1.5 wt % or higher, 2 wt % or higher, 2.5 wt % or higher, 3 wt % or higher, 3.5 wt % or higher, 4 wt % or higher, 4.5 wt % or higher, 5 wt % or higher, 5.5 wt % or higher, 6 wt % or higher, 7 wt % or higher, 8 wt % or higher, or 9 wt % or higher. In addition, the content may be 10 wt % or lower, 9 wt % or lower, 8 wt % or lower, 7 wt % or lower, 6 wt % or lower, 5.5 wt % or lower, 5 wt % or lower, 4.5 wt % or lower, 4 wt % or lower, 3.5 wt % or lower, 3 wt % or lower, 2.5 wt % or lower, 2 wt % or lower, 1.5 wt % or lower, 1 wt % or lower, or 0.5 wt % or lower.
In another exemplary embodiment, the content of the betaine may be 0.1-10 wt % based on the total weight of the skin cosmetic solution. If the content exceeds 10 wt %, usability may be poor due to increased viscosity, difficulty of filtration, etc. If the content is below 0.1 wt %, the effect of extraction may decrease remarkably. In an aspect, the content of the betaine may be 0.1 wt % or higher, 0.5 wt % or higher, 1 wt % or higher, 1.5 wt % or higher, 2 wt % or higher, 2.5 wt % or higher, 3 wt % or higher, 3.5 wt % or higher, 4 wt % or higher, 4.5 wt % or higher, 5 wt % or higher, 5.5 wt % or higher, 6 wt % or higher, 7 wt % or higher, 8 wt % or higher, or 9 wt % or higher. In addition, the content may be 10 wt % or lower, 9 wt % or lower, 8 wt % or lower, 7 wt % or lower, 6 wt % or lower, 5.5 wt % or lower, 5 wt % or lower, 4.5 wt % or lower, 4 wt % or lower, 3.5 wt % or lower, 3 wt % or lower, 2.5 wt % or lower, 2 wt % or lower, 1.5 wt % or lower, 1 wt % or lower, or 0.5 wt % or lower.
In an exemplary embodiment, the Artemisia extract may be one extracted by ultrasonic extraction, room-temperature extraction, cold brewing extraction or reflux condensation extraction, although not being limited thereto.
In another exemplary embodiment, the Artemisia extract may be one extracted at 85-95° C. For example, the Artemisia extract may be one extracted at 85° C. or higher, 86° C. or higher, 87° C. or higher, 88° C. or higher, 89° C. or higher, 90° C. or higher, 91° C. or higher, 92° C. or higher, 93° C. or higher, or 94° C. or higher. In addition, it may be one extracted at 95° C. or lower, 94° C. or lower, 93° C. or lower, 92° C. or lower, 91° C. or lower, 90° C. or lower, 89° C. or lower, 88° C. or lower, 87° C. or lower, or 86° C. or lower.
In another exemplary embodiment, the Artemisia extract may be one extracted for 20-30 hours. For example, the Artemisia extract may be one extracted for 20 hours or longer, 22 hours or longer, 24 hours or longer, 26 hours or longer, or 28 hours or longer. In addition, it may be one extracted for 30 hours or shorter, 28 hours or shorter, 26 hours or shorter, 24 hours or shorter, or 22 hours or shorter.
In an exemplary embodiment, the Artemisia extract may be contained in an amount of 0.001-100 wt % based on the total weight of the composition in order to achieve the desired effect. In another exemplary embodiment, the content of the Artemisia extract may be 0.001 wt % or higher, 0.01 wt % or higher, 0.1 wt % or higher, 1 wt % or higher, 10 wt % or higher, 20 wt % or higher, 30 wt % or higher, 40 wt % or higher, 50 wt % or higher, 60 wt % or higher, 70 wt % or higher, 80 wt % or higher, or 90 wt % or higher, and 100 wt % or lower, 90 wt % or lower, 80 wt % or lower, 70 wt % or lower, 60 wt % or lower, 50 wt % or lower, 40 wt % or lower, 30 wt % or lower, 20 wt % or lower, 10 wt % or lower, 1 wt % or lower, or 0.1 wt % or lower, based on the total weight of the composition.
In an exemplary embodiment, the composition may be a cosmetic composition.
The cosmetic composition according to an aspect of the present disclosure may contain a cosmetically or dermatologically acceptable medium or base. It may be prepared into any formulation suitable for topical application. For example, it may be provided in the form of a solution, a gel, a solid, an anhydrous paste, an oil-in-water emulsion, a suspension, a microemulsion, a micro capsule, a microgranule, an ionic (liposome) or non-ionic vesicular dispersion, a cream, a lotion, a powder, an ointment, a spray or a concealer stick. These formulations may be prepared according to common methods in the art. The cosmetic composition may also be used as an aerosol composition further containing a propellant compressed into a foam.
The cosmetic composition is not particularly limited in formulation, which may be selected adequately depending on purposes. For example, it may be prepared into a skin lotion, a skin softener, a skin toner, a milk lotion, a moisturizing lotion, a nourishing lotion, a massage cream, a nourishing cream, a moisturizing cream, a hand cream, a foundation, an essence, a nourishing essence, a pack, a soap, a cleansing foam, a cleansing lotion, a cleansing cream, a cleansing water, a powder, a body lotion, a body cream, a body oil, a body cleanser, a body essence, etc.
When the formulation of the present disclosure is a paste, a cream or a gel, an animal fiber, a plant fiber, a wax, paraffin, starch, tragacanth, a cellulose derivative, polyethylene glycol, silicone, bentonite, silica, talc, zinc oxide, etc. may be used as a carrier ingredient.
When the formulation of the present disclosure is a powder or a spray, lactose, talc, silica, aluminum hydroxide, calcium silicate or polyamide powder may be used as a carrier ingredient. In particular, a spray may further contain a propellant such as chlorofluorohydrocarbon, propane/butane or dimethyl ether.
When the formulation of the present disclosure is a solution or an emulsion, a solvent, a solubilizer or an emulsifier may be used as a carrier ingredient. Examples include water, ethanol, isopropanol, ethyl carbonate, ethyl acetate, benzyl alcohol, benzyl benzoate, propylene glycol, 1,3-butylene glycol, a glycerol aliphatic ester, polyethylene glycol or a fatty acid ester of sorbitan.
When the formulation of the present disclosure is a suspension, a liquid diluent such as water, ethanol or propylene glycol, suspending agent such as ethoxylated isostearyl alcohol, polyoxyethylene sorbitol ester and polyoxyethylene sorbitan ester, microcrystalline cellulose, aluminum meta hydroxide, bentonite, agar, tragacanth, etc. may be used as a carrier ingredient.
When the formulation of the present disclosure is a surfactant-containing cleanser, an aliphatic alcohol sulfate, an aliphatic alcohol ether sulfate, sulfosuccinic acid monoester, isethionate, an imidazolinium derivative, methyl tau rate, sarcosinate, a fatty acid amide ether sulfate, an alkyl amidobetaine, aliphatic alcohol, a fatty acid glyceride, a fatty acid diethanolamide, a vegetable oil, a lanolin derivative, an ethoxylated glycerol fatty acid ester, etc. may be used as a carrier ingredient.
In addition to the Artemisia extract, the cosmetic composition may further contain a functional additive and common ingredients contained in cosmetic compositions. The functional additive may be one or more ingredient selected from a group consisting of a water-soluble vitamin, an oil-soluble vitamin, a polypeptide, a polysaccharide, a sphingolipid and a seaweed extract.
In addition to the functional additive, the composition may further contain common ingredients contained in cosmetic compositions. The additional ingredients may be an oil, a fat, a humectant, an emollient, a surfactant, an organic or inorganic pigment, an inorganic powder, a UV absorbent, an antiseptic, a sterilizer, an antioxidant, a plant extract, a pH control agent, an alcohol, a colorant, a flavor, a blood circulation promoter, a cooling agent, an antiperspirant, purified water, etc.
Hereinafter, the present disclosure will be described in detail through examples and test examples. However, the following examples and test examples are for illustrative purposes only and it will be apparent to those of ordinary skill in the art that the scope of the present disclosure is not limited by the examples and test examples.
[Examples and Comparative Examples] Preparation of Artemisia Extract
Artemisia extracts were prepared by performing extraction with extraction solvents of Examples 1-2 and Comparative Examples 1-5 as described in Table 1.
Specifically, 1 g of the upper leaf of Artemisia arg yi acquired from a farmhouse in Ganghwa Island was immersed in 1 kg of the extraction solvent of Examples 1-2 and Comparative Examples 1-5, extracted under reflux at 90° C. for 24 hours, and then filtered through a 0.45-μm filter.
TABLE 1 Comp. Comp. Comp. Comp. Comp. Ex. 1 Ex. 2 Ex. 1 Ex. 2 Ex. 3 Ex. 4 Ex. 5 Purified water To 100 To 100 100 — — — — Ethanol — — — 100 — — — Ethyl acetate — — — — 100 — — Hexane — — — — — 100 — Isopropyl alcohol — — — — — — 100 Glycerin 15 10 — — — — — 1,3-Butylene glycol 20 10 — — — — — 1,3-Propanediol 10 — — — — — — 1,2-Hexanediol 1 1 — — — — — Ethylhexylglycerin 0.1 0.1 — — — — — D-Glucose — 5 — — — — — Betaine — 5 — — — — —
[Test Example 1] Evaluation of Skin Safety and Extraction Efficiency
The skin safety and extraction efficiency of the Artemisia extracts extracted with the extraction solvents of Examples 1-2 and Comparative Example 1-5 were evaluated.
Specifically, the skin safety was evaluated by a closed patch test (on the back) for 32 healthy female adults with an average age of 36 years (Those with psoriasis, acne, eczema or other skin diseases, pregnant women, lactating women and those who were taking contraceptives, antihistamines, etc. were excluded). After applying each sample (Artemisia extract) with an amount of 204 per chamber (IQ chamber), the patch was removed 24 hours later. Skin response was evaluated according to the CTFA guideline and the criteria of Frosch & Kligman.
And, the extraction efficiency was evaluated using a dried residue. Specifically, after drying 1 g of each sample at 105° C. for 4 hours, the quantity of the residue was compared. A larger quantity of the residue is translated into higher extraction efficiency (+++++:highest extraction efficiency/+:lowest extraction efficiency).
The result is given in Table 2.
TABLE 2 Comp. Comp. Comp. Comp. Comp. Ex. 1 Ex. 2 Ex. 1 Ex. 2 Ex. 3 Ex. 4 Ex. 5 Skin ◯ ◯ ◯ X X X X safety Extraction +++ +++ + ++++ ++++ ++++ ++++ efficiency
From Table 2, it can be seen that superior skin safety and extraction efficiency were achieved when the extraction solvents of Examples 1 and 2, which are the skin cosmetic solution according to the present disclosure, were used. In contrast, when organic solvents commonly used in general extraction methods such as ethanol, ethyl acetate, hexane or isopropyl alcohol were used (Comparative Examples 2-5), extraction efficiency was higher but the skin safety requirement was not satisfied. And, when purified water (Comparative Example 1) was used as the extraction solvent, the extraction efficiency was decreased significantly although there was no skin safety problem.
That is to say, it can be seen that Examples 1 and 2 according to the present disclosure, wherein the substances that can be used as cosmetic ingredients were mixed, can be used as skin cosmetic solutions (cosmetics) without solvent removal or additional processes because they can be applied safely to the skin without irritation unlike the organic solvents such as ethanol, ethyl acetate, hexane, isopropyl alcohol, etc. Accordingly, Examples 1 and 2 exhibit remarkably superior usability as compared to Comparative Examples since they can be applied directly to the skin as cosmetic compositions without additional processing of the extracted Artemisia extract. In addition, Examples 1 and 2 provide remarkably superior preservation of the extracted ingredients as compared to the existing solvents since they can effectively extract the useful ingredients of Artemisia as extraction solvents with minimized processing.
[Test Example 2] Evaluation of Skin Moisturizing Effect of Artemisia Extract
The skin moisturizing effect of the Artemisia extract extracted with the extraction solvent of Example 1 was evaluated.
The skin moisturizing effect was evaluated by measuring water content before and after (1 hour) applying the Artemisia extract on the forearm for 10 women aged 29-38 years (about 33.2 years on average). Specifically, the water content was measured before and after (1 hour) the application of the Artemisia extract using Corneometer® CM 825 (C+K, Germany). The measurement was made 3 times and then averaged. The result is shown in FIG. 1.
From FIG. 1, it can be seen that the water content in the skin is increased greatly when the Artemisia extract extracted with the extraction solvent of Example 1 according to the present disclosure was used.
[Test Example 3] Evaluation of Skin Anti-Inflammation Effect of Artemisia Extract
The skin anti-inflammation effect of the Artemisia extract extracted with the extraction solvent of Example 1 was evaluated.
The skin anti-inflammation effect was evaluated by analyzing the expression of COX-2 (cytochrome c oxidase subunit 2) RNA by quantitative PCR. Specifically, 2×10⁵ human neonatal epidermal keratinocytes (HE Kn; Lonza) were seeded onto a 6-well plate and cultured in a KBM-Gold medium (Lonza) under the condition of 37° C. and 5% CO₂ for 24 hours. After treating each well with 20 ng/mL IFNγ for 24 hours and then treating with the Artemisia extract extracted with the extraction solvent of Example 1 at different concentrations, the cells were lysed 24 hours later using a Trizol reagent (Invitrogen Carlsbad, Calif., USA) and RNA was extracted from the cells. After quantifying the isolated RNA, cDNA was synthesized using a Superscript reverse transcriptase (RT) II kit (Invitrogen) and real-time polymerase chain reaction (RT-PCR) was conducted using a Taqman gene expression assay kit. The RPLPO gene was used as an internal control gene, and the relative expression level of COX2 was quantitated using the Ct value. The result is shown in FIG. 2.
From FIG. 2, it can be seen that the expression level of COX2, which was significantly increased by the treatment with IFNγ, was decreased in a concentration-dependent manner due to the treatment with the Artemisia extract of Example 1 according to the present disclosure. In particular, it can be seen that the expression level of COX2 is decreased greatly when the Artemisia extract of Example 1 was treated at a concentration of 20000 ppm.
[Formulation Example 1] Nourishing Lotion
A nourishing lotion was prepared by extracting 1 wt % of Artemisia as described in Example 1 according to an aspect of the present disclosure and then adding 5 wt % (based on the total weight of the extract) of squalane to the extract.
[Formulation Example 2] Softening Lotion
A softening lotion was prepared by extracting 5 wt % of Artemisia as described in Example 1 according to an aspect of the present disclosure and then adding 0.5 wt % (based on the total weight of the extract) of liquid paraffin, 5 wt % of caprylic/capric triglyceride, 1.5 wt % of polysorbate 60, 5 wt % of squalane and 4 wt % of beeswax to the extract.
[Formulation Example 3] Pack
A pack was prepared by extracting 3 wt % of Artemisia as described in Example 1 according to an aspect of the present disclosure, adding 0.3 wt % (based on the total weight of the extract) of PEG 12 nonyl phenyl ether, 0.1 wt % of allantoin and 13 wt % of polyvinyl alcohol to the extract and then applying the mixture onto surface of a pack.
What is claimed is:
1. A method for skin anti-inflammation, which comprises preparing an Artemisia extract using a skin cosmetic solution as an extraction solvent; and administering the Artemisia extract to a subject in need thereof, wherein the skin cosmetic solution comprises one or more selected from the group consisting of butylene glycol, propanediol, and hexanediol; one or more of glycerin and a glycerin derivative; and one or more of D-glucose and betaine, wherein a content of the D-glucose is 0.1-10 wt % based on a total weight of the skin cosmetic solution; or a content of the betaine is 0.1-10 wt % based on the total weight of the skin cosmetic solution, and wherein the Artemisia extract is administered in a form of a cosmetic composition and the Artemisia extract is comprised in an amount of 100 wt % based on total weight of the cosmetic composition.
2. The method according to claim 1, wherein the butylene glycol is 1,3-butylene glycol, the propanediol is 1,3-propanediol, and the hexanediol is 1,2-hexanediol.
3. The method according to claim 1, wherein the glycerin derivative is ethylhexylglycerin.
4. The method according to claim 1, wherein a content of the butylene glycol is 10-25 wt % based on the total weight of the skin cosmetic solution; a content of the propanediol is 1-20 wt % based on the total weight of the skin cosmetic solution; or a content of the hexanediol is 0.1-5 wt % based on the total weight of the skin cosmetic solution.
5. The method according to claim 1, wherein a content of the glycerin is 5-20 wt % based on the total weight of the skin cosmetic solution; or a content of the glycerin derivative is 0.01-10 wt % based on the total weight of the skin cosmetic solution.
|
---
layout: post
title: Week 3 Day 4
---
## Topics For Today
* Relationships
* [Screencast](https://www.youtube.com/watch?v=uDWluN3gUww)
* [Class Notebook](https://github.com/tiy-lv-python-2015-10/class-notes/blob/master/week3/02%20-%20Django%20Model%20Relationships.ipynb)
* [In Class Project](https://github.com/tiy-lv-python-2015-10/chirper/tree/Week3Day4)
* [OneToOneField](https://docs.djangoproject.com/en/1.8/topics/db/examples/one_to_one/)
* [ForeignKeyField](https://docs.djangoproject.com/en/1.8/topics/db/examples/many_to_one/)
* [ManyToManyField](https://docs.djangoproject.com/en/1.8/topics/db/examples/many_to_many/)
* Queryset Deep Dive
* [Screencast](https://www.youtube.com/watch?v=O1BmUB0fbTQ)
* [Class Notebook](https://github.com/tiy-lv-python-2015-10/class-notes/blob/master/week3/03%20-%20QuerySets.ipynb)
* [Queryset Docs](https://docs.djangoproject.com/en/1.8/ref/models/querysets/)
* Django Model Testing
* [In Class Project](https://github.com/tiy-lv-python-2015-10/chirper/blob/Week3Day4/chirper/chirp/tests.py)
* [Testing Docs](https://docs.djangoproject.com/en/1.8/topics/testing/)
* Admin
* [Admin Docs](https://docs.djangoproject.com/en/1.8/ref/contrib/admin/)
## Homework
[Reddit Remake](https://github.com/tiy-lv-python-2015-10/reddit-remake)
|
Lotus Froststone
Lotus Froststone is a relic in Wizard of Legend.
Description
Summons an aura that has a 20% chance to freeze nearby enemies, on a 0.4s delay.
Strategies
Item combos
Having this and the causes enemies to be frozen very often, as each will individually activate.
Additional notes
|
Page:Alexander Jonas - Reporter and Socialist (1885).djvu/38
I think I can do that easily, and if you will listen attentively, you will soon find out what we want; and I hope that you will then likewise admit that ‘"what we want," will be beneficial to mankind if it be carried out, and that it is rational, just, practical and feasible.
Proceed, I am ready to listen.
For facts and figures I must recur to the United States Census of 1880, and, as I did before, I take the very first item mentioned: "agricultural implements.’" According to the Census there were 1943 establishments in which such implements were manufactured, and the capital invested amounted to 62 millions of dollars. The number of workers employed in these establishments was 38,313 men, 73 women, and 1194 children under 16 years of age. The amount of wages paid during the year was $15,359,160, and the cost of the raw matterial is given at $31,531,170, while the aggregate value of the implements produced is figured at $63,640,486. From these figures we see—and every schoolboy can make the example—that every one of the workers employed in this branch of industry received during that year $388.25 in wages, while the bosses, after paying the workmen, and after deducting the cost of the material and five per Cent. interest for the capital invested, put just $18,640,706 of the values produced into their pockets. In other words,—out of the labor of every worker whose wages in the average amount to $388.25 per year, they make $470.00. This is a proportion somewhat more unfavorable than that mentioned by the Census as the average proportion prevailing upon the field of our industrial manufactures; for, on an average the Census shows that the capitalists "make" $1.08 for every $1.00 they pay out in the form of wages.
And do you believe these figures to be correct?
They appear to agree with the statistics gathered by the different States and municipalities. But, if they are incorrect, they favor the capitalistic side; for, when they were gathered the capitalists, and not the workmen, were called upon to give them, and it is but natural that the capitalists should make themselves appear in the best light possible. You
|
Page:Improvisatrice.pdf/151
THE GUERILLA CHIEF.
But the war-storm came on the mountain gale, And man's heart beat high, though his cheek was pale, For blood and dust lay on the white hair, And the maiden wept o'er her last despair; The hearth was cold, and the child was prest A corpse to the murdered mother's breast; And fear and guilt, and sorrow and shame, Darkened wherever the war-fiend came.
stood beneath a large old chesnut-tree, And had stood there for years;—the moonlight fell Over the white walls, which the vine had hung With its thick leaves and purple fruit; a pair
|
Ice Magic
Description
Regular Magic
* Thalg Al-Salos
* Thalg Hajar
Composite Magic
* Gravity Sword - (Gravity Magic)
* Thalg Thalgeyya - (Wind Magic)
Metal Vessels
* Garufor Zairu
* Zarufor Kirestal
Magic Tools
* Roaring Cold Wave Cannon
|
Thread:Ultraman4Ever/@comment-27784559-20180901143602/@comment-27784559-20180909174212
Okay, Kyle. The Great Discovery DVD Menu of the United States or Scotland?
|
# StarlingDecompMicrobiome
# Code files
Starling2022.r contains code use in creating figures for technical report
Starling2019.r contains code used for inline statistics and figures
Starling7.31.19.rmd (and Starling7.31.19.html) contains precomputed code used for an overview of the data
StarlingScratch.r contains miscellaneous code
# Data files
Taxonomic bacterial communities
table-with-taxonomy500.biom (rarefied to 500 reads)
table-with-taxonomyNoR.biom (not rarefied)
Phylogenetic tree StarlingTree7.31.19.nwk
Predicted functional communities
OTU matrix StarlingPiCrustMatrixL2.txt
Group names StarlingPiCrustGroupsL2.csv
metadata StarlingMeta1.16.18.csv
metadata from 2022 StarlingMeta5.13.22.csv
# Output files
Figures are given in the Figures/ folder
Text files show the relative abundance for sample groups based on either PICRUSt or taxonomy (Files with other have groups with low abundances grouped into an single group to facilitate plotting)
|
Microsoft KB Archive/189673
= PUB98: Cannot Open Pub98tr1.cab File Running Trial Version Setup =
Article ID: 189673
Article Last Modified on 10/31/2001
-
APPLIES TO
* Microsoft Publisher 98 Standard Edition
-
This article was previously published under Q189673
SYMPTOMS
Error: Cannot open file: pub98TR1.cab.
Label not found.
CAUSE
RESOLUTION
Pub98tr1.cab
Pub98tr2.cab
Pub98tr3.cab
Pub98tr4.cab
Pub98tr5.cab
You should now be able to successfully install the trial version of Publisher 98.
MORE INFORMATION
http://support.microsoft.com/
Keywords: kberrmsg kbsetup kbprb KB189673
-
<EMAIL_ADDRESS>Send feedback to Microsoft]
© Microsoft Corporation. All rights reserved.
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.