text stringlengths 8 5.77M |
|---|
package com.fengdu.entity;
import java.io.Serializable;
/**
* 实体
* 表名 nideshop_shipping
*
* @author lipengjun
* @email 939961241@qq.com
* @date 2017-09-04 21:42:24
*/
public class ShippingEntity implements Serializable {
private static final long serialVersionUID = 1L;
//
private Integer id;
//
private String code;
//
private String name;
/**
* 设置:
*/
public void setId(Integer id) {
this.id = id;
}
/**
* 获取:
*/
public Integer getId() {
return id;
}
/**
* 设置:
*/
public void setCode(String code) {
this.code = code;
}
/**
* 获取:
*/
public String getCode() {
return code;
}
/**
* 设置:
*/
public void setName(String name) {
this.name = name;
}
/**
* 获取:
*/
public String getName() {
return name;
}
}
|
Salmon, Potato and Sea Bean Tart
Salmon, Potato and Sea Bean Tart
Fresh ingredients from both sea and land are united in this unusual, but satisfying recipe. Sea beans, with their fresh, briny flavor, firm yet delicate wild-caught salmon and creamy fingerling potatoes are enveloped in crisp phyllo pastry. A sprinkling of brightly flavored dill pollen ties it all together!
Pre-heat the oven to 350 degrees. Bring a pan of unsalted water to boil and blanch the sea beans for 1 minute, then drain and plunge into cold water. Drain well. Toss the green onions, potatoes, salmon and sea beans together with 1 Tbsp olive oil, then season with salt and pepper (careful with the salt - sea beans are naturally VERY salty).
Brush the bottom of an 8x8 inch baking pan with olive oil. Brush the top of a sheet of phyllo dough with olive oil and place it in the pan. (You may have to cut the phyllo dough to fit the pan.) Repeat until you have 4-6 layers, depending on how thick you want the crust.
Place the salmon, potato and sea bean mixture on top of the phyllo dough. Brush the top of a sheet of phyllo dough with olive oil and place it on the spinach. Repeat until you have 4-6 layers, depending on how thick you want the crust.
Bake in the preheated oven about 30-40 minutes or until golden brown on top. Sprinkle with dill or fennel pollen and allow to cool slightly. Slice and serve. |
The tie-up with Foxconn means "we will see BlackBarry hardware for years to come," Michaluk added.
"The big thing is they are committed to the handsets," Kevin Michaluk, editor-in-chief of BlackBerry loyalist hub Crackberry.com , told CNBC in an interview. "Blackberry always had trouble making money on handsets. It's a part of the business they've never been great at but it's an integral part of the business."
In a sign that BlackBerry isn't yet prepared to give up on the consumer market, it struck a five-year partnership with Foxconn—the Taiwan-based manufacturer that is the linchpin of Apple's electronics building efforts. According to BlackBerry, Foxconn will help the battered company develop consumer-focused smartphones for Indonesia, as well as "other fast-growing markets" next year.
BlackBerry reported a massive $4.4 billion write-down on unsold inventory in its fiscal third quarter--including on the BlackBerry 10 device it hoped would lead to its salvation. The news initially sent Blackberry stock lower in premarket trading, but its share price was up by more than 13 percent in the afternoon as investors absorbed the news. ( Click here for the latest price.)
By late morning, more than 48.9 million BlackBerry shares had been traded, more than triple its 30-day average volume of 13.6 million. The last time BBRY had gained more than 10 percent in a day was Aug. 12.
Toronto-based BlackBerry is trying to revive its fortunes in a fiercely competitive marketplace that has largely left it for dead. It reported a net loss of $4.4 billion, or $8.37 a share, in the quarter ended Nov. 30. That compares with Wall Street expectations of a quarterly loss excluding items of 44 cents a share on $1.59 billion in revenue, according to a consensus estimate from Thomson Reuters. Revenue for the quarter plunged 24 percent from the previous quarter, to $1.2 billion.
The company is in the midst of a broad reorganization to help it refocus its efforts on enterprise software and security, while helping the company to find a way to profit from the devices bearing its name. BlackBerry touted growth in its enterprise service, as well what it says were more than 40 million new Apple and Samsung smartphone users who migrated to its BlackBerry Messenger (BBM) application.
"With the operational and organizational changes we have announced, BlackBerry has established a clear roadmap that will allow it to target a return to improved financial performance in the coming year," said John Chen, BlackBerry's interim CEO and executive chairman.
"While our Enterprise Services, Messaging and QNX Embedded businesses are already well-positioned to compete in their markets, the most immediate challenge for the company is how to transition the devices operations to a more profitable business model," he added.
That mission, however, may be easier said than done. BlackBerry's market share has dwindled into the single digits, and efforts to rebrand itself in the face of ferocious competition have consistently fallen short. The make-or-break launch of the BlackBerry 10 fell flat with consumers, which forced the company to take a massive write-down on the units and lay off about 4,500 people.
Barely a month at the helm of the troubled company, Chen has his work cut out for him. Some longtime BlackBerry watchers say his first moves—including an executive reshuffle—put him on the right track.
The alliance with Foxconn may help BlackBerry gain a modicum of headway in a fast-growing segment of the mobile market. According to technology analysts, emerging markets are projected to be one of the hottest markets for smartphones in the coming year.
In November, the company jettisoned Thorsten Heins from his perch as chief executive, while simultaneously ending a buyout agreement with Fairfax Financial, opting instead for a $1 billion infusion of cash from a group of investors. Earlier this week, two senior executives in charge of global sales and merger strategy also departed the company.
--By CNBC's Javier E. David. |
Dots Baby Lounge to Go - Pink Dots
All in One!Our Dots Baby Lounge to Go features a sweet and classic polka dot design, while providing your baby a safe and comfortable place to sleep and play. The lounge combines a crib, bassinet and play mat all in one compact and portable piece. The cover is washable and the bottom is waterproof, making it perfect for the outdoors. When you're ready to go, simply fold up the lounge into a lightweight backpack, for hands free travel. |
It is a perfect template for bloggers and photographers. The layers of the contents are well organised and named well. This template’s layout was based on a Bootstrap grid of 1170px, so you don’t have to spend to much time implementing it. Author of this freebie is Dmitry Khizhnyak.
File Type: PSD
File Size: 29 mb
1367 Downloads |
Microsoft Visual Studio Solution File, Format Version 12.00
# Visual Studio 14
VisualStudioVersion = 14.0.25420.1
MinimumVisualStudioVersion = 10.0.40219.1
Project("{8BC9CEB8-8B4A-11D0-8D11-00A0C91BC942}") = "ESP", "ESP.vcxproj", "{7FD42DF7-442E-479A-BA76-D0022F99702A}"
EndProject
Project("{8BC9CEB8-8B4A-11D0-8D11-00A0C91BC942}") = "openframeworksLib", "..\..\third-party\openFrameworks\libs\openFrameworksCompiled\project\vs\openframeworksLib.vcxproj", "{5837595D-ACA9-485C-8E76-729040CE4B0B}"
EndProject
Project("{8BC9CEB8-8B4A-11D0-8D11-00A0C91BC942}") = "ESPlib", "ESPlib.vcxproj", "{6141ABD7-C691-407E-832D-F0FBAAED0781}"
EndProject
Global
GlobalSection(SolutionConfigurationPlatforms) = preSolution
Debug|Win32 = Debug|Win32
Debug|x64 = Debug|x64
Release|Win32 = Release|Win32
Release|x64 = Release|x64
EndGlobalSection
GlobalSection(ProjectConfigurationPlatforms) = postSolution
{7FD42DF7-442E-479A-BA76-D0022F99702A}.Debug|Win32.ActiveCfg = Debug|Win32
{7FD42DF7-442E-479A-BA76-D0022F99702A}.Debug|Win32.Build.0 = Debug|Win32
{7FD42DF7-442E-479A-BA76-D0022F99702A}.Debug|x64.ActiveCfg = Debug|x64
{7FD42DF7-442E-479A-BA76-D0022F99702A}.Debug|x64.Build.0 = Debug|x64
{7FD42DF7-442E-479A-BA76-D0022F99702A}.Release|Win32.ActiveCfg = Release|Win32
{7FD42DF7-442E-479A-BA76-D0022F99702A}.Release|Win32.Build.0 = Release|Win32
{7FD42DF7-442E-479A-BA76-D0022F99702A}.Release|x64.ActiveCfg = Release|x64
{7FD42DF7-442E-479A-BA76-D0022F99702A}.Release|x64.Build.0 = Release|x64
{5837595D-ACA9-485C-8E76-729040CE4B0B}.Debug|Win32.ActiveCfg = Debug|Win32
{5837595D-ACA9-485C-8E76-729040CE4B0B}.Debug|Win32.Build.0 = Debug|Win32
{5837595D-ACA9-485C-8E76-729040CE4B0B}.Debug|x64.ActiveCfg = Debug|x64
{5837595D-ACA9-485C-8E76-729040CE4B0B}.Debug|x64.Build.0 = Debug|x64
{5837595D-ACA9-485C-8E76-729040CE4B0B}.Release|Win32.ActiveCfg = Release|Win32
{5837595D-ACA9-485C-8E76-729040CE4B0B}.Release|Win32.Build.0 = Release|Win32
{5837595D-ACA9-485C-8E76-729040CE4B0B}.Release|x64.ActiveCfg = Release|x64
{5837595D-ACA9-485C-8E76-729040CE4B0B}.Release|x64.Build.0 = Release|x64
{6141ABD7-C691-407E-832D-F0FBAAED0781}.Debug|Win32.ActiveCfg = Debug|Win32
{6141ABD7-C691-407E-832D-F0FBAAED0781}.Debug|Win32.Build.0 = Debug|Win32
{6141ABD7-C691-407E-832D-F0FBAAED0781}.Debug|x64.ActiveCfg = Debug|x64
{6141ABD7-C691-407E-832D-F0FBAAED0781}.Debug|x64.Build.0 = Debug|x64
{6141ABD7-C691-407E-832D-F0FBAAED0781}.Release|Win32.ActiveCfg = Release|Win32
{6141ABD7-C691-407E-832D-F0FBAAED0781}.Release|Win32.Build.0 = Release|Win32
{6141ABD7-C691-407E-832D-F0FBAAED0781}.Release|x64.ActiveCfg = Release|x64
{6141ABD7-C691-407E-832D-F0FBAAED0781}.Release|x64.Build.0 = Release|x64
EndGlobalSection
GlobalSection(SolutionProperties) = preSolution
HideSolutionNode = FALSE
EndGlobalSection
EndGlobal
|
Thief sought
Utica Police are searching for a black male who stole an 85-year-old woman’s credit card and then withdrew thousands of dollars from her bank account.
Police said the theft occurred in March, and the thief was captured on the security camera of the same ATM on March 20 and March 22. The man has a thin build, with a black mustache and black hair with a cornrows hairstyle.
Anyone who recognizes the man or has information about the theft is asked to call investigators at 223-3515. All call will be kept confidential. |
No. 38 June 16, 2016 715
IN THE SUPREME COURT OF THE
STATE OF OREGON
John HARKNESS
and Sherri Harkness,
Petitioners on Review,
v.
Jack R. PLATTEN,
Respondent on Review.
(CC C092970CV; CA A147439; SC S063222)
On review from the Court of Appeals.*
Argued and submitted March 4, 2016.
Emil R. Berg, Boise, Idaho, argued the cause and filed
the brief for petitioners on review. With him on the brief was
Leonard D. DuBoff, The Duboff Law Group, Portland.
James M. Callahan, Callahan & Shears, P.C., Portland,
argued the cause and filed the brief for respondent on review.
Scott A. Shorr, Stoll Stoll Berne Lokting & Shlachter
PC, Portland, filed the brief for amicus curiae Oregon Trial
Lawyers Association.
Before Balmer, Chief Justice, Kistler, Walters, Landau,
Baldwin, Brewer, Justices, and DeVore, Justice pro
tempore.**
BALDWIN, J.
The decision of the Court of Appeals is reversed. The
judgment of the circuit court is reversed, and the case is
remanded to the circuit court for further proceedings.
______________
** Appeal from Washington County Circuit Court, Charles D. Bailey, Judge.
270 Or App 260, 348 P3d 1145 (2015)
** Nakamoto, J., did not participate in the consideration or decision of this
case.
716 Harkness v. Platten
Case Summary: A loan officer employed successively by two mortgage compa-
nies defrauded plaintiffs by means of an investment and loan scheme. Plaintiffs
filed suit against the loan officer and the mortgage companies and, with the
advice of defendant—their attorney—settled the case. Plaintiffs then filed this
legal malpractice and negligent misrepresentation action against defendant,
alleging, among other things, that, but for defendant’s legal malpractice or neg-
ligent misrepresentation, they would have gone to trial in the underlying action
against the loan officer and mortgage companies, prevailed, and been awarded
more than the amount that they had received in the settlement. Defendant moved
for a directed verdict on the ground that plaintiffs could not have prevailed in
the underlying action because they failed to present sufficient evidence of the
loan officer’s apparent authority to act on behalf of the mortgage companies. The
trial court granted the directed verdict, and the Court of Appeals affirmed. Held:
The plaintiffs presented sufficient evidence for a reasonable factfinder to infer
that the loan officer had apparent authority to bind the mortgage companies to
the loan transactions arranged by the loan officer between plaintiffs and third
parties.
The decision of the Court of Appeals is reversed. The judgment of the cir-
cuit court is reversed, and the case is remanded to the circuit court for further
proceedings.
Cite as 359 Or 715 (2016) 717
BALDWIN, J.
This is a legal malpractice and negligent misrep-
resentation case where we review a trial court judgment
directing a verdict in favor of Platten (defendant). In an
earlier lawsuit, defendant had represented the Harknesses
(plaintiffs) against Kantor, a loan officer, and her succes-
sive employers, Sunset Mortgage (Sunset) and Directors
Mortgage, Inc. (Directors), as the result of a fraudulent
investment and loan scheme directed at plaintiffs by Kantor.
That case did not settle to plaintiffs’ satisfaction, and plain-
tiffs sought to recover their remaining loss from defendant.
In this case, the trial court granted defendant’s motion for a
directed verdict based on the conclusion that plaintiffs’ lia-
bility theories of apparent authority and respondeat superior
asserted against Sunset and Directors were not supported
by sufficient evidence in the record and could not have led
to a result more favorable than the settlement. Plaintiffs
appealed the trial court ruling, and the Court of Appeals
affirmed. Harkness v. Platten, 270 Or App 260, 348 P3d 1145
(2015). For the reasons explained below, we reverse the deci-
sions of the trial court and the Court of Appeals.
The facts as stated by the Court of Appeals, which
we adopt, are as follows:1
“Plaintiffs * * * were interested in using the equity in
their home to invest when [Mr. Harkness] saw a homemade
flyer for various businesses at work. The flyer included a
photocopy of Kantor’s business card that indicated Kantor
was a loan officer with Sunset. After [Mr. Harkness] spoke
with a coworker who had worked with Kantor to purchase
an apartment complex, plaintiffs set up and attended a
meeting with Kantor at her Sunset office. Kantor proposed
that plaintiffs borrow money from Sunset, using the equity
in their house as collateral, and then she would invest those
proceeds in short-term, high-interest loans to developers
and building contractors (hard-money loans). She told
plaintiffs that those hard-money loans would be secured
1
In its review of the grant of defendant’s motion for a directed verdict, the
Court of Appeals properly viewed the evidence and all reasonable inferences in
the light most favorable to plaintiffs. Trees v. Ordonez, 354 Or 197, 200, 311 P3d
848 (2013). We omit part of the factual statement relating to plaintiffs’ allega-
tions of malpractice, because those facts are not relevant to our review.
718 Harkness v. Platten
by first or second liens on real property with ‘lots’ of equity.
Kantor explained that she and Sunset would get paid from
the commission on plaintiffs’ conventional loan on their
house and from the conventional construction loans that
Sunset would do for the builders.
“After meeting with Kantor at Sunset again, plain-
tiffs agreed to the proposal, took out a conventional loan
from Sunset, and turned over the loan proceeds to Kantor.
Kantor did use those proceeds to make hard-money loans
to several people and prepared certain documentation on
Sunset letterhead. For the first of those loans, which was
not funded from the Sunset loan proceeds turned over to
Kantor, [Mrs. Harkness] gave Kantor a cashier’s check
made out to Sunset. [Mrs. Harkness] always met with
Kantor at her Sunset office to learn about additional hard-
money loan opportunities and to receive copies of notes for
the loans Kantor made, which were always closed outside of
plaintiffs’ presence.
“Kantor later went to work as a loan officer at Directors.
Plaintiffs continued their same investment relationship
with Kantor at Directors and met with her at her Directors’
office in the same manner as when Kantor was at Sunset.
Plaintiffs also took out an additional loan from Directors,
using their rental house as collateral, the proceeds of which
were paid directly to Kantor to make hard-money loans to
people Kantor found. Kantor’s assistant at Directors was
knowledgeable about all of plaintiffs’ hard-money loans and
would assist plaintiffs with information on those matters.
“Plaintiffs did not get loan payments directly from bor-
rowers and did not know how borrowers made payments,
but Kantor arranged deposits into plaintiffs’ bank account
to service plaintiffs’ personal loans. [Mrs. Harkness] tes-
tified that certain notes directed payments to be made at
addresses that corresponded to Sunset’s or Directors’ office
address. Plaintiffs did not receive the proceeds from some
of the note payoffs; instead, when a note was paid off or
came due but not paid off, Kantor would recommend that
plaintiffs immediately invest payoffs into new loans or roll
over unpaid loans into a new loan to the same borrower,
which plaintiffs would then do.
“[Mrs. Harkness] testified that she would not have
dealt with Kantor if she were not working through Sunset.
She also testified that she would not have continued
Cite as 359 Or 715 (2016) 719
working with Kantor if Kantor had not been at Directors.
[Mrs. Harkness] believed that Kantor was a representative
of Sunset, and then Directors, and was acting within the
scope of her employment in all her dealings with plaintiffs.
However, it was undisputed that Kantor, in fact, was not
performing duties for which she was hired as a loan officer
with regard to the investment scheme and hard-money loan
arrangements—that type of transaction was not part of the
business of either Sunset or Directors—and neither Sunset
nor Directors received any fees or commissions from the
hard-money loans. There also was no evidence that the con-
trol persons at Sunset or Directors were aware of Kantor’s
arrangement with plaintiffs.
“After about two years of investing with Kantor, plain-
tiffs were contacted by an attorney for one of the borrow-
ers on a hard-money loan financed by plaintiffs. Kantor
told [Mrs. Harkness] that she just had forgotten to record
a lien, so [Mrs. Harkness] accompanied Kantor to record
the lien. The borrower then sued plaintiffs. At the end of
that lawsuit, plaintiffs learned that Kantor had forged
the documents for at least that loan, and, for other loans,
Kantor had not recorded any liens, or had recorded a lien
in third position behind a lien Kantor had placed in favor
of Directors on the property. Kantor also had been running
all the money through her personal accounts. At the conclu-
sion of that lawsuit, plaintiffs held notes to five outstanding
loans, including the one deemed a forgery by the court, that
totaled approximately $980,000, and at least one of the bor-
rowers had already filed bankruptcy.
“Plaintiffs then retained attorney Flaherty to represent
them in a suit against Kantor, Sunset, and Directors (the
underlying action). Sometime after filing the underlying
action, Flaherty contacted defendant to be a securities law
expert in the case, but, instead, defendant fully associated
with Flaherty as co-counsel in the case to assist with secu-
rities law issues. * * *
“* * * * *
“At the end of [a] two-day mediation, the parties set-
tled the underlying action for $600,000. Plaintiffs testified
that that amount could not make them whole because it
would leave them with significant amounts owing on their
residential mortgage. Plaintiffs’ expert in the malpractice
case testified that, on the date of the settlement, the total
720 Harkness v. Platten
amount owing to plaintiffs on the five outstanding loans was
$998,149. Plaintiffs believed at the time of the settlement
that their total damages were approximately $1.15 million.
Plaintiffs initially were prepared to reject a $600,000 set-
tlement and go to trial because they were led to believe by
their attorneys that they had a strong case. After learning
about their exposure to attorney fees and that Flaherty
and defendant were not prepared for trial, and relying on
defendant’s assurance that they could get money from bor-
rowers, plaintiffs decided to settle for $600,000.
“After the settlement, plaintiffs contacted defendant to
pursue the big borrower. Defendant declined to take the
case and told plaintiffs that ‘you’d be better off to take your
money and take it to Vegas and put it in a slot machine.’
Plaintiffs would not have accepted the settlement if defen-
dant had not told them that there were ways to collect from
the borrowers. Plaintiffs hired another attorney to sue that
borrower, but the borrower filed bankruptcy.
“Plaintiffs then brought a legal malpractice case against
Flaherty, which was dismissed for reasons not disclosed in
the record. Following that dismissal, plaintiffs brought this
legal malpractice and negligent misrepresentation case
against defendant.”
Harkness, 270 Or App at 262-67 (footnotes omitted).
To prevail on their legal malpractice and negli-
gent misrepresentation claims against defendant, plaintiffs
needed to prove a “case within a case”—that is, they were
required to show, among other things, that, but for defen-
dant’s legal malpractice or negligent misrepresentation,
they would have gone to trial in the underlying action, pre-
vailed, and been awarded more than the amount that they
had received in the settlement. See Chocktoot v. Smith, 280
Or 567, 570-71, 571 P2d 1255 (1977) (explaining case-within-
a-case methodology). Plaintiffs’ underlying action involved
both contract and noncontract claims. For their case within
a case on their contract claims, plaintiffs proceeded on a
theory that Kantor had apparent authority from Sunset
and Directors to bind those companies to the oral contract
that was the basis for Kantor’s investment scheme with
plaintiffs—loaning funds to plaintiffs based on the equity in
their different properties and then facilitating the lending
of those funds to other borrowers for plaintiffs’ investment
Cite as 359 Or 715 (2016) 721
purposes. For their case within a case on their noncontract
claims, plaintiffs pursued a respondeat superior theory that
Sunset and Directors were vicariously liable as her employ-
ers for Kantor’s actions, because Kantor had appeared to
be acting within the scope of her employment.2 Plaintiffs’
apparent authority and respondeat superior theories were
ultimately based on the same argument and evidence—i.e.,
that Sunset and Directors had clothed Kantor with apparent
authority to engage in the investment scheme with plain-
tiffs on behalf of the companies as part of her employment
as a loan officer.
At the close of plaintiffs’ case, defendant moved
for a directed verdict on several grounds, including that
plaintiffs could not have prevailed in the underlying action
against Sunset and Directors. The trial court agreed, con-
cluding that plaintiffs had failed to present any evidence of
actual or apparent authority and, therefore, that they had
not presented any evidence that would have allowed them
to prevail at trial against Sunset or Directors. Based on
that conclusion, the trial court granted a directed verdict to
defendant.
On appeal, plaintiffs argued that they had pre-
sented sufficient evidence for a factfinder to draw an infer-
ence of apparent authority with respect to their contract
claims and to draw an inference of respondeat superior
with respect to their noncontract claims. Plaintiffs prin-
cipally relied on this court’s decision in Badger v. Paulson
Investment Co., Inc., 311 Or 14, 803 P2d 1178 (1991), in which
this court held that, even though sales representatives of an
investment company had actual authority to sell investors
only approved securities, the representatives had apparent
authority to sell unregistered securities.
The Court of Appeals affirmed the trial court’s rul-
ing that plaintiffs had not presented sufficient evidence of
apparent authority to survive defendant’s directed-verdict
motion: “Plaintiffs presented no evidence that Kantor had
2
Plaintiffs’ noncontract claims were for negligence, conversion, fraud, viola-
tion of state mortgage brokerage laws, breach of fiduciary duty for any account-
ing, rescission, slander of title, and violation of state security laws. Harkness, 270
Or App at 268.
722 Harkness v. Platten
the apparent authority to give investment advice on behalf of
either company, engage in the proposed investment scheme,
or, for the contract claim, bind Sunset or Directors to the
oral terms of that scheme.” Harkness, 270 Or App at 272.
In reaching that conclusion, the court disregarded the evi-
dence related to Kantor arranging for plaintiffs to take out
a conventional loan from Sunset and Directors and to those
companies receiving a commission on those loans, “because
those acts were within Kantor’s actual authority as a loan
officer for Sunset and Directors and are not evidence that
Kantor had apparent authority to do more than just that.”
Id. The court then considered the remaining evidence and
concluded that “[i]t was not objectively reasonable for plain-
tiffs to believe that that type of investment scheme [in which
Kantor had engaged] was part of Kantor’s job as a ‘loan offi-
cer,’ nor did Sunset or Directors provide any information to
plaintiffs, whether directly or indirectly, that such a scheme
or financial advice was part of Kantor’s job.” Id. at 273. The
court also concluded that “[p]laintiffs’ reliance on Badger to
make their case is misplaced.” Id.
We allowed review to determine whether the Court
of Appeals properly applied this court’s case law on apparent
authority. More specifically, we allowed review to determine
whether the Court of Appeals was correct that, in assessing
whether a reasonable factfinder could infer that Kantor had
apparent authority, the court was required to disregard all
evidence relating to acts that were within Kantor’s actual
authority as a loan officer for Sunset and Directors. Id. at
272.
On review, plaintiffs argue that the Court of Appeals’
reasoning “was based on both an unduly circumscribed view
of the evidence in this case and an unduly circumscribed
interpretation” of this court’s decision in Badger. For his
part, defendant argues that the Court of Appeals was cor-
rect in its view that the evidence in support of plaintiffs’
theories of apparent authority and respondeat superior was
insufficient. In particular, defendant argues that “there was
insufficient evidence that Sunset and Directors had said or
done anything to create the appearance that Kantor was
authorized to act on their behalf as a financial advisor and
Cite as 359 Or 715 (2016) 723
propose, and then carry out, an investment scheme involv-
ing the placement of private loans.”
We begin with a brief discussion of Oregon law relat-
ing to the doctrine of apparent authority. This court recently
summarized the legal principles applicable to a determina-
tion of when “a putative principal can be held responsible for
the acts of another on an apparent agency theory” in Eads v.
Borman, 351 Or 729, 277 P3d 503 (2012):
“Classically, an agency relationship ‘results from the
manifestation of consent by one person to another that the
other shall act on behalf and subject to his control, and con-
sent by the other so to act.’ Vaughn v. First Transit, Inc.,
346 Or 128, 135, 206 P3d 181 (2009) (emphasis in Vaughn
omitted) * * *. The agency relationship can arise either from
actual consent (express or implied) or from the appearance
of such consent. See generally Taylor v. Ramsay-Gerding
Construction Co., 345 Or 403, 410, 196 P3d 532 (2008) (so
discussing). In either circumstance, the principal is bound
by or otherwise responsible for the actual or apparent
agent’s acts only if the acts are within the scope of what
the agent is actually or apparently authorized to do. Id.; see
also Beeson v. Hegsted, 199 Or 325, 330, 261 P2d 381 (1953)
(one cannot hold principal liable for an act that does not fall
within the scope of agent’s real or apparent authority).
“* *
*. Under this court’s settled cases, ‘[a]pparent
authority to do any particular act can be created only by
some conduct of the principal which, when reasonably
interpreted, causes a third party to believe that the prin-
cipal consents to have the apparent agent act for him on
that matter.’ Jones v. Nunley, 274 Or 591, 595, 547 P2d 616
(1976). There accordingly are two keys to the analysis: (1)
the principal’s representations; and (2) a third party’s rea-
sonable reliance on those representations.”
Id. at 735-37 (internal quotation marks omitted).
This court also observed in Eads that the test in
Oregon to determine when a principal is bound by an actor
under an apparent authority theory is consistent with the
rule stated in the Restatement (Third) of Agency section 2.03
(2006):
“ ‘Apparent authority is the power held by an agent or
other actor to affect a principal’s legal relations with third
724 Harkness v. Platten
parties when a third party reasonably believes the actor
has authority to act on behalf of the principal and that
belief is traceable to the principal’s manifestations.’ ”
351 Or at 737 n 5 (quoting Restatement (Third) § 2.03). That
test is applicable both “to determine when a principal is
bound by actors who appear to be agents but are not, as well
as actors who act beyond the scope of their actual authority.”
Id. (citing Restatement (Third) § 2.03 comment a).
Regarding the first element of the apparent author-
ity test—a putative principal’s representation that an agent
is authorized to act on its behalf—an agent’s actions, stand-
ing alone, will not give rise to apparent authority. Id. at
737 (citing Taylor, 345 Or at 410). Instead, the principal
“must take some affirmative step in creating the appear-
ance of authority, one that the principal either intended to
cause or ‘should realize’ likely would cause a third party
to believe that the putative agent has authority to act on
the principal’s behalf.” Id. (ultimately quoting Restatement
(Second) of Agency § 27 comment a (1958)). The principal’s
words, conduct, or other representation need not be made
directly to or witnessed directly by the third party for the
principal to be liable under a theory of apparent authority;
rather, the representation of authority need only be trace-
able to the principal. Id.; see Taylor, 345 Or at 411 (indirect
information attributed to principal’s conduct “can be used
to support apparent agency, as long as that information
can be traced back to the principal”); see also Restatement
(Third) § 1.03 comment b (although “the presence of actual
authority depends upon whether the principal has made a
manifestation to the agent,” by contrast, “a manifestation
sufficient to establish apparent authority may, but need not
necessarily be, directed toward an identified person as its
audience”).3
3
The Restatement (Third) describes a “manifestation” of authority by a
putative principal in similarly broad terms. Section 1.03 notes that “[a] person
manifests assent or intention through written or spoken words or other conduct,”
and the commentary to section 1.03 explains that “[a] manifestation is conduct
by a person, observable by others, that expresses meaning. It is a broader con-
cept than communication.” Id. § 1.03 comment b; see State v. Sines, 359 Or 41,
55-56, __ P3d __ (2016) (citing section 1.03 and observing that “in determining
whether agency exists, the emphasis is on ‘manifestations’ that can be assessed
objectively”).
Cite as 359 Or 715 (2016) 725
Further, when a principal cloaks an agent with
actual authority to perform certain tasks, that actual author-
ity may create the appearance of authority to perform other,
related tasks. Taylor, 345 Or at 411; see Badger, 311 Or at
26 (sales representatives’ actual authority to sell approved
securities lent weight to sales representatives’ apparent
authority to sell unregistered securities). Additionally, when
a principal appoints an agent to a position that carries “gen-
erally recognized duties,” a principal may create apparent
authority to perform those duties. Badger, 311 Or at 24-25
n 9 (quoting Restatement (Second) § 27 comment a).
Regarding the second element of the apparent
authority test—the third party’s reasonable reliance—the
third party must in fact rely on the principal’s representa-
tion in dealing with the apparent agent, and that reliance
must be objectively reasonable. Eads, 351 Or at 737 (citing
Jones, 274 Or at 595-96; Badger, 311 Or at 26). In assess-
ing the reasonableness of the third part’s reliance, a court
must consider what is customary and usual for certain posi-
tions or within certain professions. Eads, 351 Or at 737 n 5
(“Apparent authority also includes concepts of ‘usual author-
ity’ and ‘customary authority’ in determining whether ‘a
substantial basis for a third party’s belief’ exists that the
person with whom the third party dealt was acting as an
agent for a principal in a particular circumstance.”) (quot-
ing Restatement (Third) § 2.03 comment b).
The Restatement (Third) commentary further explains that “an organization
manifests its assent to be bound by the acts of individuals through the observable
connections between the individual and the organization. An organization man-
ifests assent to an individual by appointing that person to a position defined by
the organization.” Id. § 1.03 comment c. Moreover, the commentary emphasizes
that the significance of manifestations by a putative principal must be under-
stood in context:
“A manifestation does not occur in a vacuum, and the meaning that may
reasonably be inferred from it will reflect the context in which the manifesta-
tion is made. Assent and intention may be expressed explicitly, but often they
are inferred from surrounding facts and circumstances. For example, if an
organization hires a person as its purchasing manager, the organization’s act
expresses assent that the person undertake the manager’s role as defined by
the organization.”
Id. at comment e; see Peoples Heritage Sav. Bank v. Pease, 2002 ME 82, ¶¶ 20-21,
797 A2d 1270, 1276 (Me 2002) (genuine issue of material fact whether mortgag-
ee’s employee acted within apparent authority in negotiating terms with mort-
gagors to pay off loans).
726 Harkness v. Platten
We now turn to the Court of Appeals’ analysis of
whether a factfinder could reasonably infer that Kantor
had apparent authority to bind Sunset and Directors to the
loan transactions between plaintiffs and third parties. As
noted, the court focused almost entirely on the nature of the
“investment scheme”4 perpetrated by Kantor as precluding
a factfinder from drawing an inference of apparent author-
ity, because “[i]t was not objectively reasonable for plaintiffs
to believe that that type of investment scheme was part of
Kantor’s job as a ‘loan officer[.]’ ” Harkness, 270 Or App at
273. However, in so narrowing its inquiry, the court disre-
garded, as irrelevant, the evidence concerning the actual
authority with which Sunset and Directors had cloaked
Kantor. Having disregarded that evidence, the court readily
distinguished Badger, a case in which this court concluded
that—under the circumstances presented—sales repre-
sentatives with actual authority to sell approved securities
were apparent agents with authority to sell unregistered
securities.
Because both parties rely on Badger—and the
Court of Appeals found Badger inapposite—we discuss it
in some detail. Badger was a civil case for damages aris-
ing from the sale of unregistered securities to investors by
representatives of an investment company. The investment
company (Paulson) had taken over the investment accounts
from a prior company (Slanker) and had informed custom-
ers that it had taken over the Slanker accounts. 311 Or at
17. Paulson’s sales representatives, Lambo and Kennedy,
who had previously worked for Slanker, then made sales
presentations to those investors, and other investors, at
Paulson’s office and solicited sales of unregistered secu-
rities using Paulson’s letterhead. The unregistered secu-
rities “proved to be valueless.” Id. The investors brought
claims against Paulson, Lambo, and Kennedy for securi-
ties fraud under ORS 59.115 and for common-law fraud.
A jury entered a verdict against Paulson for damages on
4
Although the court referred to Kantor’s fraudulent scheme as an “invest-
ment scheme,” we note that that scheme could just as accurately be referred to as
a “loan scheme,” or an “investment and loan scheme.” Kantor advised plaintiffs
that they could use the equity in their home to obtain “loans” from Sunset and
Directors that could be “invested” by plaintiffs by making secure “loans” to devel-
opers and contractors.
Cite as 359 Or 715 (2016) 727
all claims based on a finding that the representatives had
apparent authority to bind Paulson to the sales. The trial
court set aside the verdict for the investors against Paulson
on the securities claims and a verdict against Paulson for
punitive damages on the common-law claim. Id. at 18. The
Court of Appeals reversed the trial court’s judgment not-
withstanding the verdict and reinstated those verdicts. Id.
at 18-19.
On review, this court concluded that common-law
agency principles may be invoked “to impose liability as
a seller against a principal for an agent’s violation” of the
statutory requirements of ORS 59.115(1) and that “the evi-
dence of an apparent agency relationship between Paulson
and Kennedy and Lambo [was] sufficient to impose lia-
bility on Paulson” under that statute. Id. at 19. The court
quoted from Wiggins v. Barrett & Associates, Inc., 295 Or
679, 687, 669 P2d 1132 (1983), and cited the commentary
to the Restatement (Second) section 27 for the principle that
apparent authority may arise when an agent does not have
actual or implied authority to act for a principal in a mat-
ter, but “the principal has clothed the agent with apparent
authority to act for the principal in that particular. In other
words, the principal permits the agent to appear to have the
authority to bind the principal.” Badger, 311 Or at 24 & n 9
(internal quotation marks omitted).
In reviewing whether the evidence was sufficient
to support a finding that Kennedy and Lambo were “acting
within the apparent authority of Paulson,” this court dis-
cussed the fact that Kennedy and Lambo “were employed
by Paulson as registered representatives” and that Paulson
made it known to its customers that Kennedy was associ-
ated with Paulson:
“When Kennedy went to work for Paulson, it sent its cus-
tomers letters announcing Kennedy’s association with
Paulson. A second letter was sent a short time later to
announce the assignment of Kennedy to several ongoing
customer accounts. With these announcements, Paulson,
who did not inform its customers of any limitations on
Kennedy’s authority to act for Paulson, conferred on
Kennedy the authority to represent Paulson in securities
sales and investment transactions.
728 Harkness v. Platten
“* * * * *
“There is evidence that Paulson provided information
intended to cause third persons to believe that Kennedy
and Lambo were authorized to act for it in matters per-
taining to the sale of securities, including meeting with
customers, making sales presentations, sending mailings
and handling paperwork. Although Paulson may have
forbade its sales representatives to present or sell nonap-
proved securities, liability based on the agency principle of
apparent authority may be imposed even though the princi-
pal expressly forbade the conduct in question. See McClure
v. E.A. Blackshere Company, 231 F Supp 678, 685 (D Md
1964).
“There is also evidence that from the information
provided to them by Paulson, the plaintiffs reasonably
believed that Kennedy and Lambo were authorized to act
for Paulson concerning the securities sold by Kennedy and
Lambo to the plaintiffs. The investors testified to their reli-
ance on this apparent authority.”
Badger, 311 Or at 25-26. This court concluded that the
evidence was sufficient “to support the jury’s verdict that
Kennedy and Lambo conducted the illegal sales with the
apparent authority of Paulson.” Id. at 26.
In this case, the Court of Appeals concluded that
Badger did not aid plaintiffs. The court noted that, in
Badger, the sales representatives had sold both authorized
and unauthorized securities in the same manner and that
the investment company had informed customers that the
sales representatives were authorized to sell securities.
Harkness, 270 Or App at 274. The court then contrasted
those facts with this case, in which “neither Sunset nor
Directors provided any information to plaintiffs from which
they could reasonably conclude that Kantor was authorized
by them to act as a financial advisor to, or engage in invest-
ment schemes with, its mortgage customers.” Id.
We conclude, however, that the Court of Appeals
made two missteps in determining that Sunset and Directors
had made no manifestations from which plaintiffs could rea-
sonably have concluded that Kantor was authorized to per-
form the acts constituting the fraudulent scheme. First, the
court disregarded evidence concerning the actual authority
Cite as 359 Or 715 (2016) 729
with which Sunset and Directors clothed Kantor. Second,
the court does not appear to have considered evidence in the
record relating to the usual or customary authority of a loan
officer for a mortgage company.
As to the first misstep, this court’s case law makes
clear that the appearance of authority may, at least in part,
be based on conduct relating to an agent’s actual authority.
Taylor, 345 Or at 411 (“[W]hen a principal clothes an agent
with actual authority to perform certain tasks, the principal
might create apparent authority to perform other, related
tasks.”); Badger, 311 Or at 26 (sales representatives had
apparent authority to sell unregistered securities when they
had actual authority to sell approved securities). That is so
because, as noted, the rationale for the doctrine of apparent
authority is that a principal must be held accountable for
the results of reasonable third-party beliefs about an actor’s
authority to act as an agent based on manifestations that
are traceable to the principal. One such manifestation is the
actual authority with which the principal has cloaked an
agent. Indeed, much of the commentary to section 1.03 and
section 2.03 of the Restatement (Third) contemplates situ-
ations where an actor for a putative principal is an agent
for the principal for other purposes. See, e.g., Restatement
(Third) § 2.03 comment d (“[A] third party should assess
what is observed of the agent in light of the agent’s position
as a fiduciary with a duty to use authority on behalf of the
principal.”). Thus, evidence of an agent’s actual authority to
perform certain tasks is relevant to determining whether
the agent was apparently authorized to perform other,
related tasks, and the Court of Appeals erred in disregard-
ing that evidence in this case.
As to the second misstep, the Court of Appeals does
not appear to have considered the evidence in the record
concerning the role of a loan officer for a mortgage com-
pany in the local industry. That evidence included excerpts
from a deposition of Todd Johnson, Sunset’s president, in
which Johnson indicated that Sunset was a “mortgage
finance provider” and a “mortgage broker” that used its
own money and the money of others to make real estate
loans and that Kantor was employed on a commission basis
as a loan officer to originate loans. Johnson also testified
730 Harkness v. Platten
that there could be “a time that a hard money loan would
be a benefit” as part of his “creative approach” to making
loans, that a good loan officer could tell clients to utilize the
equity in their real property to make money, and that his
loan officers were encouraged to go out and find business.
As we stated in Eads, apparent authority “includes concepts
of ‘usual authority’ and ‘customary authority’ in determin-
ing whether ‘a substantial basis for a third party’s belief’
exists that the person with whom the third party dealt was
acting as an agent for a principal in a particular circum-
stance.” 351 Or at 738 n 5 (citing Restatement (Third) § 2.03
comment b); see also Taylor, 345 Or at 413 (reasonable reli-
ance on apparent authority where owner’s general contrac-
tor testified that it was customary to obtain warranties in
writing). Accordingly, evidence relating to Kantor’s usual or
customary role as a loan officer was relevant to the determi-
nation whether plaintiffs reasonably believed that Kantor
had apparent authority, and that evidence should not have
been disregarded by the Court of Appeals.
We now turn to the sufficiency of the evidence for
a factfinder to infer that Kantor had apparent authority to
bind Sunset and Directors to the loan transactions arranged
by Kantor between plaintiffs and third parties. We review
the grant of a directed verdict against a party in the light
most favorable to that party—here, the plaintiffs—and we
draw all inferences from the evidence in plaintiffs’ favor.
Trees, 354 Or at 200.
The record in this case includes evidence that
Kantor was employed successively by two mortgage compa-
nies, Sunset and Directors, as a “loan officer” during a period
of time when Kantor defrauded plaintiffs by use of an invest-
ment or loan scheme. The scheme consisted of Kantor advis-
ing plaintiffs to take out conventional loans from Sunset and
Directors using the equity in their home as collateral and
using the proceeds to make hard-money loans to contrac-
tors and developers as arranged by Kantor. Unbeknownst
to plaintiffs, and contrary to Kantor’s representations, those
loans by plaintiffs were not secured, and Kantor retained
some of the proceeds from those loans for her own benefit.
Kantor used Sunset and Directors offices, letterhead, and
Cite as 359 Or 715 (2016) 731
staff in the presence of plaintiffs during this period of time.
Neither mortgage company informed plaintiffs of any lim-
itations on Kantor’s authority as a “loan officer” to act for
those companies in matters pertaining to loans or financial
investment. As noted, Sunset’s president, Johnson, testified
that Sunset was a “mortgage finance provider” and a “mort-
gage broker” and that Kantor was employed on a commis-
sion basis as a loan officer to originate loans. Johnson also
testified that a good loan officer could tell clients to utilize
the equity in their real property to make money and that his
loan officers were encouraged to go out and find business.
Finally, Mrs. Harkness testified that she would not have
entered into the loan transactions if Kantor had not been
working with Sunset and Directors and that she believed
that Kantor had been acting within the scope of her employ-
ment in all of her dealings with plaintiffs.
Viewing that evidence in the light most favorable
to plaintiffs, we conclude that a reasonable factfinder could
infer that Sunset and Directors manifested their assent to be
bound by the acts of Kantor through the observable connec-
tions between Kantor and those organizations. Restatement
(Third) § 1.03 comment c. As we have explained, a factfinder
in this case could consider all of the relevant conduct of
Sunset and Directors in the context of those organizations
having hired Kantor as a “loan officer,” given Kantor actual
authority to perform the tasks of a loan officer, and placed
her in their offices without notice to customers of any lim-
itation on her authority or fiduciary duties as a loan offi-
cer. Under those circumstances, a factfinder could infer that
Sunset and Directors manifested their assent to be bound
to the loan transactions between plaintiffs and third parties
arranged by Kantor. Taylor, 345 Or at 410-11; Badger, 311
Or at 24-25; Restatement (Third) § 2.03.5
5
Defendant’s argument that Sunset and Directors did nothing to create the
appearance of authority for Kantor to act “as a financial advisor and propose, and
then carry out, an investment scheme involving the placement of private loans”
misses the mark. Plaintiffs do not seek to hold Sunset and Directors liable under
an apparent authority theory for Kantor’s financial advice. Rather, plaintiffs
seek to bind Sunset and Directors to the loan transactions arranged by Kantor.
The evidence that we have recited provides a basis for a factfinder to draw an
inference that Kantor—as a “loan officer” hired by Sunset and Directors—was
authorized to facilitate the receipt of loans to plaintiffs from those companies and
to arrange for plaintiffs to make loans to third parties.
732 Harkness v. Platten
We further conclude that a reasonable factfinder
could infer from the evidence that it was reasonable for plain-
tiffs to believe that Kantor was authorized—as a loan offi-
cer for Sunset and Directors—to engage in the investment
and loan scheme on behalf of those companies. In particular,
a factfinder could infer that plaintiffs reasonably believed
that Kantor’s actions were part of her usual or customary
authority as a loan officer hired by Sunset and Directors to
make and arrange loans on behalf of the mortgage compa-
nies. See Eads, 351 Or at 738 n 5 (concepts of “usual author-
ity” and “customary authority” help inform determination
whether third party’s reliance was reasonable).
Additionally, we find the Restatement (Third) com-
mentary instructive on the question of the reasonableness
of plaintiffs’ belief. Comment d to section 2.03 notes that,
where “a third party knows that the actor in question is
an agent and knows the identity of the principal, the third
party should assess what is observed of the agent in light of
the agent’s position as a fiduciary with a duty to use author-
ity on behalf of the principal.” Restatement (Third) § 2.03 at
comment d. With respect to particular transactions, such
as the loan transactions in this case, a third party should
consider whether it appears to be reasonably related to the
principal’s known business. Id. “Absent circumstances that
should raise questions in the mind of a reasonable third
party, as a general matter there is no requirement that
the third party inquire into the scope of an agent’s author-
ity.” Id. Here, plaintiffs knew that Kantor was an agent of
Sunset and Directors and observed Kantor in light of her
position as a fiduciary with a duty to use authority on behalf
of Sunset and Directors. Under the circumstances described
above, plaintiffs could reasonably have believed that all the
loans were reasonably related to Sunset’s and Directors’
business, and that Kantor was acting within her fiduciary
duty as a “loan officer.”
Finally, we consider plaintiffs’ argument that
the trial court erred in granting defendant’s motion for a
directed verdict on plaintiffs’ noncontract claims under
a theory of respondeat superior. The Court of Appeals did
not reach plaintiffs’ argument that the trial court failed to
determine the vicarious liability of Sunset and Directors on
Cite as 359 Or 715 (2016) 733
those claims, because, in its view, plaintiffs did “not raise or
develop any legal arguments as to how [the] evidence meets
the respondeat superior elements.” Harkness, 270 Or at 271
n 6. We disagree. In their brief on appeal, plaintiffs argued,
“The trial court in this case conflated the concept of
respondeat superior liability for tort claims with the concept
of apparent authority that applied to the breach of contract
claims in the Kantor lawsuit, although the Harnesses’ trial
counsel pointed out the difference. As a practical matter,
however, it only makes a potential difference with respect to
the second element for respondeat superior liability—that
the employee must have been motivated, at least partially,
by a purpose to serve the employer—which is not part of
the test for apparent authority. The evidence for the first
and third elements—that the conduct must have occurred
substantially within the time and space limits authorized
by the employment, and the act must have been of a kind
that the employee was hired to perform—is the same as the
evidence for Kantor’s apparent authority discussed above
with respect to the breach of contract claim.
“The evidence for the second element of respondeat supe-
rior liability is, however, present in the fact that Kantor
persuaded the Harknesses to obtain the funds which she
would then purportedly lend to other borrowers by taking
out loans from Sunset and Directors, using their equities
in first their residence and then a rental house that they
owned as collateral. A jury could find that these loans to
the Harknesses, which Kantor arranged in her capacity
as a loan officer with first Sunset and then Directors, had
a partial purpose to benefit, and did benefit, those two
employers.
“Because of these flaws in the trial court’s analysis, it
never addressed the substance of the Harknesses[’] other
claims alleged against Kantor, Sunset, and Directors in the
Kantor lawsuit. The evidence summarized in the Summary
of Facts, above, established most, if not all of those claims
as they were alleged in the Second Amended Complaint in
that case.”
(Record citations omitted.)
We conclude that plaintiffs sufficiently developed
their argument on appeal that the trial court failed to
determine the vicarious liability of Sunset and Directors
734 Harkness v. Platten
on plaintiffs’ noncontract claims, and we therefore reach
that argument. Again, on review of the grant of defendant’s
motion for a directed verdict, we view the evidence and draw
all reasonable inferences in plaintiffs’ favor. Trees, 354 Or
at 200. Based on the evidence we have discussed in rela-
tion to plaintiffs’ theory of apparent authority, we also con-
clude that a factfinder could infer that the requirements for
holding an employer vicariously liable under the doctrine of
respondeat superior are met in this case.
This court has summarized those requirements as
follows:
“Under the doctrine of respondeat superior, an employer
is liable for an employee’s torts when the employee acts
within the scope of employment. Negligence or other tor-
tious conduct by the employer is not required. * * *
“Three requirements must be met to conclude that
an employee was acting within the scope of employment.
These requirements traditionally have been stated as:
(1) whether the act occurred substantially within the
time and space limits authorized by the employment;
(2) whether the employee was motivated, at least partially,
by a purpose to serve the employer; and (3) whether the act
is of a kind which the employee was hired to perform.”
Chesterman v. Barmon, 305 Or 439, 442, 753 P2d 404 (1988)
(citation omitted).
In this case, based on the same evidence that plain-
tiffs presented regarding apparent authority, a reasonable
factfinder could infer that the above three requirements
have been met:
(1) Kantor’s acts occurred substantially within the time
and space limits authorized by the employment;
(2) Kantor’s conduct as a “loan officer” in loaning funds
to plaintiffs based on the equity in their different
properties and then facilitating the lending of those
funds to other borrowers for plaintiffs’ investment
purposes was motivated, at least in part, by a pur-
pose to serve her employers, and
(3) Kantor’s conduct described above was a kind that
Kantor was hired to perform as a “loan officer.” In
Cite as 359 Or 715 (2016) 735
particular, and as previously described, there was
evidence that Sunset was a “mortgage finance pro-
vider” and a “mortgage broker” and that Kantor
was employed on a commission basis as a loan offi-
cer to originate loans. Sunset’s president, Johnson,
also testified that a good loan officer at Sunset could
tell clients to utilize the equity in their real property
to make money.
Thus, the trial court erred in allowing defendant’s motion
for directed verdict on plaintiffs’ theory of respondeat supe-
rior. See Stanfield, 284 Or 651, 655, 588 P2d 1271 (1978)
(“question of whether or not an employee has acted within
the scope of his employment at any given time is normally a
question for the jury, except in cases where only one reason-
able conclusion can be drawn from the facts”).
We conclude, then, that the trial court erred in
allowing defendant’s motion for a directed verdict and
that the Court of Appeals erred in affirming that decision.
Accordingly, we remand to the trial court for further pro-
ceedings consistent with this opinion.
The decision of the Court of Appeals is reversed.
The judgment of the circuit court is reversed, and the case
is remanded to the circuit court for further proceedings.
|
We are the Turtle Group here at www.3fatchicks.com. We welcome you to join us as we work toward good health and fitness in a persistent manner. As our inspiration we use the race between the turtle and the hare where the turtle was the victor because he didn't give up. We believe in keepin' on even when the odds are against us. We believe in giving each other support. Good luck to us all!
I hope i don't offend anyone by getting this thread started being the new girl and all. I had my weigh in on Wed. morning and went from 212 to 210.5. I have been struggling with emotional eating because i have been stressed over looking for a new house. I hope that everyone else is having an OP day.
Dear Cherry Autumn and all the Turtles,
Glad to see you on this new thread! Congrats on your great weight loss, Cherry!!! Weigh to go. Keep up the good work. I bet 1/2 the people trying to lose weight are emotional eaters. The great thing about WW's is that it tries to have you think of optional things to do instead of eating when you're emotional or under stress.
I'm having a good week even though it's hectic. I'm trying to listen to how my body feels and am trying much harder to eat only when I'm hungry.
Have a great weekend, everyone.
Judy Itryharder
234.6/220/thinner into onederland
Dear Turtles,
Tomorrow is my WI and I'm hoping I'll be down a smidge or so. Princess, I hear you loud and clear about your weight gain. All I can think to say is that now you've stopped taking meds your weight will go down again and I say to you for going to your WI even though you knew you'd be up.
It's the denial and ignoring the weight gain that got me every time and before I knew it the six pounds became ten became twenty. So, I' m sending you a to keep your spirits up. Thanks for chiming in and I know you'll make this a good week.
Ariana, are you settled in your new place yet?
Bandit, how are you doing? We've had so much rain and cold weather here lately. Are you getting the same? Is your dd back at school yet?
Chrily, how are you feeling?
Not much new going on around here... just busy getting DS ready to go off to college tomorrow...
I have started a class for my project management certification that is just stressful and a huge mountainous work load comes with the class... the good news is that it only last 12 weeks so it is all do-able but it is a total of class time plus another 200-300 hours worth of studying for the next 3 months.
The scale is not budging so I really need to start watching my daily intake more and I need to get out and do more walking.
Hi Turtles,
I posted earlier, but it didn't take. Anyway, my weight stayed the same this week, but at least I didn't gain. Now I have exercised two days in a row and am counting on that to do the trick. We have non-stop company and parties in the next couple of weeks, so I have to get out early tomorrow and stock the house with more fruit and veggies to help keep me on track. Good luck to us all.
Judy
Dear Cherry,
Of course you can post here. We love to see your progress. This isn't an "official" WW site==we just are a group of gals who use WW's to lose weight. We really encourage each other as best we can , so we're happy to have you here. I have a feeling we all "tweak" WW's every once in awhile to shake up our weight loss.
Hey, congrats on such a wonderful loss already.
Judy
I'll be busy this weekend, but I'll try and chime in--so far 2 days down and I exercised both days. I've gotta keep that up.
Thanks for letting me stick around. I am disappointed in myself. I can't seem to even stay motivated and have enough willpower for one day. I just don't know what to do. I cannot give up because i have to do this for my health. It gets so frustrating having to fight myself everyday.
Hi Turtles,
I got on the treadmill Sat. and Sun. even though family members were here.
Trying to put myself on the important list! Eating could have been better, but it was pretty decent and I'm pleased.
Cherry, a lot of us have gone through (or are going through) what you are right now with motivation. One suggestion is to take baby steps. Keep saying in your mind, "I can do this this hour". Fake it till you make it. Drink your water, write down every single thing you eat (you'll think twice about eating it if you have to write it down) and get in some movement each day.
Don't beat yourself up, congratulate yourself on what you're doing right, and keep on keepin' on. None of this is easy, but it is doable. and for posting.
Hi Turtles,
Wondering where everyone has gone to. I am making a new start this morning. I am just going to do the best I can.
Judy, thanks for all of the support. My husband tells me I am to hard on myself and that i am doing a good thing. I have very low self esteem so i need to work on that and look for the positive in what i am doing and quite seeing myself as a failure. Cause i know i am really not a failure
Well I went to W/I on Saturday... I was down .8... not much but I will take it as I thought that I had gained even more from last time. I am back on the meds again but that is ok... I am going to really track and watch what I eat and get outside and get walking... along with the pilates classes I should be back on track in no time.
Sorry I have been MIA lately... the work load from this class that I am taking is crushing so I have no extra time anymore.
I made a big pot of the Garden Vegetable Soup this weekend for lunches and it turned out very good! I forgot how much I liked that until I was trying to come up with low point lunch items... I have just been plowing thru my points so early in the day that it is almost a given that I will be over by the end of the day... this will help though.
I have to run but will check back later on...
Autumn... I think we all suffer from low self esteem in one form or another... I think that is a huge contributor as to why we end up over weight... food = comfort. You are doing great though... don't stress and just keep on going, you will be fine!
Ladies -- a quick note to tell you that I am well and hope that you are the same. I'm putting in some OT during lunch, my primary posting time, and I will continue to do so until I can't take it anymore, so I will be quiet for quite a while. I'm sorry to be gone so long. Take care ladies, and be well. I will see you all in a while...
__________________ Goal for w/e Nov 30 -- Survive this work push, keep eating the healthy pre-prepared food. Bring a scale, a tiny (desert) fork and spoon to Thanksgiving to make it last longer and weigh my portions before I eat. Plan on weighed seconds so I don't feel deprived.
Original Before WW: 206. Lifetime Max Goal: 140. Personal Goal: 130.
I had my weigh in this morning and i was 210. Last week i was 209.5 but during the week peaked at 211.5 so i guess that atleast i got back down to 210. I have only been counting calories for a couple days so i think i just need to give it a chance to work. I did have 8 glasses of water yesterday which was an improvement for me.
Princess - Great job on the weightloss. Every little bit counts. It is much better than going up. |
Ignacy Machowski
Ignacy Machowski (5 July 1920 – 11 January 2001) was a Polish actor. He appeared in more than fifty films from 1954 to 1999.
Selected filmography
References
External links
Category:1920 births
Category:2001 deaths
Category:Polish male film actors |
The Shameful Treatment Of Bradley Manning
Pfc. Bradley Manning is being treated worse than a Prisoner Of War, and he hasn't been convicted of a crime yet.
Doug Mataconis · · 36 comments
As James Joyner noted yesterday, Pfc. Bradley Manning, currently being held in the brig on the Marine base at Quantico, Virginia, was forced to spend most of two nights this week naked in his cell for reasons that were never made clear. Today, The New York Times reports that that this will be a permanent condition for Manning for the foreseeable future:
WASHINGTON — Pfc. Bradley E. Manning, the Army intelligence analyst accused of leaking government files to WikiLeaks, will be stripped of his clothing every night as a “precautionary measure” to prevent him from injuring himself, an official at the Marine brig at Quantico, Va., said on Friday. Private Manning will also be required to stand outside his cell naked during a morning inspection, after which his clothing will be returned to him, said a Marine spokesman, First Lt. Brian Villiard. “Because of recent circumstances, the underwear was taken away from him as a precaution to ensure that he did not injure himself,” Lieutenant Villiard said. “The brig commander has a duty and responsibility to ensure the safety and well-being of the detainees and to make sure that they are able to stand trial.” Private Manning is a maximum-security detainee under “prevention of injury watch,” a special set of restrictions — a step his supporters, who contend that he is not suicidal, have said is unjustified. He has not been elevated to the more restrictive “suicide watch” conditions. Lieutenant Villiard said the new rule on clothing, which would continue indefinitely, had been imposed by the brig commander, Chief Warrant Officer Denise Barnes. He said that he was not allowed to explain what prompted it “because to discuss the details would be a violation of Manning’s privacy.”
David Coombs, Manning’s chief defense lawyer rejected the “mental health” justification outright:
There can be no conceivable justification for requiring a soldier to surrender all his clothing, remain naked in his cell for seven hours, and then stand at attention the subsequent morning. This treatment is even more degrading considering that PFC Manning is being monitored — both by direct observation and by video — at all times. The defense was informed by Brig officials that the decision to strip PFC Manning of all his clothing was made without consulting any of the Brig’s mental health providers.
As Coombs went on to say in a phone interview with the Times that if brig officials truly beleived that Manning’s mental health was an issue, then the appropriate response is to get him treatment, not to force him to be naked seven hours a day.
As Glenn Greenwald notes, there really only seems to be one purpose behind what Manning is being subjected to:
Let’s review Manning’s detention over the last nine straight months: 23-hour/day solitary confinement; barred even from exercising in his cell; one hour total outside his cell per day where he’s allowed to walk around in circles in a room alone while shackled, and is returned to his cell the minute he stops walking; forced to respond to guards’ inquiries literally every 5 minutes, all day, everyday; and awakened at night each time he is curled up in the corner of his bed or otherwise outside the guards’ full view. Is there anyone who doubts that these measures — and especially this prolonged forced nudity — are punitive and designed to further erode his mental health, physical health and will? As The Guardian reported last year, forced nudity is almost certainly a breach of the Geneva Conventions; the Conventions do not technically apply to Manning, as he is not a prisoner of war, but they certainly establish the minimal protections to which all detainees — let alone citizens convicted of nothing — are entitled.
Moreover, Greenwald points out, correctly I think, the media seems to be giving the Obama Administration a pass here:
I’ll say this again: just fathom the contrived, shrieking uproar from opportunistic Democratic politicians and their loyalists if it had been George Bush and Dick Cheney — on U.S. soil — subjecting a whistle-blowing member of the U.S. military to these repressive conditions without being convicted of anything, charging him with a capital offense that statutorily carries the death penalty, and then forcing him to remain nude every night and stand naked for inspection outside his cell. Feigning concern over detainee abuse for partisan gain is only slightly less repellent than the treatment to which Manning is being subjected.
Indeed. It’s understandable, to be honest, why the right wouldn’t care all that much about how Private Manning is being treated. If this were happening under a Republican, though, the left would be united in outrage. Now, their silence is telling
Make no mistake about it. I do not consider Bradley Manning a hero in any sense of the word. Even if it were the case that much of the material that Manning stole from military computers should not have been classified, or really wasn’t all that important (and much of it wasn’t in the end), that isn’t a decision that a Private in the Army has a right to make. If the charges against him are true, he violated orders, accessed systems he had no right to access, and stole information that he had no right to take off base. If he’s convicted of these charges, he deserves to be punished to the fullest extent of the law. While he’s awaiting trial, though, and even after he’s convicted, he still must be treated humanely and, at present, Manning is receiving worse treatment than a Prisoner Of War would, and the only purpose behind it seems to be to break him psychologically. That’s simply unacceptable. |
1. Field of the Invention:
This invention relates to improved foam materials, particularly for food service and food packaging applications. These foams are made from starshaped polymers with a plurality of poly(hydroxyacid) chains (polylactide, polyglycolide, polycaprolactone, etc.) attached to a central polyfunctional compound having a plurality of hydroxyl and/or amino groups.
The materials of this invention are degradable, both biodegradable and hydrolyzable. Furthermore, they are foamed with environmentally benign gas and so contain no stratosphere ozone-depleting chemicals nor chemicals that have significant low altitude smog forming photochemical ozone producing reactivity. They have little global warming potential compared to chlorofluorocarbon (CFC) blowing agents. Thus, this invention provides readily degradable foam packaging materials with minimal environmental impact.
2. Description of the Related Art:
Copending and commonly assigned U.S. patent application Ser. No. 07/826,357, allowed Mar. 3, 1992, relates to poly(hydroxy acid) foam materials. The polymers for the foams of the present invention are branched star polymers containing hydroxy acidic acid units polymerized with other units that greatly enhance their foaming capabilities and the properties of the resultant foams.
At the present time, the most commonly used food service and food packaging materials are light weight closed cell foamed polystyrene, usually foamed with chlorofluorocarbon (CFC) or hydrocarbon (HC) blowing agents. These products pose serious environmental problems.
First, polystyrene is not degradable, either in landfills or as roadside litter. Thus, unless collected and recycled, polystyrene foam products have an unlimited litter life.
Second, CFC blowing agents trapped in the foam products, which make up a high volume percentage of the products, eventually escape to the stratosphere where the chlorine enters an ozone-depletion cycle.
Third, if HC blowing agents are used in place of CFCs, upon release from the foam they are photochemically reactive and thus promote smog formation. Also, they are flammable.
Thus, there is a need for light weight closed cell foam of a degradable resin foamed by a blowing agent that does not enter into chemical reactions that cause environmental damage.
Degradable polylactides are shown in Murdoch U.S. Pat. No. 4,766,182 (Aug. 23, 1988) and 4,719,246 (Jan. 12, 1988). These patents also disclose forming open cell porous structures by the extraction of solvent from polylactide gel. These open cell structures cannot be used for containers for wet foods such as meats and drinks. Also, to the extent any of Murdoch's blowing agents are present in the porous product, they are not environmentally benign.
Battelle WO 90/01521 published Feb. 22, 1990 discloses degradable polylactide resins, and their processing into solid films. The films may be made into "foam" structures by dissolving therein a mixture of petroleum ether and methylene chloride, and then placing the film into boiling water to volatilize the liquid mixture. The Battelle "foam" films are irregular and unsuitable. Also, upon degradation these products will release a high volume percent of hydrocarbons that are deleterious to the atmosphere.
Zhu et al "Super Microcapsules (SMC). I. Preparation and Characterization of Star Polyethylene Oxide (PEO)-Polylactide (PLA) Copolymers.", Journal of Polymer Science: Part A: Polymer Chemistry, Vol 27, pages 2151-2159 (1989) describe polymerization of lactide from 3-arm and 4-arm hydrophilic poly (ethylene oxide) with hydroxylterminated arms.
Polylactic acid (PLA) polymers often show a very rapid drop in melt viscosity with increasing processing temperature. At temperatures which are high enough to allow processing of semicrystalline PLA polymers, the melt viscosity drops very fast (partly because of thermal degradation). As a result, a number of PLA melts have a low melt strength, which may affect the foam-forming capacity of these polymers. An ideal foam-forming PLA polymer should combine a lower processing temperature to limit thermal degradation during processing with a higher melt strength to improve the foam-forming capacity. Such combination of desirable features are approached with branched (star) PLA polymers used in the foams of the present invention.
A number of blowing agents, including fluorohydrocarbons, are known in the art. Spitzer U.S. Pat. No. 4,422,877 (Feb. 4, 1982) shows the use of a number of blowing agents, including 1,1-difluoroethane, to form foams from a number of resins. However, no PHA foam articles are disclosed.
Walter U.S. Pat. No. 4,988,740 (Jan. 29, 1991, filed Jun. 15, 1989) discloses closed cell elastic foam material made from elastomeric polymer. No rigid foam products are disclosed.
"The Elements of Expansion of Thermoplastics", Part I and Part II, James G. Burt, Journal of CELLULAR PLASTICS, May/June 1979 (Part I) and November/December 1978 (Part II) disclose in detail the mechanics of meltfoaming thermoplastic resins. This article, while not disclosing PHA foams, sets forth a large number of requirements that must be met by the foaming ingredients to prepare an acceptable foam product, such as: amount of plasticization of the molten resin by the blowing agent; volatility of the blowing agent at foaming temperature; speed of solidification of the blown resin on cooling; heat transfer necessary for solidification; molecular migration of the blowing agent through the blown cell walls; melt viscosity and melt strength of the resin during the cooling/solidification; the rate of change of polymer viscosity with temperature; and a number of other properties. One concludes that the suitability of particular polymeric resins to be foamed can be determined only by trial and error.
HFC manufacture is known in the art. See "Aliphatic Fluorine Compounds", A. M. Lovelace et al. (1958), p. 55.
The above patents, patent application and literature references are incorporated herein in total and made a part of this patent application. |
[lit-ideas] Re: Canadians foil terror plot
From: JimKandJulieB@xxxxxxx
To: lit-ideas@xxxxxxxxxxxxx
Date: Sat, 3 Jun 2006 19:12:02 EDT
<<Ken, who is now
known to be gay (thanks to The Negro Problem)>>
This has to be one of the ultimately most obscure sentences I've read on
this list. Even including the Schoepenhauer (sp?) thread.
Julie Krueger
========Original Message======== Subj: [lit-ideas] Re: Canadians foil
terror plot Date: 6/3/06 5:54:47 P.M. Central Daylight Time From:
_atlas@xxxxxxxxxxxxxx (mailto:atlas@xxxxxxxxxxxxx) To:
_lit-ideas@xxxxxxxxxxxxxx
(mailto:lit-ideas@xxxxxxxxxxxxx) Sent on:
EY:
> Mommy good, Daddy bad. Yeah I know. I know.
Huh? I was just trying to keep you from inadvertently disqualifying
yourself from the military by associating yourself with Ken, who is now
known to be gay (thanks to The Negro Problem) and is therefore banned from
the Army and the Catholic priesthood (yeah, right). I have no idea what
your response means.
Mike Geary
just trying to help
----- Original Message -----
From: "Eric Yost" <eyost1132@xxxxxxxxxxxxx>
To: <lit-ideas@xxxxxxxxxxxxx>
Sent: Saturday, June 03, 2006 5:00 PM
Subject: [lit-ideas] Re: Canadians foil terror plot
> Mike: Ken is now considered gay and I'd hate for you to identify yourself
> with him and lose your chance to kill Islamists.
>
>
> Mommy good, Daddy bad. Yeah I know. I know.
>
> ------------------------------------------------------------------
> To change your Lit-Ideas settings (subscribe/unsub, vacation on/off,
> digest on/off), visit www.andreas.com/faq-lit-ideas.html
>
------------------------------------------------------------------
To change your Lit-Ideas settings (subscribe/unsub, vacation on/off,
digest on/off), visit www.andreas.com/faq-lit-ideas.html |
Former Bristol Rovers striker Matt Harrold would love to stay at Crawley Town for fourth season
Graham Carter
Crawley Town Fans’ favourite Matt Harrold has admitted he would love to stay on for a fourth season at Crawley Town.
The former Bristol Rovers player has been offered a new deal along with Lewis Young and is considering his options before signing.
He is loved by fans, having played a variety of roles since being signed by John Gregory in June 2014.
Harrold said: “I haven’t signed yet but I’d love to stay at Crawley; I think everyone can see whenever I put on a Crawley shirt it matters to me and I always give 100 per cent.
“I’ve played in goal, been temporary manager, fans will have seen I always give my all.”
Harrold’s season last season was ruined by injury. Major Achilles injuries to both feet, plus a lengthy recovery following a knee operation restricted him to making just 15 appearances, scoring one goal.
This was a distinct contrast to 2015-16 when he made 39 appearances and scored nine goals.
He said: “At first I had my doubters but then I proved myself with a good season. Last season was frustrating, the most frustrating of my life.
“I really hope to stay at Crawley. I’ve spoken to a few clubs and I will make a decision.” |
Manipulative therapy in the treatment of benign cervicobrachialgia of mechanical origin.
The authors compared two methods of rehabilitation, traditional physical therapy and manual therapy, in the treatment of benign cervicobrachialgia of mechanical origin, typical of young subjects, generally consequent to mild and moderate trauma, occasional strain or incorrect posture repeated in time. A MID (minor intervertebral deficit) is at its origin, characterized by the absence of objective instrumental signs (X-ray, CT scan, MRI) and it is only diagnosed based on clinical history and accurate physical examination of the spine segment involved. A sample of 80 patients was divided at random into two groups: the first group was submitted to traditional physiotherapy, the second to manipulative therapy carried out according to the French method of R. Meigne. The results obtained, which were evaluated by univaried ANOVA and Student's "t" test statistical analysis, showed the greater effectiveness of manipulative treatment, in the short term and in the long term. |
Public keys (701):
[#KEY] type [ui32] 75693332 len [ 4] attr [88] handler [000371C8] -> ATTR_CONST|ATTR_READ
[$Adr] type [ui32] 75693332 len [ 4] attr [88] handler [2000081C] -> ATTR_CONST|ATTR_READ
[$Num] type [ui8 ] 75693820 len [ 1] attr [D0] handler [00023DE5] -> ATTR_FUNCTION|ATTR_WRITE|ATTR_READ
[+LKS] type [flag] 666C6167 len [ 1] attr [90] handler [000222D9] -> ATTR_FUNCTION|ATTR_READ
[AC-A] type [flag] 666C6167 len [ 1] attr [C0] handler [200004E0] -> ATTR_WRITE|ATTR_READ
[AC-D] type [ui8 ] 75693820 len [ 1] attr [50] handler [00012F21] -> ATTR_FUNCTION|ATTR_WRITE
[AC-E] type [flag] 666C6167 len [ 1] attr [50] handler [00012F41] -> ATTR_FUNCTION|ATTR_WRITE
[AC-I] type [ui16] 75693136 len [ 2] attr [80] handler [200004B0] -> ATTR_READ
[AC-N] type [ui8 ] 75693820 len [ 1] attr [88] handler [0003602E] -> ATTR_CONST|ATTR_READ
[AC-R] type [ui8 ] 75693820 len [ 1] attr [D0] handler [00012FBB] -> ATTR_FUNCTION|ATTR_WRITE|ATTR_READ
[AC-U] type [flag] 666C6167 len [ 1] attr [D0] handler [00012F99] -> ATTR_FUNCTION|ATTR_WRITE|ATTR_READ
[AC-V] type [hex_] 6865785F len [ 4] attr [88] handler [200004C4] -> ATTR_CONST|ATTR_READ
[AC-W] type [si8 ] 73693820 len [ 1] attr [90] handler [00012FF3] -> ATTR_FUNCTION|ATTR_READ
[AC-h] type [ui8 ] 75693820 len [ 1] attr [C0] handler [200004A1] -> ATTR_WRITE|ATTR_READ
[AC-l] type [ui8 ] 75693820 len [ 1] attr [C0] handler [200004A0] -> ATTR_WRITE|ATTR_READ
[AC-p] type [ui8 ] 75693820 len [ 1] attr [C0] handler [2000049F] -> ATTR_WRITE|ATTR_READ
[AC-s] type [ui16] 75693136 len [ 2] attr [C0] handler [200004BA] -> ATTR_WRITE|ATTR_READ
[AC-t] type [ui16] 75693136 len [ 2] attr [C0] handler [200004E2] -> ATTR_WRITE|ATTR_READ
[ACDI] type [ui16] 75693136 len [ 2] attr [80] handler [20001806] -> ATTR_READ
[ACEN] type [ui8 ] 75693820 len [ 1] attr [90] handler [00013F41] -> ATTR_FUNCTION|ATTR_READ
[ACFP] type [flag] 666C6167 len [ 1] attr [80] handler [20001AB6] -> ATTR_READ
[ACIC] type [ui16] 75693136 len [ 2] attr [80] handler [20001A84] -> ATTR_READ
[ACIN] type [flag] 666C6167 len [ 1] attr [80] handler [20000550] -> ATTR_READ
[ACLM] type [ui16] 75693136 len [ 2] attr [D1] handler [00018357] -> ATTR_PRIVATE_WRITE|ATTR_FUNCTION|ATTR_WRITE|ATTR_READ
[ACPW] type [ui32] 75693332 len [ 4] attr [D1] handler [00018727] -> ATTR_PRIVATE_WRITE|ATTR_FUNCTION|ATTR_WRITE|ATTR_READ
[ACVM] type [flag] 666C6167 len [ 1] attr [C0] handler [20000490] -> ATTR_WRITE|ATTR_READ
[ADC0] type [ui16] 75693136 len [ 2] attr [80] handler [20001824] -> ATTR_READ
[ADC1] type [ui16] 75693136 len [ 2] attr [80] handler [20001826] -> ATTR_READ
[ADC2] type [ui16] 75693136 len [ 2] attr [80] handler [20001828] -> ATTR_READ
[ADC3] type [ui16] 75693136 len [ 2] attr [80] handler [2000182A] -> ATTR_READ
[ADC4] type [ui16] 75693136 len [ 2] attr [80] handler [2000182C] -> ATTR_READ
[ADC5] type [ui16] 75693136 len [ 2] attr [80] handler [2000182E] -> ATTR_READ
[ADC6] type [ui16] 75693136 len [ 2] attr [80] handler [20001830] -> ATTR_READ
[ADC7] type [ui16] 75693136 len [ 2] attr [80] handler [20001832] -> ATTR_READ
[ADC8] type [ui16] 75693136 len [ 2] attr [80] handler [20001834] -> ATTR_READ
[ADC9] type [ui16] 75693136 len [ 2] attr [80] handler [20001836] -> ATTR_READ
[ADCa] type [ui16] 75693136 len [ 2] attr [80] handler [20001838] -> ATTR_READ
[ADCb] type [ui16] 75693136 len [ 2] attr [80] handler [2000183A] -> ATTR_READ
[ADCc] type [ui16] 75693136 len [ 2] attr [80] handler [2000183C] -> ATTR_READ
[ADCd] type [ui16] 75693136 len [ 2] attr [80] handler [2000183E] -> ATTR_READ
[ADCe] type [ui16] 75693136 len [ 2] attr [80] handler [20001840] -> ATTR_READ
[ADCf] type [ui16] 75693136 len [ 2] attr [80] handler [20001842] -> ATTR_READ
[ADCg] type [ui16] 75693136 len [ 2] attr [80] handler [20001844] -> ATTR_READ
[ADCh] type [ui16] 75693136 len [ 2] attr [80] handler [20001846] -> ATTR_READ
[ADCi] type [ui16] 75693136 len [ 2] attr [80] handler [20001848] -> ATTR_READ
[ADCj] type [ui16] 75693136 len [ 2] attr [80] handler [2000184A] -> ATTR_READ
[ADCk] type [ui16] 75693136 len [ 2] attr [80] handler [2000184C] -> ATTR_READ
[ADCl] type [ui16] 75693136 len [ 2] attr [80] handler [2000184E] -> ATTR_READ
[ADCm] type [ui16] 75693136 len [ 2] attr [80] handler [20001850] -> ATTR_READ
[ADCn] type [ui16] 75693136 len [ 2] attr [80] handler [20001852] -> ATTR_READ
[ADSC] type [hex_] 6865785F len [ 1] attr [80] handler [200004E9] -> ATTR_READ
[AL! ] type [ui16] 75693136 len [ 2] attr [C0] handler [200004FA] -> ATTR_WRITE|ATTR_READ
[ALCI] type [ui8 ] 75693820 len [ 1] attr [80] handler [200004F8] -> ATTR_READ
[ALI0] type [{ali] 7B616C69 len [ 4] attr [90] handler [0001529D] -> ATTR_FUNCTION|ATTR_READ
[ALI1] type [{ali] 7B616C69 len [ 4] attr [90] handler [000152BB] -> ATTR_FUNCTION|ATTR_READ
[ALIT] type [ui8 ] 75693820 len [ 1] attr [D0] handler [00015541] -> ATTR_FUNCTION|ATTR_WRITE|ATTR_READ
[ALP0] type [{alp] 7B616C70 len [ 4] attr [D0] handler [000152D9] -> ATTR_FUNCTION|ATTR_WRITE|ATTR_READ
[ALP1] type [{alp] 7B616C70 len [ 4] attr [D0] handler [0001530D] -> ATTR_FUNCTION|ATTR_WRITE|ATTR_READ
[ALPD] type [flag] 666C6167 len [ 1] attr [C0] handler [200004F6] -> ATTR_WRITE|ATTR_READ
[ALRV] type [ui16] 75693136 len [ 2] attr [88] handler [00036B1A] -> ATTR_CONST|ATTR_READ
[ALSC] type [{alc] 7B616C63 len [16] attr [D0] handler [00015945] -> ATTR_FUNCTION|ATTR_WRITE|ATTR_READ
[ALSF] type [fp1f] 66703166 len [ 2] attr [C0] handler [2000088C] -> ATTR_WRITE|ATTR_READ
[ALSL] type [ui16] 75693136 len [ 2] attr [C0] handler [2000088A] -> ATTR_WRITE|ATTR_READ
[ALV0] type [{alv] 7B616C76 len [10] attr [D0] handler [00015341] -> ATTR_FUNCTION|ATTR_WRITE|ATTR_READ
[ALV1] type [{alv] 7B616C76 len [10] attr [D0] handler [000153AB] -> ATTR_FUNCTION|ATTR_WRITE|ATTR_READ
[ALcc] type [hex_] 6865785F len [24] attr [D0] handler [00015453] -> ATTR_FUNCTION|ATTR_WRITE|ATTR_READ
[ALcs] type [ui8 ] 75693820 len [ 1] attr [80] handler [200004F4] -> ATTR_READ
[ATCT] type [ui32] 75693332 len [ 4] attr [80] handler [20000A80] -> ATTR_READ
[ATPS] type [ui8 ] 75693820 len [ 1] attr [D1] handler [00031E49] -> ATTR_PRIVATE_WRITE|ATTR_FUNCTION|ATTR_WRITE|ATTR_READ
[ATVB] type [ui8 ] 75693820 len [ 1] attr [D1] handler [00031EA7] -> ATTR_PRIVATE_WRITE|ATTR_FUNCTION|ATTR_WRITE|ATTR_READ
[AUPO] type [ui8 ] 75693820 len [ 1] attr [C0] handler [2000083A] -> ATTR_WRITE|ATTR_READ
[AUWT] type [ui16] 75693136 len [ 2] attr [C0] handler [2000084A] -> ATTR_WRITE|ATTR_READ
[B0AC] type [si16] 73693136 len [ 2] attr [C1] handler [20001A44] -> ATTR_PRIVATE_WRITE|ATTR_WRITE|ATTR_READ
[B0AP] type [flt ] 666C7420 len [ 4] attr [84] handler [20001ABC] -> ATTR_ATOMIC|ATTR_READ
[B0AV] type [ui16] 75693136 len [ 2] attr [80] handler [20001A42] -> ATTR_READ
[B0Al] type [ui16] 75693136 len [ 2] attr [C0] handler [20000566] -> ATTR_WRITE|ATTR_READ
[B0Am] type [ui8 ] 75693820 len [ 1] attr [C0] handler [20000541] -> ATTR_WRITE|ATTR_READ
[B0Ar] type [ui8 ] 75693820 len [ 1] attr [C0] handler [20000558] -> ATTR_WRITE|ATTR_READ
[B0As] type [ui8 ] 75693820 len [ 1] attr [C0] handler [20000540] -> ATTR_WRITE|ATTR_READ
[B0At] type [ui16] 75693136 len [ 2] attr [C0] handler [20000568] -> ATTR_WRITE|ATTR_READ
[B0Au] type [ui16] 75693136 len [ 2] attr [C0] handler [2000056A] -> ATTR_WRITE|ATTR_READ
[B0BI] type [hex_] 6865785F len [ 1] attr [80] handler [20001A7B] -> ATTR_READ
[B0CT] type [ui16] 75693136 len [ 2] attr [80] handler [20001A58] -> ATTR_READ
[B0FC] type [ui16] 75693136 len [ 2] attr [C1] handler [20001A50] -> ATTR_PRIVATE_WRITE|ATTR_WRITE|ATTR_READ
[B0LI] type [ui16] 75693136 len [ 2] attr [C0] handler [20001A82] -> ATTR_WRITE|ATTR_READ
[B0OS] type [hex_] 6865785F len [ 2] attr [80] handler [20001A6A] -> ATTR_READ
[B0PS] type [hex_] 6865785F len [ 2] attr [C1] handler [20001A5E] -> ATTR_PRIVATE_WRITE|ATTR_WRITE|ATTR_READ
[B0RI] type [ui16] 75693136 len [ 2] attr [80] handler [20001A48] -> ATTR_READ
[B0RM] type [ui16] 75693136 len [ 2] attr [C1] handler [20001A4C] -> ATTR_PRIVATE_WRITE|ATTR_WRITE|ATTR_READ
[B0RS] type [ui16] 75693136 len [ 2] attr [80] handler [20001A52] -> ATTR_READ
[B0RV] type [ui16] 75693136 len [ 2] attr [80] handler [20001A60] -> ATTR_READ
[B0St] type [hex_] 6865785F len [ 2] attr [C1] handler [20001A3E] -> ATTR_PRIVATE_WRITE|ATTR_WRITE|ATTR_READ
[B0TF] type [ui16] 75693136 len [ 2] attr [80] handler [20001A5A] -> ATTR_READ
[B0TI] type [ui16] 75693136 len [ 2] attr [C0] handler [20000624] -> ATTR_WRITE|ATTR_READ
[BALG] type [ui8 ] 75693820 len [ 1] attr [C0] handler [20000551] -> ATTR_WRITE|ATTR_READ
[BATP] type [flag] 666C6167 len [ 1] attr [80] handler [20001A98] -> ATTR_READ
[BBAD] type [flag] 666C6167 len [ 1] attr [80] handler [20001A9D] -> ATTR_READ
[BBIF] type [ui8 ] 75693820 len [ 1] attr [90] handler [00017451] -> ATTR_FUNCTION|ATTR_READ
[BBIN] type [flag] 666C6167 len [ 1] attr [80] handler [20001A9E] -> ATTR_READ
[BC1V] type [ui16] 75693136 len [ 2] attr [80] handler [20001A6C] -> ATTR_READ
[BC2V] type [ui16] 75693136 len [ 2] attr [80] handler [20001A6E] -> ATTR_READ
[BCLM] type [ui8 ] 75693820 len [ 1] attr [D0] handler [0001838F] -> ATTR_FUNCTION|ATTR_WRITE|ATTR_READ
[BCMV] type [ui16] 75693136 len [ 2] attr [C1] handler [20001A5C] -> ATTR_PRIVATE_WRITE|ATTR_WRITE|ATTR_READ
[BEMB] type [flag] 666C6167 len [ 1] attr [80] handler [000360F5] -> ATTR_READ
[BFCT] type [ui16] 75693136 len [ 2] attr [80] handler [20001A96] -> ATTR_READ
[BFLO] type [ui8 ] 75693820 len [ 1] attr [80] handler [20001A94] -> ATTR_READ
[BIMX] type [ui16] 75693136 len [ 2] attr [C1] handler [20001A78] -> ATTR_PRIVATE_WRITE|ATTR_WRITE|ATTR_READ
[BIPD] type [ui16] 75693136 len [ 2] attr [D1] handler [000182BD] -> ATTR_PRIVATE_WRITE|ATTR_FUNCTION|ATTR_WRITE|ATTR_READ
[BITV] type [ui16] 75693136 len [ 2] attr [D1] handler [000182D9] -> ATTR_PRIVATE_WRITE|ATTR_FUNCTION|ATTR_WRITE|ATTR_READ
[BLPT] type [hex_] 6865785F len [20] attr [90] handler [000182F5] -> ATTR_FUNCTION|ATTR_READ
[BNCM] type [ui8 ] 75693820 len [ 1] attr [C3] handler [20004A2B] -> ATTR_PRIVATE_WRITE|ATTR_PRIVATE_READ|ATTR_WRITE|ATTR_READ
[BNCR] type [ui8 ] 75693820 len [ 1] attr [80] handler [20001AA0] -> ATTR_READ
[BNum] type [ui8 ] 75693820 len [ 1] attr [80] handler [20000620] -> ATTR_READ
[BPII] type [sp78] 73703738 len [ 2] attr [80] handler [20005CAE] -> ATTR_READ
[BPIT] type [sp78] 73703738 len [ 2] attr [80] handler [20005CA8] -> ATTR_READ
[BQX1] type [ui16] 75693136 len [ 2] attr [80] handler [20001A70] -> ATTR_READ
[BQX2] type [ui16] 75693136 len [ 2] attr [80] handler [20001A72] -> ATTR_READ
[BROS] type [ui16] 75693136 len [ 2] attr [90] handler [000186F3] -> ATTR_FUNCTION|ATTR_READ
[BRSC] type [ui16] 75693136 len [ 2] attr [C1] handler [20001A56] -> ATTR_PRIVATE_WRITE|ATTR_WRITE|ATTR_READ
[BRTC] type [ui8 ] 75693820 len [ 1] attr [80] handler [20000A35] -> ATTR_READ
[BRTE] type [ui8 ] 75693820 len [ 1] attr [80] handler [20000A34] -> ATTR_READ
[BRTG] type [ui8 ] 75693820 len [ 1] attr [80] handler [20000A36] -> ATTR_READ
[BRTH] type [si8 ] 73693820 len [ 1] attr [90] handler [0001870F] -> ATTR_FUNCTION|ATTR_READ
[BRTM] type [si8 ] 73693820 len [ 1] attr [90] handler [0001871B] -> ATTR_FUNCTION|ATTR_READ
[BRTP] type [ui16] 75693136 len [ 2] attr [90] handler [00018701] -> ATTR_FUNCTION|ATTR_READ
[BSAC] type [hex_] 6865785F len [ 1] attr [C0] handler [20001ABA] -> ATTR_WRITE|ATTR_READ
[BSIn] type [hex_] 6865785F len [ 1] attr [80] handler [20001AB7] -> ATTR_READ
[BTIL] type [ui16] 75693136 len [ 2] attr [80] handler [20001936] -> ATTR_READ
[BTTI] type [ui8 ] 75693820 len [ 1] attr [80] handler [20001934] -> ATTR_READ
[BTVI] type [ui8 ] 75693820 len [ 1] attr [80] handler [20001935] -> ATTR_READ
[BTVR] type [ui8 ] 75693820 len [ 1] attr [C1] handler [20001930] -> ATTR_PRIVATE_WRITE|ATTR_WRITE|ATTR_READ
[BTVS] type [fp1f] 66703166 len [ 2] attr [80] handler [20001938] -> ATTR_READ
[BTVT] type [ui8 ] 75693820 len [ 1] attr [C1] handler [20001931] -> ATTR_PRIVATE_WRITE|ATTR_WRITE|ATTR_READ
[BWLM] type [ui8 ] 75693820 len [ 1] attr [C0] handler [20001AA5] -> ATTR_WRITE|ATTR_READ
[C2HD] type [hex_] 6865785F len [ 4] attr [C1] handler [20000784] -> ATTR_PRIVATE_WRITE|ATTR_WRITE|ATTR_READ
[C2HP] type [hex_] 6865785F len [ 2] attr [C1] handler [20000782] -> ATTR_PRIVATE_WRITE|ATTR_WRITE|ATTR_READ
[C2TD] type [ch8*] 6368382A len [32] attr [C1] handler [20005068] -> ATTR_PRIVATE_WRITE|ATTR_WRITE|ATTR_READ
[C2TM] type [ch8*] 6368382A len [32] attr [51] handler [000205F1] -> ATTR_PRIVATE_WRITE|ATTR_FUNCTION|ATTR_WRITE
[C2TP] type [hex_] 6865785F len [ 1] attr [C1] handler [20000780] -> ATTR_PRIVATE_WRITE|ATTR_WRITE|ATTR_READ
[CHBI] type [ui16] 75693136 len [ 2] attr [C1] handler [20001A86] -> ATTR_PRIVATE_WRITE|ATTR_WRITE|ATTR_READ
[CHBV] type [ui16] 75693136 len [ 2] attr [80] handler [20001AA8] -> ATTR_READ
[CHGC] type [ui16] 75693136 len [ 2] attr [80] handler [20001AAA] -> ATTR_READ
[CHGD] type [flag] 666C6167 len [ 1] attr [C3] handler [20000537] -> ATTR_PRIVATE_WRITE|ATTR_PRIVATE_READ|ATTR_WRITE|ATTR_READ
[CHGI] type [ui16] 75693136 len [ 2] attr [80] handler [20001AAE] -> ATTR_READ
[CHGV] type [ui16] 75693136 len [ 2] attr [80] handler [20001AAC] -> ATTR_READ
[CHII] type [ui16] 75693136 len [ 2] attr [80] handler [20001AB0] -> ATTR_READ
[CHIM] type [flag] 666C6167 len [ 1] attr [80] handler [20000536] -> ATTR_READ
[CHIT] type [ui16] 75693136 len [ 2] attr [C1] handler [20001AB2] -> ATTR_PRIVATE_WRITE|ATTR_WRITE|ATTR_READ
[CHUD] type [flt ] 666C7420 len [ 4] attr [C4] handler [20001818] -> ATTR_ATOMIC|ATTR_WRITE|ATTR_READ
[CHUE] type [flag] 666C6167 len [ 1] attr [C0] handler [20001820] -> ATTR_WRITE|ATTR_READ
[CHUV] type [ui16] 75693136 len [ 2] attr [80] handler [2000181E] -> ATTR_READ
[CLKT] type [ui32] 75693332 len [ 4] attr [D0] handler [00031711] -> ATTR_FUNCTION|ATTR_WRITE|ATTR_READ
[CLSD] type [ui16] 75693136 len [ 2] attr [D0] handler [000242A5] -> ATTR_FUNCTION|ATTR_WRITE|ATTR_READ
[CLWK] type [ui16] 75693136 len [ 2] attr [D0] handler [000242C9] -> ATTR_FUNCTION|ATTR_WRITE|ATTR_READ
[CPL1] type [sp78] 73703738 len [ 2] attr [D3] handler [00025E79] -> ATTR_PRIVATE_WRITE|ATTR_PRIVATE_READ|ATTR_FUNCTION|ATTR_WRITE|ATTR_READ
[CPL2] type [sp78] 73703738 len [ 2] attr [D3] handler [00025EB5] -> ATTR_PRIVATE_WRITE|ATTR_PRIVATE_READ|ATTR_FUNCTION|ATTR_WRITE|ATTR_READ
[CPL3] type [ui32] 75693332 len [ 4] attr [D3] handler [00025EF1] -> ATTR_PRIVATE_WRITE|ATTR_PRIVATE_READ|ATTR_FUNCTION|ATTR_WRITE|ATTR_READ
[CPL4] type [sp78] 73703738 len [ 2] attr [D3] handler [00025F3F] -> ATTR_PRIVATE_WRITE|ATTR_PRIVATE_READ|ATTR_FUNCTION|ATTR_WRITE|ATTR_READ
[CPPL] type [sp78] 73703738 len [ 2] attr [80] handler [200053E0] -> ATTR_READ
[CPTX] type [sp78] 73703738 len [ 2] attr [80] handler [200053E6] -> ATTR_READ
[CRCA] type [ui32] 75693332 len [ 4] attr [80] handler [0003FFF8] -> ATTR_READ
[CRCB] type [ui32] 75693332 len [ 4] attr [80] handler [000057F8] -> ATTR_READ
[CRCC] type [ui32] 75693332 len [ 4] attr [80] handler [0000B7F8] -> ATTR_READ
[CRCF] type [ui32] 75693332 len [ 4] attr [90] handler [000194E9] -> ATTR_FUNCTION|ATTR_READ
[CRCK] type [ui32] 75693332 len [ 4] attr [90] handler [0001943F] -> ATTR_FUNCTION|ATTR_READ
[CRCR] type [ui32] 75693332 len [ 4] attr [80] handler [000007FC] -> ATTR_READ
[CRCS] type [ui32] 75693332 len [ 4] attr [80] handler [0000E7FC] -> ATTR_READ
[CRCU] type [ui32] 75693332 len [ 4] attr [80] handler [0000A7F8] -> ATTR_READ
[CRCa] type [ui32] 75693332 len [ 4] attr [90] handler [000193C1] -> ATTR_FUNCTION|ATTR_READ
[CRCb] type [ui32] 75693332 len [ 4] attr [90] handler [00019359] -> ATTR_FUNCTION|ATTR_READ
[CRCc] type [ui32] 75693332 len [ 4] attr [90] handler [0001939B] -> ATTR_FUNCTION|ATTR_READ
[CRCr] type [ui32] 75693332 len [ 4] attr [90] handler [00019335] -> ATTR_FUNCTION|ATTR_READ
[CRCs] type [ui32] 75693332 len [ 4] attr [90] handler [000193E7] -> ATTR_FUNCTION|ATTR_READ
[CRCu] type [ui32] 75693332 len [ 4] attr [90] handler [00019373] -> ATTR_FUNCTION|ATTR_READ
[D1CA] type [ui16] 75693136 len [ 2] attr [C0] handler [200015F4] -> ATTR_WRITE|ATTR_READ
[D1CD] type [ui16] 75693136 len [ 2] attr [C0] handler [200015F6] -> ATTR_WRITE|ATTR_READ
[D1CR] type [ui16] 75693136 len [ 2] attr [C0] handler [200015F8] -> ATTR_WRITE|ATTR_READ
[D1Cd] type [hex_] 6865785F len [14] attr [90] handler [00013007] -> ATTR_FUNCTION|ATTR_READ
[D1IC] type [ui16] 75693136 len [ 2] attr [C0] handler [200015DE] -> ATTR_WRITE|ATTR_READ
[D1IR] type [ui16] 75693136 len [ 2] attr [80] handler [200015D4] -> ATTR_READ
[D1JA] type [ui32] 75693332 len [ 4] attr [90] handler [000107AF] -> ATTR_FUNCTION|ATTR_READ
[D1JB] type [ui32] 75693332 len [ 4] attr [90] handler [000107D5] -> ATTR_FUNCTION|ATTR_READ
[D1JD] type [{jst] 7B6A7374 len [17] attr [90] handler [000107FB] -> ATTR_FUNCTION|ATTR_READ
[D1JR] type [ui32] 75693332 len [ 4] attr [50] handler [000106CF] -> ATTR_FUNCTION|ATTR_WRITE
[D1JS] type [ui32] 75693332 len [ 4] attr [50] handler [000106CF] -> ATTR_FUNCTION|ATTR_WRITE
[D1LR] type [ui8 ] 75693820 len [ 1] attr [80] handler [200015E9] -> ATTR_READ
[D1VC] type [ui16] 75693136 len [ 2] attr [C0] handler [200015DC] -> ATTR_WRITE|ATTR_READ
[D1VM] type [ui16] 75693136 len [ 2] attr [80] handler [200015D6] -> ATTR_READ
[D1VR] type [ui16] 75693136 len [ 2] attr [80] handler [200015D8] -> ATTR_READ
[D1VX] type [ui16] 75693136 len [ 2] attr [80] handler [200015DA] -> ATTR_READ
[D1if] type [ch8*] 6368382A len [12] attr [80] handler [20001620] -> ATTR_READ
[D1ih] type [ch8*] 6368382A len [12] attr [80] handler [2000162C] -> ATTR_READ
[D1ii] type [ch8*] 6368382A len [32] attr [80] handler [20001638] -> ATTR_READ
[D1im] type [ch8*] 6368382A len [32] attr [80] handler [20001658] -> ATTR_READ
[D1in] type [ch8*] 6368382A len [32] attr [80] handler [20001678] -> ATTR_READ
[D1is] type [ch8*] 6368382A len [32] attr [80] handler [20001698] -> ATTR_READ
[DBGE] type [ui8 ] 75693820 len [ 1] attr [80] handler [200006DB] -> ATTR_READ
[DBGP] type [ui8 ] 75693820 len [ 1] attr [80] handler [00036D57] -> ATTR_READ
[DBGT] type [ui8 ] 75693820 len [ 1] attr [C0] handler [200006A2] -> ATTR_WRITE|ATTR_READ
[DID0] type [ui32] 75693332 len [ 4] attr [80] handler [400FE000] -> ATTR_READ
[DID1] type [ui32] 75693332 len [ 4] attr [80] handler [400FE004] -> ATTR_READ
[DM0C] type [hex_] 6865785F len [ 2] attr [90] handler [0001C01D] -> ATTR_FUNCTION|ATTR_READ
[DM0E] type [flag] 666C6167 len [ 1] attr [D1] handler [0001BE1F] -> ATTR_PRIVATE_WRITE|ATTR_FUNCTION|ATTR_WRITE|ATTR_READ
[DM0F] type [ui8 ] 75693820 len [ 1] attr [80] handler [20004757] -> ATTR_READ
[DM0I] type [{hdi] 7B686469 len [14] attr [90] handler [0001BF09] -> ATTR_FUNCTION|ATTR_READ
[DM0M] type [ui8 ] 75693820 len [ 1] attr [80] handler [20004756] -> ATTR_READ
[DM0P] type [ui8 ] 75693820 len [ 1] attr [C1] handler [200006F4] -> ATTR_PRIVATE_WRITE|ATTR_WRITE|ATTR_READ
[DM0R] type [ui8 ] 75693820 len [ 1] attr [80] handler [20004713] -> ATTR_READ
[DM0S] type [ui8 ] 75693820 len [ 1] attr [C1] handler [200006F5] -> ATTR_PRIVATE_WRITE|ATTR_WRITE|ATTR_READ
[DM0W] type [ui8 ] 75693820 len [ 1] attr [80] handler [20004712] -> ATTR_READ
[DM0h] type [ui8 ] 75693820 len [ 1] attr [90] handler [0001BE7D] -> ATTR_FUNCTION|ATTR_READ
[DM0r] type [ui8 ] 75693820 len [ 1] attr [80] handler [20004715] -> ATTR_READ
[DM0w] type [ui8 ] 75693820 len [ 1] attr [80] handler [20004714] -> ATTR_READ
[DME!] type [hex_] 6865785F len [ 1] attr [C1] handler [200006E7] -> ATTR_PRIVATE_WRITE|ATTR_WRITE|ATTR_READ
[DMFR] type [hex_] 6865785F len [ 2] attr [80] handler [200006EA] -> ATTR_READ
[DMFV] type [flag] 666C6167 len [ 1] attr [80] handler [200006E1] -> ATTR_READ
[DMP!] type [hex_] 6865785F len [ 1] attr [C1] handler [200006E8] -> ATTR_PRIVATE_WRITE|ATTR_WRITE|ATTR_READ
[DMS!] type [hex_] 6865785F len [ 1] attr [C1] handler [200006E9] -> ATTR_PRIVATE_WRITE|ATTR_WRITE|ATTR_READ
[DPB0] type [ui8 ] 75693820 len [ 1] attr [D0] handler [00026769] -> ATTR_FUNCTION|ATTR_WRITE|ATTR_READ
[DPB1] type [ui8 ] 75693820 len [ 1] attr [C0] handler [2000086F] -> ATTR_WRITE|ATTR_READ
[DPBR] type [ui16] 75693136 len [ 2] attr [C0] handler [200008D0] -> ATTR_WRITE|ATTR_READ
[DPLM] type [{lim] 7B6C696D len [ 5] attr [51] handler [0002C0B9] -> ATTR_PRIVATE_WRITE|ATTR_FUNCTION|ATTR_WRITE
[DSAS] type [flag] 666C6167 len [ 1] attr [C0] handler [200008DC] -> ATTR_WRITE|ATTR_READ
[DT0A] type [sp78] 73703738 len [ 2] attr [80] handler [20004718] -> ATTR_READ
[DT0B] type [sp78] 73703738 len [ 2] attr [80] handler [2000471A] -> ATTR_READ
[DT0C] type [sp78] 73703738 len [ 2] attr [80] handler [2000471C] -> ATTR_READ
[DT0a] type [sp78] 73703738 len [ 2] attr [80] handler [20004730] -> ATTR_READ
[DT0b] type [sp78] 73703738 len [ 2] attr [80] handler [20004732] -> ATTR_READ
[DT0c] type [sp78] 73703738 len [ 2] attr [80] handler [20004734] -> ATTR_READ
[ECIP] type [hex_] 6865785F len [19] attr [C3] handler [200053A8] -> ATTR_PRIVATE_WRITE|ATTR_PRIVATE_READ|ATTR_WRITE|ATTR_READ
[ECIT] type [ui8 ] 75693820 len [ 1] attr [D3] handler [00025675] -> ATTR_PRIVATE_WRITE|ATTR_PRIVATE_READ|ATTR_FUNCTION|ATTR_WRITE|ATTR_READ
[EECC] type [ui32] 75693332 len [ 4] attr [50] handler [00020149] -> ATTR_FUNCTION|ATTR_WRITE
[EECT] type [ui32] 75693332 len [ 4] attr [80] handler [2000076C] -> ATTR_READ
[ENV0] type [ui8 ] 75693820 len [ 1] attr [80] handler [20004A42] -> ATTR_READ
[EPCA] type [ui32] 75693332 len [ 4] attr [88] handler [00036E3C] -> ATTR_CONST|ATTR_READ
[EPCF] type [flag] 666C6167 len [ 1] attr [90] handler [0001ED45] -> ATTR_FUNCTION|ATTR_READ
[EPCI] type [ui32] 75693332 len [ 4] attr [80] handler [0000B004] -> ATTR_READ
[EPCV] type [ui16] 75693136 len [ 2] attr [80] handler [0000B00C] -> ATTR_READ
[EPMA] type [ch8*] 6368382A len [ 4] attr [90] handler [0001ED7D] -> ATTR_FUNCTION|ATTR_READ
[EPMI] type [ui8 ] 75693820 len [ 1] attr [C0] handler [2000072C] -> ATTR_WRITE|ATTR_READ
[EPUA] type [ui32] 75693332 len [ 4] attr [88] handler [00036E38] -> ATTR_CONST|ATTR_READ
[EPUF] type [flag] 666C6167 len [ 1] attr [90] handler [0001ED1D] -> ATTR_FUNCTION|ATTR_READ
[EPUI] type [ui32] 75693332 len [ 4] attr [80] handler [0000A804] -> ATTR_READ
[EPUV] type [ui16] 75693136 len [ 2] attr [80] handler [0000A80C] -> ATTR_READ
[ERCE] type [flag] 666C6167 len [ 1] attr [80] handler [20000578] -> ATTR_READ
[ERCR] type [ui16] 75693136 len [ 2] attr [C0] handler [2000057C] -> ATTR_WRITE|ATTR_READ
[ERCS] type [flag] 666C6167 len [ 1] attr [C0] handler [20000579] -> ATTR_WRITE|ATTR_READ
[EVCT] type [hex_] 6865785F len [ 2] attr [D0] handler [0001F0B5] -> ATTR_FUNCTION|ATTR_WRITE|ATTR_READ
[EVHF] type [ch8*] 6368382A len [28] attr [90] handler [0001F223] -> ATTR_FUNCTION|ATTR_READ
[EVMD] type [ui32] 75693332 len [ 4] attr [50] handler [0002010D] -> ATTR_FUNCTION|ATTR_WRITE
[EVRD] type [ch8*] 6368382A len [32] attr [90] handler [0001F1C5] -> ATTR_FUNCTION|ATTR_READ
[EVSL] type [ui8 ] 75693820 len [ 1] attr [C0] handler [2000072F] -> ATTR_WRITE|ATTR_READ
[EVVR] type [ui8 ] 75693820 len [ 1] attr [80] handler [00036E40] -> ATTR_READ
[FNum] type [ui8 ] 75693820 len [ 1] attr [88] handler [0003613B] -> ATTR_CONST|ATTR_READ
[G3AO] type [ui32] 75693332 len [ 4] attr [C1] handler [20000A60] -> ATTR_PRIVATE_WRITE|ATTR_WRITE|ATTR_READ
[G3NO] type [ui8 ] 75693820 len [ 1] attr [C3] handler [200008E0] -> ATTR_PRIVATE_WRITE|ATTR_PRIVATE_READ|ATTR_WRITE|ATTR_READ
[G3WD] type [flag] 666C6167 len [ 1] attr [C0] handler [20000841] -> ATTR_WRITE|ATTR_READ
[HBKP] type [ch8*] 6368382A len [32] attr [C0] handler [20005788] -> ATTR_WRITE|ATTR_READ
[HBKT] type [ui32] 75693332 len [ 4] attr [C0] handler [20000A5C] -> ATTR_WRITE|ATTR_READ
[HC0N] type [ui8 ] 75693820 len [ 1] attr [C0] handler [2000097F] -> ATTR_WRITE|ATTR_READ
[HC0T] type [ui8 ] 75693820 len [ 1] attr [C0] handler [20000979] -> ATTR_WRITE|ATTR_READ
[HDBS] type [ui8 ] 75693820 len [ 1] attr [80] handler [20007224] -> ATTR_READ
[HDST] type [hex_] 6865785F len [ 4] attr [80] handler [2000721C] -> ATTR_READ
[HDSW] type [hex_] 6865785F len [ 4] attr [80] handler [20007220] -> ATTR_READ
[HI0N] type [ui8 ] 75693820 len [ 1] attr [D0] handler [0002D8BD] -> ATTR_FUNCTION|ATTR_WRITE|ATTR_READ
[HI0T] type [ui8 ] 75693820 len [ 1] attr [C0] handler [20005E31] -> ATTR_WRITE|ATTR_READ
[HI1N] type [ui8 ] 75693820 len [ 1] attr [D0] handler [0002D8D9] -> ATTR_FUNCTION|ATTR_WRITE|ATTR_READ
[HI1T] type [ui8 ] 75693820 len [ 1] attr [C0] handler [20005E38] -> ATTR_WRITE|ATTR_READ
[HNVD] type [ui16] 75693136 len [ 2] attr [80] handler [20000736] -> ATTR_READ
[I33C] type [flt ] 666C7420 len [ 4] attr [C4] handler [200059FC] -> ATTR_ATOMIC|ATTR_WRITE|ATTR_READ
[I50C] type [flt ] 666C7420 len [ 4] attr [C4] handler [200059EC] -> ATTR_ATOMIC|ATTR_WRITE|ATTR_READ
[IAPC] type [flt ] 666C7420 len [ 4] attr [C4] handler [200059BC] -> ATTR_ATOMIC|ATTR_WRITE|ATTR_READ
[IB0L] type [flt ] 666C7420 len [ 4] attr [C4] handler [200058DC] -> ATTR_ATOMIC|ATTR_WRITE|ATTR_READ
[IBLR] type [flt ] 666C7420 len [ 4] attr [C4] handler [200059CC] -> ATTR_ATOMIC|ATTR_WRITE|ATTR_READ
[IC0R] type [flt ] 666C7420 len [ 4] attr [C4] handler [200058EC] -> ATTR_ATOMIC|ATTR_WRITE|ATTR_READ
[ICAM] type [flt ] 666C7420 len [ 4] attr [C4] handler [2000590C] -> ATTR_ATOMIC|ATTR_WRITE|ATTR_READ
[ICGM] type [flt ] 666C7420 len [ 4] attr [C4] handler [2000592C] -> ATTR_ATOMIC|ATTR_WRITE|ATTR_READ
[ICIC] type [flt ] 666C7420 len [ 4] attr [C4] handler [200059AC] -> ATTR_ATOMIC|ATTR_WRITE|ATTR_READ
[ICSC] type [flt ] 666C7420 len [ 4] attr [C4] handler [2000593C] -> ATTR_ATOMIC|ATTR_WRITE|ATTR_READ
[ICUC] type [flt ] 666C7420 len [ 4] attr [C4] handler [2000594C] -> ATTR_ATOMIC|ATTR_WRITE|ATTR_READ
[ID0R] type [flt ] 666C7420 len [ 4] attr [C4] handler [200058AC] -> ATTR_ATOMIC|ATTR_WRITE|ATTR_READ
[IHCC] type [flt ] 666C7420 len [ 4] attr [C4] handler [2000596C] -> ATTR_ATOMIC|ATTR_WRITE|ATTR_READ
[IHNC] type [flt ] 666C7420 len [ 4] attr [C4] handler [2000595C] -> ATTR_ATOMIC|ATTR_WRITE|ATTR_READ
[ILDC] type [flt ] 666C7420 len [ 4] attr [C4] handler [20005A0C] -> ATTR_ATOMIC|ATTR_WRITE|ATTR_READ
[IM0C] type [flt ] 666C7420 len [ 4] attr [C4] handler [2000597C] -> ATTR_ATOMIC|ATTR_WRITE|ATTR_READ
[IM1C] type [flt ] 666C7420 len [ 4] attr [C4] handler [200059DC] -> ATTR_ATOMIC|ATTR_WRITE|ATTR_READ
[IO0R] type [flt ] 666C7420 len [ 4] attr [C4] handler [2000598C] -> ATTR_ATOMIC|ATTR_WRITE|ATTR_READ
[IPBR] type [flt ] 666C7420 len [ 4] attr [C4] handler [200058CC] -> ATTR_ATOMIC|ATTR_WRITE|ATTR_READ
[ISCC] type [flt ] 666C7420 len [ 4] attr [C4] handler [2000599C] -> ATTR_ATOMIC|ATTR_WRITE|ATTR_READ
[KDD0] type [hex_] 6865785F len [32] attr [80] handler [00036F36] -> ATTR_READ
[KDD1] type [hex_] 6865785F len [32] attr [80] handler [00036F56] -> ATTR_READ
[KDFT] type [ui8 ] 75693820 len [ 1] attr [80] handler [200009C8] -> ATTR_READ
[KDTP] type [ui8 ] 75693820 len [ 1] attr [80] handler [00036F34] -> ATTR_READ
[KINC] type [ui16] 75693136 len [ 2] attr [80] handler [200007AA] -> ATTR_READ
[KINV] type [ch8*] 6368382A len [ 4] attr [D0] handler [00021BD5] -> ATTR_FUNCTION|ATTR_WRITE|ATTR_READ
[KINX] type [hex_] 6865785F len [ 4] attr [80] handler [200007AC] -> ATTR_READ
[LAcN] type [ui8 ] 75693820 len [ 1] attr [51] handler [0001D96F] -> ATTR_PRIVATE_WRITE|ATTR_FUNCTION|ATTR_WRITE
[LAtN] type [ui16] 75693136 len [ 2] attr [51] handler [00023D7F] -> ATTR_PRIVATE_WRITE|ATTR_FUNCTION|ATTR_WRITE
[LC2D] type [ui16] 75693136 len [ 2] attr [80] handler [20000810] -> ATTR_READ
[LC2E] type [ui16] 75693136 len [ 2] attr [80] handler [20000812] -> ATTR_READ
[LCCC] type [ui8 ] 75693820 len [ 1] attr [80] handler [20000830] -> ATTR_READ
[LCCN] type [ui8 ] 75693820 len [ 1] attr [80] handler [200007FB] -> ATTR_READ
[LCCQ] type [ui8 ] 75693820 len [ 1] attr [80] handler [200007FC] -> ATTR_READ
[LCKA] type [ui8 ] 75693820 len [ 1] attr [80] handler [200007F9] -> ATTR_READ
[LCKN] type [ui8 ] 75693820 len [ 1] attr [80] handler [2000071E] -> ATTR_READ
[LCLD] type [ui16] 75693136 len [ 2] attr [C0] handler [2000080C] -> ATTR_WRITE|ATTR_READ
[LCLG] type [ui8 ] 75693820 len [ 1] attr [80] handler [200007FF] -> ATTR_READ
[LCSA] type [ui8 ] 75693820 len [ 1] attr [80] handler [200007FA] -> ATTR_READ
[LCTN] type [ui8 ] 75693820 len [ 1] attr [80] handler [200007FD] -> ATTR_READ
[LCTQ] type [ui8 ] 75693820 len [ 1] attr [80] handler [200007FE] -> ATTR_READ
[LDCR] type [ui32] 75693332 len [ 4] attr [C3] handler [20000814] -> ATTR_PRIVATE_WRITE|ATTR_PRIVATE_READ|ATTR_WRITE|ATTR_READ
[LDEN] type [ui16] 75693136 len [ 2] attr [C0] handler [20000850] -> ATTR_WRITE|ATTR_READ
[LDI2] type [ui8 ] 75693820 len [ 1] attr [D0] handler [00023FCF] -> ATTR_FUNCTION|ATTR_WRITE|ATTR_READ
[LDKN] type [ui8 ] 75693820 len [ 1] attr [88] handler [0003A0EA] -> ATTR_CONST|ATTR_READ
[LDLG] type [ui8 ] 75693820 len [ 1] attr [50] handler [00023CFD] -> ATTR_FUNCTION|ATTR_WRITE
[LDLT] type [ui8 ] 75693820 len [ 1] attr [88] handler [0003A0EB] -> ATTR_CONST|ATTR_READ
[LDS4] type [ui8 ] 75693820 len [ 1] attr [80] handler [200007D8] -> ATTR_READ
[LDSP] type [flag] 666C6167 len [ 1] attr [40] handler [20000803] -> ATTR_WRITE
[LDT1] type [ui8 ] 75693820 len [ 1] attr [C0] handler [20000831] -> ATTR_WRITE|ATTR_READ
[LDT2] type [ui16] 75693136 len [ 2] attr [C0] handler [2000080E] -> ATTR_WRITE|ATTR_READ
[LDT4] type [ui32] 75693332 len [ 4] attr [C0] handler [20000834] -> ATTR_WRITE|ATTR_READ
[LDTF] type [ui16] 75693136 len [ 2] attr [D0] handler [00023E69] -> ATTR_FUNCTION|ATTR_WRITE|ATTR_READ
[LDWE] type [ui32] 75693332 len [ 4] attr [80] handler [20000818] -> ATTR_READ
[LPMC] type [ui32] 75693332 len [ 4] attr [C0] handler [200007E8] -> ATTR_WRITE|ATTR_READ
[LVME] type [flag] 666C6167 len [ 1] attr [D3] handler [000262E7] -> ATTR_PRIVATE_WRITE|ATTR_PRIVATE_READ|ATTR_FUNCTION|ATTR_WRITE|ATTR_READ
[LVMS] type [ui8 ] 75693820 len [ 1] attr [C3] handler [2000086A] -> ATTR_PRIVATE_WRITE|ATTR_PRIVATE_READ|ATTR_WRITE|ATTR_READ
[MACA] type [ui32] 75693332 len [ 4] attr [C0] handler [200008D8] -> ATTR_WRITE|ATTR_READ
[MACM] type [flag] 666C6167 len [ 1] attr [C0] handler [200008C2] -> ATTR_WRITE|ATTR_READ
[MACR] type [ch8*] 6368382A len [32] attr [90] handler [00028B0F] -> ATTR_FUNCTION|ATTR_READ
[MD0R] type [ui8 ] 75693820 len [ 1] attr [C1] handler [20000974] -> ATTR_PRIVATE_WRITE|ATTR_WRITE|ATTR_READ
[MD0W] type [ui8 ] 75693820 len [ 1] attr [C1] handler [20000973] -> ATTR_PRIVATE_WRITE|ATTR_WRITE|ATTR_READ
[MDr!] type [ui8 ] 75693820 len [ 1] attr [C1] handler [20000978] -> ATTR_PRIVATE_WRITE|ATTR_WRITE|ATTR_READ
[MDw!] type [ui8 ] 75693820 len [ 1] attr [C1] handler [20000977] -> ATTR_PRIVATE_WRITE|ATTR_WRITE|ATTR_READ
[MFIX] type [ui8 ] 75693820 len [ 1] attr [80] handler [200008C1] -> ATTR_READ
[MSAL] type [hex_] 6865785F len [ 1] attr [D1] handler [0002BF4F] -> ATTR_PRIVATE_WRITE|ATTR_FUNCTION|ATTR_WRITE|ATTR_READ
[MSAc] type [fp88] 66703838 len [ 2] attr [80] handler [20005B66] -> ATTR_READ
[MSAf] type [fp6a] 66703661 len [ 2] attr [80] handler [20005B76] -> ATTR_READ
[MSAg] type [fp88] 66703838 len [ 2] attr [80] handler [20005B6E] -> ATTR_READ
[MSBC] type [ui16] 75693136 len [ 2] attr [C0] handler [20000A22] -> ATTR_WRITE|ATTR_READ
[MSBP] type [ui16] 75693136 len [ 2] attr [C0] handler [20000A24] -> ATTR_WRITE|ATTR_READ
[MSBc] type [ui16] 75693136 len [ 2] attr [C0] handler [20000A26] -> ATTR_WRITE|ATTR_READ
[MSBp] type [ui16] 75693136 len [ 2] attr [C0] handler [20000A28] -> ATTR_WRITE|ATTR_READ
[MSC0] type [ui32] 75693332 len [ 4] attr [C0] handler [20000900] -> ATTR_WRITE|ATTR_READ
[MSCL] type [ui8 ] 75693820 len [ 1] attr [D3] handler [0002EFA3] -> ATTR_PRIVATE_WRITE|ATTR_PRIVATE_READ|ATTR_FUNCTION|ATTR_WRITE|ATTR_READ
[MSDW] type [flag] 666C6167 len [ 1] attr [50] handler [00028FDD] -> ATTR_FUNCTION|ATTR_WRITE
[MSEP] type [flag] 666C6167 len [ 1] attr [C0] handler [200008C6] -> ATTR_WRITE|ATTR_READ
[MSER] type [ui8 ] 75693820 len [ 1] attr [C0] handler [200009B9] -> ATTR_WRITE|ATTR_READ
[MSEW] type [ui8 ] 75693820 len [ 1] attr [C0] handler [200009B8] -> ATTR_WRITE|ATTR_READ
[MSF0] type [ui16] 75693136 len [ 2] attr [C0] handler [2000091C] -> ATTR_WRITE|ATTR_READ
[MSF1] type [ui8 ] 75693820 len [ 1] attr [C0] handler [20000915] -> ATTR_WRITE|ATTR_READ
[MSF2] type [ui8 ] 75693820 len [ 1] attr [D1] handler [0002A71D] -> ATTR_PRIVATE_WRITE|ATTR_FUNCTION|ATTR_WRITE|ATTR_READ
[MSF8] type [ui8 ] 75693820 len [ 1] attr [C0] handler [2000093D] -> ATTR_WRITE|ATTR_READ
[MSF9] type [ui8 ] 75693820 len [ 1] attr [80] handler [20000912] -> ATTR_READ
[MSFA] type [ch8*] 6368382A len [ 4] attr [C4] handler [2000092C] -> ATTR_ATOMIC|ATTR_WRITE|ATTR_READ
[MSFB] type [ch8*] 6368382A len [32] attr [51] handler [000205F1] -> ATTR_PRIVATE_WRITE|ATTR_FUNCTION|ATTR_WRITE
[MSFC] type [ui8 ] 75693820 len [ 1] attr [D1] handler [000205D9] -> ATTR_PRIVATE_WRITE|ATTR_FUNCTION|ATTR_WRITE|ATTR_READ
[MSFD] type [ch8*] 6368382A len [32] attr [C1] handler [20005068] -> ATTR_PRIVATE_WRITE|ATTR_WRITE|ATTR_READ
[MSFE] type [ui8 ] 75693820 len [ 1] attr [C0] handler [20000913] -> ATTR_WRITE|ATTR_READ
[MSFL] type [ch8*] 6368382A len [ 4] attr [D0] handler [0002ADFF] -> ATTR_FUNCTION|ATTR_WRITE|ATTR_READ
[MSFM] type [ui8 ] 75693820 len [ 1] attr [D0] handler [0002B39B] -> ATTR_FUNCTION|ATTR_WRITE|ATTR_READ
[MSFN] type [ui8 ] 75693820 len [ 1] attr [D1] handler [0002AEA5] -> ATTR_PRIVATE_WRITE|ATTR_FUNCTION|ATTR_WRITE|ATTR_READ
[MSFV] type [flt ] 666C7420 len [ 4] attr [C4] handler [20000920] -> ATTR_ATOMIC|ATTR_WRITE|ATTR_READ
[MSFW] type [flag] 666C6167 len [ 1] attr [C0] handler [200008C9] -> ATTR_WRITE|ATTR_READ
[MSG3] type [flag] 666C6167 len [ 1] attr [D0] handler [0002408F] -> ATTR_FUNCTION|ATTR_WRITE|ATTR_READ
[MSGL] type [ui8 ] 75693820 len [ 1] attr [D3] handler [0002F005] -> ATTR_PRIVATE_WRITE|ATTR_PRIVATE_READ|ATTR_FUNCTION|ATTR_WRITE|ATTR_READ
[MSLB] type [flt ] 666C7420 len [ 4] attr [84] handler [20005FA4] -> ATTR_ATOMIC|ATTR_READ
[MSLC] type [ui8 ] 75693820 len [ 1] attr [80] handler [20005E49] -> ATTR_READ
[MSLD] type [ui8 ] 75693820 len [ 1] attr [D0] handler [00022085] -> ATTR_FUNCTION|ATTR_WRITE|ATTR_READ
[MSLF] type [ui8 ] 75693820 len [ 1] attr [80] handler [20005E61] -> ATTR_READ
[MSLG] type [ui8 ] 75693820 len [ 1] attr [80] handler [20005E55] -> ATTR_READ
[MSLP] type [ui8 ] 75693820 len [ 1] attr [80] handler [20005E6D] -> ATTR_READ
[MSLS] type [ui8 ] 75693820 len [ 1] attr [C0] handler [20000980] -> ATTR_WRITE|ATTR_READ
[MSMD] type [ui8 ] 75693820 len [ 1] attr [80] handler [2000096F] -> ATTR_READ
[MSMF] type [ui8 ] 75693820 len [ 1] attr [D0] handler [0002E175] -> ATTR_FUNCTION|ATTR_WRITE|ATTR_READ
[MSMN] type [ui8 ] 75693820 len [ 1] attr [80] handler [200009CC] -> ATTR_READ
[MSN0] type [ui16] 75693136 len [ 2] attr [C0] handler [200008CE] -> ATTR_WRITE|ATTR_READ
[MSPA] type [fp6a] 66703661 len [ 2] attr [80] handler [20005B7E] -> ATTR_READ
[MSPB] type [flag] 666C6167 len [ 1] attr [80] handler [20000874] -> ATTR_READ
[MSPC] type [ui8 ] 75693820 len [ 1] attr [D0] handler [0002D805] -> ATTR_FUNCTION|ATTR_WRITE|ATTR_READ
[MSPI] type [ui8 ] 75693820 len [ 1] attr [D0] handler [0002D8BD] -> ATTR_FUNCTION|ATTR_WRITE|ATTR_READ
[MSPP] type [ui8 ] 75693820 len [ 1] attr [80] handler [200008E7] -> ATTR_READ
[MSPR] type [ui16] 75693136 len [ 2] attr [88] handler [00036138] -> ATTR_CONST|ATTR_READ
[MSPS] type [hex_] 6865785F len [ 2] attr [C0] handler [20000892] -> ATTR_WRITE|ATTR_READ
[MSPT] type [hex_] 6865785F len [ 5] attr [90] handler [0001FB63] -> ATTR_FUNCTION|ATTR_READ
[MSQC] type [hex_] 6865785F len [ 2] attr [80] handler [20000984] -> ATTR_READ
[MSQL] type [ui8 ] 75693820 len [ 1] attr [80] handler [20000966] -> ATTR_READ
[MSQM] type [ui8 ] 75693820 len [ 1] attr [80] handler [2000095F] -> ATTR_READ
[MSQN] type [flag] 666C6167 len [ 1] attr [C0] handler [20000961] -> ATTR_WRITE|ATTR_READ
[MSQO] type [ui8 ] 75693820 len [ 1] attr [D0] handler [0002DFAF] -> ATTR_FUNCTION|ATTR_WRITE|ATTR_READ
[MSQS] type [flag] 666C6167 len [ 1] attr [C0] handler [20000962] -> ATTR_WRITE|ATTR_READ
[MSQW] type [ui16] 75693136 len [ 2] attr [80] handler [20000986] -> ATTR_READ
[MSRC] type [ui32] 75693332 len [ 4] attr [80] handler [20000794] -> ATTR_READ
[MSSD] type [si8 ] 73693820 len [ 1] attr [D0] handler [00028BE3] -> ATTR_FUNCTION|ATTR_WRITE|ATTR_READ
[MSSP] type [si8 ] 73693820 len [ 1] attr [C0] handler [20007226] -> ATTR_WRITE|ATTR_READ
[MSSR] type [flag] 666C6167 len [ 1] attr [C1] handler [2000071D] -> ATTR_PRIVATE_WRITE|ATTR_WRITE|ATTR_READ
[MSSS] type [{mss] 7B6D7373 len [ 1] attr [80] handler [200008E8] -> ATTR_READ
[MSSW] type [flag] 666C6167 len [ 1] attr [C0] handler [20000A49] -> ATTR_WRITE|ATTR_READ
[MSTC] type [ui16] 75693136 len [ 2] attr [C0] handler [200009CE] -> ATTR_WRITE|ATTR_READ
[MSTD] type [ui16] 75693136 len [ 2] attr [C0] handler [200009D0] -> ATTR_WRITE|ATTR_READ
[MSTQ] type [flag] 666C6167 len [ 1] attr [80] handler [200009EA] -> ATTR_READ
[MSTS] type [ui8 ] 75693820 len [ 1] attr [D0] handler [0002D8A5] -> ATTR_FUNCTION|ATTR_WRITE|ATTR_READ
[MSTW] type [hex_] 6865785F len [ 1] attr [80] handler [200009BD] -> ATTR_READ
[MSTc] type [ui8 ] 75693820 len [ 1] attr [80] handler [40080500] -> ATTR_READ
[MSTe] type [ui8 ] 75693820 len [ 1] attr [80] handler [40080504] -> ATTR_READ
[MSTf] type [ui8 ] 75693820 len [ 1] attr [80] handler [40080503] -> ATTR_READ
[MSTi] type [ui8 ] 75693820 len [ 1] attr [80] handler [40080501] -> ATTR_READ
[MSTj] type [ui8 ] 75693820 len [ 1] attr [80] handler [40080502] -> ATTR_READ
[MSWA] type [fp6a] 66703661 len [ 2] attr [D1] handler [0002D8F5] -> ATTR_PRIVATE_WRITE|ATTR_FUNCTION|ATTR_WRITE|ATTR_READ
[MSWE] type [ui8 ] 75693820 len [ 1] attr [D1] handler [0002D929] -> ATTR_PRIVATE_WRITE|ATTR_FUNCTION|ATTR_WRITE|ATTR_READ
[MSWF] type [ui16] 75693136 len [ 2] attr [C1] handler [2000098C] -> ATTR_PRIVATE_WRITE|ATTR_WRITE|ATTR_READ
[MSWO] type [ui16] 75693136 len [ 2] attr [C1] handler [2000098A] -> ATTR_PRIVATE_WRITE|ATTR_WRITE|ATTR_READ
[MSWP] type [ui8 ] 75693820 len [ 1] attr [C1] handler [2000096E] -> ATTR_PRIVATE_WRITE|ATTR_WRITE|ATTR_READ
[MSWd] type [flag] 666C6167 len [ 1] attr [C0] handler [200008C0] -> ATTR_WRITE|ATTR_READ
[MSWo] type [flag] 666C6167 len [ 1] attr [D0] handler [00027E6F] -> ATTR_FUNCTION|ATTR_WRITE|ATTR_READ
[MSWr] type [ui8 ] 75693820 len [ 1] attr [80] handler [200049E8] -> ATTR_READ
[MSX0] type [ui16] 75693136 len [ 2] attr [C0] handler [20000917] -> ATTR_WRITE|ATTR_READ
[MSX2] type [ui8 ] 75693820 len [ 1] attr [D0] handler [0002B6BD] -> ATTR_FUNCTION|ATTR_WRITE|ATTR_READ
[MSX9] type [ui8 ] 75693820 len [ 1] attr [80] handler [20000918] -> ATTR_READ
[MSXA] type [ch8*] 6368382A len [ 4] attr [C4] handler [20000934] -> ATTR_ATOMIC|ATTR_WRITE|ATTR_READ
[MSXC] type [ch8*] 6368382A len [ 4] attr [90] handler [0000F4CF] -> ATTR_FUNCTION|ATTR_READ
[MSXD] type [ch8*] 6368382A len [16] attr [90] handler [0000F325] -> ATTR_FUNCTION|ATTR_READ
[MSXH] type [ch8*] 6368382A len [16] attr [90] handler [0000F3A7] -> ATTR_FUNCTION|ATTR_READ
[MSXK] type [ch8*] 6368382A len [32] attr [90] handler [0000F531] -> ATTR_FUNCTION|ATTR_READ
[MSXL] type [ch8*] 6368382A len [16] attr [90] handler [0000F429] -> ATTR_FUNCTION|ATTR_READ
[MSXN] type [ui8 ] 75693820 len [ 1] attr [80] handler [000369D3] -> ATTR_READ
[MSXP] type [ui32] 75693332 len [ 4] attr [C0] handler [20001488] -> ATTR_WRITE|ATTR_READ
[MSXS] type [ch8*] 6368382A len [ 4] attr [D0] handler [0000F5AD] -> ATTR_FUNCTION|ATTR_WRITE|ATTR_READ
[MSXT] type [ui32] 75693332 len [ 4] attr [C0] handler [20001490] -> ATTR_WRITE|ATTR_READ
[MSXb] type [ui8 ] 75693820 len [ 1] attr [D0] handler [0000F0B1] -> ATTR_FUNCTION|ATTR_WRITE|ATTR_READ
[MSXc] type [ch8*] 6368382A len [ 4] attr [90] handler [0000F4AB] -> ATTR_FUNCTION|ATTR_READ
[MSXd] type [ch8*] 6368382A len [16] attr [90] handler [0000F157] -> ATTR_FUNCTION|ATTR_READ
[MSXh] type [ch8*] 6368382A len [16] attr [90] handler [0000F1D9] -> ATTR_FUNCTION|ATTR_READ
[MSXk] type [ch8*] 6368382A len [32] attr [90] handler [0000F4F3] -> ATTR_FUNCTION|ATTR_READ
[MSXl] type [ch8*] 6368382A len [16] attr [90] handler [0000F295] -> ATTR_FUNCTION|ATTR_READ
[MSXm] type [ui16] 75693136 len [ 2] attr [D0] handler [0000F125] -> ATTR_FUNCTION|ATTR_WRITE|ATTR_READ
[MSXn] type [ui8 ] 75693820 len [ 1] attr [80] handler [000369D2] -> ATTR_READ
[MSXs] type [ui32] 75693332 len [ 4] attr [D0] handler [0000F56F] -> ATTR_FUNCTION|ATTR_WRITE|ATTR_READ
[MSXt] type [ch8*] 6368382A len [16] attr [90] handler [0000F25B] -> ATTR_FUNCTION|ATTR_READ
[MSa!] type [hex_] 6865785F len [ 1] attr [C0] handler [20000972] -> ATTR_WRITE|ATTR_READ
[MSac] type [ui8 ] 75693820 len [ 1] attr [C0] handler [20005B64] -> ATTR_WRITE|ATTR_READ
[MSaf] type [ui8 ] 75693820 len [ 1] attr [C0] handler [20005B74] -> ATTR_WRITE|ATTR_READ
[MSag] type [ui8 ] 75693820 len [ 1] attr [C0] handler [20005B6C] -> ATTR_WRITE|ATTR_READ
[MSap] type [ui8 ] 75693820 len [ 1] attr [C0] handler [20005B7C] -> ATTR_WRITE|ATTR_READ
[MSaw] type [ui8 ] 75693820 len [ 1] attr [C0] handler [20005B84] -> ATTR_WRITE|ATTR_READ
[MSbo] type [flag] 666C6167 len [ 1] attr [D0] handler [00027EA7] -> ATTR_FUNCTION|ATTR_WRITE|ATTR_READ
[MSt0] type [flt ] 666C7420 len [ 4] attr [84] handler [20005D30] -> ATTR_ATOMIC|ATTR_READ
[MSt1] type [flt ] 666C7420 len [ 4] attr [84] handler [20005D7C] -> ATTR_ATOMIC|ATTR_READ
[MSt2] type [flt ] 666C7420 len [ 4] attr [84] handler [20005DC8] -> ATTR_ATOMIC|ATTR_READ
[MSt3] type [flt ] 666C7420 len [ 4] attr [84] handler [20005E14] -> ATTR_ATOMIC|ATTR_READ
[MT0c] type [flt ] 666C7420 len [ 4] attr [C4] handler [20005D44] -> ATTR_ATOMIC|ATTR_WRITE|ATTR_READ
[MT0g] type [flt ] 666C7420 len [ 4] attr [C4] handler [20005D48] -> ATTR_ATOMIC|ATTR_WRITE|ATTR_READ
[MT0t] type [flt ] 666C7420 len [ 4] attr [C4] handler [20005D38] -> ATTR_ATOMIC|ATTR_WRITE|ATTR_READ
[MT1c] type [flt ] 666C7420 len [ 4] attr [C4] handler [20005D90] -> ATTR_ATOMIC|ATTR_WRITE|ATTR_READ
[MT1g] type [flt ] 666C7420 len [ 4] attr [C4] handler [20005D94] -> ATTR_ATOMIC|ATTR_WRITE|ATTR_READ
[MT1t] type [flt ] 666C7420 len [ 4] attr [C4] handler [20005D84] -> ATTR_ATOMIC|ATTR_WRITE|ATTR_READ
[MT2c] type [flt ] 666C7420 len [ 4] attr [C4] handler [20005DDC] -> ATTR_ATOMIC|ATTR_WRITE|ATTR_READ
[MT2g] type [flt ] 666C7420 len [ 4] attr [C4] handler [20005DE0] -> ATTR_ATOMIC|ATTR_WRITE|ATTR_READ
[MT2t] type [flt ] 666C7420 len [ 4] attr [C4] handler [20005DD0] -> ATTR_ATOMIC|ATTR_WRITE|ATTR_READ
[MT3c] type [flt ] 666C7420 len [ 4] attr [C4] handler [20005E28] -> ATTR_ATOMIC|ATTR_WRITE|ATTR_READ
[MT3g] type [flt ] 666C7420 len [ 4] attr [C4] handler [20005E2C] -> ATTR_ATOMIC|ATTR_WRITE|ATTR_READ
[MT3t] type [flt ] 666C7420 len [ 4] attr [C4] handler [20005E1C] -> ATTR_ATOMIC|ATTR_WRITE|ATTR_READ
[MTBc] type [flt ] 666C7420 len [ 4] attr [C4] handler [20005FB8] -> ATTR_ATOMIC|ATTR_WRITE|ATTR_READ
[MTBg] type [flt ] 666C7420 len [ 4] attr [C4] handler [20005FBC] -> ATTR_ATOMIC|ATTR_WRITE|ATTR_READ
[MTBt] type [flt ] 666C7420 len [ 4] attr [C4] handler [20005FAC] -> ATTR_ATOMIC|ATTR_WRITE|ATTR_READ
[NACK] type [ui8 ] 75693820 len [ 1] attr [C3] handler [20000530] -> ATTR_PRIVATE_WRITE|ATTR_PRIVATE_READ|ATTR_WRITE|ATTR_READ
[NATJ] type [ui8 ] 75693820 len [ 1] attr [C0] handler [20000A45] -> ATTR_WRITE|ATTR_READ
[NATi] type [ui16] 75693136 len [ 2] attr [C0] handler [20000A4A] -> ATTR_WRITE|ATTR_READ
[NOPB] type [ui8 ] 75693820 len [ 1] attr [D0] handler [000268DF] -> ATTR_FUNCTION|ATTR_WRITE|ATTR_READ
[NTOK] type [ui8 ] 75693820 len [ 1] attr [50] handler [00023D9D] -> ATTR_FUNCTION|ATTR_WRITE
[ONMI] type [ui8 ] 75693820 len [ 1] attr [C0] handler [20000870] -> ATTR_WRITE|ATTR_READ
[OOBC] type [ui16] 75693136 len [ 2] attr [D1] handler [0001C259] -> ATTR_PRIVATE_WRITE|ATTR_FUNCTION|ATTR_WRITE|ATTR_READ
[OOBR] type [hex_] 6865785F len [32] attr [80] handler [20004988] -> ATTR_READ
[OOBS] type [hex_] 6865785F len [32] attr [80] handler [200049A8] -> ATTR_READ
[OOBT] type [hex_] 6865785F len [ 2] attr [D1] handler [0001C1BB] -> ATTR_PRIVATE_WRITE|ATTR_FUNCTION|ATTR_WRITE|ATTR_READ
[OOBW] type [hex_] 6865785F len [21] attr [D1] handler [0001C299] -> ATTR_PRIVATE_WRITE|ATTR_FUNCTION|ATTR_WRITE|ATTR_READ
[OSSS] type [hex_] 6865785F len [32] attr [C0] handler [20004AA5] -> ATTR_WRITE|ATTR_READ
[OSWD] type [ui16] 75693136 len [ 2] attr [C0] handler [20000A4E] -> ATTR_WRITE|ATTR_READ
[P33C] type [flt ] 666C7420 len [ 4] attr [C4] handler [20005B3C] -> ATTR_ATOMIC|ATTR_WRITE|ATTR_READ
[P50C] type [flt ] 666C7420 len [ 4] attr [C4] handler [20005B2C] -> ATTR_ATOMIC|ATTR_WRITE|ATTR_READ
[PAPC] type [flt ] 666C7420 len [ 4] attr [C4] handler [20005AFC] -> ATTR_ATOMIC|ATTR_WRITE|ATTR_READ
[PB0L] type [flt ] 666C7420 len [ 4] attr [C4] handler [20005A3C] -> ATTR_ATOMIC|ATTR_WRITE|ATTR_READ
[PBLR] type [flt ] 666C7420 len [ 4] attr [C4] handler [20005B0C] -> ATTR_ATOMIC|ATTR_WRITE|ATTR_READ
[PC0R] type [flt ] 666C7420 len [ 4] attr [C4] handler [20005A4C] -> ATTR_ATOMIC|ATTR_WRITE|ATTR_READ
[PCAM] type [flt ] 666C7420 len [ 4] attr [C4] handler [20005A5C] -> ATTR_ATOMIC|ATTR_WRITE|ATTR_READ
[PCGM] type [flt ] 666C7420 len [ 4] attr [C4] handler [20005A6C] -> ATTR_ATOMIC|ATTR_WRITE|ATTR_READ
[PCIC] type [flt ] 666C7420 len [ 4] attr [C4] handler [20005AEC] -> ATTR_ATOMIC|ATTR_WRITE|ATTR_READ
[PCPC] type [sp78] 73703738 len [ 2] attr [C0] handler [2000583C] -> ATTR_WRITE|ATTR_READ
[PCPG] type [sp78] 73703738 len [ 2] attr [C0] handler [2000583E] -> ATTR_WRITE|ATTR_READ
[PCPT] type [sp78] 73703738 len [ 2] attr [C0] handler [2000583A] -> ATTR_WRITE|ATTR_READ
[PCSC] type [flt ] 666C7420 len [ 4] attr [C4] handler [20005A7C] -> ATTR_ATOMIC|ATTR_WRITE|ATTR_READ
[PCUC] type [flt ] 666C7420 len [ 4] attr [C4] handler [20005A8C] -> ATTR_ATOMIC|ATTR_WRITE|ATTR_READ
[PD0R] type [flt ] 666C7420 len [ 4] attr [C4] handler [20005A1C] -> ATTR_ATOMIC|ATTR_WRITE|ATTR_READ
[PHCC] type [flt ] 666C7420 len [ 4] attr [C4] handler [20005AAC] -> ATTR_ATOMIC|ATTR_WRITE|ATTR_READ
[PHNC] type [flt ] 666C7420 len [ 4] attr [C4] handler [20005A9C] -> ATTR_ATOMIC|ATTR_WRITE|ATTR_READ
[PLDC] type [flt ] 666C7420 len [ 4] attr [C4] handler [20005B4C] -> ATTR_ATOMIC|ATTR_WRITE|ATTR_READ
[PM0C] type [flt ] 666C7420 len [ 4] attr [C4] handler [20005ABC] -> ATTR_ATOMIC|ATTR_WRITE|ATTR_READ
[PM1C] type [flt ] 666C7420 len [ 4] attr [C4] handler [20005B1C] -> ATTR_ATOMIC|ATTR_WRITE|ATTR_READ
[PO0R] type [flt ] 666C7420 len [ 4] attr [C4] handler [20005ACC] -> ATTR_ATOMIC|ATTR_WRITE|ATTR_READ
[PPBR] type [flt ] 666C7420 len [ 4] attr [C4] handler [20005A2C] -> ATTR_ATOMIC|ATTR_WRITE|ATTR_READ
[PSCC] type [flt ] 666C7420 len [ 4] attr [C4] handler [20005ADC] -> ATTR_ATOMIC|ATTR_WRITE|ATTR_READ
[PSTR] type [sp78] 73703738 len [ 2] attr [C0] handler [2000098E] -> ATTR_WRITE|ATTR_READ
[PZ0E] type [flt ] 666C7420 len [ 4] attr [C4] handler [20005D24] -> ATTR_ATOMIC|ATTR_WRITE|ATTR_READ
[PZ0F] type [flt ] 666C7420 len [ 4] attr [C4] handler [20005D0C] -> ATTR_ATOMIC|ATTR_WRITE|ATTR_READ
[PZ0G] type [flt ] 666C7420 len [ 4] attr [C4] handler [20005D08] -> ATTR_ATOMIC|ATTR_WRITE|ATTR_READ
[PZ0T] type [flt ] 666C7420 len [ 4] attr [84] handler [20005D30] -> ATTR_ATOMIC|ATTR_READ
[PZ1E] type [flt ] 666C7420 len [ 4] attr [C4] handler [20005D70] -> ATTR_ATOMIC|ATTR_WRITE|ATTR_READ
[PZ1F] type [flt ] 666C7420 len [ 4] attr [C4] handler [20005D58] -> ATTR_ATOMIC|ATTR_WRITE|ATTR_READ
[PZ1G] type [flt ] 666C7420 len [ 4] attr [C4] handler [20005D54] -> ATTR_ATOMIC|ATTR_WRITE|ATTR_READ
[PZ1T] type [flt ] 666C7420 len [ 4] attr [84] handler [20005D7C] -> ATTR_ATOMIC|ATTR_READ
[PZ2E] type [flt ] 666C7420 len [ 4] attr [C4] handler [20005DBC] -> ATTR_ATOMIC|ATTR_WRITE|ATTR_READ
[PZ2F] type [flt ] 666C7420 len [ 4] attr [C4] handler [20005DA4] -> ATTR_ATOMIC|ATTR_WRITE|ATTR_READ
[PZ2G] type [flt ] 666C7420 len [ 4] attr [C4] handler [20005DA0] -> ATTR_ATOMIC|ATTR_WRITE|ATTR_READ
[PZ2T] type [flt ] 666C7420 len [ 4] attr [84] handler [20005DC8] -> ATTR_ATOMIC|ATTR_READ
[PZ3E] type [flt ] 666C7420 len [ 4] attr [C4] handler [20005E08] -> ATTR_ATOMIC|ATTR_WRITE|ATTR_READ
[PZ3F] type [flt ] 666C7420 len [ 4] attr [C4] handler [20005DF0] -> ATTR_ATOMIC|ATTR_WRITE|ATTR_READ
[PZ3G] type [flt ] 666C7420 len [ 4] attr [C4] handler [20005DEC] -> ATTR_ATOMIC|ATTR_WRITE|ATTR_READ
[PZ3T] type [flt ] 666C7420 len [ 4] attr [84] handler [20005E14] -> ATTR_ATOMIC|ATTR_READ
[QCEC] type [si8 ] 73693820 len [ 1] attr [80] handler [2000530B] -> ATTR_READ
[QCFE] type [flt ] 666C7420 len [ 4] attr [84] handler [200052F4] -> ATTR_ATOMIC|ATTR_READ
[QCHA] type [flt ] 666C7420 len [ 4] attr [84] handler [200052E4] -> ATTR_ATOMIC|ATTR_READ
[QCHE] type [flt ] 666C7420 len [ 4] attr [84] handler [200052EC] -> ATTR_ATOMIC|ATTR_READ
[QCHa] type [si8 ] 73693820 len [ 1] attr [80] handler [2000530D] -> ATTR_READ
[QCLA] type [flt ] 666C7420 len [ 4] attr [84] handler [200052D4] -> ATTR_ATOMIC|ATTR_READ
[QCLE] type [flt ] 666C7420 len [ 4] attr [84] handler [200052DC] -> ATTR_ATOMIC|ATTR_READ
[QCLV] type [ui8 ] 75693820 len [ 1] attr [C1] handler [20005308] -> ATTR_PRIVATE_WRITE|ATTR_WRITE|ATTR_READ
[QCLa] type [si8 ] 73693820 len [ 1] attr [80] handler [2000530C] -> ATTR_READ
[QCLv] type [flt ] 666C7420 len [ 4] attr [84] handler [20005304] -> ATTR_ATOMIC|ATTR_READ
[QCPE] type [flt ] 666C7420 len [ 4] attr [84] handler [200052FC] -> ATTR_ATOMIC|ATTR_READ
[QECI] type [ui8 ] 75693820 len [ 1] attr [D0] handler [00024C35] -> ATTR_FUNCTION|ATTR_WRITE|ATTR_READ
[QECS] type [ui8 ] 75693820 len [ 1] attr [80] handler [20005386] -> ATTR_READ
[QENA] type [flag] 666C6167 len [ 1] attr [D0] handler [00024B23] -> ATTR_FUNCTION|ATTR_WRITE|ATTR_READ
[QENN] type [flag] 666C6167 len [ 1] attr [C1] handler [20005382] -> ATTR_PRIVATE_WRITE|ATTR_WRITE|ATTR_READ
[QERI] type [hex_] 6865785F len [ 4] attr [D1] handler [00024B01] -> ATTR_PRIVATE_WRITE|ATTR_FUNCTION|ATTR_WRITE|ATTR_READ
[QERR] type [hex_] 6865785F len [ 4] attr [80] handler [20005374] -> ATTR_READ
[QERS] type [hex_] 6865785F len [ 4] attr [D0] handler [00024ADD] -> ATTR_FUNCTION|ATTR_WRITE|ATTR_READ
[QFL!] type [hex_] 6865785F len [ 1] attr [C1] handler [20005388] -> ATTR_PRIVATE_WRITE|ATTR_WRITE|ATTR_READ
[QIEC] type [si8 ] 73693820 len [ 1] attr [80] handler [20005347] -> ATTR_READ
[QIFE] type [flt ] 666C7420 len [ 4] attr [84] handler [20005330] -> ATTR_ATOMIC|ATTR_READ
[QIHA] type [flt ] 666C7420 len [ 4] attr [84] handler [20005320] -> ATTR_ATOMIC|ATTR_READ
[QIHE] type [flt ] 666C7420 len [ 4] attr [84] handler [20005328] -> ATTR_ATOMIC|ATTR_READ
[QIHa] type [si8 ] 73693820 len [ 1] attr [80] handler [20005349] -> ATTR_READ
[QILA] type [flt ] 666C7420 len [ 4] attr [84] handler [20005310] -> ATTR_ATOMIC|ATTR_READ
[QILE] type [flt ] 666C7420 len [ 4] attr [84] handler [20005318] -> ATTR_ATOMIC|ATTR_READ
[QILV] type [ui8 ] 75693820 len [ 1] attr [C1] handler [20005344] -> ATTR_PRIVATE_WRITE|ATTR_WRITE|ATTR_READ
[QILa] type [si8 ] 73693820 len [ 1] attr [80] handler [20005348] -> ATTR_READ
[QILv] type [flt ] 666C7420 len [ 4] attr [84] handler [20005340] -> ATTR_ATOMIC|ATTR_READ
[QIPE] type [flt ] 666C7420 len [ 4] attr [84] handler [20005338] -> ATTR_ATOMIC|ATTR_READ
[QVER] type [ui8 ] 75693820 len [ 1] attr [80] handler [20000865] -> ATTR_READ
[RBr ] type [ch8*] 6368382A len [ 8] attr [88] handler [0003FFE6] -> ATTR_CONST|ATTR_READ
[REV ] type [{rev] 7B726576 len [ 6] attr [90] handler [0001D8C9] -> ATTR_FUNCTION|ATTR_READ
[RMde] type [char] 63686172 len [ 1] attr [88] handler [000371C7] -> ATTR_CONST|ATTR_READ
[RPlt] type [ch8*] 6368382A len [ 8] attr [88] handler [0003FFEE] -> ATTR_CONST|ATTR_READ
[RSvn] type [ui32] 75693332 len [ 4] attr [88] handler [0003FFDC] -> ATTR_CONST|ATTR_READ
[RVBF] type [{rev] 7B726576 len [ 6] attr [90] handler [0001D8EB] -> ATTR_FUNCTION|ATTR_READ
[RVCR] type [{rev] 7B726576 len [ 6] attr [90] handler [00020129] -> ATTR_FUNCTION|ATTR_READ
[RVUF] type [{rev] 7B726576 len [ 6] attr [90] handler [0001D92D] -> ATTR_FUNCTION|ATTR_READ
[SACT] type [ui16] 75693136 len [ 2] attr [C0] handler [200008D2] -> ATTR_WRITE|ATTR_READ
[SALS] type [hex_] 6865785F len [ 1] attr [80] handler [200009F0] -> ATTR_READ
[SAPN] type [ui8 ] 75693820 len [ 1] attr [90] handler [00027DDB] -> ATTR_FUNCTION|ATTR_READ
[SAS!] type [hex_] 6865785F len [ 4] attr [D1] handler [000142C1] -> ATTR_PRIVATE_WRITE|ATTR_FUNCTION|ATTR_WRITE|ATTR_READ
[SBF ] type [hex_] 6865785F len [ 4] attr [80] handler [20000508] -> ATTR_READ
[SBFC] type [flag] 666C6167 len [ 1] attr [41] handler [20000504] -> ATTR_PRIVATE_WRITE|ATTR_WRITE
[SBFD] type [hex_] 6865785F len [ 4] attr [C1] handler [20000520] -> ATTR_PRIVATE_WRITE|ATTR_WRITE|ATTR_READ
[SBFE] type [flag] 666C6167 len [ 1] attr [C0] handler [20000505] -> ATTR_WRITE|ATTR_READ
[SBFF] type [hex_] 6865785F len [ 4] attr [80] handler [20000510] -> ATTR_READ
[SBFL] type [hex_] 6865785F len [ 4] attr [C0] handler [20000518] -> ATTR_WRITE|ATTR_READ
[SBFN] type [hex_] 6865785F len [ 4] attr [80] handler [2000050C] -> ATTR_READ
[SBFU] type [hex_] 6865785F len [ 4] attr [C1] handler [2000051C] -> ATTR_PRIVATE_WRITE|ATTR_WRITE|ATTR_READ
[SBFV] type [hex_] 6865785F len [ 4] attr [80] handler [20000514] -> ATTR_READ
[SBS!] type [ui16] 75693136 len [ 2] attr [C3] handler [20001AA6] -> ATTR_PRIVATE_WRITE|ATTR_PRIVATE_READ|ATTR_WRITE|ATTR_READ
[SCIA] type [ui16] 75693136 len [ 2] attr [D0] handler [000280C7] -> ATTR_FUNCTION|ATTR_WRITE|ATTR_READ
[SCII] type [ui8 ] 75693820 len [ 1] attr [D0] handler [00023E07] -> ATTR_FUNCTION|ATTR_WRITE|ATTR_READ
[SCIL] type [ui8 ] 75693820 len [ 1] attr [D0] handler [00028061] -> ATTR_FUNCTION|ATTR_WRITE|ATTR_READ
[SCXC] type [sp78] 73703738 len [ 2] attr [80] handler [200053E6] -> ATTR_READ
[SDAF] type [ui16] 75693136 len [ 2] attr [C1] handler [2000099A] -> ATTR_PRIVATE_WRITE|ATTR_WRITE|ATTR_READ
[SDAS] type [ui16] 75693136 len [ 2] attr [C1] handler [20000998] -> ATTR_PRIVATE_WRITE|ATTR_WRITE|ATTR_READ
[SECD] type [flag] 666C6167 len [ 1] attr [90] handler [00026A4B] -> ATTR_FUNCTION|ATTR_READ
[SECN] type [ch8*] 6368382A len [32] attr [90] handler [00026B47] -> ATTR_FUNCTION|ATTR_READ
[SECS] type [ch8*] 6368382A len [32] attr [50] handler [00026B81] -> ATTR_FUNCTION|ATTR_WRITE
[SECl] type [flag] 666C6167 len [ 1] attr [80] handler [2000722E] -> ATTR_READ
[SECs] type [flag] 666C6167 len [ 1] attr [80] handler [2000722D] -> ATTR_READ
[SFBR] type [ui8 ] 75693820 len [ 1] attr [C0] handler [200008C8] -> ATTR_WRITE|ATTR_READ
[SIP ] type [ui8 ] 75693820 len [ 1] attr [D0] handler [00024107] -> ATTR_FUNCTION|ATTR_WRITE|ATTR_READ
[SIPB] type [flag] 666C6167 len [ 1] attr [80] handler [20000864] -> ATTR_READ
[SIS!] type [hex_] 6865785F len [ 4] attr [C1] handler [200009A8] -> ATTR_PRIVATE_WRITE|ATTR_WRITE|ATTR_READ
[SLP0] type [ui8 ] 75693820 len [ 1] attr [80] handler [200008ED] -> ATTR_READ
[SLPE] type [ui8 ] 75693820 len [ 1] attr [D1] handler [00029A3F] -> ATTR_PRIVATE_WRITE|ATTR_FUNCTION|ATTR_WRITE|ATTR_READ
[SLPS] type [flag] 666C6167 len [ 1] attr [C0] handler [200008EE] -> ATTR_WRITE|ATTR_READ
[SMBC] type [hex_] 6865785F len [ 6] attr [C3] handler [2000078A] -> ATTR_PRIVATE_WRITE|ATTR_PRIVATE_READ|ATTR_WRITE|ATTR_READ
[SMBG] type [ui8 ] 75693820 len [ 1] attr [51] handler [000217FD] -> ATTR_PRIVATE_WRITE|ATTR_FUNCTION|ATTR_WRITE
[SMBR] type [hex_] 6865785F len [32] attr [82] handler [20005110] -> ATTR_PRIVATE_READ|ATTR_READ
[SMBS] type [hex_] 6865785F len [ 2] attr [C7] handler [20000788] -> ATTR_PRIVATE_WRITE|ATTR_PRIVATE_READ|ATTR_ATOMIC|ATTR_WRITE|ATTR_READ
[SMBW] type [hex_] 6865785F len [32] attr [C3] handler [200050CF] -> ATTR_PRIVATE_WRITE|ATTR_PRIVATE_READ|ATTR_WRITE|ATTR_READ
[SPDO] type [ui8 ] 75693820 len [ 1] attr [D0] handler [00028C45] -> ATTR_FUNCTION|ATTR_WRITE|ATTR_READ
[SPF!] type [hex_] 6865785F len [ 1] attr [C3] handler [200009E3] -> ATTR_PRIVATE_WRITE|ATTR_PRIVATE_READ|ATTR_WRITE|ATTR_READ
[SPH0] type [ui16] 75693136 len [ 2] attr [80] handler [20000A3C] -> ATTR_READ
[SPHE] type [ui8 ] 75693820 len [ 1] attr [D1] handler [000313C5] -> ATTR_PRIVATE_WRITE|ATTR_FUNCTION|ATTR_WRITE|ATTR_READ
[SPHR] type [ui32] 75693332 len [ 4] attr [80] handler [20000A40] -> ATTR_READ
[SPHS] type [ui8 ] 75693820 len [ 1] attr [C0] handler [20000A38] -> ATTR_WRITE|ATTR_READ
[SPHT] type [ui16] 75693136 len [ 2] attr [80] handler [20000A3E] -> ATTR_READ
[SPHZ] type [ui8 ] 75693820 len [ 1] attr [50] handler [00031373] -> ATTR_FUNCTION|ATTR_WRITE
[SPP!] type [hex_] 6865785F len [ 1] attr [C3] handler [200009E2] -> ATTR_PRIVATE_WRITE|ATTR_PRIVATE_READ|ATTR_WRITE|ATTR_READ
[SPT!] type [hex_] 6865785F len [ 1] attr [C3] handler [200009E4] -> ATTR_PRIVATE_WRITE|ATTR_PRIVATE_READ|ATTR_WRITE|ATTR_READ
[SPU!] type [hex_] 6865785F len [ 4] attr [C1] handler [200009C0] -> ATTR_PRIVATE_WRITE|ATTR_WRITE|ATTR_READ
[SPV!] type [hex_] 6865785F len [ 4] attr [C1] handler [200009C4] -> ATTR_PRIVATE_WRITE|ATTR_WRITE|ATTR_READ
[SRS!] type [hex_] 6865785F len [ 4] attr [C1] handler [200009A4] -> ATTR_PRIVATE_WRITE|ATTR_WRITE|ATTR_READ
[STDK] type [ui16] 75693136 len [ 2] attr [80] handler [20000946] -> ATTR_READ
[STFD] type [flag] 666C6167 len [ 1] attr [80] handler [20000959] -> ATTR_READ
[SWER] type [hex_] 6865785F len [ 1] attr [80] handler [20000983] -> ATTR_READ
[TA0V] type [sp78] 73703738 len [ 2] attr [C0] handler [2000588E] -> ATTR_WRITE|ATTR_READ
[TA35] type [flag] 666C6167 len [ 1] attr [C3] handler [200009EE] -> ATTR_PRIVATE_WRITE|ATTR_PRIVATE_READ|ATTR_WRITE|ATTR_READ
[TB0T] type [sp78] 73703738 len [ 2] attr [C0] handler [20001A3C] -> ATTR_WRITE|ATTR_READ
[TB1T] type [sp78] 73703738 len [ 2] attr [C0] handler [20001A62] -> ATTR_WRITE|ATTR_READ
[TB2T] type [sp78] 73703738 len [ 2] attr [C0] handler [20001A64] -> ATTR_WRITE|ATTR_READ
[TBXT] type [sp78] 73703738 len [ 2] attr [C0] handler [20005860] -> ATTR_WRITE|ATTR_READ
[TC0E] type [sp78] 73703738 len [ 2] attr [C0] handler [2000586C] -> ATTR_WRITE|ATTR_READ
[TC0F] type [sp78] 73703738 len [ 2] attr [C0] handler [20005874] -> ATTR_WRITE|ATTR_READ
[TC0P] type [sp78] 73703738 len [ 2] attr [C0] handler [20005824] -> ATTR_WRITE|ATTR_READ
[TC1C] type [sp78] 73703738 len [ 2] attr [C0] handler [20005840] -> ATTR_WRITE|ATTR_READ
[TC2C] type [sp78] 73703738 len [ 2] attr [C0] handler [20005842] -> ATTR_WRITE|ATTR_READ
[TCGC] type [sp78] 73703738 len [ 2] attr [C0] handler [20005844] -> ATTR_WRITE|ATTR_READ
[TCHP] type [sp78] 73703738 len [ 2] attr [C0] handler [20005828] -> ATTR_WRITE|ATTR_READ
[TCSA] type [sp78] 73703738 len [ 2] attr [C0] handler [20005846] -> ATTR_WRITE|ATTR_READ
[TCXC] type [sp78] 73703738 len [ 2] attr [C0] handler [20005838] -> ATTR_WRITE|ATTR_READ
[TH0A] type [sp78] 73703738 len [ 2] attr [C0] handler [20005878] -> ATTR_WRITE|ATTR_READ
[TH0B] type [sp78] 73703738 len [ 2] attr [C0] handler [2000587A] -> ATTR_WRITE|ATTR_READ
[TH0C] type [sp78] 73703738 len [ 2] attr [C0] handler [2000587C] -> ATTR_WRITE|ATTR_READ
[TH0F] type [sp78] 73703738 len [ 2] attr [C0] handler [20005880] -> ATTR_WRITE|ATTR_READ
[TH0R] type [sp78] 73703738 len [ 2] attr [C0] handler [2000587E] -> ATTR_WRITE|ATTR_READ
[TKBV] type [sp78] 73703738 len [ 2] attr [C0] handler [20005884] -> ATTR_WRITE|ATTR_READ
[TM0P] type [sp78] 73703738 len [ 2] attr [C0] handler [20005826] -> ATTR_WRITE|ATTR_READ
[TPCD] type [sp78] 73703738 len [ 2] attr [C0] handler [20005834] -> ATTR_WRITE|ATTR_READ
[TPMV] type [sp78] 73703738 len [ 2] attr [C0] handler [20005886] -> ATTR_WRITE|ATTR_READ
[TW0P] type [sp78] 73703738 len [ 2] attr [C0] handler [2000582A] -> ATTR_WRITE|ATTR_READ
[Th0N] type [sp78] 73703738 len [ 2] attr [C0] handler [20005832] -> ATTR_WRITE|ATTR_READ
[Th0R] type [sp78] 73703738 len [ 2] attr [C0] handler [20005836] -> ATTR_WRITE|ATTR_READ
[Ts0P] type [sp78] 73703738 len [ 2] attr [C0] handler [2000582C] -> ATTR_WRITE|ATTR_READ
[Ts0S] type [sp78] 73703738 len [ 2] attr [C0] handler [20005862] -> ATTR_WRITE|ATTR_READ
[Ts1P] type [sp78] 73703738 len [ 2] attr [C0] handler [2000582E] -> ATTR_WRITE|ATTR_READ
[TsCH] type [sp78] 73703738 len [ 2] attr [C0] handler [20000622] -> ATTR_WRITE|ATTR_READ
[TsFD] type [sp78] 73703738 len [ 2] attr [C0] handler [200005FC] -> ATTR_WRITE|ATTR_READ
[TsFS] type [sp78] 73703738 len [ 2] attr [C0] handler [200005FA] -> ATTR_WRITE|ATTR_READ
[TsHS] type [sp78] 73703738 len [ 2] attr [C0] handler [20000608] -> ATTR_WRITE|ATTR_READ
[TsTH] type [sp78] 73703738 len [ 2] attr [C0] handler [2000060C] -> ATTR_WRITE|ATTR_READ
[TsTP] type [sp78] 73703738 len [ 2] attr [C0] handler [2000060A] -> ATTR_WRITE|ATTR_READ
[TsWS] type [sp78] 73703738 len [ 2] attr [C0] handler [20000606] -> ATTR_WRITE|ATTR_READ
[UBCA] type [fp6a] 66703661 len [ 2] attr [80] handler [20005B8E] -> ATTR_READ
[UBCa] type [ui8 ] 75693820 len [ 1] attr [C0] handler [20005B8C] -> ATTR_WRITE|ATTR_READ
[UBEN] type [flag] 666C6167 len [ 1] attr [C0] handler [2000095E] -> ATTR_WRITE|ATTR_READ
[UBGA] type [fp6a] 66703661 len [ 2] attr [80] handler [20005B96] -> ATTR_READ
[UBGa] type [ui8 ] 75693820 len [ 1] attr [C0] handler [20005B94] -> ATTR_WRITE|ATTR_READ
[UFIS] type [ui32] 75693332 len [ 4] attr [90] handler [00028D37] -> ATTR_FUNCTION|ATTR_READ
[UREV] type [ui8 ] 75693820 len [ 1] attr [80] handler [20000791] -> ATTR_READ
[URPP] type [ui32] 75693332 len [ 4] attr [80] handler [400FE318] -> ATTR_READ
[URWD] type [ui32] 75693332 len [ 4] attr [80] handler [400FEFA4] -> ATTR_READ
[USR0] type [ui32] 75693332 len [ 4] attr [80] handler [400FE1E0] -> ATTR_READ
[USR1] type [ui32] 75693332 len [ 4] attr [80] handler [400FE1E4] -> ATTR_READ
[USR2] type [ui32] 75693332 len [ 4] attr [80] handler [400FE1E8] -> ATTR_READ
[USR3] type [ui32] 75693332 len [ 4] attr [80] handler [400FE1EC] -> ATTR_READ
[VC0C] type [flt ] 666C7420 len [ 4] attr [C4] handler [200058FC] -> ATTR_ATOMIC|ATTR_WRITE|ATTR_READ
[VCGC] type [flt ] 666C7420 len [ 4] attr [C4] handler [2000591C] -> ATTR_ATOMIC|ATTR_WRITE|ATTR_READ
[VD0R] type [flt ] 666C7420 len [ 4] attr [C4] handler [2000589C] -> ATTR_ATOMIC|ATTR_WRITE|ATTR_READ
[VP0R] type [flt ] 666C7420 len [ 4] attr [C4] handler [200058BC] -> ATTR_ATOMIC|ATTR_WRITE|ATTR_READ
[WCPD] type [ui8 ] 75693820 len [ 1] attr [80] handler [200008CB] -> ATTR_READ
[WCPW] type [ui8 ] 75693820 len [ 1] attr [80] handler [200008CA] -> ATTR_READ
[WKEN] type [ui8 ] 75693820 len [ 1] attr [C1] handler [20004A4A] -> ATTR_PRIVATE_WRITE|ATTR_WRITE|ATTR_READ
[WKTP] type [ui8 ] 75693820 len [ 1] attr [D0] handler [0002DFCF] -> ATTR_FUNCTION|ATTR_WRITE|ATTR_READ
[WOw0] type [si8 ] 73693820 len [ 1] attr [80] handler [20005CBD] -> ATTR_READ
[WPo0] type [si8 ] 73693820 len [ 1] attr [80] handler [20000A1E] -> ATTR_READ
[ZPEN] type [hex_] 6865785F len [ 1] attr [D1] handler [0002BF8F] -> ATTR_PRIVATE_WRITE|ATTR_FUNCTION|ATTR_WRITE|ATTR_READ
[hSci] type [ui8 ] 75693820 len [ 1] attr [D3] handler [0001FBAD] -> ATTR_PRIVATE_WRITE|ATTR_PRIVATE_READ|ATTR_FUNCTION|ATTR_WRITE|ATTR_READ
[hSdn] type [flt ] 666C7420 len [ 4] attr [84] handler [2000073C] -> ATTR_ATOMIC|ATTR_READ
[hSia] type [ui16] 75693136 len [ 2] attr [51] handler [0001FBF9] -> ATTR_PRIVATE_WRITE|ATTR_FUNCTION|ATTR_WRITE
[hSii] type [ui8 ] 75693820 len [ 1] attr [D3] handler [0001FC2F] -> ATTR_PRIVATE_WRITE|ATTR_PRIVATE_READ|ATTR_FUNCTION|ATTR_WRITE|ATTR_READ
[hSij] type [ui8 ] 75693820 len [ 1] attr [D3] handler [0001FC63] -> ATTR_PRIVATE_WRITE|ATTR_PRIVATE_READ|ATTR_FUNCTION|ATTR_WRITE|ATTR_READ
[hSta] type [hex_] 6865785F len [ 3] attr [90] handler [0001FB9F] -> ATTR_FUNCTION|ATTR_READ
[hSup] type [flt ] 666C7420 len [ 4] attr [84] handler [20000738] -> ATTR_ATOMIC|ATTR_READ
[mSTC] type [flt ] 666C7420 len [ 4] attr [C4] handler [200009D4] -> ATTR_ATOMIC|ATTR_WRITE|ATTR_READ
[mSTD] type [flt ] 666C7420 len [ 4] attr [C4] handler [200009D8] -> ATTR_ATOMIC|ATTR_WRITE|ATTR_READ
[mSTK] type [flt ] 666C7420 len [ 4] attr [C4] handler [200009DC] -> ATTR_ATOMIC|ATTR_WRITE|ATTR_READ
[tt11] type [flt ] 666C7420 len [ 4] attr [C4] handler [20005800] -> ATTR_ATOMIC|ATTR_WRITE|ATTR_READ
[tt12] type [flt ] 666C7420 len [ 4] attr [C4] handler [20005804] -> ATTR_ATOMIC|ATTR_WRITE|ATTR_READ
[tt13] type [flt ] 666C7420 len [ 4] attr [C4] handler [20005808] -> ATTR_ATOMIC|ATTR_WRITE|ATTR_READ
[tt14] type [flt ] 666C7420 len [ 4] attr [C4] handler [2000580C] -> ATTR_ATOMIC|ATTR_WRITE|ATTR_READ
[tt15] type [flt ] 666C7420 len [ 4] attr [C4] handler [20005810] -> ATTR_ATOMIC|ATTR_WRITE|ATTR_READ
[tt16] type [flt ] 666C7420 len [ 4] attr [C4] handler [20005814] -> ATTR_ATOMIC|ATTR_WRITE|ATTR_READ
[tt17] type [flt ] 666C7420 len [ 4] attr [C4] handler [20005818] -> ATTR_ATOMIC|ATTR_WRITE|ATTR_READ
[tt18] type [flt ] 666C7420 len [ 4] attr [C4] handler [2000581C] -> ATTR_ATOMIC|ATTR_WRITE|ATTR_READ
[tt1j] type [flt ] 666C7420 len [ 4] attr [C4] handler [20005820] -> ATTR_ATOMIC|ATTR_WRITE|ATTR_READ
[ttcm] type [ui16] 75693136 len [ 2] attr [C0] handler [2000091A] -> ATTR_WRITE|ATTR_READ
[ttcn] type [ui8 ] 75693820 len [ 1] attr [C0] handler [2000093C] -> ATTR_WRITE|ATTR_READ
[zBDC] type [flag] 666C6167 len [ 1] attr [90] handler [00028D0D] -> ATTR_FUNCTION|ATTR_READ
[zDBG] type [ui8 ] 75693820 len [ 1] attr [D0] handler [00027F4B] -> ATTR_FUNCTION|ATTR_WRITE|ATTR_READ
[zDBI] type [flag] 666C6167 len [ 1] attr [40] handler [200006AC] -> ATTR_WRITE
[zDSF] type [flag] 666C6167 len [ 1] attr [C1] handler [2000090C] -> ATTR_PRIVATE_WRITE|ATTR_WRITE|ATTR_READ
[zKLG] type [hex_] 6865785F len [ 5] attr [D1] handler [0001B015] -> ATTR_PRIVATE_WRITE|ATTR_FUNCTION|ATTR_WRITE|ATTR_READ
[zKLI] type [hex_] 6865785F len [ 2] attr [D1] handler [0001AF51] -> ATTR_PRIVATE_WRITE|ATTR_FUNCTION|ATTR_WRITE|ATTR_READ
[zLDG] type [hex_] 6865785F len [ 5] attr [D1] handler [0001B191] -> ATTR_PRIVATE_WRITE|ATTR_FUNCTION|ATTR_WRITE|ATTR_READ
[zLDI] type [hex_] 6865785F len [ 2] attr [D3] handler [0001B0CD] -> ATTR_PRIVATE_WRITE|ATTR_PRIVATE_READ|ATTR_FUNCTION|ATTR_WRITE|ATTR_READ
[zMOJ] type [flag] 666C6167 len [ 1] attr [C0] handler [20000790] -> ATTR_WRITE|ATTR_READ
[zSEN] type [flag] 666C6167 len [ 1] attr [D1] handler [00027EDD] -> ATTR_PRIVATE_WRITE|ATTR_FUNCTION|ATTR_WRITE|ATTR_READ
Hidden keys (15):
[OSK0] type [ch8*] 6368382A len [32] attr [90] handler [0001D7B9] -> ATTR_FUNCTION|ATTR_READ
[OSK1] type [ch8*] 6368382A len [32] attr [90] handler [0001D7DF] -> ATTR_FUNCTION|ATTR_READ
[MSSN] type [ui16] 75693136 len [ 1] attr [C0] handler [20007225] -> ATTR_WRITE|ATTR_READ
[CRDP] type [flag] 666C6167 len [ 1] attr [C0] handler [2000069C] -> ATTR_WRITE|ATTR_READ
[FPOR] type [ch8*] 6368382A len [ 8] attr [50] handler [00028CEB] -> ATTR_FUNCTION|ATTR_WRITE
[MOJC] type [ui8 ] 75693820 len [ 1] attr [D0] handler [0001A883] -> ATTR_FUNCTION|ATTR_WRITE|ATTR_READ
[MOJD] type [ui8 ] 75693820 len [ 1] attr [90] handler [0001A867] -> ATTR_FUNCTION|ATTR_READ
[MOJE] type [ui8 ] 75693820 len [ 1] attr [90] handler [0001A845] -> ATTR_FUNCTION|ATTR_READ
[MOJO] type [ui8 ] 75693820 len [ 1] attr [D0] handler [0001A7F1] -> ATTR_FUNCTION|ATTR_WRITE|ATTR_READ
[KPCT] type [ui8 ] 75693820 len [ 1] attr [80] handler [200007A9] -> ATTR_READ
[KPPW] type [ch8*] 6368382A len [32] attr [50] handler [00021C01] -> ATTR_FUNCTION|ATTR_WRITE
[KPST] type [ui8 ] 75693820 len [ 1] attr [80] handler [200007A8] -> ATTR_READ
[KPVR] type [ui8 ] 75693820 len [ 1] attr [80] handler [200007D0] -> ATTR_READ
[zCRS] type [ui8 ] 75693820 len [ 1] attr [51] handler [00028C89] -> ATTR_PRIVATE_WRITE|ATTR_FUNCTION|ATTR_WRITE
[____] type [flag] 666C6167 len [ 1] attr [88] handler [000371C6] -> ATTR_CONST|ATTR_READ
Key values:
[#KEY] is BD020000 -> 701
[RVBF] is 02350F000005 -> 2.35f5 (org 2.35f105)
[RVUF] is 02350F000005 -> 2.35f5 (org 2.35f105)
[REV ] is 02350F000005 -> 2.35f5 (org 2.35f105)
[LDKN] is 02 -> 2
[RBr ] is 323031366D620000 -> 2016mb
[RPlt] is 6A39330000000000 -> j93
[CRC?] is F830E37B
|
Share This Story!
'Abandoned' Puppy was Turned in by Owner
According to a statement released Saturday, it was the dog's owner who turned the animal over to police, claiming that he had accidentally stepped on the dog's leg and couldn't afford to pay a veterinarian.
EVANS, NY – The Town of Evans Police Department have solved the case of an injured puppy that was supposedly found abandoned on Holland Road Thursday. According to a statement released Saturday, it was the dog's owner who turned the animal over to police, claiming that he had accidentally stepped on the dog's leg and couldn't afford to pay a veterinarian. He made up the story about finding the dog on Holland Road knowing that it would get medical attention if he turned it over to police.
His story started unraveling within an hour of police releasing photos of the puppy to the media. Police learned the name, address and phone number of the person who bought the dog in August thanks to a tip from the seller. It turns out that the buyer, William M. Montroy, 27, of Angola, was the same person who delivered the injured animal to the police station.
“I just wanted the dog to be taken care of because neither I nor my family had any means to pay for the vet bills.”
William Montroy
On Friday, police asked Montroy to come the station to answer some questions. He arrived with a parent and immediately broke down and started to cry while being questioned, police officials say. That's when he admitted that he had accidentally stepped on the puppy and injured its leg.
In his written statement to police, Montroy said that he is unemployed and couldn't afford the veterinary bill. "The price just for the visit alone was far [too] much for me to pay on my own," he said. After consulting with his father, he decided the best thing to do was to turn the dog over to the Town of Evans Police Department. "I apologize for the story and for my actions," he wrote, "but I just wanted the dog to be taken care of because neither I nor my family had any means to pay for the vet bills of that magnitude and didn't want the puppy to be euthanized."
According to the Town of Evans Police Department, the dog has been adopted.
In the video above, Chief of Police Ernest Masullo explains why he made the decision not to charge the owner with making a false report. |
Q:
C++ class override for const and non-const reference member
So I'm making a bitmask class that stores a reference to an std::byte as a member and the index of the individual bit to allow accessing the value of that bit and also assigning to that bit. I also want it to be possible for the value of the std::byte passed to optionally be a const, and if it is a const, I want the class itself to be considered a const or at least make sure operations that may change the underlying value of the std::byte (such as assignment) do not work. However I don't see a way to implement it without copypasting code which I consider to be too complicated. Is there an easier way to get around this? This is my current code for the bitmask class:
class bitmask
{
public:
bitmask(std::byte &chunk, std::uint_fast8_t index) noexcept
: _chunk(chunk), _index(index){};
bitmask(bitmask const &source) = default;
operator bool() const noexcept
{
return static_cast<bool>((_chunk >> (7 - _index)) & std::byte{1});
}
bitmask &operator=(bool val) noexcept
{
_chunk = ((_chunk & ~(std::byte{1} << (7 - _index))) |
(std::byte{val} << (7 - _index)));
return *this;
}
private:
std::byte &_chunk;
std::uint_fast8_t const _index;
};
What I want is to basically make a variant of it where chunk is a const reference and the assignment operator doesn't exist, without copy-pasting existing code to avoid reptition.
PS: I don't mind using any C++ standard, including C++20, as long as it solves the problem elegantly.
A:
So, despite there being some really nice answers here, I didn't find any of them particularly elegant, so I decided to delve deeper and solve my own problem. Note that this solution isn't entirely mine, and was originally inspired by @ildjarn 's answer, so props to them as well.
This is how I ended up solving my problem
// Class to mask reference to individual bit
template <bool is_const = false>
class bitmask
{
public:
using ChunkType = std::conditional_t<is_const, std::byte const, std::byte>;
bitmask(ChunkType &chunk, std::uint_fast8_t index) noexcept
: _chunk(chunk), _index(index){};
bitmask(bitmask const &source) = default;
operator bool() const noexcept
{
return static_cast<bool>((_chunk >> (7 - _index)) & std::byte{1});
}
template <typename = std::enable_if_t<!is_const>>
bitmask &operator=(bool val) noexcept
{
_chunk = ((_chunk & ~(std::byte{1} << (7 - _index))) |
(std::byte{val} << (7 - _index)));
return *this;
}
private:
ChunkType &_chunk;
std::uint_fast8_t const _index;
};
bitmask(std::byte &, std::uint_fast8_t)->bitmask<false>;
bitmask(std::byte const &, std::uint_fast8_t)->bitmask<true>;
So basically, the class is a template now which takes a boolean value depending on whether the byte referenced to is a const or not, and I also added template argument deduction hints for the constructor so the constness is automatically deduced. I also made operator= only work if is_const is false.
|
The metabolism of imidacloprid by aldehyde oxidase contributes to its clastogenic effect in New Zealand rabbits.
Imidacloprid (IMI) is a systemic, chloro-nicotinyl insecticide classified in Regulation N° 1272/2008 of the European Commision as "harmful if swallowed and very toxic to aquatic life, with long-lasting effects". IMI is metabolized in vitro both by aldehyde oxidase (AOX) (reduction) and by cytochrome P450s enzymes (CYPs). In the present study, the AOX inhibitor sodium tungstate dihydrate (ST) was used to elucidate the relative contribution of CYP 450 and AOX metabolic pathways on IMI metabolism, in male rabbits exposed to IMI for two months. To evaluate the inhibition effectiveness, various metabolite concentrations in the IMI and IMI + ST exposed groups were monitored. DNA damage was also evaluated in micronucleus (MN) and single cell electrophoresis (SCGC) assays in both groups, along with oxidative stress (OS) with the inflammatory status of the exposed animals, in order to clarify which metabolic pathway is more detrimental in this experimental setting. A significant increase in the frequency of binucleated cells with MN (BNMN, 105%) and micronuclei (MN, 142%) was observed after exposure to IMI (p < 0.001). The increase in the ST co-exposed animals was less pronounced (BNMN 75%, MN 95%). The Cytokinesis Block Proliferation Index (CBPI) showed no significant difference between controls and exposed animals at any time of exposure (p > 0.05), which indicates no cytotoxic effect. Similarly, comet results show that the IMI group exhibited the highest achieved tail intensity, which reached 70.7% over the control groups, whereas in the IMI + ST groups the increase remained at 48.5%. No differences were observed between all groups for oxidative-stress biomarkers. The results indicate that the AOX metabolic pathway plays a more important role in the systemic toxicity of IMI. |
South Korea fines steel firms for price-fixing
SEOUL--South Korea's antitrust regulator on Sunday levied 291.7 billion won ($272 million) in fines against Posco (005490.SE) and six other steel companies for price fixing.
The steel companies regularly had meetings to collude with each other on prices for cold-rolled steel, galvanized steel and color steel, the Fair Trade Commission said in a statement. The commission said the collusion occurred in the past several years.
The FTC said it will ask prosecutors to look into the case against a group of six steel companies, including Posco, Hyundai HYSCO (010520.SE) and Dongbu Steel Co. (016380.SE).
Posco was slapped with a fine of KRW98.33 billion, the largest of the group. The FTC said the country's top steelmaker joined with others in 2005 to create "zinc surcharge," aimed at passing a surge in zinc prices onto customers.
Posco said they were not involved in price collusion. The company controls more than 60% of the domestic galvanized steel market.
"We will take a legal action to prove we are not guilty," company spokeswoman Han Mi-hyang said.
Intraday Data provided by SIX Financial Information and subject to terms of use.
Historical and current end-of-day data provided by SIX Financial Information. Intraday data
delayed per exchange requirements. S&P/Dow Jones Indices (SM) from Dow Jones & Company, Inc.
All quotes are in local exchange time. Real time last sale data provided by NASDAQ. More
information on NASDAQ traded symbols and their current financial status. Intraday
data delayed 15 minutes for Nasdaq, and 20 minutes for other exchanges. S&P/Dow Jones Indices (SM)
from Dow Jones & Company, Inc. SEHK intraday data is provided by SIX Financial Information and is
at least 60-minutes delayed. All quotes are in local exchange time. |
MARCH 27--Despite a police appeal that triggered worldwide media coverage and a torrent of social media activity, the notorious "Akron Pooper" remains at large more than two weeks after his photo and details of his vile spree were widely publicized.
Asked today about the status of the investigation, Akron Police Department spokesperson Lt. Rick Edwards said, “We have received multiple tips on the pooper.” While investigators are “following up on each and every one of them,” said Edwards, cops “have not identified the suspect and no charges have been filed.”
On the bright side, no additional public defecations have been reported in Ohio’s fifth-largest city since March 10, when a witness photographed the suspect as he prepared to relieve himself atop the hood of her 2004 Dodge Neon.
Police believe that the man, pictured at right, is responsible for defecating on--and, in some cases, in--at least 20 vehicles since 2012. Some victims have been repeatedly targeted, like the Dodge owner, whose car was attacked seven times over a four-month period.
The suspect has often struck in Akron’s Castle Homes neighborhood, usually between 4 AM and 6 AM, police say.
Numerous Akron police reports include victim accounts detailing how their autos were pooped upon. One man, whose Toyota was hit twice, reported discovering human waste smeared on the car’s passenger door. While “The excrement did not cause any damage to the car,” cops noted, it “did cause a big mess.”
Other victims have used the neighborhood’s Facebook page--where the suspect is known as the “Castle Homes Crapper”--to report on the man’s illegal activities. A typical post reported, “There was Poop on the hood of my car this past summer!!!!”
The Akron police poop hotline is awaiting tips at (330) 275-2552. (2 pages) |
Q:
Is there a way to not display empty TreeCells in JavaFX?
My TreeView is displayed even though there are no TreeItems in it. Is there any way to not display the TreeCells before they actually have a corresponding TreeItem to display?
This is how it looks without any items:
This is how it looks when one item is added to the root:
Thanks for any suggestions :)
A:
I think you can not prevent empty TreeCells being added to the TreeView, but if all you care about is appearance, you can define different style for empty cells. Empty cells have the :empty pseudo class, which you can use in your CSS:
.tree-cell:empty {
-fx-background-color: transparent;
}
|
Background
==========
Metastatic melanoma is a malignancy that is associated with a poor prognosis and until recently, few treatment options were available. Vemurafenib (Zelboraf™, Roche Pharmaceuticals Ltd, Sydney, Australia), is a serine-threonine kinase BRAF inhibitor that has demonstrated efficacy in treating metastatic or unresectable metastatic melanoma that has a known mutation in BRAF protein \[[@B1]\]. Approximately 40--60% of cutaneous melanomas carry a BRAF mutation, which is known to enhance cell proliferation and tumor progression \[[@B2]\]. Vemurafenib acts as a potent inhibitor of BRAF-mediated cell signaling and proliferation, and has produced improved progression-free and overall survival in previously untreated metastatic melanoma containing BRAF V600E and V600K mutations. Vemurafenib is highly protein bound (\>99%), and is excreted *via* feces (94%) and urine (1%) \[[@B3]\]. While it has been demonstrated that drug pharmacokinetics are not significantly altered by mild to moderate renal dysfunction, there have been no studies in patients with severe renal dysfunction. The other important consideration in patients treated with serine-threonine kinases is the effect that the renal failure has on cardiac function and serum electrolytes. Here, we report a case of a patient with end stage renal disease who was treated with vemurafenib and who developed a prolonged QTc interval during treatment that was successfully managed using dose reduction.
Case presentation
=================
A 50-year old male, seen by the surgical team, had a pigmented lesion on his scalp that had recently increased in size, and become tender and ulcerated. Initial excision revealed a nodular invasive malignant melanoma with a Breslow thickness of 10 mm, 5 mitosis per square millimeter, and no lymphovascular invasion, and the excision was deemed incomplete. Following this, he underwent a wide local excision and sentinel lymph node biopsy. Because two out of four lymph nodes from the left supraclavicular fossa had malignant melanoma micro-metastases, surgical dissection of the left neck nodes was performed. This showed that 3 out of 29 lymph nodes contained metastatic malignant melanoma without any extra-nodal spread, and mutation testing showed the BRAF V600K mutation.
Four years before, the patient had been diagnosed with chronic renal failure believed to be due to uncontrolled hypertension. This patient had been on continuous ambulatory peritoneal dialysis since the diagnosis, and his renal function and electrolytes were stable (plasma urea and creatinine ranged from 20--30 mmol/L and 1004--1483 umol/L, respectively, potassium was 5.2 mmol/L, calcium was 2.4 mmol/L, and magnesium was 1.02 mmol/L). There was no other significant medical history of relevance.
Three months later, a computerized tomography (CT) scan showed convincing evidence of metastatic disease with confluent lymphadenopathy in the paratracheal group of nodes, with the target node measuring 22 mm. There were also new lymph nodes in the subcarinal region, right para-oesophageal lymphadenopathy and a right lower lobe target mass. The lactate dehydrogenase (LDH) level was also elevated (526 U/L) and the patient was started on vemurafenib at the recommended dose (960 mg twice daily).
Four weeks after beginning treatment, his LDH returned to normal, and the patient denied any significant toxicities. Results of his serial electrocardiograms (ECGs) were normal. Importantly, the patient's renal function remained stable throughout this time. Four months after beginning treatment, there was a reduction in size of the paratracheal and subcarinal nodes and the pulmonary mass was not seen. Throughout this time, the patient remained well, reporting grade 1 photosensitivity as the only side effect of treatment.
After treatment for 5 months, an ECG demonstrated that the QTc interval was increased at 511 msec (CTC grade 3) compared with baseline (467 ms), but it was still less than the baseline QTc interval of 60 ms (Figures [1](#F1){ref-type="fig"} and [2](#F2){ref-type="fig"}). Vemurafenib treatment was stopped and other possible causes of the prolonged QTc interval were investigated. There were no changes in his renal function, electrolyte levels were normal and he was not on any new medications. A 24-h Halter monitor assessment was carried out to check for the presence of any arrhythmias or any periods of torsade de pointes, but none were found. Serial ECGs were carried out, and the QTc returned to the baseline level over 3 weeks. The patient was re-started on vemurafenib at a reduced dose (720 mg BD) after discussion with both the renal and cardiology teams. Throughout treatment, the patient's renal function remained stable and there were no significant variations in the electrolytes. In addition, it was noted that the patient had also had a high QTc interval (512 msec) 2 years previously, which resolved spontaneously and no precipitating cause was found, and there were no other documented episodes of a prolonged QTc interval.
{#F1}
{#F2}
This patient continued on the reduced dose of vemurafenib, and after one month, his QTc interval again increased to 511 ms, but because it was still less than 60 ms from baseline, a dose interruption was deemed unnecessary because he had an increased QTc interval before starting treatment. An additional ECG a week later confirmed that the QTc interval was normal and the fluctuation was not associated with any symptoms. Staging scans 12 months after re-initiating the treatment showed that the patient had a partial response according to RECICT criteria.
This is one of the first reported cases where vemurafenib was administered to a patient with chronic renal failure and dialysis. The case demonstrates some important aspects about the use of serine-threonine kinase inhibitors in patients with cancer and other co-morbidities. There is limited data on vemurafenib in patients with severe renal impairment, but because hepatic metabolism is the main route of drug excretion, it is theoretically safe \[[@B4]\]. This report shows that other factors need to be considered in this context because electrolyte abnormalities or cardiac co-morbidities could lead to potential complications.
Management of patients with changes in the QTc interval is an important issue that needs to be evaluated because this class of drugs is being increasingly used. The QTc interval is prolonged in a dose-dependent manner in response to vemurafenib, and the risk of malignant arrhythmias such as torsade de pointes can occur with any increase in QTc interval, even though the risk is higher at longer intervals \[[@B5]\]. Cardiovascular disease remains the most common cause of death among patients with end stage renal failure and cardiac arrhythmias are an important contributor \[[@B6]\]. One of the major difficulties in measuring the QTc interval is diurnal variation, and prolonged QTc intervals are seen in patients with renal failure for many reasons. The common causes of QTc changes in patients with renal failure include electrolyte disturbances, cardiac fibrosis and hypertrophy, changes in cellular or interstitial composition during dialysis, and iron overload. The patient had one episode of prolonged QTc interval 2 years prior to this reported event. However, there was no further documented evidence of QTc abnormalities and because a prolonged QTc interval is a potential drug side effect that can have significant consequences, vemurafenib was initially considered to have caused of the prolongation. However, a detailed adverse drug reaction analysis using established criteria revealed that the probability of this being a drug reaction was low \[[@B7]\]. The patient was started on lower dose as a precaution.
The risks and benefits need to be carefully assessed on a case-by-case basis. The decision was made by the team to continue vemurafenib treatment in this patient because the patient was responding and the adverse event risk was low, even though the QTc interval increased to \> 500 ms from \<60 ms at baseline.
Conclusions
===========
This case study shows that vemurafenib can be used safely in patients with chronic renal failure. It also highlights the importance of regular follow-up including serial ECGs to prevent treatment complications that result from other co-morbidities, such as a prolonged QTc interval. It also demonstrates that such changes may occur after several months of treatment, and it is important to investigate all possible causes including those related to other co-morbidities.
Consent
=======
Written informed consent was obtained from the patient for publication of this case report and any accompanying images. A copy of the written consent is available for review by the Editor of this journal.
Competing interests
===================
The authors declare that they no competing interests.
Authors' contributions
======================
MI was involved in manuscript preparation, literature search and patient care. SC and LG were involved in manuscript preparation and patient care. RH, AL, NN and WRA were involved in a patient care, manuscript preparation and review. All authors read and approved the final manuscript.
Pre-publication history
=======================
The pre-publication history for this paper can be accessed here:
<http://www.biomedcentral.com/1471-2407/13/581/prepub>
|
Insulseal Protective Coating
Insulseal is intended for use as a protective coating over Monoglass Spray-On Insulation or Sonoglass Acoustic Treatment in residential and commercial construction.
Insulseal helps prevent damage to sprayed insulation from personnel, machinery, birds and other sources. Insulseal provides a tough, flexible coating which encapsulates surface fibers and resists abrasion. It is spray applied using airless spray equipment and it can be used over wall or ceiling applications.
Appearance:
Insulseal is available in white, black and gray, and can be tinted to various colors or painted with latex paint following curing.
Composition & Materials:
Insulseal is a water soluble liquid copoly emulsion. It is non hazardous and is not regulated as a health or environmental hazard. It cleans up with soap and water while wet. The standard color is white for high light reflectance, but is also available in black and gray.
Tested to ASTM E-84;
Flame Spread Rating= 0 Smoke Development Rating = 0
Application:
Insulseal is to be applied using airless spray equipment. For recommended equipment refer to Insulseal Application Guide. Insulseal is applied to Monoglass or Sonoglass insulation that has been board tamped flat and over-sprayed with standard adhesive for a smoother application. Insulseal can be applied in varying coverage levels to achieve the amount of protection and surface coverage required. The spray application allows it to be spray applied to virtually any surface configuration to ensure complete coverage.
Limitations:
Insulseal is not to be applied at a coverage rate lower than 30 square feet per gallon.
Insulseal is to be applied as delivered: do not dilute.
The product should be applied to tamped insulation for a smoother finish.
Insulseal must not be applied until after insulation material is completely cured and dry through to substrate.
Insulseal must be kept from freezing. Insulseal cannot be applied when ambient and substrate temperatures are below 1°C / 34°F during the application and until the product is completely dry. Adequate dry heat and ventilation must be supplied at low temperatures. Keep container closed when not in use. Should separation occur after extended storage, stir until evenly mixed prior to use.
Installation:
Insulseal shall be installed in accordance with manufacturer’s written instructions. Contact Monoglass Inc. for further details.
Availability & Cost:
Insulseal is available throughout the United States, Canada, and many countries worldwide. Contact Monoglass Inc. for the names of contractors and Monoglass Agents in your area. |
/*
* Copyright © 2018-2019 Cask Data, Inc.
*
* Licensed under the Apache License, Version 2.0 (the "License"); you may not
* use this file except in compliance with the License. You may obtain a copy of
* the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
* WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
* License for the specific language governing permissions and limitations under
* the License.
*/
package io.cdap.cdap.config;
import com.google.common.reflect.TypeToken;
import com.google.gson.Gson;
import io.cdap.cdap.common.ConflictException;
import io.cdap.cdap.proto.PreferencesDetail;
import io.cdap.cdap.proto.element.EntityType;
import io.cdap.cdap.proto.id.ApplicationId;
import io.cdap.cdap.proto.id.EntityId;
import io.cdap.cdap.proto.id.InstanceId;
import io.cdap.cdap.proto.id.NamespaceId;
import io.cdap.cdap.proto.id.ParentedId;
import io.cdap.cdap.proto.id.ProgramId;
import io.cdap.cdap.spi.data.StructuredRow;
import io.cdap.cdap.spi.data.StructuredTable;
import io.cdap.cdap.spi.data.StructuredTableContext;
import io.cdap.cdap.spi.data.table.field.Field;
import io.cdap.cdap.spi.data.table.field.Fields;
import io.cdap.cdap.store.StoreDefinition;
import java.io.IOException;
import java.lang.reflect.Type;
import java.util.ArrayList;
import java.util.Collections;
import java.util.List;
import java.util.Map;
import java.util.Optional;
import javax.annotation.Nullable;
/**
* This class is responsible for preferences operations.
* It does not wrap its operations in a transaction. It is up to the caller to decide what operations belong
* in a transaction.
*/
public class PreferencesTable {
private static final String EMPTY_NAMESPACE = "";
private static final String INSTANCE_PREFERENCE = "instance_preference";
private static final String NAMESPACE_PREFERENCE = "namespace_preference";
private static final String APPLICATION_PREFERENCE = "application_preference";
private static final String PROGRAM_PREFERENCE = "program_preference";
private static final Gson GSON = new Gson();
private static final Type MAP_TYPE = new TypeToken<Map<String, String>>() { }.getType();
private final StructuredTable table;
public PreferencesTable(StructuredTableContext context) {
this.table = context.getTable(StoreDefinition.PreferencesStore.PREFERENCES);
}
/**
* Get the preferences for the entity id.
*
* @param entityId the entity id to get the preferences from
* @return the map which contains the preferences
*/
public PreferencesDetail getPreferences(EntityId entityId) throws IOException {
switch (entityId.getEntityType()) {
case INSTANCE:
return get(EMPTY_NAMESPACE, INSTANCE_PREFERENCE, entityId.getEntityName());
case NAMESPACE:
NamespaceId namespaceId = (NamespaceId) entityId;
return get(namespaceId.getNamespace(), NAMESPACE_PREFERENCE, namespaceId.getNamespace());
case APPLICATION:
ApplicationId appId = (ApplicationId) entityId;
return get(appId.getNamespace(), APPLICATION_PREFERENCE, appId.getApplication());
case PROGRAM:
ProgramId programId = (ProgramId) entityId;
return get(programId.getNamespace(), PROGRAM_PREFERENCE, getProgramName(programId));
default:
throw new UnsupportedOperationException(
String.format("Preferences cannot be used on this entity type: %s", entityId.getEntityType()));
}
}
/**
* Verify that the preferences for the entity id were written with a greater or equal sequence id.
*
* @param entityId the entity id to verify
* @param afterId the sequence id to check
* @throws ConflictException if the latest version of the preferences is older than the given sequence id
*/
public void ensureSequence(EntityId entityId, long afterId)
throws IOException, ConflictException {
switch (entityId.getEntityType()) {
case INSTANCE:
checkSeqId(EMPTY_NAMESPACE, INSTANCE_PREFERENCE, entityId.getEntityName(), afterId);
return;
case NAMESPACE:
NamespaceId namespaceId = (NamespaceId) entityId;
checkSeqId(namespaceId.getNamespace(), NAMESPACE_PREFERENCE, namespaceId.getNamespace(), afterId);
return;
case APPLICATION:
ApplicationId appId = (ApplicationId) entityId;
checkSeqId(appId.getNamespace(), APPLICATION_PREFERENCE, appId.getApplication(), afterId);
return;
case PROGRAM:
ProgramId programId = (ProgramId) entityId;
checkSeqId(programId.getNamespace(), PROGRAM_PREFERENCE, getProgramName(programId), afterId);
return;
default:
throw new UnsupportedOperationException(
String.format("Preferences cannot be used on this entity type: %s", entityId.getEntityType()));
}
}
/**
* Get the resolved preferences for the entity id, the preferences are resolved from
* instance -> namespace -> application -> program level
* (i.e. preferences at child level e.g. program take precedence over those at parent level e.g. application)
*
* @param entityId the entity id to get the preferences from
* @return preferences detail
*/
public PreferencesDetail getResolvedPreferences(EntityId entityId) throws IOException {
// if it is instance level get the properties and return
if (entityId.getEntityType().equals(EntityType.INSTANCE)) {
PreferencesDetail preferences = getPreferences(entityId);
return new PreferencesDetail(preferences.getProperties(), preferences.getSeqId(), true);
}
PreferencesDetail parentPreferences = null;
// if the entity id has a parent id, get the preference from its parent
if (entityId instanceof ParentedId) {
parentPreferences = getResolvedPreferences(((ParentedId) entityId).getParent());
} else if (entityId.getEntityType() == EntityType.NAMESPACE) {
parentPreferences = getResolvedPreferences(new InstanceId(""));
}
PreferencesDetail preferences = getPreferences(entityId);
PreferencesDetail resolved = new PreferencesDetail(preferences.getProperties(), preferences.getSeqId(),
true);
if (parentPreferences != null) {
resolved = PreferencesDetail.resolve(parentPreferences, resolved);
}
return resolved;
}
/**
* Get a single resolved preference for the entity id, the preferences are resolved from instance -> namespace -> app
* -> program level.
*
* @param entityId the entity id to get the preferences from
* @param name the name of the preference to resolve
* @return the resolved value of the preference, or null of the named preference is not there
*/
@Nullable
public String getResolvedPreference(EntityId entityId, String name) throws IOException {
// get the preference for the entity itself
String value = getPreferences(entityId).getProperties().get(name);
if (value != null) {
return value;
}
// if the value is null and the entity has a parent, defer to the parent
if (entityId instanceof ParentedId) {
value = getResolvedPreference(((ParentedId) entityId).getParent(), name);
} else {
// if there is no parent get from the instance id
value = getPreferences(new InstanceId("")).getProperties().get(name);
}
return value;
}
/**
* Set the preferences for the entity id.
*
* @param entityId the entity id to set the preferences from
* @param propMap the map which contains the preferences
* @return the sequence id of the operation
*/
public long setPreferences(EntityId entityId, Map<String, String> propMap) throws IOException {
switch (entityId.getEntityType()) {
case INSTANCE:
return upsert(
EMPTY_NAMESPACE, INSTANCE_PREFERENCE, new Config(entityId.getEntityName(), propMap));
case NAMESPACE:
NamespaceId namespaceId = (NamespaceId) entityId;
return upsert(
namespaceId.getNamespace(), NAMESPACE_PREFERENCE, new Config(namespaceId.getNamespace(), propMap));
case APPLICATION:
ApplicationId appId = (ApplicationId) entityId;
return upsert(
appId.getNamespace(), APPLICATION_PREFERENCE, new Config(appId.getApplication(), propMap));
case PROGRAM:
ProgramId programId = (ProgramId) entityId;
return upsert(
programId.getNamespace(), PROGRAM_PREFERENCE, new Config(getProgramName(programId), propMap));
default:
throw new UnsupportedOperationException(
String.format("Preferences cannot be used on this entity type: %s", entityId.getEntityType()));
}
}
/**
* Delete the preferences for the entity id.
*
* @param entityId the entity id to delete the preferences
* @return the sequence id of the operation, or -1 if no preferences existed for the entity id
*/
public long deleteProperties(EntityId entityId) throws IOException {
switch (entityId.getEntityType()) {
case INSTANCE:
return delete(EMPTY_NAMESPACE, INSTANCE_PREFERENCE, entityId.getEntityName());
case NAMESPACE:
NamespaceId namespaceId = (NamespaceId) entityId;
return delete(namespaceId.getNamespace(), NAMESPACE_PREFERENCE, namespaceId.getNamespace());
case APPLICATION:
ApplicationId appId = (ApplicationId) entityId;
return delete(appId.getNamespace(), APPLICATION_PREFERENCE, appId.getApplication());
case PROGRAM:
ProgramId programId = (ProgramId) entityId;
return delete(programId.getNamespace(), PROGRAM_PREFERENCE, getProgramName(programId));
default:
throw new UnsupportedOperationException(
String.format("Preferences cannot be used on this entity type: %s", entityId.getEntityType()));
}
}
/**
* Used to dedup programs in different applications or types.
*/
private String getProgramName(ProgramId programId) {
return String.join(",", programId.getApplication(), programId.getType().getCategoryName(),
programId.getProgram());
}
private long upsert(String namespace, String type, Config config) throws IOException {
List<Field<?>> primaryKey = getPrimaryKey(namespace, type, config.getName());
Optional<StructuredRow> row = table.read(primaryKey);
long seq = 1;
if (row.isPresent()) {
Long currentSeq = row.get().getLong(StoreDefinition.PreferencesStore.SEQUENCE_ID_FIELD);
if (currentSeq != null) {
seq = currentSeq + 1;
}
}
table.upsert(toFields(namespace, type, config, seq));
return seq;
}
private long delete(String namespace, String type, String name) throws IOException {
List<Field<?>> primaryKey = getPrimaryKey(namespace, type, name);
Optional<StructuredRow> row = table.read(primaryKey);
if (!row.isPresent() || row.get().getString(StoreDefinition.PreferencesStore.PROPERTIES_FIELD) == null) {
return -1;
}
Long currentSeq = row.get().getLong(StoreDefinition.PreferencesStore.SEQUENCE_ID_FIELD);
long seq = currentSeq == null ? 1L : currentSeq + 1;
table.upsert(toFields(namespace, type, name, seq));
return seq;
}
private void checkSeqId(String namespace, String type, String name, long seq)
throws IOException, ConflictException {
List<Field<?>> primaryKey = getPrimaryKey(namespace, type, name);
Optional<StructuredRow> row = table.read(primaryKey);
Long currentSeq = null;
if (row.isPresent()) {
currentSeq = row.get().getLong(StoreDefinition.PreferencesStore.SEQUENCE_ID_FIELD);
if (currentSeq != null && currentSeq >= seq) {
return;
}
}
throw new ConflictException(String.format("Expected sequence id >= %d for %s %s in namespace %s, but found %s",
seq, type, name, namespace, String.valueOf(currentSeq)));
}
private PreferencesDetail get(String namespace, String type, String name) throws IOException {
List<Field<?>> primaryKey = getPrimaryKey(namespace, type, name);
Optional<StructuredRow> row = table.read(primaryKey);
Map<String, String> properties = Collections.emptyMap();
Long seqId = new Long(0);
if (row.isPresent()) {
String string = row.get().getString(StoreDefinition.PreferencesStore.PROPERTIES_FIELD);
seqId = row.get().getLong(StoreDefinition.PreferencesStore.SEQUENCE_ID_FIELD);
if (string != null) {
properties = GSON.fromJson(string, MAP_TYPE);
}
}
return new PreferencesDetail(properties, seqId, false);
}
private List<Field<?>> toFields(String namespace, String type, Config config, long seqId) {
List<Field<?>> fields = getPrimaryKey(namespace, type, config.getName());
fields.add(Fields.stringField(StoreDefinition.PreferencesStore.PROPERTIES_FIELD,
GSON.toJson(config.getProperties())));
fields.add(Fields.longField(StoreDefinition.PreferencesStore.SEQUENCE_ID_FIELD, seqId));
return fields;
}
private List<Field<?>> toFields(String namespace, String type, String configName, long seqId) {
List<Field<?>> fields = getPrimaryKey(namespace, type, configName);
fields.add(Fields.stringField(StoreDefinition.PreferencesStore.PROPERTIES_FIELD, null));
fields.add(Fields.longField(StoreDefinition.PreferencesStore.SEQUENCE_ID_FIELD, seqId));
return fields;
}
private List<Field<?>> getPrimaryKey(String namespace, String type, String name) {
List<Field<?>> primaryKey = new ArrayList<>();
primaryKey.add(Fields.stringField(StoreDefinition.PreferencesStore.NAMESPACE_FIELD, namespace));
primaryKey.add(Fields.stringField(StoreDefinition.PreferencesStore.TYPE_FIELD, type));
primaryKey.add(Fields.stringField(StoreDefinition.PreferencesStore.NAME_FIELD, name));
return primaryKey;
}
}
|
Receptive Vocabulary, Cognitive Flexibility, and Inhibitory Control Differentially Predict Older and Younger Adults' Success Perceiving Speech by Talkers With Dysarthria.
Previous research has demonstrated equivocal findings related to the effect of listener age on intelligibility ratings of dysarthric speech. The aim of the present study was to investigate the mechanisms that support younger and older adults' perception of speech by talkers with dysarthria. Younger and older adults identified words in phrases produced by talkers with dysarthria. Listeners also completed assessments on peripheral hearing, receptive vocabulary, and executive control functions. Older and younger adults did not differ in their ability to perceive speech by talkers with dysarthria. Younger adults' success in identifying words produced by talkers with dysarthria was associated only with their hearing acuity. In contrast, older adults showed effects of working memory and cognitive flexibility and interactions between hearing acuity and receptive vocabulary and between hearing acuity and inhibitory control. Although older and younger adults had equivalent performance identifying words produced by talkers with dysarthria, older adults appear to utilize more cognitive support to identify those words. |
Leslie George Kelly
Leslie George Kelly (10 May 1906 – 6 August 1959) was a New Zealand journalist, engine driver and historian. Kelly's father, Sidney Mellish Kelly, was descended from Edward Meurant, a trader and interpreter at Kawhia in the 1830s, and his wife, Kenehuru, the daughter of Ngāti Mahuta leader Te Tuhi-o-te-rangi. Leslie Kelly was born in Auckland on 10 May 1906. He married Heera (Sarah) Te Moengaroa Ueke, who was of Ngāi Tawake, a hapu (subtribe) of Ngāpuhi, and Ngāti Mahuta, on 11 February 1929, in Auckland. From the late 1920s, he studied Māori history and wrote articles for the Journal of the Polynesian Society, later writing two books. He died in a train crash at Motumaoho, Morrinsville, on 6 August 1959.
Bibliography
Marion Dufresne at the Bay of Islands. Wellington: Reed, 1951.
Tainui: the story of Hoturoa and his descendants. Wellington: Polynesian Society, 1949.
References
Category:1906 births
Category:1959 deaths
Category:New Zealand journalists
Category:New Zealand historians
Category:People from Auckland
Category:Ngāti Mahuta
Category:New Zealand Māori writers
Category:20th-century historians |
body {
padding-bottom: @footer-height;
}
[cam-widget-footer] {
.cam-corporate-footer-base();
text-align: right;
}
|
Q:
Is there a tool to check CSS url files exist?
I've just been tasked with migrating a website from a Windows server to a Linux server.
One of the issues I've noticed straight away is that there are a number of CSS url() definitions that don't work because the case in the CSS is not the same as the actual file.
eg:
background: url(myFile.jpg);
while on the server the file is actually MyFile.jpg.
Does anyone know of a simple tool or browser plugin I can use just to scan the CSS file and verify that the url() declarations exist so that I can easily find and fix them?
The site is quite large, so I don't want to have to navigate through the pages to find 404 errors if I can avoid it.
A:
Turns out that the W3c Link Checker also scans CSS files which is very handy.
Had this have not worked I would have had to put together something like Vanga's solution.
|
Influence of preoperative high-dose radiotherapy on postoperative outcome and colonic anastomotic healing: experimental study in the rat.
Surgical treatment of rectal cancer is followed by local recurrence in up to 30 percent of cases. Recently, preoperative low-dose radiotherapy has been shown to improve both local recurrence rate and overall survival. Down-staging of locally advanced tumors, however, requires preoperative doses of at least 50 to 60 Gy. Most experimental studies investigating the effect of preoperative radiotherapy have made use of a single dose or a limited number of fractionated doses. Moreover, in most studies, both limbs of the anastomosis were irradiated, in contrast to clinical practice, in which one limb of the anastomosis consists of nonirradiated bowel. We studied the effect of a fractionated, clinically relevant scheme of high-dose preoperative radiotherapy on colonic anastomotic healing in the rat. Male Wistar rats randomly received 0, 40, 60, or 80 Gy of preoperative radiotherapy on one limb of the anastomosis only. Radiotherapy doses were validated with implanted dosimeters; before the start of radiotherapy, the cecum was fixed outside the radiation field. A clinically used fractionation scheme of 2 Gy per day, 5 days per week for 4 to 8 weeks was used. The day after radiotherapy completion, a side-to-side colorectal anastomosis was performed. Rats were killed 10 days after surgery. The following parameters were determined: presence of abscess or peritonitis, anastomotic complications (stenosis, leak, or dehiscence), intestinal obstruction, anastomotic bursting pressure, and anastomotic hydroxyproline content. No significant differences were found in peritonitis rate, anastomotic complications, anastomotic bursting pressure, or hydroxyproline content. Irradiated animals gained weight more slowly than the control group. In this rat model, preoperative high-dose radiotherapy using a clinically relevant fractionation scheme does not affect outcome or anastomotic healing when only one limb of the anastomosis is irradiated. |
Benign intraductal papilloma: diagnosis and removal at stereotactic vacuum-assisted directional biopsy guided by galactography.
Galactography was performed in women who had problematic nipple discharge. In five women who had a focal intraductal filling defect, immediate stereotactic vacuum-assisted directional biopsy of the filling defect was performed; results were a benign intraductal papilloma in each, with atypia in one. In the four women who did not have atypia, the procedure was diagnostic and appears to have been therapeutic as well, since nipple discharge ceased after the procedure. |
Facts & Arguments is a daily personal piece submitted by readers. Have a story to tell? See our guidelines at tgam.ca/essayguide.
My daughter is a nun.
What?! They still have those? Where does she live? What does she do? Does she wear that thing? Will she be home for Christmas? What made her decide to do that?
These are just a few of the reactions and questions we field as a family whenever the topic comes up. My other daughter and I think we should create a list of FAQs.
The answers to the above are: Yes. In Western Ontario, in a convent. In recent years she’s mostly been going to school, and also teaching children. Yes, she belongs to an order that wears a habit and veil. No. And as for why she decided to enter a convent, her answer would be “God.”
It certainly wasn’t my idea. At the age of 18, our daughter went off to university to become a veterinarian. It was all she had ever wanted to do. Things didn’t work out, though, and she began to pray. It seemed that God was calling her to a different life. She tried to run away from this for a while, but eventually began exploring different religious orders, going on retreats and attending “come and see” days. Did you know that nuns have websites? Me neither.
Eventually, she broke the news to me and her father. We were not thrilled. We encouraged her to return to school and get an education in something.
She went off to community college for a year and completed training to be a medical laboratory assistant. I prayed she would meet a young man. She met with a priest for vocational discernment.
Halfway through the school year, she had a very serious health concern. It turned out all right, but during the weeks we waited for test results, I made a thousand promises. Once I knew all was well, I told God he could have her. My husband and I also told our daughter not to be surprised if one or both of us dropped dead suddenly – we had repeatedly offered our lives in place of hers.
Our contact with our daughter is limited. We have one two-week home visit from her a year, three four-hour visits at the convent and occasional letters and phone calls. I may send as many letters and cards as I wish; she is restricted to two letters a month. She has been very busy lately, so it’s often just one letter. The phone calls are on the third Sunday of each month, plus an extra call on her birthday and our anniversary. There are no phone calls or letters during Advent, Lent or in a month when we have a visit.
Celia Krampien for The Globe and Mail
It took me a long time to accept my daughter’s choice. For the first two years, I cried after every visit. Whenever I heard that a candidate, or postulant, had withdrawn, I got excited. There was still hope, I thought, that our daughter could have a normal life!
Eventually, though, I realized she was truly happy. I gave up hoping for her heart to change, and began praying for my own heart to change instead.
Here’s another question I am often asked. Are you very religious?
I never know how to answer. I was baptized and raised a Catholic, but I stopped going to church in my teens. When I did decide to go back to regular Sunday worship, I went to a Pentecostal church. I’ve dabbled in other religions as well; in fact, I’m fascinated by all religions from a psychological and sociological standpoint.
I have to admit, though, that I don’t have the passionate love and unshakeable certainty about Catholicism that I see in others. I go to church, I pray and meditate; I still have the rosary beads my parents gave me when I made my First Communion in 1963; I struggle with doubt.
We have just finished our annual two-week home visit. As usual, it went too fast. This year was a little challenging for my daughter, because my husband and I recently sold our house and moved to an apartment. She worried about how it would feel to see us in different surroundings, but soon realized that home is where your loved ones are. We now live in the same city as our married daughter, so Sister and sister were able to spend more time together. We sat around the same old table, laughing over the same old stories and enjoying each other’s company.
On the last night of the visit, we went out for dinner. It happened to be a bar and grill, but we went early and sat in the restaurant part. We usually attract attention in public, but the few families sharing the space seemed not to even notice us. We had an enjoyable meal, and were quite fascinated by our surroundings: We decided to go out through the bar so we could have a look at another part of the beautiful old building.
As soon as we stepped into the bar, there was dead silence. We casually walked through, exclaiming over the brick and woodwork, and the deep, cushioned window sills. The silence continued until we reached the exit, when I heard a woman sitting a few feet away exclaim: “I told you I saw a nun in here!”
One of my biggest fears when my daughter became a nun was that her personality would change. I’m happy to report that, though her life has followed a path I never even dreamed of, she is still the same girl we raised. “One of these days,” she said, “I’m going to say: ‘What, you never saw a nun before?’ ”
We laughed all the way home.
Donna Slade lives in Kingston. |
The Federal Reserve on Sunday slashed interest rates by a full percentage point to near zero and said it would buy $700 billion in Treasury securities, an aggressive step to insulate the U.S. economy from the coronavirus pandemic.
Continue Reading Below
“The coronavirus outbreak has harmed communities and disrupted economic activity in many countries, including the United States,” the Federal Open Market Committee said in a statement. “The Federal Reserve is prepared to use its full range of tools to support the flow of credit to households and businesses.”
The benchmark federal fund rate is now at a range of 0 to 0.25 percent, down from a range of 1 to 1.25 percent. The cut essentially brings the nation’s interest rate to zero -- something that President Trump has repeatedly pressed for over the past year.
NEW YORK FED PUMPS LIQUIDITY INTO MARKETS
The historically low interest rates, which not been at this level since the 2008 financial crisis, are expected to remain until the economy recovers from the recent downturn.
"The Committee expects to maintain this target range until it is confident that the economy has weathered recent events and is on track to achieve its maximum employment and price stability goals," the Fed said in its Sunday evening statement.
TRUMP 'VERY HAPPY' AS FED CUTS RATES TO NEAR ZERO
The Fed also said that it will buy at least $500 billion in Treasury securities and $200 billion in mortgage-backed securities over the coming months, a program known as "quantitative easing."
Earlier this month, Powell announced an emergency 50-basis-point cut to the benchmark federal funds rate, sending it to a range of just 1 percent to 1.25 percent. It marked the first time since the financial crisis that the Fed has reduced its key rate outside of scheduled policy-setting meetings.
“Desperate times call for desperate measures and the Fed is doing just that in an effort to keep credit markets functioning and prevent the type of starving of credit that nearly toppled the global economy into a depression in 2008," Bankrate chief financial analyst Greg McBride said in a statement.
CLICK HERE TO READ MORE ON FOX BUSINESS |
Significance of antibodies to the recombinant E2 protein of hepatitis G virus in haemodialysis patients.
Patients on maintenance haemodialysis represent a high-risk group for parenterally transmitted viral infections, such as hepatitis B, C and G. In addition to hepatitis G virus (HGV) (GBV-C) RNA, analysed in previous studies, we characterized the seroprevalence rates of antibodies to the putative E2 protein (anti-E2) of HGV in a German cohort of patients on maintenance dialysis (n = 72) in comparison to healthy blood donors (n = 100). The presence of anti-E2 and/or HGV RNA as indicators of present or past HGV infection could be demonstrated in 34.7% of patients and in 16% of the blood donors (P < 0.01). The infection rates with HGV seem to increase only during the first 6 years of haemodialysis. The simultaneous presence of viraemia and anti-E2 was found very rarely in patients and controls. Therefore, the emergence of anti-E2 indicates clearance of HGV viraemia. In conclusion, patients on haemodialysis are at high risk of acquiring HGV infection, but a chronic carrier state with viraemia is rare. The risk of infection is not strictly correlated with the duration of dialysis. |
Q:
JDBC: How to clear the contents of a result set before using it again?
I want to clear the contents of a result set (but nothing should happen to the underlying database) before using it again to execute a new query?
Is there any method which will delete its data (but do nothing to the underlying database, that's important), so that I can use the same resultset again to retrieve data from another query?
A quick search in the API documentation gave me the idea that deleting things through a method like deleteRow() will actually delete data from the database as well. I just want to reset/refresh/clear the resultSet, so that when it is again used to get results of another query, it should contain data from that query only, and not the previous one.
Or does it automatically remove its contents itself once we have retrieved them from it (through methods like ResultSet.getInt(), ResultSet.getString() etc.)
EDIT:-
Can we create new result sets for executing each query in the same method?
A:
Lets say you want to execute a query like this :
ResultSet rs = statement.executeQuery("select * from people");
You would iterate of the results with something like this:
while(result.next()) {
// ... get column values from this record
}
Then you just reuse the variable rs to execute another query like:
rs = statement2.executeQuery("select * from cars");
Here is a tutorial on working with ResultSet
|
© Joshua Lott / Reuters
In-flight medical emergencies are always scary, but when one passenger on a Delta flight lost consciousness, Dr. Tamika Cross was fortunately on board. But the black doctor became too busy dealing with flight attendants skeptical that she was qualified to help.Dr. Cross witnessed the emergency on a Delta flight last weekend. Flight attendants issued a typical call for any physicians on-board. However, when she raised her hand the flight attendant allegedly said, "we are looking for actual physicians or nurses or some type of medical personnel, we don't have time to talk to you."Cross wrote about her experience with Delta on Sunday in a Facebook post that has been shared over 79,000 times. While flying from Detroit to Houston, Cross learned that a passenger two rows in front of her had become unresponsive."I naturally jumped into Doctor mode as no one else was getting up," she wrote, "as I'm about to stand up, flight attendant says 'everyone stay calm, it's just a night terror, he is alright.'"The man became unresponsive again just a few minutes later, and the flight attendant yelled "call overhead for a physician on board." Cross raised her hand, only to receive the response "oh no sweetie," and was told to put her hand down."I tried to inform her that I was a physician but I was continually cut off by condescending remarks," she wrote.When the flight attendant made an official page for physicians, Cross said that she stared at the flight attendant as she went to press her button. The flight attendant was allegedly incredulous and demanded to see her credentials, asking about the type of doctor she was and why she was in Detroit. Meanwhile, a man two seats in front of them was still being subjected to his medical emergency.Cross responded by explaining that she was an OB-GYN resident and in Detroit for a wedding, "but believe it or not they DO HAVE doctors in Detroit."New York Daily News reported At this point, a white man approached and said that he was a physician as well. Cross claimed the flight attendant thanked her but said the man had credentials. Cross claimed he did not show anything to the attendant, "just showed up and fit the 'description of a doctor.'"The passenger having a medical emergency was seemingly doing better at this point, but the flight attendant asked Cross what she should do next. The two engaged in some medical conversation and agreed that the passenger's blood pressure was low.Cross was unavailable to comment on Thursday when the Daily News attempted to reach her as she was on call for baby deliveries, according to a representative for the McGovern Medical School at the University of Texas Health Science Center at Houston.However, the issue has already gone beyond being a viral post on Facebook. The Artemis Medical Society released a letter to Delta CEO Ed Bastian. Its president, Dr. Myiesha Taylor, wrote, |
Robert Genetski
Robert Genetski is a Republican politician from the U.S. state of Michigan. He is currently the Allegan County Clerk and Register of Deeds. In his capacity has Clerk, Genetski has focused on increasing support services to veterans. He is a former member of the Michigan House of Representatives, representing the 88th District which covers Allegan County, including the cities of Holland, Allegan, Douglas, Fennville, Plainwell, Saugatuck, South Haven, and Wayland. Prior to his first term as a State Representative, Genetski was a school teacher for a decade. He spent time teaching at Orion Alternative School, which caters to at-risk students.
Education
Genetski earned his B.A. in education from Auburn University in 1991 and his master's degree in education from Grand Valley State University in 2004.
After leaving the State House, Bob Genetski became the Allegan County Clerk - Register of Deeds. His work with constituents set records. In his first year in office, his office served more Veterans, enabling them to file more honorable discharge papers, than the previous 10 years combined.
http://www.hollandsentinel.com/news/20180117/number-of-veterans-served-by-allegan-county-skyrockets-in-2017
2nd Amendment Advocate
Following the Stoneman Douglas High School shooting Genetski made a tweet
that David Hogg is a paid crisis actor. In a followup statement Genetski said he doesn't think Hogg is a trained actor or was paid money by CNN. Genetski wrote in depth to many media outlets sharing his viewpoint that CNN found an individual that met their anti-2nd Amendment narrative.
References
External links
Bob Genetski Republican for State Representative
Category:Grand Valley State University alumni
Category:Auburn University alumni
Category:Members of the Michigan House of Representatives
Category:Michigan Republicans
Category:Living people
Category:Year of birth missing (living people) |
The ABC's of Opening a Restaurant
Sitting in the private dining room at Dan Kluger’s soon-to-open Loring Place in Greenwich Village on a rainy October afternoon, it’s easy to imagine the space filled with guests. Forks diving into bona fide Kluger dishes like roasted Brussels sprouts with crunchy sunflower seeds, avocado, apples and herbs (see the recipe), and charred broccoli with pistachios, mint and orange. Dishes that excite, prepared by a chef the dining scene has sorely missed since leaving ABC Kitchen two years ago.
In this cozy room, the table, made from long boards of wood that once lined the floors of the mid-1800s building, is set for dinner with crisp white napkins that have never been used and wineglasses that have never been clinked. Bob Dylan croons “Like a Rolling Stone” quietly over the sound system.
When eating at a great restaurant, it’s often easy to forget just how hard it is to open a place like this. “There’s really nothing easy about it,” Kluger says, laughing when asked what the hardest part of opening his first solo restaurant was.
Outside the door in the main dining room, the music is barely heard over the sounds of the construction zone. Painters are touching up walls as contractors are drilling in the barroom, while others work to get the grand staircase and entryway—still covered by paint-spattered drop cloths—ready.
Kluger may have gotten the keys to the space a year and a half ago, but the restaurant has been in the works in his mind for much longer. “I just had the bug,” he says. Kluger knew he needed a space large enough to accommodate a semi-open kitchen, where he could cook with live fire, and wanted something that wouldn’t feel cavernous. He looked at 50 to 70 spaces before settling on 21 West Eighth Street.
But finding the perfect space was just the beginning. “Everything in here I’ve put my hands on and [chosen]. So if I look in a year from now and I don’t like the color of those audio controls, that’s my fault.” Some of those choices include plates from Jono Pandolfi, tables like that long one in the private dining room from NYCitySlab and custom denim aprons from menswear designer Todd Snyder.
Kluger’s been in the industry long enough to know that the small decisions are what add up to an overall outstanding dining experience. “Things that a lot of people take for granted, we thought about how they’re going to impact someone’s experience, impact the hospitality,” he explains. And even under construction, it’s apparent those decisions will pay off. The space is warm and gracious, clean but not sterile. “I wanted it to be simple, muted colors and then the food to be pops of color, the people to be the pops of color,” he adds.
Amid the chaos and the “never-ending compounding feeling of ‘oh my god, this has to get done on cost and time,’” he says he felt he “should have been working on food. Truthfully, I haven’t done menu development until now.”
For a business that hinges on the food, it may seem counterintuitive that Kluger arrived at the space with only “candidates” for the menu.“There were things that worked perfectly in my mind, but as you start to really cook it and you cook it in a restaurant setting, you say, ‘Oh, there’s no way we could keep up with this. Or on the plates that we had custom designed for us, this dish doesn’t work.’”
As the space and menu started to come together this fall, Kluger still had one major decision to make. Until late September, his restaurant was nameless. He and his team went through nearly 100 options. Then, unprompted, a cousin sent him a photo of a yearbook that belonged to Kluger’s father, who grew up in the Bronx and died unexpectedly last year. It said “Arthur Kluger, Loring Place,” the name of the street he grew up on. The name stuck. “Had he not passed away, it probably wouldn’t have happened, and I would still be looking for a name. It’s a nice thing; it’s not a shrine to him,” Kluger says.
Not long after, Kluger received an email to the restaurant’s general inbox. It said, “I grew up at 1850 Loring Place. I look forward to coming in.” Once the drop cloths have been gathered and the doors finally open, we do, too.
View Gallery
Butcher paper covers the windows at Loring Place, while the team works busily inside getting the space ready.
Get the Tasting Table newsletterfor adventurous eaters everywhereYour information will never be shared with a third party. I accept the Terms & Conditions and Privacy Policy and confirm I am at least 21 years old.
Close
Tasting Table To-Dos
To-Dos allows Tasting Table members to store and remember all of the food and
drink recommendations we send out each week. You've now added the To-Dos below to your personal list.
You can access your To-Do list at any time by visiting http://TastingTable.com
and clicking "Login". Happy eating!
Company
Account
Connect
Tasting Table serves genuine editorial. There is no pay for play: We only recommend products and services we love. If you read about a product or service on our site and make a purchase through the links we provide, we may receive a small commission or "affiliate fee" that we use to offset our editorial costs. "Partner Content" from our advertisers are not editorial recommendations and are clearly marked on every post or email as such. Click here for our editorial policy. |
The present invention relates to improvements in electron-beam welding and, more particularly, to a method for checking and stabilizing the depth of fusion in electron-beam welding and a device for effecting same. The invention may be used to the best advantage for controlling and stabilizing the fusion depth in the course of welding metal and metal alloy articles of small and medium thickness with the aid of low-voltage welders having a power of 15 to 20 kw at an acceleration voltage of 50 to 60 kV.
It is highly important to obtain information as to the quality of welding, in particular, the fusion depth, directly in the course of welding. This is equally important from the viewpoint of controlling the welding process and from the viewpoint of locating faulty fusion in order to eliminate the defects found in the weld by way of rewelding. At present, however, there is no method for taking direct measurement of the fusion depth in the course of welding, which would be suitable for checking and control without affecting the weld.
Numerous studies carried out in the past have been aimed at finding indirect parameters of the welding process correlated with the depth of fusion.
One case deals with the research aimed at revealing interrelation between the fusion depth and secondary electron emission currents resulting from electron bombardment of the material being welded.
Also known is a method, whereby pressed to a preset depth into a weld is a material different from that of the article being welded. In the course of welding, investigation is made, with the use of spectroscopic methods, of vapours originating in the welding zone; the moment of the appearance in the spectrum under investigation of lines corresponding to spectral lines of the pressed-in material is indicative of the depth of fusion. Attempts have also been made to determine the fusion depth with the use of X-rays resulting from deceleration of the welding electron beam in the weld crater. This method, however, turned out to be impracticable in the case of welding articles made of X-ray-absorbing materials.
All the foregoing methods have proven to be unsatisfactory due to their complexity, low accuracy and multisided interrelation between parameters affecting the readings of instruments.
More widespread is a method for controlling the depth of fusion, which is based on counting the number of electrons in the electron beam that pass through the weld. This method is applicable when there is access to the weld on the side opposite to the direction of the electron flow. In addition, it is applicable in cases of complete or almost complete fusion of articles being welded. In most cases, however, this method proves to be impracticable due to the foregoing limitations.
It is an object of the present invention to ensure control of the fusion depth directly in the course of welding in cases of both partial and complete fusion of an article being welded.
Another object of the present invention is to simplify the method for controlling the fusion depth.
Still another object of the invention is to increase the accuracy of controlling the fusion depth.
Other objects of the invention include raising the reliability of fusion depth control. |
Glucosephosphate isomerase polymorphism in sheep.
Two types of glucosephosphate isomerase (GPI) are described for the first time in sheep. Type T produced a 3-band pattern on polyacrylamide gel electrophoresis of serum samples, whereas type M produced a pattern of 5-7 bands. When 23 Scottish Halfbred ewes showing type T were mated to 3 Suffolk rams showing type M, their 32 offspring had frequencies of 0.72 and 0.28 for T and M respectively. There was no conclusive evidence that the types were controlled by codominant alleles or by simple Mendelian inheritance and neither was sex-linked. The frequency of the rarer type (M) was sufficiently high to provide conclusive evidence of true enzyme polymorphism. |
---
abstract: 'We estimate convergence rates for curves generated by the Loewner equation under the basic assumption that a convergence rate for the driving terms is known. An important tool is the “tip structure modulus”, a geometric measure of regularity for Loewner curves in the capacity parameterization which is analogous to Warschawski’s structure modulus, and is closely related to annuli crossings. The main application we have in mind is that of a random discrete-model curve approaching a Schramm-Loewner evolution (SLE) curve in the lattice size scaling limit. We carry out the approach in the case of loop-erased random walk in a simply connected domain. Under some mild assumptions of boundary regularity we obtain an explicit power-law rate for the convergence of the loop-erased random walk path towards the radial SLE$_2$ path in the supremum norm, the curves being parameterized by capacity. On the deterministic side we show that the tip structure modulus gives a sufficient geometric condition for a Loewner curve to be Hölder continuous in the capacity parameterization, assuming its driving term is Hölder continuous. We also briefly discuss the case when the curves are *à-priori* known to be Hölder continuous in the capacity parameterization and we obtain a power-law rate depending only on the regularity of the curves.'
address: |
Department of Mathematics\
Columbia University\
2990 Broadway\
New York, NY 10027, USA
author:
- Fredrik Johansson Viklund
title: 'Convergence Rates for Loop-Erased Random Walk and other Loewner Curves'
---
Introduction, Motivation, and Results
=====================================
Introduction
------------
The Loewner equation is a partial differential equation that produces a Loewner chain, a family of conformal mappings from a reference domain onto a continuously decreasing sequence of simply connected domains. The evolution is controlled by a real valued function called driving term which acts as a parameter. Under smoothness assumptions on the driving term the Loewner equation can be used to generate a growing continuous curve, by which we mean a continuous function from some interval into the reference domain. Conversely, starting from a suitable curve one can reverse the procedure to recover the driving term and so there is a correspondence between *Loewner curves* and their driving terms. In recent years Loewner’s equation has been successfully applied to study conformally invariant lattice-size scaling limits of certain discrete models from statistical physics. By taking a scaled Brownian motion as the driving term one obtains the one-parameter family of random fractal Schramm-Loewner evolution (SLE) curves which are, essentially, the only possible conformally invariant scaling limits of cluster interfaces with a certain Markovian property; see [@Schramm_IJM]. Convergence to SLE has been proved in several cases; see, e.g., [@schramm_icm] and the references therein. The use of the Loewner equation and SLE techniques in this context has made it possible to give precise meaning to the (passage to the) scaling limit itself, but also to prove conformal invariance, and to give rigorous proofs of various predictions made by physicists. The latter is to large extent due to the fact that the SLE processes are amenable to computation via stochastic calculus.
In this paper we will be interested in quantifying the relationship between (random) rough Loewner curves with driving terms that are close in the supremum norm. To explain our interest, let us first consider a non-random setting. One can view the Loewner equation as a highly non-linear function from a space of driving terms to a suitable metric space of (parameterized) curves and it is natural to ask about its continuity properties, if any. This point of view is closely related to work by Lind, Marshall, and Rohde; see [@MR] and [@LMR]. For example, Theorem 4.1 of [@LMR] proves that curves driven by Hölder-1/2 driving terms with small semi-norm converge as curves if the driving terms converge. So the “Loewner function” is continuous when restricted to this collection of driving terms and our results can be used to show that it is Hölder continuous with an explicit exponent depending only on the semi-norm when sufficiently small. One can also ask similar questions, restricting attention to driving terms generating curves with some given regularity.
Our principal motivation, however, comes from the observation that although several discrete-model curves are known to converge (as curves up to reparameterization) to SLE curves, next to nothing appears to be known about the speeds of their convergence. (See the paper [@BJK] by Beneš, Kozdron, and the author for a quantitative result of convergence of loop-erased random walk with respect to Hausdorff distance when the curves are viewed as compact sets.)
Good control over convergence rates would allow SLE techniques to be used on mesoscopic scales, that is, scales of order ${\epsilon}^p$ with $p \in (0, 1)$ where ${\epsilon}$ is the lattice spacing. This is likely to be helpful for obtaining fine properties of corresponding discrete models; this question was raised by Schramm in connection with sharp estimation of critical exponents [@schramm_icm]. We may compare with a related model. So-called strong approximation results such as the KMT approximation or the Skorokhod embedding [@LL] allow for the coupling of simple random walk and Brownian motion in such a way that the paths are close with high probability, with error terms expressed explicitly in terms of the lattice spacing. This gives a natural way to use techniques for Brownian motion to deduce fine properties of simple random walk which can depend on behavior on mesoscopic scales. This approach has been used by, e.g., Lawler, Lawler and Puckette, and Beneš; see [@LP] and [@benes] and the references therein. It thus seems reasonable that approximation results with explicit error terms for discrete models converging to SLE would be quite useful. Presently, all known proofs of convergence to SLE goes via convergence of the driving terms in one way or another, so it seems natural to take a convergence rate for the driving terms as a starting point. In particular since the work in [@BJK] essentially reduces finding a convergence rate for the driving terms to finding a convergence rate for the so-called martingale observable in rough domains. We will show that a power-law convergence rate to an SLE curve can be derived from a power-law convergence rate for the driving terms provided some additional quantitative geometric information, related to crossing events, is available for the discrete curves, along with an estimate on the growth of the derivative of the SLE map. The approach is quite general and we believe it can be applied to several models as soon as the aforementioned information is available, though we carry out the specific probabilistic estimates only in the case of loop-erased random walk.
Overview, Results, and Related Work
-----------------------------------
Let us briefly sketch the setup and main ideas. We will do it in the half plane setting, but we will later work mostly in a radial setup. See Section \[prel\] for precise definitions. Let $W, W_n : [0,T] \to \mathbb{R}$ be continuous functions with $$\sup_{t \in [0,T]}|W(t)-W_n(t)| \le {\epsilon},$$ where ${\epsilon}>0$ is to be thought of as small but fixed. Let $f(t,z): \mathbb{H} \to H(t)$ and $f_n(t,z): \mathbb{H} \to H_n(t)$ be the solutions to the chordal Loewner equations driven by $W$ and $W_n$, respectively, and assume that the Loewner chains are generated by the curves $\gamma$ and $\gamma_n$ parameterized by capacity so that for each $t$, $H(t)$ and $H_n(t)$ are the unbounded components of $\mathbb{H} \setminus \gamma[0,t]$ and $\mathbb{H} \setminus \gamma_n[0,t]$, respectively. (We can think of $\gamma_n$ as the conformal image of a discrete-model curve on a lattice approximation of a smooth domain $D$, where the mesh of the lattice is $n^{-1}$, and the driving term of $\gamma_n$ is coupled with a scaled Brownian motion $W$ driving the chordal SLE curve $\gamma$ so that the driving terms are at distance at most ${\epsilon}=n^{-q}$ for some $q<1$.) Let $y > 0$; we will later choose $y=y({\epsilon})$. Let $t \in [0,T]$. We can write $$\begin{aligned}
|\gamma(t)-\gamma_n(t)| \le & \,\, |\gamma(t)-f(t,W(t)+iy)| \\
& + |f(t,W(t)+iy)-f(t,W_n(t)+iy)| \\
& + |f(t,W_n(t)+iy) - f_n(t,W_n(t)+iy)| \\
& + |f_n(t,W_n(t)+iy)-\gamma_n(t)| \\
=: & \, A_1+A_2+A_3+A_4.\end{aligned}$$ We wish to estimate the $A_j$ in terms of ${\epsilon}$. Suppose that there are $\beta <1$ and $c < \infty$ such that $$\label{intro1}
d|f'(t, W(t)+id)| \le c d^{1-\beta}\, \textrm{ for all } \, d \le y.$$ If this estimate holds, by integrating, $A_1 \le c \, y^{1-\beta}$. (Constants may change from line to line, and are assumed to depend only on the parameters and not on ${\epsilon},y$, etc.) By the distortion theorem the same bound holds for $A_2$ if $y \ge {\epsilon}$. The third term, $A_3$, represents the distance between two solutions to the Loewner equation, with driving terms at supremum distance at most ${\epsilon}$, evaluated at the same point. In Section \[gronwall-sect\] we will use the reverse-time Loewner flow to estimate quantities like this. In particular, we will see that if ${\operatorname{Im}}z=y$, then $$\left| f(t, z) - f_n(t,z) \right| \le c\, {\epsilon}y^{-1},$$ with $c$ depending only on $T$. Hence $A_3 \le c \, {\epsilon}y^{-1}$ and Cauchy’s integral formula implies that $$\left|y|f'(t, z)| - y|f_n'(t, z)|\right| =c \, {\epsilon}y^{-1}.$$ From this it follows, using Koebe’s estimate and , that if $$\Delta_n(t, y) :={\operatorname{dist}}\left[f_n(t,W_n(t)+iy), \partial H_n(t) \right],$$ then $$\label{intro2}
\Delta_n(t, y) \le c\, y|f_n'(t,W_n(t)+iy)| \le c \, y^{1-\beta} +c \,{\epsilon}y^{-1};$$ see Proposition \[rough\]. (Note that we have made no explicit assumption on the behavior of $|f_n'|$.) Now choose $y({\epsilon})={\epsilon}^p$, for some $p \in (0,1)$. Then, $$A_1+A_2+A_3 \le c\, {\epsilon}^{p(1-\beta)} + c\, {\epsilon}^{1-p}$$ and it remains to bound $A_4$. Clearly, $A_4 \ge \Delta_n(t, {\epsilon}^p)$ but we would like an upper bound in terms of $\Delta_n(t, {\epsilon}^p)$. To proceed, some additional information about the boundary behavior of $f_n$ is necessary.
For this, we will use the so-called “tip structure modulus”, a geometric gauge of the regularity of a Loewner curve in the capacity parameterization that is, for our problem, the analog of Warschawski’s [@W] measure with a similar name. Let $\delta>0$ and consider $\mathcal{S}_{t,\delta}$, the set of all crosscuts of $H_n(t)$ of diameter at most $\delta$ that separate the tip, $\gamma_n(t)$, from $\infty$ in $H_n(t)$. Each crosscut ${\mathcal{C}}\in \mathcal{S}_{t,\delta}$ separates from $\infty$ in $H_n(t)$ a “maximal” piece $\gamma_{{\mathcal{C}}}$ of $\gamma_n$ containing $\gamma_n(t)$ as a prime-end. We then define the tip structure modulus of $\gamma_n(t), t \in [0,T]$, by $$\eta_{{\operatorname{tip}}}(\delta) = \sup_{t \in [0,T]} \sup_{{\mathcal{C}}\in \mathcal{S}_{t,\delta}} {\operatorname{diam}}\, \gamma_{\mathcal{C}}.$$ (See Section \[geom\] for a precise definition.) Roughly speaking, $\eta_{{\operatorname{tip}}}(\delta)$ is the maximal distance the curve travels into a “bottle” with “bottleneck” opening smaller than $\delta$ viewed from the point towards which the curve is growing. (Similar conditions have been used before; see below.) In Proposition \[nov4.1\] we show that $$\label{intro3}
|f_n(t,W_n(t)+iy)-\gamma_n(t)| \le \eta_{{\operatorname{tip}}}\left(c \, \Delta_n(t, y) \right),$$ where $\eta_{{\operatorname{tip}}}$ is the tip structure modulus for $\gamma_n$. Consequently, if we have a power-law bound on the tip structure modulus evaluated at $c \, \Delta_n(t, {\epsilon}^p)$, that is, if $$\eta_{{\operatorname{tip}}}(c \Delta_n(t, {\epsilon}^p)) \le c' \, (\Delta_n(t, {\epsilon}^p))^r,$$ for some $r>0$, then by $$A_4 \le c\,{\epsilon}^{p(1-\beta)r} + c\,{\epsilon}^{(1-p)r}.$$ We stress that the estimate on $\eta_{{\operatorname{tip}}}$ is only required to hold on the scale of $\Delta_n(t, {\epsilon}^p)$ and note that the failure of the existence of a given bound on $\eta_{{\operatorname{tip}}}$ implies certain crossing events for the curve. If the estimates hold uniformly in $t \in [0,T]$, then we have obtained a power-law bound in terms of ${\epsilon}$ on $\sup_{t \in [0,T]} |\gamma(t) - \gamma_n(t)|$ and we can finally optimize over exponents.
To implement these ideas in a particular setting we need to show that the assumptions we used are satisfied uniformly in $t \in [0,T]$, with high probability in terms of ${\epsilon}$. If a convergence rate for the driving terms (or martingale observable in rough domains) is known, then we believe it is possible to derive the remaining required information from existing results in the literature on discrete models without too much effort, and we derive the needed SLE derivative estimates, from estimates in [@JVL], in this paper. Indeed, as already mentioned, the event that the geometric condition fails implies annuli crossing events that are reasonably well-understood for the models known to converge to SLE.
The organization of the paper is as follows. In Section \[gronwall-sect\] we discuss some preliminaries and prove the quantitative comparison estimates for solutions to the Loewner equation. These estimates might be of some independent interest; see the forthcoming [@JVRW]. We also consider a case when the curves are *à-priori* known to be Hölder continuous in the capacity parameterization; we then get a power-law convergence rate depending only on the regularity of the curves. See Corollaries \[lip\] and \[holder2\].
In Section \[geom\] we define the tip structure modulus and prove the estimates implying . Then in Theorem \[geom-holder\] we show that if a Loewner curve $\gamma$ has the property that there is $M< \infty$ such that $\eta_{{\operatorname{tip}}}(\delta) \le M \delta, \, \delta < \delta_0,$ and the driving term is Hölder continuous, then $\gamma$ is also Hölder continuous in the capacity parameterization with exponent depending only on $M$ and the exponent for the driving term. This is an analog of the fact that John domains are Hölder domains [@Pom92] for Loewner curves parameterized by capacity.
In Section \[lerw-sect\] we apply the above ideas to obtain a power-law estimate on the convergence rate to radial SLE$_2$ for the loop-erased random walk (LERW) path. Let us informally state one version of the result; see Theorem \[lerw-thm\] for a precise statement. Let $D_n$ be an $n^{-1}\mathbb{Z}^2$ grid domain approximation of a fixed simply connected Jordan domain $D \ni 0$ with $\mathcal{C}^{1+\alpha}$ boundary and inner radius from $0$ equal to $1$. (The proof works for the larger class of quasidisks [@Pom92], but we then get a slower convergence rate which depends on the constant in the Ahlfors three-point condition for $D$.) Let $\gamma_n$ be the time-reversal of LERW on $D_n$ from $0$ to $\partial D_n$ and let $\tilde{\gamma}_n$ be its image in ${\mathbb{D}}$ under the conformal map $\psi_n: D_n \to {\mathbb{D}}$ with the usual normalization. Let $\tilde{\gamma}$ be the radial SLE$_2$ path in ${\mathbb{D}}$ started uniformly on $\partial {\mathbb{D}}$.
For each $n$ sufficiently large, there is a coupling of $\tilde{\gamma}_n$ with $\tilde{\gamma}$ such that $$\mathbb{P} \left\{ \sup_{t \in [0, \sigma]}|\tilde{\gamma}_n(t)-\tilde{\gamma}(t)| > {\epsilon}_n^{1/41}\right\} < {\epsilon}_n^{1/41},$$ where both curves are parameterized by capacity, ${\epsilon}_n=n^{-1/24}$ is the convergence rate of the driving terms from [@BJK], and $\sigma$ is a stopping time. The same estimate holds for the pre-images of the curves in $D_n$.
(The stopping time $\sigma=\sigma({\epsilon},T)$ can be taken as the minimum of some fixed $T<\infty$ and the first time such that the forward SLE$_2$ flow of $-\tilde{\gamma}(0)$ is smaller than some given ${\epsilon}>0$. Note that in this case $\lim_{{\epsilon}\to 0} \sigma({\epsilon},T) = T$ almost surely, see Appendix \[sle-sect\].) This quantifies the convergence result [@LSW Theorem 3.9] of Lawler, Schramm, and Werner. As indicated, the proof considers the couplings of [@BJK] in which if $s < 1/24$, then with probability at least $1-n^{-s}$ the estimate $\sup_{t \in [0,T]}|W_n(t)-W(t)| < n^{-s}$ holds for the driving term $W_n$ of the LERW on $D_n$ and $W$, a Brownian motion with speed $2$ on $\partial {\mathbb{D}}$. Using the Brownian motion as driving term in the Loewner equation we have a coupling of the LERW image and SLE$_2$ for each $n$, with their driving terms close. We then show that the above reasoning can be carried out on an event with large probability in terms of $n$ to prove Theorem \[lerw-thm\]. Some work is required to establish the needed geometric condition for the LERW path; see Proposition \[lerw-sm\].
In Appendix \[sle-sect\] we derive an estimate on the probability (in terms of $y$) that a bound of the type holds for *radial* SLE from a corresponding estimate for chordal SLE from [@JVL]. This is where the stopping time $\sigma=\sigma({\epsilon},T)$ is needed; it is related to the “disconnection time” when the radial and chordal SLE$_\kappa$ processes become singular with respect to each other.
Finally, in Appendix \[grid-sect\] we discuss a convergence rate result for a sequence of grid-domain approximations of a quasidisk which allows us to directly “transfer” the geometric condition to ${\mathbb{D}}$.
Besides classical articles by Ahlfors, Warschawski, Becker, Pommerenke, and others, which develop (Euclidean) geometric conditions for regularity estimates on Riemann maps; see, e.g., [@W; @BP; @NP1; @NP2; @SS] and the references therein, there are close connections between the results and methods of this paper and more recent work. Let us highlight some. We mentioned the work by Lind, Marshall, and Rohde [@LMR] and by Marshall and Rohde [@MR]; see also Wong’s paper [@wong]. The paper by Aizenman and Burchard [@AB] characterizes tightness for probability measures on a space of (discrete-model) curves modulo reparameterization in terms of estimates on probabilities of annuli crossing events. The event that the geometric condition fails is contained in a union of crossing events of this type and this is what allows for estimation of probabilities. Kemppainen and Smirnov consider related questions and use similar conditions in [@KS] and a quantity somewhat similar to the tip structure modulus has been used by Lind and Rohde in [@LR].
Acknowledgements
----------------
Support from the Simons Foundation, Institut Mittag-Leffler, and the AXA Research Fund is gratefully acknowledged. I wish to thank Dmitry Belyaev, Don Marshall, and Steffen Rohde for interesting, helpful, and inspiring conversations on the topics of this paper, and Julien Dubédat and Alan Sola for their useful comments on the manuscript.
Preliminaries and the Deterministic Loewner Equation {#prel}
====================================================
Preliminaries
-------------
We start by setting some notation. We will write ${\mathbb{D}}= \{z \in \mathbb{C} : |z| < 1\}$ for the unit disk in the complex plane. This is the basic [**reference domain**]{}, although we will occasionally also consider the upper-half plane ${\mathbb{H}}= \{z \in \mathbb{C}: {\operatorname{Im}}z > 0\}$. Let $D \ni 0$ be a simply connected domain. By the Riemann mapping theorem there exists a unique conformal map $\psi: D \to {\mathbb{D}}$ with $\psi(0)=0$ and $\psi'(0)>0$. If we do not state otherwise we will always assume that uniformizing conformal maps like $\psi$ are normalized in this way.
A [**crosscut**]{} ${\mathcal{C}}$ of a simply connected domain $D$ is an open Jordan arc in $D$ such that $\overline{{\mathcal{C}}} = {\mathcal{C}}\cup \{\zeta,\eta \}$ with $\zeta,\eta \in \partial{D}$. A crosscut partitions $D$ into exactly two disjoint components; see Chapter 2 of [@Pom92].
A (parameterized) [**curve**]{} $\gamma$ is a continuous function $\gamma(t):I \to \mathbb{C}$ defined on some interval $I$ which we will usually assume to be $[0,T]$ for some fixed $T > 0$. Given two curves $\gamma_1, \gamma_2$ defined on the same interval, we measure their distance by the supremum norm $$\sup_{t \in [0,T]}|\gamma_1(t)-\gamma_2(t)|.$$ Let $\gamma:[0,T] \to \overline{{\mathbb{D}}}$ be a curve with $\gamma(0) \in \partial {\mathbb{D}}, 0 \notin \gamma[0,T],$ and for $t \in [0,T]$, let $D_t$ be the connected component of $0$ of ${\mathbb{D}}\setminus \gamma[0,t]$. We say that $\gamma$ is [**parameterized by capacity**]{} if the normalized conformal maps $g_t : D_t \to {\mathbb{D}}$ satisfy $g'_t(0)=e^t$ for $t \in [0,T]$. A reparameterization (which is increasing) of a curve $\gamma$ is a new curve $\tilde{\gamma}$ obtained by $\tilde{\gamma}(t)=\gamma \circ \alpha(t)$, where $\alpha(t) : [0,\tilde{T}] \to [0,T]$ is a strictly increasing and continuous function. We will often, when no confusion is possible, treat a curve and its reparameterizations as the same. A (${\mathbb{D}}$-) [**Loewner curve**]{} is a curve $\gamma$ in $\overline{{\mathbb{D}}}$ as above, parameterized by capacity, for which the following continuity condition holds: for every ${\epsilon}>0$ there exists $\delta > 0$ such that for all $s,t \in [0, T]$ with $0 < t-s < \delta$ there is a crosscut ${\mathcal{C}}$ with ${\operatorname{diam}}{\mathcal{C}}< {\epsilon}$ that separates $K_{t} \setminus K_s$ from $0$ in $D_t$, where $K_t=\overline{{\mathbb{D}}\setminus D_t}$. Intuitively, a ${\mathbb{D}}$-Loewner curve is a continuous curve with no transversal self-crossings whose tip $\gamma(t)$ is always “visible” from $0$. For example, if $\gamma$ is has no double points and is contained in ${\mathbb{D}}$ for $t \in (0,T]$, then it is a Loewner curve. By Theorem 1 of [@Pom66], the ${\mathbb{D}}$-Loewner curves are exactly the curves that can be described using the radial Loewner equation driven by a continuous driving term, as discussed in the next section. We will also consider (chordal) Loewner curves in ${\mathbb{H}}$ which are defined in a similar manner; we refer to Chapter 4 of [@lawler-book] for more information. We just note that in this case it is convenient to parameterize $\gamma$ by the so-called half-plane capacity, that is, so that the conformal maps $g_t : H_t \to {\mathbb{H}}$, where $H_t$ is the unbounded connected component of ${\mathbb{H}}\setminus \gamma[0,t]$, satisfy $g_t(z)=z+2t/z + o(1/|z|)$ at $\infty$. (That is, in this case the normalization is at a boundary point, and the tip of the curve is to be “visible” from this point at all times.)
We will often write “constants” depending on parameters as $c=c(a,b)$, etc. It is then to be understood that $c$ depends only on these parameters.
Loewner Equations
-----------------
We will be interested in two versions of Loewner’s differential equation. We define radial and chordal Loewner vector fields by $$\Phi_\mathbb{D}(z,\zeta)=-z\frac{\zeta+z}{\zeta-z},\quad \Phi_\mathbb{H}(z,\xi)=-\frac{2}{z-\xi}.$$ The radial and chordal Loewner equations are then given by $$\label{crpde}
\partial_t f(t,z) = \partial_zf(t,z) \, \Phi_X(z, W(t)), \quad f_0(z)=z, \quad z \in X,$$ $X=\mathbb{D}$ and $X=\mathbb{H}$ respectively. (We will sometimes refer to these equations the ${\mathbb{D}}$- and ${\mathbb{H}}$-Loewner PDEs and their solutions as ${\mathbb{D}}$- and ${\mathbb{H}}$-Loewner chains, etc.) Here, $W: [0, \infty) \to \partial X$ is a (continuous) function called the driving term. (In the radial case, we will sometimes write the driving term as $W(t)=e^{i \xi(t)}$ for a real valued function $\xi$ which, when no confusion is possible, is for brevity also referred to as the driving term.)
Let us discuss a few properties in the radial case. (Similar results hold for the chordal version.) For each $t_0 \ge 0$ the solution $f(t_0, \cdot ): \mathbb{D} \to D_{t_0} $ is a conformal map onto a simply connected domain $D_{t_0} \subset \mathbb{D}$. The family $(f(t,z))_{t \ge 0}$ of conformal mappings is called a [Loewner chain]{}. A [Loewner pair]{} $(f, W)$ consists of a function $f(t,z)$ and a real-valued (continuous) function $W(t), \, t \ge 0,$ such that $f$ is the solution to the Loewner equation with $W$ as driving term. Under some rather mild regularity assumptions on $W$ (e.g., that $W$ is Hölder-(1/2+${\epsilon}$) for some ${\epsilon}>0$) there exists a curve $\gamma(t)$ such that $D_t$ is the component of the origin of $\mathbb{D} \setminus \gamma[0,t]$ and in this case we say that the Loewner chain is generated by the (Loewner) curve $\gamma$. Conversely, given a Loewner curve, one can associate via the Loewner equation a unique driving term such that the Loewner chain $(f_t)$ in the Loewner pair $(f, W)$ is generated by $\gamma$. In fact, the driving term is the preimage in $\partial \mathbb{D}$ of the tip of the growing curve. In terms of the inverse relationship we have $$\label{dec9.1}
\gamma(t)=\lim_{d \to 0+}f(t, (1-d)W(t)).$$ A sufficient condition for $(f,W)$ to be generated by a curve $\gamma$ is that the limit exists for all $t \ge 0$ and that $t \mapsto \gamma(t)$ is continuous; see Theorem 4.1 of [@RS]. The parameterization of $\gamma$ given by is the capacity parameterization.
We will sometimes use the notation $f_t(z) = f(t,z)$, $f'=\partial_z f$, and $\dot{f}=\partial_t f$.
\[lemma34\] There exists a constant $c_0 <\infty$ such that the following holds. Let $X \in \{\mathbb{D}, \mathbb{H}\}$. Suppose that $f_t$ satisfies the X-Loewner PDE and that ${\operatorname{dist}}(z, \partial X) = d$. Then for $s \geq 0$ $$\label{nov19.9}
e^{-c_0s/d^2}\, |f_t'(z)|
\leq |f_{t+s}'(z)|\leq
e^{c_0s/d^2}\, |f_t'(z)|$$ and $$\label{mar14.7}
|f_{t+s}(z) - f_t(z)| \leq c_0 d |f_t'(z)| (e^{c_0s/d^2}-1).$$
See [@JVL] for the proof in the chordal case. The radial case is proved in the same way.
For Hölder continuous driving terms the existence of the curve and its regularity in the capacity parameterization is completely determined by the local behavior at the tip, that is, the growth of the derivative of the conformal map close to the pre-image of the tip. However, there are Hölder-1/2 driving terms that do not generate curves; see [@LMR]. The following result is a version of Proposition 3.9 of [@JVL], but allows for a less regular driving term.
\[der\] Let $(f,W)$ be a ${\mathbb{D}}$-Loewner pair and assume that $W(t)=e^{i \xi(t)}$ and $\xi(t)$ is Hölder-$\alpha$ on $[0,T]$ for some $\alpha \le 1/2$. If there exist constants $c < \infty$, $d_0>0$, and $\beta <1$ such that $$\label{der-eq}
\sup_{t \in (0,T]}d|f'_t((1-d)W(t))| \le c \, d^{1-\beta}, \quad \forall d \le d_0,$$ then $(f,W)$ is generated by a curve $\gamma$ which for every ${\epsilon}>0$ is Hölder-$\alpha(1-\beta)$ continuous in the capacity parameterization on $[{\epsilon}, T]$ and Hölder-$\min\{\alpha, \alpha(1-\beta)\}$ continuous on $[0,T]$. The analogous statement holds for ${\mathbb{H}}$-Loewner pairs.
The bound on the derivative implies that the limit $$\gamma(t)=\lim_{d \to 0+} f_t((1-d)W(t))$$ exists for every $t \in [0,T]$ and since the convergence is uniform $\gamma(t)$ is a continuous function. Let $s>0$ and set $d=s^\alpha$. If $t, t+s \in [0,T]$, we have $$\begin{aligned}
|\gamma(t+s)-\gamma(t)| \le & \, |\gamma(t+s) - f_{t+s}((1-d)W(t+s))| \\
& + |f_{t+s}((1-d)W(t+s))- f_{t+s}((1-d)W(t))| \\
& + |f_{t+s}((1-d)W(t))- f_{t}((1-d)W(t))| \\
& + |\gamma(t) - f_{t}((1-d)W(t))|.\end{aligned}$$ If $t >0$, then the estimate implies that the first and last terms are bounded by a constant times $d^{1-\beta}=s^{\alpha(1-\beta)}$. By assumption $|\xi(t+s)-\xi(t)| \le c s^{\alpha} = c d$, so the distortion theorem implies that $$|f_{t+s}((1-d)W(t+s))- f_{t+s}((1-d)W(t))| \le c d^{1-\beta}.$$ Finally, since $s=d^{1/\alpha}$ and $\alpha \le 1/2$, implies $$|f_{t+s}((1-d)W(t))- f_{t}((1-d)W(t))| \le c d^{1-\beta}.$$ Since $d|f'_0((1-d)W(0))|=d$ and so cannot decay faster than linearly, we get the stated exponent on $[0,T]$.
An Estimate for the Reverse-Time Loewner Equation {#gronwall-sect}
-------------------------------------------------
We want to compare solutions to the Loewner equation corresponding to driving terms which are close in the supremum norm. We will use the **reverse-time Loewner equation**: Let $T < \infty$ and let $(f_j, W_j), j=1,2,$ be Loewner pairs. Let $t_0 \in (0, T]$ be fixed. Consider solutions $h_j(t,z; t_0)=h_j(t,z)$ to the reverse-time Loewner equation $$\label{reverselocal}
\partial_t h_j(t,z) = \Phi_X(h_j, U_j(t)), \quad h_j(0,z)=z,$$ where $X$ equals $\mathbb{D}$ and $\mathbb{H}$ in the radial and chordal case, respectively. We say that $U_j$ is the driving term for . If we take $U_j(t)=W_j(t_0-t)$ we have the well-known identity $$h_j(t_0,z; t_0) = f_j(t_0,z), \quad z \in X, \quad j=1,2,$$ where $f_j(t,z)$ solves the Loewner PDE with $W_j(t)$ as driving term. Note that these equalities only hold at the special time $t=t_0$. The families of conformal mappings $(h_j(\cdot, z))$ and $(f_j(\cdot, z))$ are in general different. Note also that solutions $t \mapsto h(t,z)$ to flow away from $\partial X$ as $t$ increases when $z \in X$. This implies that if $z \in X$ is fixed then the solution $t \mapsto h(t,z)$ exists for all $t \ge 0$.
Now assume that ${\epsilon}$ and $\nu$ are given positive numbers. Let $z_1,z_2 \in X$ be given and suppose that $$\sup_{t \in [0 , T]}|W_1(t)-W_2(t)| \le {\epsilon}, \quad |z_1-z_2| \le \nu {\epsilon}.$$ Set$$H(t)=h_1(t,z_1)-h_2(t,z_2),$$ where the $h_j$ are assumed to solve the reverse-time Loewner equations driven by $$\tilde{W}_j(t):=W_j(t_0-t), \quad j=1,2.$$ Then $H(t_0) = f_1(t_0,z_1) - f_2(t_0,z_2)$. We differentiate with respect to $t$ and use to obtain the linear differential equation $$\dot{H}(t)-H(t)\psi_X(t)=(\tilde W_2(t)-\tilde W_1(t))\xi_X(t),$$ where $$\begin{aligned}
\psi_{\mathbb{D}}(t) & =\frac{h_1h_2 - \tilde W_1 \tilde W_2-\frac{1}{2}(h_1+h_2)(\tilde W_1+\tilde W_2)}{(h_1-\tilde W_1)(h_2-\tilde W_2)}, \\ \xi_{\mathbb{D}}(t) & =\frac{h_1^2+h_2^2}{2(h_1-\tilde W_1)(h_2-\tilde W_2)}\end{aligned}$$ and $$\begin{aligned}
\psi_\mathbb{H}(t) &=\frac{2}{(h_1-\tilde W_1)(h_2-\tilde W_2)}, \\
\xi_\mathbb{H}(t) & =\psi_\mathbb{H}(t).\end{aligned}$$ Here we have suppressed the dependence on $t$ in the right-hand sides. We can integrate the differential equation and with $u(t) = \exp\{-\int_0^t \psi_X(s) \, ds\}$ we find $$H(t)=u(t)^{-1}\left(H(0)+\int_0^t (\tilde W_2-\tilde W_1)u \xi_X \, ds \right).$$ Hence, for $0 \le t\le t_0$, $$\label{gron}
|H(t)| \le |H(0)| e^{\int_0^{t} {\operatorname{Re}}\psi_X(s) \, ds} + \int_0^{t}|\tilde W_2-\tilde W_1| e^{\int_s^{t} {\operatorname{Re}}\psi_X(r) \, dr}|\xi_X| \, ds.$$ Consequently, since $$\sup_{t \in [0, t_0]}|\tilde{W}_1(t)-\tilde{W}_2(t)| \le {\epsilon}, \quad |H(0)|=|z_1-z_2| \le \nu {\epsilon},$$ recalling that $|f_1(t_0, z_1) - f_2(t_0,z_2)| = |H(t_0)|$, we get the estimate $$\begin{gathered}
\label{G}
|f_1(t_0, z) - f_2(t_0,w)| \\ \le {\epsilon}\left( \nu e^{\int_0^{t_0} {\operatorname{Re}}\psi_X(s) \, ds} + \int_0^{t_0} e^{\int_s^{t_0} {\operatorname{Re}}\psi_X(r) \, dr}|\xi_X| \, ds \right).\end{gathered}$$ The right-hand side in can be estimated in different ways depending on what data is available. We would like an estimate that depends only on ${\epsilon}$ and $d={\operatorname{dist}}(\{z_1,z_2 \}, \partial X)$. Estimating naively, using only the fact that points flow away from $\partial X$ under the reverse flow, gives a bound of order ${\epsilon}e^{O(d^{-2})}$. (This kind of estimate was used in [@BJK].) We shall see that we can do much better.
### The Chordal Case
To give some intuition, let us first briefly discuss the easier chordal case which will be treated in greater detail in [@JVRW]. Assume $\nu=1 $ for simplicity. Write $z_j(t) = h_j(t,z_j)-\tilde{W}_j(t)$. We can apply the Cauchy-Schwarz inequality to get $$\begin{aligned}
\int_0^{t} {\operatorname{Re}}\psi_{\mathbb{H}} (t) \, dt & \le \int_0^{t} \frac{2}{|z_1(t)z_2(t)|} \, dt \\
& \le \left( \int_0^{t} \frac{2}{|z_1(t)|^2} \, dt \right)^{1/2} \left( \int_0^{t} \frac{2}{|z_2(t)|^2} \, dt \right)^{1/2}. \end{aligned}$$ Since $\partial_t \log {\operatorname{Im}}z_j(t) = 2/|z_j(t)|^2$ this can now be used to show that the right-hand side of is bounded by ${\epsilon}d^{-1}$ times a constant depending only on $T$, if ${\operatorname{Im}}z_j(0) \ge d, \, j=1,2$. (Note that there is no logarithmic correction.)
The estimate ${\epsilon}d^{-1}$ is essentially sharp if no further assumptions are made. Indeed, consider a driving term $W_1(t)$ generating a Loewner chain such that for some fixed $p<1$ very close to $1$, $t_0 > 0$, there is a constant $c>0$ such that $|f_1'(t_0,W_1(t_0) + id)| \ge c d^{-p}$ as $d \to 0$. (As shown in [@LMR] one can take $W_1(t)=\kappa \sqrt{t_0-t}$ with $\kappa$ very close to but smaller than $4$.) If we let $W_2(t)=W_1(t)+{\epsilon}$, then $f_2(t,z)=f_1(t,z-{\epsilon}) + {\epsilon}$. Hence, for ${\epsilon}\le d/2$, by Koebe’s distortion theorem, $$\begin{gathered}
|f_2(t_0,W_1(t_0)+id)-f_1(t_0,W_1(t_0)+id)| \\
\ge |f_1(t_0,W_1(t_0)+id-{\epsilon})-f_1(t_0,W_1(t_0)+id)|-{\epsilon}\\
\ge c {\epsilon}|f'_1(t_0, W_1(t_0)+id)| \ge c {\epsilon}d^{-p},\end{gathered}$$ A similar example can be constructed for the radial case.
If more information is available we can do a bit better. The reader may check that $\partial_t {\operatorname{Re}}\log h_j'(t,z) = {\operatorname{Re}}(2/z_j(t)^2)$. From this one can see that if a non-trivial power-law bound on the growth of the derivative at time $t_0$ holds, that is, if there exists $c < \infty$ such that $$\label{der-est-t0}
|f_j'(t_0,W_j(t_0)+id)| \le c d^{-\beta_j}, \quad d \to 0+,$$ then one gets a bound in of order at most ${\epsilon}d^{-\frac{1}{2}[(1+\beta_1)(1+\beta_2)]^{1/2}} \log d^{-1}$. This refinement is joint work with Rohde and Wong and details will appear in [@JVRW].
### The Radial Case
We now move to the radial case $X=\mathbb{D}$. In order to bound we need to estimate $\int_s^{t_0} {\operatorname{Re}}\psi_{\mathbb{D}}(s) \,ds$. The idea is to prove that for a constant $q$ slightly larger than $1$, $${\operatorname{Re}}\psi_{\mathbb{D}}(t)\le q \frac{\sqrt{1+|z_1(t)|}}{|1-z_1(t)|} \cdot \frac{\sqrt{1+|z_2(t)|}}{|1-z_2(t)|},$$ where for $t \in [0,t_0]$, we define $$z_j(t)=h_j(t,z_j)\overline{\tilde{W}_j(t)}.$$ Note that $|z_j(0)|=|z_j|$. Once we have this estimate we can apply the Cauchy-Schwarz inequality to the corresponding bound on $\int_s^{t_0} {\operatorname{Re}}\psi_{\mathbb{D}}(s) \,ds$ to decouple the two flows and then compare with $$\label{nov1211.1}
\frac{1+|z_j(t)|}{|1-z_j(t)|^2}=\partial_t \log \left(1-|z_j(t)|\right).$$ This last identity follows from the reverse-time Loewner equation . This will give a bound in of order ${\epsilon}d^{-q}$, where $q$ can be taken arbitrarily close to $1$. (Arguing naively as in the chordal case gives a bound of order ${\epsilon}d^{-4}$, but we shall actually make use of this bound below.) This is essentially optimal in this general setting as we saw above.
Let $t_0 \in [0, T]$ be fixed and for $j=1,2$, let $(f_j, W_j)$ be $\mathbb{D}$-Loewner pairs. For any $\rho >1$ there exists ${\epsilon}'={\epsilon}'(\rho)>0$ and $c=c(\rho,T)<\infty$ such that the following holds. Suppose that ${\epsilon}, d>0$ are such that $|z_1-z_2| \le {\epsilon}$, $|z_1|, |z_2| \ge 1-d$, and $$\sup_{t \in [0,t_0]}|W_1(t) - W_2(t)| \le {\epsilon}.$$ Then there exist ${\epsilon}_0={\epsilon}_0(\rho)>0$ and $d_0=d_0(\rho)>0$ such that if $0<{\epsilon}<{\epsilon}_0$ and $\left( 4{\epsilon}/{\epsilon}'\right)^{1/\rho} \le d \le d_0$, then $$\label{diff-estimate}
\left| f_1(t_0, z_1) - f_2(t_0,z_2) \right| \le c_q {\epsilon}d^{-\rho}.$$
By factoring out $\tilde{W}_1 \tilde{W}_2$ we can write $$\begin{aligned}
\label{dec28.1}
{\operatorname{Re}}\psi_{\mathbb{D}}(t)& ={\operatorname{Re}}\left( \frac{z_1(t)z_2(t)-1-(z_1(t)+z_2(t))+O({\epsilon})}{(1-z_1(t))(1-z_2(t))} \right) \nonumber \\
& =\frac{{\operatorname{Re}}\left\{ \left( z_1(t)z_2(t)-1-(z_1(t)+z_2(t))+O({\epsilon}) \right) (1-\overline{z_1(t)})(1-\overline{z_2(t)}) \right\}}{|1-z_1(t)|^2|1-z_2(t)|^2}.\end{aligned}$$ This uses that $\overline{\tilde{W}_1(t)}\tilde{W}_2(t)= 1+ O({\epsilon})$ in the sense that $|\overline{\tilde{W}_1(t)}\tilde{W}_2(t)-1| \le c {\epsilon}$ for a universal constant $c$. For $z, w \in \overline{{\mathbb{D}}}$ we now consider the function $$R(z,w)=\frac{{\operatorname{Re}}\left\{ \left( zw-1-(z+w)\right) (1-\overline{z})(1-\overline{w}) \right\}}{|1-z||1-w|\sqrt{(1+|z|)(1+|w|)}}.$$ The function $R$ is bounded and continuous on the closed bi-disk ${\mathbb{D}}\times {\mathbb{D}}$. We claim that $\sup_{z,w \in \partial {\mathbb{D}}}R(z,w) \le 1$. A computation shows that $R$ simplifies if $|z|=|w|=1$ so that $$R(z, w) =\frac{(1-{\operatorname{Re}}z)(1- {\operatorname{Re}}w) + {\operatorname{Im}}z {\operatorname{Im}}w}{2\sqrt{ (1-{\operatorname{Re}}z)(1- {\operatorname{Re}}w) }}, \quad (|z| = |w|=1).$$ By changing coordinates $z=e^{i\theta}$ and $w=e^{i\mu}$, with $\theta, \mu \in [0, 2\pi],$ in the last expression we find $$\left( R(e^{i\theta}, e^{i\mu}) \right)^2=\cos^2 \left( \frac{\theta-\mu}{2}\right) \le 1.$$ Let $\delta>0$ be fixed and small. By the last expression and the continuity of $R$, there exists ${\epsilon}'(\delta)>0$ such that if $1-{\epsilon}' \le |z|,|w| \le 1$ then $R(z,w) \le 1+\delta/2$. (We think of ${\epsilon}'$ as small but macroscopic compared to ${\epsilon}$.) Hence, returning to the flows, by and the bound on $R$, if ${\epsilon}$ is sufficiently small compared to $\delta$, we have the estimate $$\begin{aligned}
\label{fine}
{\operatorname{Re}}\psi_{\mathbb{D}}(t) & = {\operatorname{Re}}\left( \frac{z_1(t)z_2(t)-1-(z_1(t)+z_2(t))+O({\epsilon})}{(1-z_1(t))(1-z_2(t))} \right) \nonumber \\
& \le (1+\delta) \frac{\sqrt{1+|z_1(t)|}}{|1-z_1(t)|} \cdot \frac{\sqrt{1+|z_2(t)|}}{|1-z_2(t)|}, \quad 0 \le t \le \tau,\end{aligned}$$ where $$\tau=\inf\{t \ge 0: \min\{|z_1(t)|, |z_2(t)| \} = 1-{\epsilon}'\}.$$ Also, note the easy bound $$\label{alw}
{\operatorname{Re}}\psi_{\mathbb{D}}(t) \le |\psi_{\mathbb{D}}(t)| \le 4 \frac{\sqrt{1+|z_1(t)|}}{|1-z_1(t)|}\cdot \frac{\sqrt{1+|z_2(t)|}}{|1-z_2(t)|}, \quad 0 \le t \le t_0.$$ We now split the integral $$\int_0^{t_0}{\operatorname{Re}}\psi_{\mathbb{D}}(s) \, ds =\int_0^{\tau}{\operatorname{Re}}\psi_{\mathbb{D}}(s) \, ds + \int_{\tau}^{t_0}{\operatorname{Re}}\psi_{\mathbb{D}}(s) \, ds.$$ We estimate the first integral using and the Cauchy-Schwarz inequality $$\int_0^{\tau}{\operatorname{Re}}\psi_{\mathbb{D}}(s) \, ds \le (1+\delta)\left( \int_0^{\tau}\frac{1+|z_1(s)|}{|1-z_1(s)|^2} \, ds \right)^{1/2} \left(\int_0^{\tau}\frac{1+|z_2(s)|}{|1-z_2(s)|^2} \, ds \right)^{1/2}.$$ Using and the fact that $|z_{j}(s)| \ge 0$ we see that $$\label{dec28.2}
\int_0^{\tau}{\operatorname{Re}}\psi_{\mathbb{D}}(s) \, ds \le (1+\delta)\left( \log\left( \frac{1}{1-|z_1|} \right) \right)^{1/2}\left( \log\left( \frac{1}{1-|z_2|} \right) \right)^{1/2}.$$ Thus, if, say, $|z_1| = 1-d \ge |z_2| \ge 1-{\epsilon}'$ we obtain for any $\delta'>\delta$ $$\begin{aligned}
|z_1(\tau)-z_2(\tau)| & \le {\epsilon}\left( \nu e^{\int_0^{\tau} {\operatorname{Re}}\psi_{\mathbb{D}}(s) \, ds} + \int_0^{\tau} e^{\int_s^{\tau} {\operatorname{Re}}\psi_{\mathbb{D}}(r) \, dr}|\xi_{\mathbb{D}}| \, ds \right) \\
& \le {\epsilon}d^{-(1+\delta')}\left(\nu+1\right),\end{aligned}$$ where we also used that $$|\xi_{{\mathbb{D}}}(t)|\le \frac{\sqrt{1+|z_1(t)|}}{|1-z_1(t)|}\cdot \frac{\sqrt{1+|z_2(t)|}}{|1-z_2(t)|}$$ and tacitly assumed that $d$ is sufficiently small so that the resulting logarithmic correction is dominated by $d^{\delta-\delta'}$. Consequently we see that if ${\epsilon}$ is sufficiently small so that we can choose $$d \ge \left( \frac{2{\epsilon}}{{\epsilon}'}(\nu+1)\right)^{1/(1+\delta')},$$ then $$\max\{ |z_1(\tau)|, |z_2(\tau)|\} \le 1-{\epsilon}' + {\epsilon}d^{-(1+\delta')}(\nu+1) \le 1-\frac{{\epsilon}'}{2}.$$ Hence, by , the Cauchy-Schwarz inequality, and , $$\int_\tau^{t_0} {\operatorname{Re}}\psi_{\mathbb{D}}(s) \, ds \le 4 \left|\log\left( \frac{2}{{\epsilon}'}\right) \right|.$$ Combining this with , the proof is complete.
We believe that the function $R(z,w)$ used in the last proof is bounded by $1$ on the whole bi-disk, and with some work one should be able to verify this. (However, this is not true for $|R(z,w)|$.) This would allow for taking $\rho=1$ in . This would not improve the resulting convergence rate, so we will not pursue this here.
Suppose now that for $j=1,2$, $f_j$ satisfies the derivative estimate with $\beta=\beta_j$ and $c=c_j$. (In the radial case we consider the radial version of and take $\beta_j=1$; indeed, it is a general fact about (normalized) conformal maps that always holds with $\beta=1$ for some constant universal constant $c<\infty$.) Set $$\label{q0}
\rho_0=\rho_0(\beta_1,\beta_2) = \left\{ \begin{array}{ll}
1 & \mbox{if $X=\mathbb{D}$};\\
\frac{1}{2}\sqrt{(1+\beta_1)(1+\beta_2)} & \mbox{if $X=\mathbb{H}$}.\end{array} \right.$$ Suppose $\rho > \rho_0$ and $p \in (0, 1/\rho)$. Let ${\epsilon}>0$ and define $$d_*={\epsilon}^p.$$ We have proved that for any $z$ and $w$ with $|z-w| \le {\epsilon}$ at distance at least $d_*$ from the boundary, if the driving terms satisfy $\sup |W_1(t) - W_2(t)| \le {\epsilon}$, then there are $c=c(\rho, p) < \infty$ and ${\epsilon}_0={\epsilon}_0(\rho)>0$ such that if ${\epsilon}< {\epsilon}_0$, then $$|f_1(t_0,z)-f_2(t_0,w)| \le c {\epsilon}^{1-\rho p}.$$ By estimating using Cauchy’s integral formula, we also get a bound relating the derivatives: Write $f_j(z)=f_j(z,t_0)$. Then with $d = {\operatorname{dist}}(z, \partial X)$, $$|f'_1(z)-f'_2(z)|= \frac{1}{2\pi} \left| \oint_{|\zeta-z|=r}\frac{f_1(\zeta)-f_2(\zeta)}{(z-\zeta)^2} d\zeta \right| \le c {\epsilon}d^{-\rho} r^{-1},$$ where $r \le d/2$. Taking $d=2r={\epsilon}^p$ this estimate combined with the reverse triangle inequality shows that there is a constant $c=c(\rho, p, T) <\infty$ (recall that $t_0 \le T$) such that $$\sup_{z: {\operatorname{dist}}(z, \partial X) \ge {\epsilon}^p}\left| |f'_1(z)|-|f'_2(z)| \right| \le c \, {\epsilon}^{1-(1+\rho)p}.$$ We have proved the radial part of the following result. (The chordal case is joint work with Rohde and Wong; see [@JVRW] for its complete proof.)
\[rough\] Let $X \in \{\mathbb{D}, \mathbb{H} \}$ and $T > 0$. Let $(f_j, W_j), j=1,2,$ be X-Loewner pairs so that $f_j$ solve with $W_j$ as driving terms and assume that $f_j$ satisfiy with $\beta=\beta_j$ and $c=c_j < \infty$. Suppose $\rho > \rho_0$, where $\rho_0$ is defined by . Assume that for ${\epsilon}>0$ $$\sup_{t \in [0,T]}|W_1(t)-W_2(t)| \le {\epsilon}, \quad |z-w| \le {\epsilon}$$ and for $p \in(0,1/\rho)$ define $$d_*={\epsilon}^p.$$ There exist $c=c(T, \rho, p, c_1, c_2)<\infty$ and ${\epsilon}_0={\epsilon}_0(\rho, p)>0$ such that if $$\min\{{\operatorname{dist}}(z, \partial X), {\operatorname{dist}}(w, \partial X)\} \ge d_*$$ and ${\epsilon}< {\epsilon}_0$, then $$\sup_{t \in [0,T]}|f_1(t,z) - f_2(t,w)| + \sup_{t \in [0,T]}\mid d_*|f'_1(t,z)| - d_*|f'_2(t,z)| \mid \, \le c {\epsilon}^{1-\rho p}.$$
One way to interpret the last proposition is that information about the derivative of one of the conformal mappings transfers to the other via the Loewner equation if they are evaluated sufficiently far away from the boundary. The proper scale (or resolution) is determined by the distance between the driving terms. Note that we make no assumptions about the regularity of the driving terms; the above results are consequences of the structure of the Loewner equation alone.
Supremum Distance Between Loewner Curves {#dist-sect}
----------------------------------------
We will now consider two Loewner curves, $\gamma_j: [0,T] \to X, \, j=1,2$, generating the $X$-Loewner pairs $(f_j,W_j)$ and suppose that $$\label{10313}
\sup_{t \in [0,T]} |W_1(t)-W_2(t)| \le {\epsilon}.$$ We are interested in estimating the supremum distance $\sup_{t \in [0,T]}|\gamma_1(t)-\gamma_2(t)|$ when the curves are parameterizes by capacity, in terms ${\epsilon}$. We have the following estimate.
\[1031\] Let $X \in \{\mathbb{D}, \mathbb{H}\}$. For $j=1,2$, let $(f_j, W_j)$ be $X$-Loewner pairs generated by the curves $\gamma_j$ and suppose that $f_j$ satisfy with $\beta=\beta_j$ and $c=c_j$. Suppose that $\rho > \rho_0$, where $\rho_0$ is given by . Suppose that ${\epsilon}>0$ is such that $$\sup_{t \in [0,T]} |W_1(t) -W_2(t)| \le {\epsilon}.$$ Let $p \in (1, 1/\rho)$ and set $d = {\epsilon}^p$. There exist $c=c(T, \rho,p) < \infty$ and ${\epsilon}_0={\epsilon}_0(\rho,p) > 0$ such that if ${\epsilon}<{\epsilon}_0$, then $$\begin{gathered}
\label{10312}
\sup_{t \in [0,T]} |\gamma_1(t) - \gamma_2(t)| \\ \le c{\epsilon}^{1-\rho p} + c \sup_{t \in [0,T]} (|\gamma_1(t)-f_1(t, (1-d)W_1(t))| \\ +|\gamma_2(t)-f_2(t, (1-d)W_2(t))|),\end{gathered}$$ with $f_j(t, (1-d)W_j(t))$ replaced by $f_j(t, W_j(t) + id)$ in the chordal case.
\[dec1.1\]
We will do the radial case. Write $$\begin{aligned}
|\gamma_1(t)-\gamma_2(t)| \le & \,\, |\gamma_1(t)-f_1(t,(1-d)W_1(t))| \\
& + |f_1(t,(1-d)W_1(t))-f_1(t,(1-d)W_2(t))| \\
& + |f_1(t,(1-d)W_2(t)) - f_2(t,(1-d)W_2(t))| \\
& + |f_2(t,(1-d)W_2(t))-\gamma_2(t)|.\end{aligned}$$ Denote by $b_1, \ldots, b_4$ the four terms on the right-hand side in the last inequality in the order in which they appear. By the distortion theorem, since $d \ge {\epsilon}$ we have that $$b_2 \le c {\operatorname{dist}}(f_1(t,(1-d)W_1(t)), \partial f(t, \mathbb{D})) \le c b_1.$$ Finally, by Proposition \[rough\], $b_1 \le c{\epsilon}^{1-\rho p}$.
\[lip\] For $j=1,2$, let $(f_j, W_j)$ be $\mathbb{H}$-Loewner pairs generated by the curves $\gamma_j$ and assume that holds. Suppose that there exist $d_0>0$, $c < \infty$, and $\beta<1$ such that $f_j$ satisfy the estimate . Then for every $$r < 2\frac{1-\beta}{3-\beta},$$ there exist $c=c(r,T) < \infty$ and ${\epsilon}_0={\epsilon}_0(r,T)>0$ such that if ${\epsilon}<{\epsilon}_0$, then $$\sup_{t \in [0,T]}|\gamma_1(t) - \gamma_2(t)| \le c\, {\epsilon}^{r}.$$
Under our assumptions $\rho_0=(1+\beta)/2$. Let $\rho > \rho_0$ and $0 < p < 1/\rho$. We set $d = {\epsilon}^{p}$, apply Propositon \[1031\], and integrate the bound on the derivatives to see that for ${\epsilon}>0$ sufficiently small, $$\sup_{t \in [0,T]}|\gamma_1(t)-\gamma_2(t)| \le c \left( {\epsilon}^{1-\rho p} + {\epsilon}^{p(1-\beta)} \right).$$ We optimize over exponents to find the stated bound for $r$.
The proof of the next corollary is an analog for Loewner curves of the well-known fact that the Riemann map onto a Hölder domain satisfies a power-law bound on the growth of the derivative.
\[holder2\] For $j=1,2$, let $(f_j, W_j)$ be $\mathbb{H}$-Loewner pairs generated by the curves $\gamma_j$ and assume that holds. Suppose that both curves are Hölder-$\alpha$ continuous in the capacity parameterization, where $\alpha > 0$. Then for every $$r < \frac{2\alpha}{1+\alpha},$$ there exist $c=c(r,T) < \infty$ and ${\epsilon}_0={\epsilon}_0(r,T)>0$ such that if ${\epsilon}<{\epsilon}_0$, then $$\sup_{t \in [0,T]}|\gamma_1(t) - \gamma_2(t)| \le c\, {\epsilon}^{r}.$$
We will prove a bound on the growth of the derivative and then apply the previous corollary. It is enough to consider $f(t,z):=f_1(t,z)$ since we made the same assumptions on both Loewner chains. Write $\gamma=\gamma_1$ and $W=W_1$ and for $t,t+s \in [0,T]$, let $$\tilde{\gamma} = f^{-1}(t, \gamma[t,t+s]).$$ Then $\tilde\gamma$ is a curve in ${\mathbb{H}}$ “rooted” at $W(t)$. Set $d={\operatorname{diam}}\tilde{\gamma}$. Let $z \in \tilde\gamma$ be a point such that $|z - W(t)|=d/2$ and let $\Gamma$ be the hyperbolic geodesic in ${\mathbb{H}}$ connecting $W(t)$ with $z$. Then $\Gamma$ contains a point $w$ with ${\operatorname{Im}}w \ge d/4$. Note that by the distortion theorem, $|f'(t,w)| \asymp |f'(t,W(t)+id)|$ so that Koebe’s 1/4 theorem implies that there is a universal constant $c>0$ such that $${\mathcal{B}}\left(f(t,w), cd|f'(t, W(t)+id)|\right) \subset f\left(t, {\mathcal{B}}(w, d/8)\right).$$ Consequently, $$\label{hol1}
{\operatorname{diam}}f(t, \Gamma) \ge c \, d|f'(t, W(t)+id)|.$$ By the Gehring-Heyman theorem, see Chapter 4 of [@Pom92], and the assumption on $\gamma$, we have that there are constants $c, c' < \infty$, depending only on the constant in the modulus of continuity for $\gamma$, such that $${\operatorname{diam}}f(t, \Gamma) \le c \, {\operatorname{diam}}\gamma[t,t+s] \le c' s^\alpha.$$ Hence, using , there is a constant $c < \infty$ such that $$d|f'(t,W(t) + id)| \le c \, s^{\alpha} \le c' \, d^{2\alpha},$$ where the last inequality follows since ${\operatorname{hcap}}\tilde \gamma = 2s$ so that there is a universal constant $c<\infty$ such that $s \le c d^2$. The diameter $d$ depended on $s$, but every $d$ sufficiently small can be written like this since $s \mapsto d$ is an increasing continuous function.
If $\gamma(t)$ is Hölder-$\alpha$ continuous in the capacity parameterization, then its driving term is at least Hölder-$\alpha/2$: Using the notion of the proof of Corollary \[holder2\], we note that by the Beurling estimate, ${\operatorname{diam}}\tilde \gamma \le c\, s^{\alpha/2}$ and by Lemma 2.1 of [@LSW], we have $|W(t+s) - W(t)| \le c {\operatorname{diam}}\tilde \gamma \le c'\, s^{\alpha/2}$.
Geometric Conditions {#geom}
====================
This section develops a geometric condition that we will use in place of a bound on the growth of the derivative of the conformal map in order to measure the regularity of a Loewner curve locally at the tip. As pointed out in the introduction, several similar conditions have appeared in the literature. We will work in the radial setting, but the results hold also in the chordal setting with minor modifications in their statements and proofs.
Let $D \ni 0$ be a simply connected domain. Let $\psi: D \to \mathbb{D}$ be the uniformizing conformal map. We consider a radial Loewner curve $\gamma: [0, T] \to D$. That is, the conformal image of $\gamma$ in $\mathbb{D}$ using the conformal map $\psi$ is a ${\mathbb{D}}$-Loewner curve. In this section we write $D_t$ for the connected component of $D \setminus \gamma[0,t]$ containing the origin. For $s,t \in [0,T]$ with $s \le t$ we let $\gamma_{s,t}$ denote the curve determined by $\gamma(r), r \in [s,t]$. For a crosscut ${\mathcal{C}}$ of $D_t$ we write $J_{{\mathcal{C}}}$ for the component of $D_t \setminus {\mathcal{C}}$ of smaller diameter.
Tip Structure Modulus
---------------------
For each $0 \le t \le T$ and $\delta> 0$, let $S_{t,\delta}$ be the collection of crosscuts of $D_t$ of diameter at most $\delta$ that separate $\gamma(t)$ from $0$ in $D_t$. For a crosscut $\mathcal{C} \in S_{t,\delta}$, define $$s_{\mathcal{C}}=\inf\{s > 0: \gamma[t-s,t] \cap \mathcal{C} \neq \emptyset\}, \quad \gamma_{\mathcal{C}} = (\gamma(r), \, r \in [t-s_{\mathcal{C}},t]).$$ (We set $s_{{\mathcal{C}}} = t$ if $\gamma$ never intersects ${\mathcal{C}}$.) We then define the **tip structure modulus** of $(\gamma(t), \, t \in [0, T])$ in $D$, $\eta_{{\operatorname{tip}}}(\delta)$, by $$\label{LSM}
\eta_{{\operatorname{tip}}}(\delta)=\sup_{t \in [0, T]} \sup_{\mathcal{C} \in S_{t, \delta}} {\operatorname{diam}}\gamma_{\mathcal{C}}.$$
In the chordal setting we consider instead crosscuts separating $\gamma(t)$ from $\infty$ in $H_t$ in the definition of the structure modulus. The remaining construction is the same.
It is useful to introduce some more terminology. We will say that the curve $\gamma$ has a $(\delta, \eta)$-**bottleneck** in $D$ if there exists $t \in [0,T]$ and $\zeta \in \partial D_t$ such that $\gamma(t)$ and $\zeta$ can be connected by a crosscut $\mathcal{C}_t$ of $D_t$ and ${\operatorname{diam}}J_{{\mathcal{C}}_t} \ge \eta$ while ${\operatorname{diam}}\mathcal{C}_t \le \delta$. This definition is similar to the one for “quasi-loops” given by Schramm in [@Schramm_IJM]. (But our definition is analogous to the John condition rather than Ahlfors’ three-point condition.) We say that the bottleneck is at $z_0$ if the points $\zeta$ and $\gamma(t)$ in the previous definition are contained in the disk ${\mathcal{B}}(z_0, \eta/4)$.
Similarly, we will say that the curve $\gamma$ has a **nested** $(\delta, \eta)$-**bottleneck** in $D$ if there exist $t \in [0,T]$ and $\mathcal{C} \in S_{t,\delta}$ with $${\operatorname{diam}}\gamma_{\mathcal{C}} \ge \eta.$$ That $\gamma(t), \, t \in [0,T]$ has no nested $(\delta, \eta)$-bottleneck in $D$ is clearly equivalent to having the inequality $\eta_{{\operatorname{tip}}}(\delta) \le \eta$ for the same curve.
The definition of nested bottleneck is independent of the particular chosen parameterization of the curve in the sense that any increasing reparameterization would do in the definition. The definition is not, however, symmetric with respect to reversibility of the curve.
The term “structure modulus” is borrowed from Warschawski [@W] who used it in the following sense: the “structure modulus of the boundary of $D$” is defined by the function $$\eta_W(\delta)=\sup_{{\mathcal{C}}} {\operatorname{diam}}J_\mathcal{C},$$ where the supremum is over all crosscuts (of $D$) of diameter at most $\delta$. Intuitively, the decay rate of $\eta_W$ places a restriction on bottlenecks/outward-pointing cusps in the boundary and this gives estimates on the regularity of the Riemann mapping from $\mathbb{D}$. For example, $D$ is a John domain if and only if $\eta_W(\delta)\le A \delta$ for some constant $A <\infty$. One can use this to show (see [@W]) that if $h<2/(A^2 \pi^2)$, then the Riemann map from $\mathbb{D}$ is Hölder-$h$ on the closed unit disk. The tip structure modulus is the natural analogue to $\eta_W$ for Loewner curves. For example, we will see that if tip structure modulus decays linearly then the Loewner curve is Hölder continuous in the capacity parameterization; see Theorem \[geom-holder\] below. Moreover, and importantly, the tip structure modulus is related to annuli crossing events (see Figure \[fig1\]), the probabilities of which are often known how to control for discrete-model curves; the connection between annuli crossings and regularity of curves is well-known; see, e.g., [@AB].
Distance to the Tip
-------------------
Let $(f,W)$ be a $\mathbb{D}$-Loewner pair and assume it is generated by a curve $\gamma$. We use the notation $$\Delta_{t}(d) = {\operatorname{dist}}(f_t((1-d)W_t), D_t),$$ where $W_t=e^{i\xi_t}$ is the driving term for $f$. Note that Koebe’s distortion theorem implies that $$\Delta_{t}(d) \asymp d|f'_t((1-d)W_t)|.$$ Recall also that for each $t$, the tip of the curve is given by taking the radial limit $$\gamma(t)=\lim_{d \to 0+}f_t((1-d)W_t).$$ We saw in Section \[dist-sect\] that we need to obtain uniform (in $t$) bounds on $$|\gamma(t) - f_t((1-d)W_t)|.$$ A lower bound on this quantity is clearly given by $\Delta_t(d)$ and if we have a bound for $\eta_{{\operatorname{tip}}}(\delta)$ in terms of $\delta$, then we can also give an estimate from above in terms of $\Delta_t(d)$. Essentially, the bound depends only on $\eta_{{\operatorname{tip}}}$. We need the following lemma.
\[1027\] Let $T <\infty$ be given. There exist constants $0< \rho_0, c_1< \infty$ with $\rho_0$ universal and $c_1=c_1(T)$ such that the following holds. Let $\gamma$ be a curve in ${\mathbb{D}}$ generated by the Loewner pair $(f, W)$. If $\Delta_t(d) < c_1$ then for each $t \in [0,T]$ there is a crosscut $\mathcal{C}={\mathcal{C}}_t$ of $D_t$ that separates $f_t((1-d)W_t)$ and $\gamma(t)$ from $0$ in $D_t$ while $${\operatorname{diam}}{\mathcal{C}}\le \rho_0 \, \Delta_t(d).$$
Let $t \in [0,T]$ and set $$z_d=f_t((1-d)W_t).$$ We will write $$\Delta=\Delta_{t}(d)={\operatorname{dist}}(z_d, \partial D_t).$$ For $\rho > 1$, consider $(\partial {\mathcal{B}}(z_d, \rho \, \Delta)) \cap D_t$. The components of this set form crosscuts of $D_t$ and we let $C_0$ be the subset of those crosscuts that separate $z_d$ from $0$ in $D_t$. (Since the inner radius of $D_t$ from $0$ is bounded below by $e^{-T}/4$, $C_0$ is non-empty whenever $\rho \Delta$ is smaller than, say, $e^{-T}/16$.) Let ${\mathcal{C}}_{\rho}$ be the unique crosscut in $C_0$ with the property that it separates every other member in $C_0$ from $0$ in $D_t$. Let $\mathcal{O}_{\rho}$ be the component of $D_t \setminus {\mathcal{C}}_{\rho}$ that contains $z_d$ and let $\mathcal{E}_{\rho}$ be the part of $\partial \mathcal{O}_{\rho}$ that is not contained in ${\mathcal{C}}_{\rho}$. By Beurling’s projection theorem and the maximum principle there exists a universal $\rho_0 <\infty$ such that for each $\rho > \rho_0$ there is constant $c_0=c_0(\rho, T)$ such that for all $\Delta< c_0$ $$\label{oct25.1}
{\omega}(z_d, \mathcal{E}_{\rho}, \mathcal{O}_{\rho}) > 1/2.$$ Let $\mathcal{O}:=\mathcal{O}_{2\rho_0}$, ${\mathcal{C}}:={\mathcal{C}}_{2\rho_0}$, and $\mathcal{E}:=\mathcal{E}_{2\rho_0}$. It follows from Beurling’s projection theorem that there is a constant $c_1 < \infty$ depending only on $T$ such that if $\Delta < c_1$, then the diameter of the pre-image of ${\mathcal{C}}$ in ${\mathbb{D}}$ is at most $1/2$ and holds with $\rho$ replaced by $2\rho_0$. We shall assume that $\Delta < c_1$ in the sequel. We claim that the pre-image of $\mathcal{E}$ in $\partial{\mathbb{D}}$ is an arc containing the point $W_t$. Indeed, if $g_t=f_t^{-1}$ then $g_t(\mathcal{C})$ is a crosscut of $\mathbb{D}$ separating $g_t(\mathcal{E})$ and $(1-d)W_t$ from $0$. By conformal invariance, the harmonic measure of $g_t(\mathcal{E})$ from $(1-d)W_t$ is strictly bigger than $1/2$. Therefore, if $W_t=e^{i\xi_t} \notin g_t(\mathcal{E})$, then the arc $g_t(\mathcal{E})$ must contain a point $e^{i\theta}$ with $\theta \in [\xi_t+\pi,\xi_t+2\pi)$. Since $g_t(\mathcal{C})$ separates $(1-d)W_t$ and $e^{i\theta}$ from $0$, this would imply that ${\operatorname{diam}}g_t(\mathcal{C}) > 1/2$ and this is a contradication. We conclude that $W_t \in g_t(\mathcal{E})$ and consequently $\gamma(t)$ is on the boundary of $\mathcal{O}$ and so ${\mathcal{C}}$ separates $z_d$ and $\gamma(t)$ from $0$ in $D_t$.
\[nov4.1\] Let $T <\infty$ be given. There exist constants $0< c_1,c_2 < \infty$ depending only on $T$ such that the following holds. Let $\gamma$ be a curve in ${\mathbb{D}}$ generating the Loewner pair $(f, W)$. Suppose there exists a non-decreasing function $\eta(\delta)$ such that for each $\delta>0$, the tip structure modulus for $(\gamma(t), t \in [0,T])$ in $\mathbb{D}$ satisfies $\eta_{{\operatorname{tip}}}(\delta) \le \eta(\delta)$. Then if $\Delta_t(d) < c_1$ for all $t \in [0,T]$, $$|\gamma(t) - f_t((1-d)W_t)| \le \eta\left(c_2 \, \Delta_{t}(d)\right).$$
We use the notation from the proof of Lemma \[1027\]. Set $$\delta_0=4 \rho_0 \Delta.$$ Then by Lemma \[1027\] there is a crosscut ${\mathcal{C}}$ separating $z_d$ and $\gamma(t)$ from $0$ in $D_t$ while ${\operatorname{diam}}{\mathcal{C}}\le \delta_0$. If $\gamma(t) \in {\mathcal{B}}(z_d, \eta(\delta_0))$ we are done. If not, there exists a subarc of $\partial {\mathcal{B}}(z_d, \eta(\delta_0)) \cap \mathcal{O}$ that separates $\gamma(t)$ from $z_d$ in $\mathcal{O}$. Let $\gamma_{\mathcal{C}} \subset \overline{\mathcal{O}}$ be the curve determined by tracing $\gamma$ backwards from $\gamma(t)$ until $\mathcal{C}$ is first hit. Then ${\mathcal{C}}$ contains a crosscut of $D_t$ separating $\gamma_{{\mathcal{C}}}$ from $0$ in $D_t$. Moreover, ${\operatorname{diam}}\gamma_{{\mathcal{C}}} \ge \eta(\delta_0)$ by assumption and since ${\operatorname{diam}}{\mathcal{C}}\le \delta_0$ this contradicts the assumption on $\eta_{{\operatorname{tip}}}$.
One can also estimate the distance to the tip directly in terms of $d$, the distance to the boundary in ${\mathbb{D}}$.
\[wolff\] Let $\gamma$ be a curve in ${\mathbb{D}}$ generating the Loewner pair $(f, W)$. Suppose there exists a non-decreasing function $\eta(\delta)$ such that for each $\delta>0$, the tip structure modulus for $(\gamma(s), s \in [0,t])$ in $\mathbb{D}$ satisfies $\eta_{{\operatorname{tip}}}(\delta) \le \eta(\delta)$. Then if $d <1/2$ $$|\gamma(t) - f_t((1-d)W_t)| \le \eta\left((2\pi A/(\log 1/d))^{1/2}\right),$$ where $A$ may be chosen as $\min\{\pi ({\operatorname{diam}}\gamma_{0,T})^2,\pi\}$.
The needed estimate is a classical result due to J. Wolff. We will give a short proof using extremal length. Consider $\mathcal{A}=\mathcal{A}(r, R) \cap \mathbb{D}$ centered around $W_t$, the pre-image of $\gamma(t)$ in $\partial{\mathbb{D}}$. Let $E$ and $F$ be the two boundary components of $\mathcal{A}$ which are contained in $\partial{\mathbb{D}}$. By comparing with a half-annulus and mapping to a rectangle, using also the comparison principle for extremal length, we see that the extremal distance between $E$ and $F$ in $\mathcal{A}$ is at most $\pi/\log(R/r)$. Hence, by conformal invariance and the definition of extremal length, $$\frac{\pi}{\log (R/r)} \ge \frac{L^2}{A},$$ where $L$ is the euclidean length of the curve-family connecting $f(E)$ with $f(F)$ in $f(\mathcal{A})$ and $A$ is the euclidean area of $f(\mathcal{A})$. The number $A$ is clearly bounded above by the minimum of $\pi({\operatorname{diam}}\gamma_{0,T})^2$ and $\pi$. Consequently, by taking $r=d$ and $R=\sqrt{d}$ we see that there exists a crosscut ${\mathcal{C}}'$ of $D_t$ separating $\gamma(t)$ and $z_d=f_t((1-d)W_t)$ from $0$ and the diameter of ${\mathcal{C}}'$ is at most $\left(2\pi A/(\log 1/d)\right)^{1/2}$. We can now argue exactly as in the end of the proof of Proposition \[nov4.1\] with ${\mathcal{C}}$ replaced by ${\mathcal{C}}'$.
We end the section with a lemma that combines some of the previous work in this section and that of Section \[prel\]. It is tailored for the situation where a discrete model Loewner curve approaches an SLE curve in the scaling limit. We will use it in the proof of Theorem \[lerw-thm\] in Section \[lerw-sect\].
\[dec3.2\] For $j=1,2,$ let $(f_j, W_j)$ be $\mathbb{D}$-Loewner pairs generated by the curves $\gamma_j$. Fix $T < \infty$ and $\rho >1$. Assume that there exist $\beta < 1$, $r \in (0,1)$, $p \in (0, \frac{1}{\rho})$, and ${\epsilon}> 0$ such that the following holds with $$d_* = {\epsilon}^p.$$
(i) [The driving terms satisfy $$\sup_{t \in [0,T]}|W_1(t)-W_2(t)| \le {\epsilon};$$]{}
(ii) [ There exists a constant $c < \infty$ such that the tip structure modulus for $(\gamma_1(t), t \in [0, T])$ in $\mathbb{D}$ satisfies $$\eta_{{\operatorname{tip}}}(d_*) \le c \, d_*^r;$$]{}
(iii) [ There exists a constant $c' < \infty$ such that the derivative estimate $$\sup_{t \in [0,T]}d|f_2'(t,(1-d)W_2(t))| \le c' \, d^{1-\beta}, \quad \forall d \le d_*$$ holds.]{}
Then there is a constant $c''=c''(T, \beta, r, p, c, c') < \infty$ such that $$\sup_{t \in [0,T]}|\gamma_1(t)-\gamma_2(t)| \le c'' \, \max\{{\epsilon}^{p(1-\beta)r}, {\epsilon}^{(1-\rho p)r}\}$$ The analogous statement holds for ${\mathbb{H}}$-Loewner pairs.
The proof is immediate from the assumptions using Proposition \[1031\] combined with Proposition \[nov4.1\].
Hölder Regularity
-----------------
We shall now see that the John-type condition $\eta_{{\operatorname{tip}}}(\delta) \le A \delta$ forces a curve driven by a Hölder continuous function to be Hölder continuous in the capacity parameterization, with exponent depending only on $A$ and the exponent for the driving term. We will derive a bound on the growth of the derivative as in from the bound on $\eta_{{\operatorname{tip}}}$. Hölder regularity then follows from Proposition \[der\]. The proof uses the length-area principle. The situation is different from the classical one; see, e.g., [@W] or [@Pom92], in that our assumptions do not prevent large bottlenecks to form.
\[geom-holder\] Suppose that the radial Loewner pair $(f,e^{i\xi})$ is generated by a curve $\gamma$. Assume that $\xi$ is Hölder continuous and that there exist $A<\infty$ and $\delta_0>0$ such that the tip structure modulus for $(\gamma(t), \, t \in [0, T])$ in $\mathbb{D}$ satisfies $\eta_{{\operatorname{tip}}}(\delta) \le A\delta$, $\delta < \delta_0$. Then $\gamma$ is Hölder continuous on $[0,T]$ with a Hölder exponent depending only on $A$ and the Hölder exponent for $\xi$.
A bound on the tip structure modulus alone cannot imply Hölder regularity of the path in the capacity parametrization; it is necessary to have some regularity of the driving term. Indeed, consider the chordal setting and take $\gamma$ to be the graph of $e^{-1/x}, \, x \in [0,1]$. For this curve the tip structure modulus clearly decays linearly, uniformly in $t$. On the other hand, parameterize by half-plane capacity and note that there is a universal constant $c$ such that $$2 t ={\operatorname{hcap}}\gamma[0,t] \le c \, {\operatorname{height}}\gamma[0,t] \cdot {\operatorname{diam}}\gamma[0,t].$$ (This follows, e.g., from a harmonic measure estimate.) Hence $$t/2 \le c e^{-1/\gamma(t)}\gamma(t),$$ which shows that $\gamma$ is not Hölder continuous at $t=0$. (By precomposing with slit map $\sqrt{z^2-4T}$ a similar example can be constructed with the “singularity” occurring at an arbitrary $T>0$.) Moreover, if $W$ is the driving term for $\gamma$, then $${\operatorname{diam}}\gamma[0,t] \asymp \sqrt{t} + \sup_{s \in [0,t]}|W(s)|,$$ so $W$ is also not Hölder continuous. (In fact, a similar argument shows that if the driving term is Hölder-$\alpha$, $\alpha \le 1/2$, at $t=0$, then so is the curve.)
It is possible to take this example as a starting point to formulate a geometric condition that implies Hölder continuity for the driving term. We shall not, however, pursue this further here.
Before giving the proof of Theorem \[geom-holder\] we need a simple lemma.
\[stolz\] Let $f:\mathbb{D} \to D$ be a conformal map with $f(0)=0, f'(0) > 0$. Define the Stolz cone $$S_r=\{1-\rho e^{i\theta}: 0\le \rho \le r, \, -\pi/4 \le \theta \le \pi/4 \},$$ set $z_r = f(1-r)$. There is a universal constant $c<\infty$ such that $${\operatorname{diam}}f(S_r) \le c {\operatorname{diam}}f(\sigma_r),$$ where $\sigma_r=[1-r,1)$ is the line segment connecting $1-r$ and $1$.
Let $u=1-\rho e^{i\theta}$ be an arbitrary point in $S_r$. By Koebe’s distortion theorem there is a universal constant $c$ such that $$|f(u) - f(1-\rho)| \le c \rho |f'(1-\rho)|.$$ Hence by Koebe’s estimate there is a universal constant $c'$ such that $$\begin{aligned}
|f(u) - f(1-\rho)| & \le c' {\operatorname{dist}}(f(1-\rho), \partial D) \\
& \le c' {\operatorname{diam}}f(\sigma_r),\end{aligned}$$ and this concludes the proof.
Let $t \in [0,T]$ and write $W_t=e^{i\xi_t}$. Without loss of generality we may assume that $t>0$ and that $W_t=1$. We suppress the dependence on $t$ and write $f$ for $f_t$ and $D$ for $D_t$ etc. throughout the proof. Set $z_r=f(1-r)$ and $\Delta_r = {\operatorname{dist}}(z_r, \partial D)$. By Proposition \[wolff\] there is an $r_0$ depending only on $A$ and $\delta_0$ such that $\Delta_r \le \delta_0$ for all $r \le r_0$. By taking $r_0$ smaller if necessary, depending only on $T$, we can guarantee that the assumptions of Lemma \[1027\] are satisfied so that there will exist a universal $\rho_0<\infty$ and a crosscut ${\mathcal{C}}$ contained in $\partial {\mathcal{B}}(z_r, \rho_0 \Delta_r)$ that separates $z_r$ and $\gamma(t)$ from $0$ in $D$. Let $\sigma_r = [1-r,1]$. We claim that the hyperbolic geodesic $f(\sigma_r)$ connecting $z_r$ with $\gamma(t)$ in $D$ satisfies $$\label{1028}
{\operatorname{diam}}f(\sigma_r) \le c \rho_0 A \, \Delta_r,$$ where $c$ is a universal constant. To prove this, note that since ${\mathcal{C}}$ separates $\gamma(t)$ and $z_r$ from $0$, the hyperbolic geodesic $f(\sigma_1) \supset f(\sigma_r)$ which connects $\gamma(t)$ and $0$ must intersect ${\mathcal{C}}$. (Since $\gamma$ is a Loewner curve, $\gamma(t)$ is always on the boundary of the simply connected domain $D_t \ni 0$.) Moreover, by the bound on the structure modulus, there is a curve $\Gamma$ connecting $\gamma(t)$ with ${\mathcal{C}}$ in $D_t$ and $${\operatorname{diam}}\Gamma \le 2 A {\operatorname{diam}}{\mathcal{C}}\le 4 \rho_0 A \Delta_r.$$ The Gehring-Hayman theorem; see, e.g., Chapter 4 of [@Pom92], now implies that there is a universal constant $c$ such that $${\operatorname{diam}}f(\sigma_r) \le {\operatorname{diam}}f(\sigma_1) \le c ({\operatorname{diam}}\Gamma + {\operatorname{diam}}{\mathcal{C}})$$ and this gives .
Using Lemma \[stolz\], the reminder of the proof now proceeds by a length-area type argument in a form used in Chapter 5 of [@Pom92]. Define $${\varphi}(r) = \int_0^r |f'(1-r)|^2 \, r \, dr.$$ Then by Koebe’s distortion theorem there is a universal constant $c_0$ such that $$\label{lb}
r^2|f'(1-r)|^2 \le c_0 \int_{r/2}^r r |f'(1-r)|^2 dr \le c_0 \phi(r).$$ This theorem also implies that there is a constant $c_1$ depending only on $c_0$ such that $${\varphi}(r) \le c_1 \int_0^r \int_{-\pi/4}^{\pi/4} |f'(1-re^{i\theta})|^2 \, r \, dr d\theta = c_1 {\operatorname{area}}f(S_r),$$ where $S_r$ is the Stolz cone defined in the statement of Lemma \[stolz\]. Now, by and Lemma \[stolz\] we have that $${\operatorname{area}}f(S_r) \le \frac{\pi^2}{4} ({\operatorname{diam}}f(S_r))^2 \le c_2 \Delta_r^2.$$ Hence $${\varphi}(r) \le c_1 {\operatorname{area}}f(S_r) \le c_3 r^2|f'(1-r)|^2.$$ Consequently, since ${\varphi}'(r)=r |f'(1-r)|^2$, we have for $r_0 > r$ and a constant $c_4$ depending only on $A$ $$\log \left( \frac{{\varphi}(r_0)}{{\varphi}(r)} \right) = \int_r^{r_0} \frac{{\varphi}'(r)}{{\varphi}(r)} dr \ge c_4^{-1} \log \left(\frac{r_0}{r} \right).$$ Taking exponentials, using , gives for $0 < r \le r_0$ $$r^2|f'(1-r)|^2 \le c_5 r^{1/c_4},$$ where $c_5$ depends only on $r_0$. Hence if $\beta=1-1/(2c_4) < 1$ we see that $$r|f'(1-r)| \le c_6 r^{1-\beta},$$ and by Proposition \[der\] this implies Hölder regularity with every exponent smaller than the minimum of $1/2$ and $(1-\beta)h$, where $h$ is the exponent for $W$.
Loop-Erased Random Walk and SLE$_2$ {#lerw-sect}
===================================
This section proves a convergence rate result for loop-erased random walk using the setup detailed in the previous sections.
Definitions
-----------
The radial [**Schramm-Loewner evolution**]{}, radial SLE$_\kappa$, is defined by taking $W(t) = e^{i\sqrt{\kappa} B(t)}$ as driving term for the radial Loewner equation, where $B$ is standard Brownian motion. It is a fact that this Loewner chain is almost surely generated by a curve – the SLE$_\kappa$ path. This is a random fractal curve which is simple when $0 \le \kappa \le 4$, has double points when $4 < \kappa$ and is space filling when $\kappa \ge 8$. See [@RS] for proofs of these facts. In Appendix \[sle-sect\] we discuss a derivative estimate for radial SLE$_\kappa$ that we will state and use in this section when $\kappa=2$. For technical reasons we use a stopping time $\sigma$ for the radial SLE path $\tilde{\gamma}$ further discussed in Appendix \[sle-sect\]. Fix a small constant ${\epsilon}>0$. We then define $$\label{sigma1}
\sigma=\sigma({\epsilon}, T)=\inf\{t \ge 0: |g_t(-1)-W(t)| \le {\epsilon}\} \wedge T,$$ where $g_t=f_t^{-1}$ is the forward Loewner SLE$_2$ flow and $W(t)$ is the driving term for $g_t$.
\[may61\] Let ${\epsilon}>0$ and $T < \infty$ be fixed and let $(f_s), \, 0 \le s \le \sigma,$ be the stopped radial SLE$_2$ Loewner chain with $\sigma=\sigma({\epsilon},T)$ defined by . For every $\beta \in (2(\sqrt{10}-1)/9 ,1)$ there exists a constant $c=c(\beta,{\epsilon},T)< \infty$ such for all $d_* < 1$ $$\mathbb{P} \left\{\forall \, d \le d_*, \, \sup_{s \in[0, \sigma]}d|f'_s((1-d)W(s))| \le d^{1-\beta}\right\} \ge 1-cd_*^{q(\beta)}.$$
where $$q(\beta)=-1+2\beta+\frac{\beta^2}{4(1+\beta)}.$$
See Appendix \[sle-sect\].
Let $D \ni 0$ be a simply connected domain and assume that the inner radius of $D$ with respect to $0$ equals $1$. We shall consider a particular discretization of $D$. A [**grid-domain**]{} with respect to $ n^{-1} {\mathbb{Z}}^2$ is a simply connected domain whose boundary is a subset of the edge set of the graph $ n^{-1} {\mathbb{Z}}^2$. We define $D_n=D_n(D)$, the $ n^{-1} {\mathbb{Z}}^2$ grid-domain approximation of $D$, as the component of $0$ of $\mathbb{C}$ minus those closed $n^{-1} {\mathbb{Z}}^2$ lattice faces that intersect $\partial D$. Then clearly $D_n$ is a grid-domain contained in $D$. Let $\psi_n : D_n \to {\mathbb{D}}$ be the normalized conformal map. We will assume, for simplicity, that $D$ is a Jordan domain with $C^{1+\alpha}$ boundary, where $\alpha>0$.
Suppose $S=S(j), \, j=0,1,\dots,$ is a finite nearest-neighbor walk on (the vertices of $n^{-1}\mathbb{Z}^2$ contained in) $D_n$. We define the loop-erasure $\mathcal{L}\{S\} \subset S$ in the following way. If $S$ is already self-avoiding, set $\mathcal{L}\{S\}=S$. Otherwise, let $s_0 = \max\{j : S(j)=S(0)\}$, and for $i > 0$, let $s_i = \max\{j : S(j) = S(s_{i-1}+1) \}$. If we let $n = \min\{i : s_i=m\}$, then $\mathcal{L}\{S\} = \{S(s_0), S(s_1), \ldots, S(s_n)\}$. Notice that $\mathcal{L}\{S\}(0)=S(0)$ and $\mathcal{L}\{S\}(s_n) = S(m)$, that is, the loop-erased walk has the same end points as the original walk $S$. [**Loop-erased random walk**]{} (LERW) from $0$ to $\partial D_n$ in $D_n$ is the random self-avoiding walk $\gamma_n$ obtained by taking $S$ to be a simple random walk on $n^{-1} {\mathbb{Z}}^2$ started from $0$ and stopped when reaching $\partial D_n$, and then setting $\gamma_n=\mathcal{L}\{S\}$. For a nearest-neighbor walk $S$, let $S^R$ be the time-reversed walk. It is known that LERW has the following symmetry with respect to time-reversal: The distribution of $(\mathcal{L}\{S\})^R$ is equal to that of $\mathcal{L}\{S^R\}$. Sometimes it is more convenient to consider $\mathcal{L}\{S^R\}$, and when we do we will call it the [*time-reversal of LERW*]{} and usually assume that the path is traced from the boundary towards $0$.
Convergence Rate for the LERW Path
----------------------------------
Lawler, Schramm, and Werner proved in [@LSW] that, as $n \to \infty$, the image of the time-reversal of LERW path in ${\mathbb{D}}$, $\psi_n\left( \mathcal{L}\{ S^R \} \right)$, traced from $\partial D$ towards $0$, converges weakly with respect to a natural metric on curves modulo increasing reparameterization towards the radial SLE$_2$ path started uniformly on $\partial D$. (See Theorem 3.9 of [@LSW] for a precise statement.) The goal of this section is to prove Theorem \[lerw-thm\], which is can be viewed as a quantitative version of Theorem 3.9 of [@LSW].
Let $D$ be a simply connected $\mathcal{C}^{1+\alpha}$ domain with grid domain approximation $D_n=D_n(D)$ as above. Let $\gamma_n$ be the time-reversal of LERW on $n^{-1} \mathbb{Z}^2$ from $0$ to $\partial D_n$ and let $\tilde{\gamma}_n=\psi_n(\gamma_n)$ be its image in ${\mathbb{D}}$ traced from the boundary and parameterized by capacity. (Since $\gamma_n$ is a simple curve that intersects $\partial D_n$ at only one point it follows that $\tilde{\gamma}_n$ is a ${\mathbb{D}}$-Loewner curve for each $n$.) Let $W_n(t)$ be the Loewner driving term for $\tilde{\gamma}_n$. Fix $s \in (0,1/24)$, and define $${\epsilon}_n=n^{-s}.$$
\[lerw-thm0\] For every $T> 0$ there exists $n_0=n_0(T,s)< \infty$ such that the following holds. For each $n \ge n_0$ there is a coupling of $\gamma_{n}$ with Brownian motion $B(t)$, $t\ge 0$, where $e^{iB(0)}$ is uniformly distributed on the unit circle, with the property that $$\label{the.equation2}
{\mathbb{P}}\left\{ \sup_{t \in [0, T]} |W_n(t)-W(t)| > {\epsilon}_n \right\} < {\epsilon}_n,$$ where $W(t)=e^{iB(2t)}$.
\[lerw-thm\] There exists $n_1=n_1({\epsilon}, T, s) < \infty$ such that if $n \ge n_1$, then in the coupling of Theorem \[lerw-thm0\], if $\tilde{\gamma}$ denotes the radial SLE$_2$ path in ${\mathbb{D}}$ driven by $W$, $$\label{the.equation3}
{\mathbb{P}}\left\{ \sup_{t \in [0, \sigma]} |\tilde{\gamma}_n(t)-\tilde\gamma(t)| > {\epsilon}_n^{m} \right\} < {\epsilon}_n^{m},$$ where both curves are parameterized by capacity, $$m=1/41,$$ and $\sigma=\sigma({\epsilon}, T)$ is the stopping time defined by .
The proof of Theorem \[lerw-thm\] (with minor modifications) would also work under the weaker assumption that $D$ is a quasidisk. (The class of quasidisks includes, e.g., the von Koch snowflake.) In this case the rate would depend on the constant in the Ahlfors three-point condition satisfied by $\partial D$; see Appendix \[grid-sect\]. We may also note that the conclusion (and proof) of Theorem \[lerw-thm\] holds true in any coupling like the one of Theorem \[lerw-thm0\], with the proviso that ${\epsilon}_n$ decays slower than $n^{-1/2}$.
By Lemma \[dec15.1\] the preimages of the curves (parameterized by capacity) in $D_n$ satisfy a similar estimate as in , namely, $${\mathbb{P}}\left\{ \sup_{t\in [0,\sigma]} |\gamma_n(t)-\psi_n^{-1}\left(\tilde\gamma(t)\right)| > {\epsilon}_n^{m} \right\} < {\epsilon}_n^{m}, \quad m=1/41.$$
The coupling(s) of $W_n=e^{i\theta_n}$ and $W=e^{iB}$ in Theorem \[lerw-thm0\] are via Shorokhod embedding of $\theta_n$ into $B$.
In order to apply the work from previous sections we need to verify that the assumptions of these results hold with large probability. In Section \[lerw-sm-sect\] we will first estimate the probability of the event of the existence of a certain power-law bound for the tip structure modulus for the LERW path in $D_n$. We show in Section \[grid-sect\] that if $\partial D$ is sufficiently smooth ($\mathcal{C}^{1+\alpha}$), then the image of the LERW path in $\mathbb{D}$ enjoys the same tip structure modulus up to constants. This uses a convergence rate result for grid domain approximations of quasidisks that we show follows from a result of Warshawski’s. In Appendix \[sle-sect\] we derive the needed estimate on the derivative of the SLE$_2$ conformal maps. These result are combined to prove Theorem \[lerw-thm\] in Section \[ps\].
Tip Structure Modulus for LERW in a Grid Domain {#lerw-sm-sect}
-----------------------------------------------
An important tool to get quantitative estimates for LERW is the **Beurling estimate** for simple random walk; see, e.g., [@LL]. There are many ways to formulate this result and we state only one version here.
There exists a constant $c < \infty$ such that the following holds. Let $A \subset \mathbb{Z}^2$ be an infinite connected set. Let $S$ be simple random walk on $\mathbb{Z}^2$ started from $z$ and stopped at the time $\tau_A$ at which $S$ hits $A$. Then for $r >1$ $$\mathbb{P} \left\{ |S(\tau_A) - z| \ge r {\operatorname{dist}}(z, A)\right\} \le cr^{-1/2}.$$
We can now formulate the main estimate.
\[lerw-sm\] Let $D_n$ be a grid domain with respect to $n^{-1}\mathbb{Z}^2$ and assume that ${\operatorname{inrad}}(D_n)=1$ and ${\operatorname{diam}}D_n \le R< \infty$, where $R$ is given. Let $\gamma_n$ be the time-reversal of loop-erased random walk from $0$ to $\partial D_n$. Let $\eta_{{\operatorname{tip}}}^{(n)}(\delta)$ be the tip structure modulus for $\gamma_n$ in $D_n$. There exists a universal constant $c_0 < \infty$ and a constant $c=c(R,r) < \infty$ such that if $n$ is sufficiently large and $\delta> c_0/n$, then $$\mathbb{P}\, \{\eta_{{\operatorname{tip}}}^{(n)}(\delta)\le \delta^r\} \ge 1- c\delta^{1/5-11r/5}|\log \delta|.$$
When we apply Proposition \[lerw-sm\] we will choose $\delta=\delta(n) \in \omega(n^{-1})$ (in the sense of Landau notation) so that $\delta> c_0/n$ is automatically satisfied for $n$ sufficiently large.
The Beurling estimate implies that there is a constant $c< \infty$ such that $$\mathbb{P}\{{\operatorname{diam}}\gamma_n > R\} \le c R^{-1/2}$$ for large $R$. This means that one can formulate and prove Proposition \[lerw-sm\] with an estimate which is independent of the diameter of $D_n$. (We still need to normalize in some way the inner radius with respect to the origin.)
Proof of Proposition \[lerw-sm\]
--------------------------------
This section is devoted to the proof of Proposition \[lerw-sm\] and towards the end the statement of a consequence that we will prove in Appendix \[grid-sect\]. Although the result was formulated for the time-reversal of LERW, in the proof we shall consider the LERW generated by erasing the loops of simple random walk from $0$ to $\partial D_n$ (without the time-reversal). By time-reversal symmetry, this is sufficient.
The strategy of the proof is based on that of the proof of Lemma 3.4 in [@Schramm_IJM], but see also the related Lemma 3.12 of [@LSW]. Let $w$ be a fixed point in $D_n$. Let $\mathcal{A}=\mathcal{A}(w; \delta, \eta)=\{z: \delta < |z-w| < \eta\}$ be the $(\delta, \eta)$-annulus about $w$. Let $\gamma$ be a curve in $D_n$. We say that $\gamma$ has a $k$-crossing of $\mathcal{A}$ if the number of components of $\gamma \cap \mathcal{A}$ that connects to two boundary components of $\mathcal{A}$ is at least $k$. We equivalently say that $\gamma$ has a $(\delta, \eta)$ $k$-crossing at $w$, and that $\gamma$ has a $(\delta, \eta)$ $k$-crossing if there exists a $w$ such that $\gamma$ has a $(\delta, \eta)$ $k$-crossing at $w$. Recall that $\eta(\delta)$ is a bound for the tip structure modulus for $\gamma$ in $D_n$ if and only if for all $t$, $\gamma[0,t]$ has no nested $(\delta,\eta(\delta))$-bottleneck in $D_n$. Now let $\gamma_n$ be the LERW path in $D_n$ traced from $\partial D_n$ towards $0$. Consider the event that there is a nested $(\delta, 2\eta)$-bottleneck in $\gamma_n$. This event is contained in the union of of the following two events:
1. [{There is a $w \in D_n$ such that $\gamma_n$ has a $(\delta, \eta)$ $5$-crossing at $w$}]{}
2. [{The random walk generating $\gamma_n$ comes within distance $\delta$ from $\partial D_n$ and then travels more than distance $\eta$ before hitting $\partial D_n$}]{}
To see this, suppose that a nested $(\delta, 2\eta)$-bottleneck occurs with the crosscut ${\mathcal{C}}$ contained in the disk ${\mathcal{B}}(w,\delta)$, $w \in \overline{D_n}$. If $|w|>\eta$ while ${\operatorname{dist}}(w,\partial D_n) > \eta$, then a $6$-crossing of $\mathcal{A}(w; \delta, \eta)$ must occur since $\gamma_n$ connects $\partial D_n$ with $0$. However, if $|w| \le \eta$ or $\delta<{\operatorname{dist}}(w,\partial D_n) \le \eta$ then only a $5$-crossing of $\mathcal{A}(w; \delta, \eta)$ is implied. These events are contained in $\mathcal{E}_5$. Close to the boundary, that is, if ${\operatorname{dist}}(w,\partial D_n) \le \delta$, a nested bottleneck can form, roughly speaking, with the “help” of the boundary. Depending on $\partial D_n$ this can happen in several ways; for example, the curve might enter a thin channel, pass a thin bottleneck, or a “bad” $4$-crossing of $\mathcal{A}(w; \delta, \eta)$ might occur. In any configuration like this, the event $\mathcal{E}_B$ occurs.
We will estimate the probabilities of the two events, starting with the last. In this case the Beurling estimate immediately implies that there is a constant $c<\infty$ such that $$\label{EC}
\mathbb{P} \left\{ \mathcal{E}_B \right\} \le c \left( \frac{\delta}{\eta} \right)^{1/2}.$$ We proceed to bound $\mathbb{P}\left\{\mathcal{E}_5\right\}$. Fix a point $w \in D_n$. Set $$d_0={\operatorname{dist}}(w, \partial D_n) > 0$$ and define $${\mathcal{B}}_1={\mathcal{B}}(w, \eta/4) ,\quad {\mathcal{B}}_2={\mathcal{B}}(w, \eta/2).$$ For a curve $\gamma \subset D_n$, we let $\mathcal{Q}'(\gamma; w, \delta, \eta)$ denote the event that $\gamma$ has a $3$-crossing of a $(\delta, \eta)$-annulus whose smaller boundary component is contained in ${\mathcal{B}}_1$. Similarly, let $\mathcal{Q}''(\gamma; w, \delta, \eta)$ denote the event that $\gamma$ has a $5$-crossing of a $(\delta, \eta)$-annulus whose smaller boundary component is contained in ${\mathcal{B}}_1$. Clearly, the latter event is contained in the former. We will first estimate the probability of $$\mathcal{Q}'':=\mathcal{Q}''(\gamma_n; w, \delta, \eta).$$ Let $S(t)=S_n(t), \, t=0,1,\dots, \tau$ be the simple random walk generating $\gamma_n$; it is started from $0$ and stopped at $$\tau=\min\{t \ge 0 : S(t) \in \partial D_n\}.$$ when $\partial D_n$ is hit. Define $$s_1=\min\{t \ge 0 : S(t) \in {\mathcal{B}}_1\}, \quad t_1=\min\{t > s_1 : S(t) \not\in {\mathcal{B}}_2\},$$ and recursively for $j=2,3, \ldots,$ $$s_j=\min\{t > t_{j-1} : S(t) \in {\mathcal{B}}_1\}, \quad t_j=\min\{t > s_j : S(t) \not\in {\mathcal{B}}_2\}.$$ Note that we have $s_1=0$ if $|w| \le \eta /4$ and $s_1 > 0$ otherwise. We will write $$\mathcal{Q}_j'':=\mathcal{Q}''(\mathcal{L}\{S[0, t_j]\}; w, \delta, \eta), \quad \mathcal{Q}_j':=\mathcal{Q}'(\mathcal{L}\{S[0, t_j]\}; w, \delta, \eta).$$ Clearly, $\mathcal{Q}_j'' \subset \mathcal{Q}_j'$, but it does not necessarily hold that $\mathcal{Q}''_{j+1} \subset \mathcal{Q}''_j$ or $\mathcal{Q}_{j+1}' \subset \mathcal{Q}_{j}'$ because part of the curve forming a crossing may be erased. Note that for $m \ge 1$ $$\mathbb{P}\left( \mathcal{Q}'' \right) \le \mathbb{P}\{\tau > t_{m+1}\} + \mathbb{P}\left(\cup_{j=1}^m\mathcal{Q}_j''\right).$$ We estimate $\mathbb{P}\{\tau > t_{m+1}\}$ in Lemma \[feb1612\] below.
We have $$\mathbb{P}\left(\cup_{j=1}^m\mathcal{Q}_j''\right) \le \sum_{j=1}^m{\mathbb{P}}\left( \mathcal{Q}_j'' , \, \lnot \mathcal{Q}_{j-1}'' \right).$$ To get the last estimate we split the event on the left-hand side according to the first time a $5$-crossing occurs; here and in the sequel, for an event $A$ the symbol “$\lnot A$” means the complement of $A$. To bound ${\mathbb{P}}(\mathcal{Q}_j'' , \, \lnot \mathcal{Q}_{j-1}'' )$ let us first discuss the analogous quantity for a $3$-crossing. In the proof of Lemma 3.4 of [@Schramm_IJM] the estimate $$\mathbb{P} \left( \mathcal{Q}_j' \mid \lnot \mathcal{Q}_{j-1}', S[0,t_{j-1}] \right) \le c (j-1) \left(\frac{\delta}{\eta}\right)^{1/2}$$ was (essentially) given and as a consequence the estimate $$\label{ql1}
\mathbb{P}\left( \mathcal{Q}_j' , \, \lnot \mathcal{Q}_{j-1}' \right) \le \mathbb{P} \left( \mathcal{Q}_j' \, \mid \, \lnot \mathcal{Q}_{j-1}' \right) \le c (j-1) \left(\frac{\delta}{\eta}\right)^{1/2}$$ follows. The exponent in the right-hand side of was not specified in [@Schramm_IJM]. However, it follows from the Beurling estimate that one can take the exponent to be $1/2$. Indeed, the proof of is as follows: Let $\{C_k\}_k$ be the components of $\mathcal{L}\{S[0, s_j]\} \cap {\mathcal{B}}_2$ intersecting ${\mathcal{B}}_1$ but not containing $S(s_{j})$. There are at most $j-1$ such components. Conditionally on $S[0,t_{j-1}]$, if $\mathcal{L}\{S[0,t_j] \}$ is to contain a $3$-crossing which was not there in $\mathcal{L}\{ S[0,t_{j-1}] \}$, then $S[s_j, t_j]$ has to come within distance $\delta$ of $C_k \cap {\mathcal{B}}_1$ for some $k$ and then exit ${\mathcal{B}}_2$ without hitting that same $C_k$. (It may hit other components.) For each component, we can use the strong Markov property and the Beurling estimate to see that this conditional probability is bounded by $c (\delta/\eta)^{1/2}$ and there are at most $j-1$ such components. We can then sum to get $${\mathbb{P}}\left( \mathcal{Q}_j'\right) \le \sum_{k=1}^j {\mathbb{P}}\left(Q_k', \, \lnot Q_{k-1}' \right) \le c j^2 \left( \frac{\delta}{\eta} \right)^{1/2}$$ Returning to ${\mathbb{P}}\left( \mathcal{Q}_j'' , \, \lnot \mathcal{Q}_{j-1}'' \right)$ we have, noticing that $(\mathcal{Q}_j'' \cap \lnot \mathcal{Q}_{j-1}'') \subset \mathcal{Q}_{j-1}'$, $$\begin{aligned}
{\mathbb{P}}\left( \mathcal{Q}_j'' , \, \lnot \mathcal{Q}_{j-1}'' \right) & = {\mathbb{P}}\left(\mathcal{Q}_j'' , \, \lnot \mathcal{Q}_{j-1}'' \mid \mathcal{Q}_{j-1}' \right) {\mathbb{P}}\left( \mathcal{Q}_{j-1}'\right)\\
& \le c {\mathbb{P}}\left(\mathcal{Q}_j'' , \, \lnot \mathcal{Q}_{j-1}'' \mid \mathcal{Q}_{j-1}' \right) j^2 \left( \frac{\delta}{\eta} \right)^{1/2}\end{aligned}$$ We continue to write $${\mathbb{P}}\left(\mathcal{Q}_j'' , \, \lnot \mathcal{Q}_{j-1}'' \mid \mathcal{Q}_{j-1}' \right) \le {\mathbb{P}}\left(\mathcal{Q}_j'' \mid \lnot \mathcal{Q}_{j-1}'', \, \mathcal{Q}_{j-1}' \right).$$ We can estimate the last expression by using that $${\mathbb{P}}\left(\mathcal{Q}_j'' \mid \lnot \mathcal{Q}_{j-1}'', \, \mathcal{Q}_{j-1}', \, S[0, t_{j-1}] \right) \le c (j-1) \left(\frac{\delta}{\eta}\right)^{1/2}.$$ Indeed, this estimate is proved in exactly the same way as using the Beurling estimate.
Combining our bounds we get $$\mathbb{P}\left(\cup_{j=1}^m\mathcal{Q}_j''\right) \le c m^4 \frac{\delta}{\eta}.$$ We now take $\nu>0$ and let $m=\lfloor \delta^{-\nu} \rfloor$. We then use Lemma \[feb1612\] (here we write the estimate for $d_0 > \eta/4$; in the case $d_0 \le \eta/4$ we use the second bound of Lemma \[feb1612\]) to get $$\begin{aligned}
\label{bulk}
\mathbb{P}(\mathcal{Q}'') &\le \left(1- \frac{c_3}{|\log(16 d_0/\eta)|}\right)^{\lfloor \delta^{-\nu} \rfloor} + c \frac{\delta^{1-4\nu}}{\eta} \nonumber \\
& \le c \delta^{\nu} | \log(16 d_0/\eta)| + c \frac{\delta^{1-4\nu}}{\eta}.\end{aligned}$$ This bound is for a fixed $w$. To conclude, note that there is a universal $c < \infty$ such that we can (deterministically) cover $D_n$ using at most $c R^2\eta^{-2}$ overlapping disks ${\mathcal{B}}(w_k, \eta/4)$ in such a way for every $w$ such that $\gamma_n$ has a $5$-crossing of $\mathcal{A}(w; \delta, \eta)$, the smaller boundary component of $\mathcal{A}(w; \delta, \eta)$ is contained in ${\mathcal{B}}(w_k, \eta/4)$ for some $k$. Consequently, for $c=c(R)<\infty$, $$\label{E5}
\mathbb{P}\left( \mathcal{E}_5\right) \le c \eta^{-2}\delta^{\nu} | \log(16 d_0/\eta)| + c \eta^{-3}\delta^{1-4\nu}.$$ For any $r \in (0,1/11)$, if $\eta=\delta^{r}$, we can take $\nu=(1-r)/5$ in which makes both terms in the bound of the same (“polynomial”) order so that the right-hand side of decays like $\delta^{1/5-11r/5}$ with a logarithmic correction. Since this term is always larger than the one coming from $\mathcal{E}_B$, this concludes the proof of Proposition \[lerw-sm\], assuming Lemma \[feb1612\].
\[feb1612\] There exist constants $0 < c_1 , c_2 < 1$ such that $$\mathbb{P}\{\tau > t_{m+1}\} \le \left\{ \begin{array}{ll}
\left(1- \frac{c_1}{|\log (16 d_0\eta^{-1})|}\right)^{m} &\mbox{ if $d_0 > \eta/4$;} \\
(1-c_2)^m &\mbox{ if $d_0 \le \eta/4$.}
\end{array} \right.$$
We first assume that $d_0 > \eta/4$. Using, e.g., Proposition 6.4.1 of [@LL] we see that the probability that a simple random walk started just outside of ${\mathcal{B}}_2$ exits ${\mathcal{B}}(z_0, 8d_0)$ before hitting ${\mathcal{B}}_1$ is bounded below by $$\frac{|\log 2| - O((\eta n )^{-1})}{|\log (16 d_0\eta^{-1})|} \ge \frac{|\log 2|}{2|\log (16 d_0\eta^{-1})|}$$ if $\eta n > c_1$, where $c_1 < \infty$ is a universal constant. (This uses also that $d_0 > \eta/4$.) This estimate is a discrete version of the expression for the harmonic measure of one of the boundary components in an annulus. Moreover, there is a universal constant $c>0$ such that the probability that simple random walk from $\partial {\mathcal{B}}(z_0, 8d_0)$ separates ${\mathcal{B}}(z_0, d_0)$ from $\infty$ before hitting ${\mathcal{B}}(z_0, d_0)$ is bounded below by $c$. (Recall that our assumptions imply that $d_0 > c'/n$, where we can assume that $c'$ is large.) Consequently, by the strong Markov property the probability that simple random walk started from $\partial {\mathcal{B}}_2$ exits $D_n$ before hitting ${\mathcal{B}}_1$ is bounded below by $c_1/|\log (16d_0\eta^{-1})|$. By iterating this argument using the strong Markov property, $$\label{nov12.1}
\mathbb{P}\{\tau > t_{m+1}\} \le \left(1- \frac{c_1}{|\log (16 d_0\eta^{-1})|}\right)^{m}.$$ When $d_0 \le \eta/4$ the Beurling estimate and the Markov property directly show that the right-hand side of can be replaced by $\left(1- c_2\right)^{m}$, where $c_2 > 0$ is a universal constant.
If the boundary of the domain $D$ that is being approximated is sufficiently regular, then the structure modulus on a sufficiently large mesoscopic scale for the image curve in $\mathbb{D}$ is essentially the same as the one in $D_n$. The next lemma, proved in Appendix \[grid-sect\], makes this precise.
\[dec15.1\] Suppose $D \ni 0$ is a simply connected domain Jordan domain with $C^{1+\alpha}$ boundary, where $\alpha > 0$. Let $D_n$ be the $n^{-1} {\mathbb{Z}}^2$ grid domain approximation of $D$ and let $\gamma_n$ be a Loewner curve in $D_n$ connecting $\partial D_n$ with $0$. There is a constant $c$ depending only on $\alpha$ and the diameter of $D$ such that the following holds. Set $0< r <1/2$ and $d_n=n^{-r}$ and let $\eta_{{\operatorname{tip}}}^{(n)}(\delta; D_n)$ be the tip structure modulus for $\gamma_n$ in $D_n$. Then for all $n$ sufficiently large the tip structure modulus $\eta_{{\operatorname{tip}}}^{(n)}(\delta; \mathbb{D})$ for $\psi_n(\gamma_n)$ in $\mathbb{D}$ satisfies $$\eta_{{\operatorname{tip}}}^{(n)}( c^{-1} d_n; \mathbb{D}) \le c \eta_{{\operatorname{tip}}}^{(n)}(d_n; D_n).$$
Proof of Theorem \[lerw-thm\] {#ps}
-----------------------------
We write $\gamma$ for the radial SLE$_2$ path in $\mathbb{D}$ corresponding to the Brownian motion in . We thus have a coupling of the radial SLE$_2$ path and the image of the LERW path $\tilde{\gamma}_n$ and we will estimate the distance between these curves in this coupling. Take $s \in (0,1/24)$ and $n > n_0$ where $n_0$ is as in Theorem \[lerw-thm0\]; fix $\rho>1$ and for $p \in (0,1/\rho)$, let $${\epsilon}_n = n^{-s}, \quad d_n=({\epsilon}_n)^p.$$ For each $n \ge n_0$, we shall define three events each of which occurs with large probability in our coupling. On the intersection of these events we can apply our estimates from Sections \[prel\] and \[geom\].
1. [ Let $\mathcal{A}_n=\mathcal{A}_n(s)$ be the event that the estimate $$\sup_{t \in [0,T]} |W_n(t)-W(t)| \le {\epsilon}_n$$ holds. By Theorem \[lerw-thm0\] we know that there exists $n_0 < \infty$ such that if $n \ge n_0$ then $$\mathbb{P}(\mathcal{A}_n) \ge 1- {\epsilon}_n.$$]{}
2. [For $\beta \in (2(\sqrt{10}-1)/9,1)$, let $\mathcal{B}_n=\mathcal{B}_n(s,r, \beta, {\epsilon}, T, c_B)$ be the event the radial SLE$_2$ Loewner chain $(f_t)$ driven by $W(t)$ satisfies the estimate $$\sup_{t\in [0,\sigma]} d |f'(t,(1-d)W(t))| \le c_B \, d^{1-\beta}, \quad \forall \, d \le d_n.$$ (Recall that ${\epsilon}, T$ were used in the definition of the stopping-time $\sigma \le T$.) Then by Proposition \[may61\] there exist $c_B < \infty$, independent of $n$, and $n_1 < \infty$ such that if $n \ge n_1$ then $$\mathbb{P}\left(\mathcal{B}_n \right) \ge 1-c'_B d_n^{q_2(\beta)},$$ where $$q_2(\beta)=-1+2\beta + \frac{\beta^2}{4(1+\beta)}.$$ ]{}
3. [For $r \in (0, 1/11)$, let $\mathcal{C}_n=\mathcal{C}_n(s, r, p, c_C, \alpha, {\operatorname{diam}}D)$ be the event that the tip structure modulus for $\tilde{\gamma}_n$ in ${\mathbb{D}}$, $\eta_{{\operatorname{tip}}}^{(n)}$, satisfies $$\eta_{{\operatorname{tip}}}^{(n)}(d_n)\le c_C \, d_n^{r}.$$ We know from Proposition \[lerw-sm\] and Lemma \[dec15.1\] that there exist $c_C, c_C' < \infty$, independent of $n$, and $n_2 < \infty$ such that if $n\ge n_2$ then $$\mathbb{P}(\mathcal{C}_n) \ge 1-c_C' \, d_n^{1/5-11r/5}|\log d_n|.$$]{}
Consequently, there exist $c_B, c_C < \infty$ and $c < \infty$, all independent of $n$ (but depending on $s,r,p,{\epsilon}, T, \beta, \alpha, {\operatorname{diam}}D$), such that for all $n$ sufficiently large, $$\label{dec2.1}
\mathbb{P}\left( \mathcal{A}_n \cap \mathcal{B}_n \cap \mathcal{C}_n\right) \ge 1 -c\,({\epsilon}_n+d_n^{q_2(\beta)} + d_n^{1/5-11r/5}|\log d_n|),$$ and on the event $\mathcal{A}_n \cap \mathcal{B}_n \cap \mathcal{C}_n$ we can apply Lemma \[dec3.2\] with constants $c=c_C,c'=c_B$ independent of $n$ to see that there exists $c$ independent of $n$ (but depending on the above parameters) such that for all $n$ sufficiently large, $$\label{dec2.3}
\sup_{t \in [0,\sigma]}|\tilde{\gamma}_n(t)-\tilde{\gamma}(t)| \le c \, (d_n^{r(1-\beta)} + {\epsilon}_n^{(1-\rho p)r}).$$ We now wish to optimize over the parameters in the exponents. Since $d_n={\epsilon}_n^p$ we see that $d_n^{r(1-\beta)}$ dominates in when $p \in (0, 1/(1+\rho-\beta)]$ and ${\epsilon}_n^{r(1-\rho p)}$ whenever $p \in [1/(1+\rho-\beta),1]$. Suppose $ p \in (0, 1/(1+\rho-\beta)]$.
Set $$\mu(\beta,r)=\min\left\{r(1- \beta), -1+2\beta + \frac{\beta^2}{4(1+\beta)}, \frac{1}{5}-\frac{11r}{5} \right\}.$$ The optimal rate is given by optimizing $\mu$ over $\beta,r$ and then choosing $p$ very close to $1/(1+\rho-\beta)$. (No improvement is obtained by considering $p \in [1/(1+\rho-\beta),1]$.) Let $\beta_* \in (2(\sqrt{10}-1)/9,1)$ solve $$45\beta^3-128\beta^2-84\beta + 68=0.$$ (One can check that $\beta_* = 0.497\dots$.) Then if $r_*=1/(16-\beta_*) \in (0,1/11)$ $$\mu(r_*,\beta_*)=\max \left\{\mu(\beta,r):\, \frac{2(\sqrt{10}-1)}{9} < \beta <1, \, 0 < r< \frac{1}{11}\right\}=0.037\dots$$ Consequently, for every $$m < m_*=\frac{\mu(r_*,\beta_*)}{2-\beta_*},$$ we obtain bounds in and of order ${\epsilon}_n^m$ for all $n$ sufficiently large. Since $1/41< m_* =0.024\ldots$, this concludes the proof.
Derivative Estimate for Radial SLE {#sle-sect}
==================================
This section proves a derivative estimate for both chordal and radial SLE. The radial case was needed in Section \[lerw-sect\] in the case $\kappa=2$. The chordal case is a direct consequence of an estimate from [@JVL], but the radial case requires a little bit of work. In this case, our goal is to estimate explicitly in terms of $d_*$ and $\beta$ the probability of the event that when $(f(t,z))$ is the radial SLE$_\kappa$ Loewner chain, the estimate $d|f'(t,(1-d) W(t))| \le c \, d^{1-\beta}$ for all $d \le d_*$ holds uniformly in $t \in [0, T]$. This follows without much trouble from a moment estimate for the chordal reverse flow in [@JVL]. The only issue is the change of coordinates from radial to chordal SLE which we begin by discussing. See also Section 7 of [@BJK] where a similar but non-equivalent situation is dealt with. We will use ideas from [@schramm-wilson].
Change of Coordinates
---------------------
Let $(f_s,W_s)$ be a radial Loewner pair generated by the curve $\gamma(s)$ with $W_s$ continuous. Recall that $f_s: \mathbb{D} \to \mathbb{D} \setminus D_s$ and that $K_s$ is the hull generated by $\gamma[0,s]$. Let $g_s = f_s^{-1}$ and set $z_s=g_s(-1)\overline{W_s}$. We will need to keep track of the “disconnection time” $\sigma'$ when $K_s$ first disconnects $-1$ from $0$ in ${\mathbb{D}}$, in other words, the first time that $z_s$ hits $1$. Fix ${\epsilon}>0$ small and $T < \infty$, and define $$\label{sigma}
\sigma=\sigma({\epsilon},T)=\inf\left\{s \ge 0: |1- z_s| \le {\epsilon}\right\} \wedge T.$$ Clearly, $\sigma < \sigma'$.
\[may12.1\] There exists a constant $c=c({\epsilon},T)>0$ such that $$\inf_{s \in [0,T]}|g'_{s \wedge \sigma}(-1)| \ge c.$$
The Loewner equation implies that with $z_s$ as above, $$|g'_s(-1)| = \exp\left\{ \int_0^s {\operatorname{Re}}\frac{2}{(1-z_s)^2}-1 \, ds\right\}.$$ This shows that $|g'_s(-1)|$ is strictly decreasing in $s$ and that $|g'_{T \wedge \sigma}(-1)| \ge c=c({\epsilon},T) >0$.
Note that if $g_s$ is the radial SLE$_\kappa$ forward flow, and if $$\theta_s:=-i \log z_s = -i \log g_s(-1) - \sqrt{\kappa}B_s, \quad \theta_0 = \pi,$$ then by Itô’s formula, $$d \theta_s = \cot(\theta_s/2) \, ds - \sqrt{\kappa} d B_s.$$ If $\kappa < 4$, then it follows from [@lawler-book Lemma 1.27] that almost surely $\theta_s$ does not hit $\{0, 2\pi\}$ in finite time. Hence for each $T <\infty$, if $\kappa < 4$, then almost surely, $$\lim_{{\epsilon}\to 0} \sigma({\epsilon},T) =T.$$
Consider now the Mobius transformation $$\varphi: \mathbb{H} \to \mathbb{D}, \quad \varphi(z)=\frac{i-z}{i+z}.$$ Clearly $\varphi^{-1} \circ \gamma$ is a curve in $\mathbb{H}$ (for sufficiently small $s$) and for $s \ge 0$ we define $$t(s):= {\operatorname{hcap}}(\varphi^{-1}(\gamma[0,s]))/2.$$ For each $s \in [0, \sigma]$ let $F_{t(s)}: \mathbb{H} \to H_{t(s)}:={\varphi}^{-1}(D_s)$ be the conformal mapping satisfying the hydrodynamical normalization $F_{t(s)}(z) = z - 2t(s)/z + o(1/|z|)$ at infinity. It is known (see, e.g., [@schramm-wilson]) that $t(s)$ is a strictly increasing, continuous function of $s$ up to the disconnection time and we will write $s(t)$ for the inverse of $t(s)$. One can write (see [@schramm-wilson] and [@BJK]) $$\label{dec16.1}
f_s = \varphi \circ F_{t(s)} \circ \Delta_s.$$ Here $$\label{dec16.2}
\Delta_s(z): \mathbb{D} \to \mathbb{H}, \quad \Delta_s(z) = \frac{z \overline{\mu_{t(s)}} - \lambda_s \mu_{t(s)}}{z-\lambda_s},$$ where the reader may verify that if $$G_{t(s)}(z)= F_{t(s)}^{-1}(z), \quad g_s(z) = f_s^{-1}(z),$$ then $$\mu_{t(s)} = G_{t(s)}(i), \quad \lambda_s = g_s(-1).$$ In fact, by expanding $G$ at infinity via , $$\label{dec16.3}
{\operatorname{Im}}\mu_{t(s)} = -\frac{g'_s(-1)}{g_s(-1)}=|g_s'(-1)|.$$ This uses that $${\operatorname{Re}}\left(1 - \frac{g_s''(-1)}{g_s'(-1)} \right) = -\frac{g'_s(-1)}{g_s(-1)},$$ which holds because the left-hand side equals $\partial_\theta [ \arg \partial_\theta g_s(e^{i\theta}) ]$ at $\theta=\pi$, and $g_s$ maps the circle to the circle locally at $-1$ so that the change of the tangent is equal to the change of the argument which is the right-hand side. By Lemma \[may12.1\] and there exists $c_1=c_1({\epsilon},T)>0$ such that $$\label{mu-lb}
{\operatorname{Im}}\mu_{t(s)} \ge c_1, \quad s \in [0, \sigma].$$ Consider the family $(F_t), \, t \in [0, \tau]$ with the half-plane capacity parameterization. It satisfies the chordal Loewner PDE in $t$ and we let $U_t=\Delta_{s(t)}(W_{s(t)})$ be the corresponding chordal driving term. Set $$\tau:=t(\sigma).$$ The estimate then implies that there is a constant $T'=T'({\epsilon},T) < \infty$ such that $\tau \le T'$. Indeed, in Theorem 3 of [@schramm-wilson] it is shown that $s'(t) = 4 ({\operatorname{Im}}\mu_{s(t)})^2/|\mu_{s(t)}-U_t|^4$ which is bounded away from $0$ on $[0,\tau]$. Using and that $|W_s-\lambda_s| \ge {\epsilon}$ for $s \in [0, \sigma]$, we see that there exist constants $0 < c < \infty$ and $d_0>0$ depending only on ${\epsilon}$ and $T$ such that for all $d \le d_0$, uniformly in $s \in [0,\sigma]$, $$\left|{\operatorname{Re}}\left(\Delta_s((1-d)W_s)\right) -U_{t(s)}\right|\le c \, d, \quad c^{-1} d \le {\operatorname{Im}}\left(\Delta_s((1-d)W_s) \right) \le c d.$$ In other words, the hyperbolic distance between $\Delta_s((1-d)W_s)$ and $U_{t(s)} + id$ is bounded by a constant depending only on ${\epsilon}$ and $T$. Therefore we can use Koebe’s distortion theorem to see that there exists a constant $c=c({\epsilon}, T)<\infty$ such that for all $s \in [0,\sigma]$ $$|f_s'((1-d)W_s)| \le |F'_{t(s)}(\Delta_s((1-d)W_s))| \le c\, |F'_{t(s)}(U_{t(s)} + id)|.$$ We have proved the following result.
\[dec16.4\] Let $T < \infty$ and ${\epsilon}>0$ be given. Suppose that $(f_s,W_s)$ is a radial Loewner pair generated by the curve $\gamma(s)$. Define $\sigma=\sigma({\epsilon},T)$ by . Let $(F_t, U_t)$ be the chordal Loewner pair generated by the curve $s \mapsto {\varphi}^{-1}(\gamma(s)), \, s \in [0,\sigma]$ reparameterized by half-plane capacity and let $\tau=t(\sigma)$. There exists $c=c({\epsilon},T) < \infty$ and $d_0=d_0({\epsilon},T)>0$ such that for all $d \le d_0$, $$\sup_{s\in [0, \sigma]} |f'_s((1-d)W_s)| \le c \sup_{t \in [0, \tau]}|F'_{t}(U_{t} + id)|.$$
Now assume that $(f_s)$ is the radial SLE$_\kappa$ Loewner chain. Then $\sigma$ is a stopping time for $(f_s)$ and $\tau$ is a stopping time for $(F_t)$. The law of the chordal driving term $U_t$ stopped at $\tau$ is absolutely continuous with respect to the law of standard linear Brownian motion with speed $\kappa$, as shown in [@schramm-wilson]. Moreover, by the Girsanov density is uniformly bounded above by a constant depending only on $\kappa$ and ${\epsilon},T$ used in the definition of $\sigma$. Since $(F_t)$ is absolutely continuous with respect to a chordal SLE$_\kappa$ Loewner chain and since the Girsanov density is uniformly bounded (for fixed $\kappa, {\epsilon}, T$) using Proposition \[dec16.4\] we can estimate the behavior of $\sup_{s\in [0,\sigma]}|f_s'((1-d)W_s)|$ using standard chordal SLE.
Derivative Estimate for Chordal SLE
-----------------------------------
We now derive the needed estimate on the growth of the derivative in chordal coordinates. The estimate is essentially a direct consequence of work in [@JVL] an we will describe the modifications here. Let $(F_t), \, t \ge 0$ be the standard chordal SLE Loewner chain mapping $\mathbb{H}$ onto the unbounded connected component of $\mathbb{H}\setminus \gamma[0,t]$. We write $\hat{F}_t(z) = F_t(z+U_t)$, where $U$ is the chordal driving term for $(F_t)$. Recall that the chordal reverse SLE$_\kappa$ flow is the family of conformal mappings solving $$\dot{h}_t=-\frac{2}{h_t-\sqrt{\kappa}B_t}, \quad h_0(z)=z,$$ where $B$ is standard Brownian motion. For fixed $t_0 > 0$, $|h_{t_0}'(z)|$ is equal to $|\hat{F}'_{t_0}(z)|$ in distribution. Hence (first) moment estimates for $|\hat F'_{t_0}|$ are reduced to corresponding estimates for $|h'_{t_0}|$ and these are often more easily obtained. Note that scaling implies that for fixed $y>0$, $|h_{t}'(iy)| \stackrel{d}{=} |h_{ty^{-2}}'(i)|$. Define $$\zeta(\lambda)=\lambda + \frac{\sqrt{(4 + \kappa)^2-8\lambda \kappa}-(4+\kappa)}{4}.$$ We will assume that $$\lambda < \lambda_c = 1+\frac{2}{\kappa}+ \frac{3\kappa}{32}.$$ In this range we quote the following estimate from [@JVL]. See also [@JVL2] and the references therein.
\[ub\] Let $h_t$ be the chordal reverse SLE$_\kappa$ flow, $\kappa > 0$. There exists a constant $c <\infty$ such that for $\lambda < \lambda_c$. $$\mathbb{E}[|h_{t}'(i)|^{\lambda}] \le c t^{-\zeta(\lambda)/2}, \quad t \ge 1.$$
This result now implies the needed estimate which is a version of Proposition 4.2 of [@JVL] with a decay rate; we will sketch the proof and refer the reader to [@JVL] for more details. Let $\kappa > 0$ and define the function $$\rho(\beta)=\beta +\frac{2(1+\beta)}{\kappa}+ \frac{\beta^2 \kappa}{8(1+\beta)}$$ and $$q(\beta)=\min\{\lambda_c \beta, \rho(\beta)-2\}, \quad \beta_+ < \beta <1,$$ where $$\beta_+=\max \left\{ 0, \frac{4(\kappa \sqrt{8+\kappa}-(4-\kappa))}{(4+\kappa)^2} \right\}.$$ Note that $q(\beta)>0$ for $\beta$ in the above range.
\[may4\] Let $T < \infty$ be fixed and let $(F_t)$ be the chordal SLE$_\kappa$ Loewner chain, $\kappa \in (0,8)$. There exists a constant $c< \infty$ depending only on $T$ and $\kappa$ such that for every $\beta \in (\beta_+,1)$ and $y_* < 1$ we have that $$\mathbb{P} \left\{ \forall \, y \le y_*, \, \sup_{t \in [0, T]}y|\hat{F}'_t(iy)| \le c y^{1-\beta}\right\} \ge 1-cy_*^{q(\beta)}.$$
(Sketch.) By the distortion theorem, scaling, and the fact that Brownian motion is almost surely weakly Hölder-(1/2), it is enough (see [@JVL]) to show that for $\beta_+ < \beta < 1$ $$\sum_{n=N_*}^{\infty} \sum_{j=1}^{2^{2n}}\mathbb{P}(|\hat{F}'_{j2^{-2n}}(i2^{-n})| > 2^{\beta n}) \le c 2^{-N_*q(\beta)},$$ where $N_*=\lfloor \log y_*^{-1} \rfloor$. We have for $0<\lambda < \lambda_c$ using scaling, Chebyshev’s inequality, and Lemma \[ub\] $$\begin{aligned}
\sum_{n=N_*}^{\infty} \sum_{j=1}^{2^{2n}}\mathbb{P}(|\hat{F}'_{j2^{-2n}}(i2^{-n})| > 2^{\beta n}) & \le \sum_{n=N_*}^{\infty} \sum_{j=1}^{2^{2n}} 2^{-n \lambda \beta} \mathbb{E}[ |\hat{F}'_{j2^{-2n}}(i2^{-n})|^{\lambda}] \\
& \le c\sum_{n=N_*}^{\infty} \sum_{j=1}^{2^{2n}} 2^{-n \lambda \beta } \mathbb{E}[ |h'_{j}(i)|^{\lambda}] \\
& \le c\sum_{n=N_*}^{\infty} \sum_{j=1}^{2^{2n}} 2^{-n \lambda \beta} j^{-\zeta/2} \\
& \le c\sum_{n=N_*}^{\infty} \sum_{j=1}^{2^{2n}} 2^{-n \lambda \beta} (1+2^{n(2-\zeta)} )\\
& \le c (2^{-N_* \lambda \beta} + 2^{-N_*(\lambda\beta + \zeta -2)}).\end{aligned}$$ Recall that $\lambda \in (0,\lambda_c)$. Note that $\zeta-2 < 0$ if and only if $\kappa >1$, so for these $\kappa$ the smaller exponent is $\lambda \beta + \zeta -2$. In this range, we find $q(\beta)$ by maximizing over $0<\lambda < \lambda_c$ for $\beta$ fixed so that $q(\beta)=\max_{\lambda} \lambda \beta+\zeta(\lambda)-2$. The lower bound $\beta_+$ is the smallest $\beta > 0$ such that $\beta > \beta_+$ implies $q(\beta)>0$. When $\kappa \le 1$, $\lambda \beta$ is the smaller exponent and we must restrict attention to $\beta >0$. We pick the largest $\lambda=\lambda_c$.
From this and the work in the previous subsection we immediately obtain the following proposition. Recall that the stopping time $\sigma$ was defined in .
\[may6\] Let $\kappa \in (0,8)$. Let ${\epsilon}>0$ be fixed and let $(f_s), \, 0 \le s \le \sigma,$ be the radial SLE$_\kappa$ Loewner chain stopped at $\sigma$ as defined by . For every $\beta \in (\beta_+,1)$ there exists a constant $c=c(\beta, \kappa, {\epsilon}, T)< \infty$ such that for $d_* < 1$, $$\mathbb{P} \left\{\forall \, d \le d_*, \, \sup_{s \in[0, \sigma]}d|f'_s((1-d)W_s)| \le c d^{1-\beta}\right\} \ge 1-cd_*^{q(\beta)}.$$
We note that when $\kappa=2$ $$q(\beta)=-1+2\beta+\frac{\beta^2}{4(1+\beta)}, \quad \beta_+=\frac{2(\sqrt{10}-1)}{9}.$$
Grid Domains and Transfer of Information to $\mathbb{D}$ {#grid-sect}
========================================================
When mapping conformally a curve into a reference domain, bounds on the tip structure modulus for the curve are not automatically preserved. In this section we will consider the general case without reference to a specific discrete model. It seems that this general setting requires information about boundary regularity of the approximated domain (as opposed to information about the behavior of the discrete curve). In particular, we shall need uniform control of the distortion of annuli on the scales of the structure modulus.
Grid Domains
------------
Recall the definition of a grid domain that was given in Section \[lerw-sect\]. Let $D \ni 0 $ be simply connected, and assume that the inner radius with respect to $0$ equals $1$. Let $D_n=D_n(D)$ be the $n^{-1} {\mathbb{Z}}^2$ grid-domain approximation of $D$. Notice that every point on $\partial D_n$ is within distance $\sqrt{2}/n$ of a point on $\partial D$, so that the inner Hausdorff distance between $\partial D_n$ and $\partial D$ is at most $\sqrt{2}/n$. Let $\psi: D \to \mathbb{D}$ be the conformal map normalized by $\psi(0)=0$ and $\psi'(0) > 0$. Similarly, for $n=1,2,\dots$, let $\psi_n : D_n \to \mathbb{D}$ be conformal maps with the same normalization. The sequence of domains $D_n$ converge to $D$ in the Carathéodory sense, and so the $\psi_n$ converge to $\psi$ uniformly on compacts. Our goal will be to find a convergence rate for $$\sup_{z \in D_n}|\psi_n(z)-\psi(z)|.$$ For this to be achievable we need some information about the regularity of the boundary of $D$. We will here consider the class of quasidisks, although it will be clear that similar methods can be used to handle other classes of domains where Euclidean geometric estimates on the behavior of the conformal mapping on the boundary are available.
Discrete Approximation of a Quasidisk
-------------------------------------
A quasicircle is the image of the unit circle under a quasiconformal mapping. A quasidisk is a (bounded) domain bounded by a quasicircle. See [@Pom92] for definitions and an overview from a conformal mapping point of view. A quasicircle is not necessarily rectifiable as the example of the von Koch snowflake shows.
We find it convenient to use an equivalent but more geometric definition, namely Ahlfors’ three-point condition: The closed Jordan curve $\partial D$ is a quasicircle if and only if there exists a constant $A <\infty$ such that for any two points $x,y \in \partial D$ it holds that $$\label{3point}
{\operatorname{diam}}J(x,y) \le A|x-y|,$$ where $J(x,y) \subset \partial D$ is the arc of smaller diameter connecting $x$ with $y$. One can consider the smallest such $A$ as a measure of regularity. This regularity implies some uniform regularity for the grid-domain approximation $D_n$ and this allows us to estimate the convergence rate of $\psi_n$ using a result from [@W]. See also Section 5 of [@MR] where similar questions are discussed.
\[dec15.2\] Let $D$ be a quasidisk satisfying and let $D_n$ be the $n^{-1} \mathbb{Z}^2$ grid domain approximation of $D$. Let $\psi, \psi_n$ be the normalized conformal maps from $D$ and $D_n$, respectively, onto $\mathbb{D}$. Then there exists a constant $c < \infty$ depending only on $A$ and the diameter of $D$ such that $$\label{dec8.1}
\sup_{z \in D_n}|\psi_n(z) - \psi(z)| \le c \frac{\log n}{\sqrt{n}}.$$
We will first show that $D_n$ satisfies uniformly in $n$ with a constant $A'$ depending only on $A$. Let $x,y \in \partial D_n$. First we consider the case when $|x-y| < 1/n$. Then since $\partial D_n$ is a Jordan curve which is a subset of the edge set of $n^{-1}\mathbb{Z}^2$, we have that ${\operatorname{diam}}J(x,y) \le \sqrt{2}\, |x-y|$. Now assume that $|x-y| \ge 1/n$. Let $\xi$ and $\eta$ be points on $\partial D$ closest to $x$ and $y$, respectively. Clearly, $|x-\xi|$ and $|y - \eta|$ are both at most $\sqrt{2}/n$. Let $\alpha, \beta$ be the two line segments connecting $x$ with $\xi$ and $y$ with $\eta$. First assume that the curve $\Gamma=J(x,y) \cup \alpha \cup \beta$ separates $J(\xi, \eta)$ from $0$ in $D$. Let $Q_j, \, j=1, \ldots, N$ be those lattice squares whose faces are outside of $D_n$ but whose boundaries touch $J(x,y)$. By the construction of $D_n$ and the Jordan curve theorem, since $\Gamma$ separates $0$ from $J(\xi, \eta)$, each $Q_j$ is intersected by $\alpha \cup \beta \cup J(\xi, \eta)$. Consequently, $${\operatorname{diam}}\Gamma \le {\operatorname{diam}}J(\xi, \eta) + 2\sqrt{2}/n \le A|\xi-\eta| + 2\sqrt{2}/n.$$ Hence, $${\operatorname{diam}}J(x,y) \le {\operatorname{diam}}\Gamma \le A|x-y| + (2A +2)\sqrt{2}/n.$$ Now, if $\Gamma$ does not separate $J(\xi, \eta)$ from $0$ in $D$, then since $\Gamma$ is a crosscut of $D$, $(\partial D_n \setminus J(x,y)) \cup \alpha \cup \beta$ does separate $J(\xi, \eta)$ from $0$ in $D$. Thus, in this case we can do the same argument as in the previous paragraph showing that ${\operatorname{diam}}\left(\partial D_n \setminus J(x,y)\right) \le {\operatorname{diam}}J(\xi, \eta) + 2\sqrt{2}/n$. But by definition, ${\operatorname{diam}}J(x,y) \le {\operatorname{diam}}\left(\partial D_n \setminus J(x,y)\right) $.
Using also the estimate we obtained in the case when $|x-y| < 1/n$ we conclude that, $$\begin{aligned}
\label{dec8.2}
{\operatorname{diam}}J(x,y) \le (3A+2\sqrt{2})|x-y|.\end{aligned}$$ By there is a constant $c$ depending only on $A$ and the diameter of $D$ such the Warschawshi structure moduli $\eta_{W}^{(n)}$ of $\partial D_n$ satisfy $$\eta_{W}^{(n)}(\delta) \le c \delta, \quad \delta \le 1.$$ Consequently, since $D_n \subset D$ and each point on $\partial D_n$ is within distance $\sqrt{2}/n$ of a point on $\partial D$, part (a) of Theorem VII in [@W] implies .
The same proof works when $D$ is a John domain.
For simplicity we will now assume that $\partial D$ is $C^{1+\alpha}$ for some $\alpha >0$, that is, we assume that there is a parameterization of $\partial D$ which has a Hölder-$\alpha$ derivative. By Kellogg’s theorem; see, e.g., [@GM], this assumption implies that the conformal map $\psi : D \to \mathbb{D}$ (and $\psi^{-1}$) is in $C^{1+\alpha}(\overline{D})$. (So we can take the conformal parameterization of $\partial D$.) In particular $\psi$ is bilipschitz on $\overline{D}$, that is, there is a constant $c< \infty$ depending only on $\alpha$ and the diameter of $D$ such that $$\label{kellogg}
c^{-1} |z-w| \le |\psi(z)-\psi(w)| \le c |z-w|, \quad z,w \in \overline{D}.$$ Similar uniform estimates, but of Hölder type, and corresponding versions of Lemma \[dec15.1\] (stated again below) hold if $D$ is assumed to be a quasidisk. Indeed, the uniformizing conformal map and its inverse are then Hölder continuous on a neighborhood of $\partial D$ with an exponent depending only on $A$; see [@Pom92]. From we immediately get the required control over distortion of annuli up to constants on sufficiently large scales. We can now prove Lemma \[dec15.1\] which we state again:
Suppose $D \ni 0$ is a simply connected domain Jordan domain with $C^{1+\alpha}$ boundary. Let $D_n$ be the $n^{-1} {\mathbb{Z}}^2$ grid domain approximation of $D$ and let $\gamma_n$ be a Loewner curve in $D_n$ connecting $\partial D_n$ with $0$. There is a constant $c$ depending only on $\alpha$ and the diameter of $D$ such that the following holds. Set $0< r <1/2$ and $d_n=n^{-r}$ and let $\eta^{(n)}(d_n; D_n)$ be the tip structure modulus for $\gamma_n$ in $D_n$. Then for all $n$ sufficiently large the tip structure modulus for $\psi_n(\gamma_n)$ in $\mathbb{D}$ satisfies $$\eta^{(n)}( c^{-1} d_n; \mathbb{D}) \le c \eta^{(n)}(d_n; D_n).$$
Let $\eta_n = \eta^{(n)}(d_n; D_n)$. We can assume that $\eta_n \ge 2d_n$. It is enough to verify that there exists a constant $c$ independent of $n$ such that for all annuli $\mathcal{A}(z)=\{w: d_n \le |w-z| \le \eta_n\}, \, z \in D_n$ we have $$\psi_n\left(\mathcal{A}(z) \cap D_n \right) \subset \{w: c^{-1} d_n \le |w-\psi_n(z)| \le c \eta_n \} \cap \mathbb{D}.$$ But this follows immediately from Lemma \[dec15.2\] with the assumption that $d_n = o(n^{-1/2})$ and .
[00]{} M. Aizenman, A. Burchard (1999). Hölder regularity and dimension bounds for random curves. Duke Math. J. 99, no. 3, 419–453.
J. Becker, Ch. Pommerenke (1982), Hölder continuity of conformal mappings and nonquasiconformal Jordan curves. Comment. Math. Helv. 57, no. 2, 221–225.
B. Beneš (2008), Counting Planar Random Walk Holes, Ann. Probab. 36, 1, 91–126.
C. Beneš, F. Johansson Viklund, M. Kozdron (2012), On the Rate of Convergence of Loop-Erased Random Walk. Comm. Math. Phys., to appear.
J. Garnett, D. Marshall (2008), Harmonic Measure. Cambridge University Press.
F. Johansson Viklund, G. F. Lawler (2011), Optimal Hölder Exponent for the SLE Path. Duke Math. J. 169, No. 3.
F. Johansson Viklund, G. F. Lawler (2012), Almost Sure Multifractal Spectrum for the Tip of an SLE Curve. Acta Math., to appear.
F. Johansson Viklund, S. Rohde, C. Wong (2012), On the continuity of SLE$_\kappa$ in $\kappa$, In Preparation.
A. Kemppainen, S. Smirnov (2009), Random curves, scaling limits and Loewner evolutions, Preprint.
J. Lind, S. Rohde (2010), Spacefilling curves and phases of the Loewner equation, Preprint.
J. Lind, D. E. Marshall, S. Rohde (2010), Collisions and Spirals of Loewner Traces. Duke Math. J. G. F. Lawler (2005), Conformally Invariant Processes in the Plane. Am. Math. Soc. G. F. Lawler, V. Limic (2010), Random Walk: A Modern Introduction. Cambridge University Press. G. F. Lawler, E. Puckette (1997), The disconnection exponent for simple random walk. Israel J. Math. G. F. Lawler, O. Schramm, W. Werner (2004), Scaling limits of loop-erased random walks and uniform spanning trees. Ann. of Probab. D. E. Marshall, S. Rohde (2005), The Loewner equation and Slit Mappings, J. Am. Math. Soc.
R. Näkki, B. Palka (1983), Lipschitz conditions, b-arcwise connectedness and conformal mappings. J. d’Analyse Math. 42 (1982/83), 38-50.
R. Näkki, B. Palka (1986), Extremal length and Hölder continuity of conformal mappings. Comment. Math. Helv. 61 (1986), no. 3, 389-414.
Ch. Pommerenke (1966), On the Loewner Differential Equation. Michigan Math. J. Volume 13, Issue 4 (1966), 435-443.
Ch. Pommerenke (1992), Boundary Behavior of Conformal maps. Springer.
S. Rohde, O. Schramm (2005), Basic Properties of SLE. Ann. Math., 161: 883-924.
O. Schramm (2000), Scaling limits of loop-erased random walks and uniform spanning trees. Israel J. Math., 118: 221–288.
O. Schramm (2006), Conformally invariant scaling limits: an overview and collection of problems.
O. Schramm, D. B. Wilson (2005), SLE coordinate changes. New York J. Math.
W. Smith, D. Stegenga (1987), A geometric characterization of Hölder domains. J. London Math. Soc. (2) 35 (1987), no. 3, 471-480.
S. E. Warchawski (1950), On the Degree of Variation in Conformal Mapping of Variable Regions. Trans. Am. Math. Soc., Vol. 69, No. 2., pp. 335-356.
C. Wong (2012), Smoothness of Loewner slits, Preprint.
|
The Psychology of Color in Branding
Not long ago, on an otherwise normal day in the winter of 2015, the internet—and by extension the world—lost its collective head over a picture of an ugly dress. In what would come to be known as Dressgate, the population was split as to whether the garment in question was white and gold or blue and black. While most memes are about as profound and lasting as a cat’s desire for cheeseburgers, “The Dress,” as it was also known, seemed to get at something deeper. How could something so seemingly incontrovertible as color be so steadfastly disagreed upon?
The answer, it turns out, lies squarely in the intersection of color psychology and branding. Like brands, colors are ultimately nothing more than perceptions. They exist nowhere but in the mind of those experiencing them. They also have a powerful effect on our emotions (hence the message board vitriol that spilled out like an oil slick over a silly dress.) The psychology of color has been widely explored by experts in academia, pop culture, business and more. And while the emotional effect of colors differs from person to person based on gender, cultural context, personal experience, and neurological variances, there are some general guidelines that have been borne out by countless color psychology studies. An understanding of these guidelines gives you one more tool in the underlying goal of branding: architecting reality by influencing and shaping consumer perception.
You’re probably aware that the color red can evoke feelings of either romance or danger. Or that blue can call to mind emotions like serenity or coldness. But what about orange? Or grey? And what of the more subtle emotions like harmony or hope? Which colors are most associated with those? Since color is among the fundamental visual stimuli in the human sequence of cognition, these questions are important. The psychology of color has the answers.
We’ve created a list of the 12 most commonly used colors in branding and logo design, along with the emotive guidelines for each. Remember, none of these emotional responses are objectively fixed to any given color. When it comes to the psychology of color, context and culture matter. And because one color can represent two wildly divergent feelings, the specific way in which a brand utilizes color can literally mean the difference between sickness and health (green). With that in mind, and a solid understanding of your brand personality, choosing the right color for your brand can be a rational, informed decision, rather than a fleeting or whimsical preference.
Click on the image below to view larger version:
Red
Arguably the most stirring of colors, red’s effects on the psyche are not subtle. It’s therefore important that it be used carefully for branding purposes. Red has been shown to reduce analytical thinking—it speeds up and intensifies our reactions. There’s a reason why clearance sale prices are put on red tags. Athletes up against opponents wearing red are more likely to lose, and students tend to perform worse on tests if exposed to red beforehand. Red, after all, is the color of stop signs, grammatical mistakes, and negative finances. Red has the longest wavelength of all the colors, and so appears to be nearer than it actually is. It is the color of passion and romance. Red tends to increase the appetite and is used in a range of colorful terms centered on excitement: red-hot, red-handed, paint the town red, seeing red. Inside the U.S. red is associated with conservatism. Outside the country, it’s long been the banner color for communism and socialism. Other emotional traits linked to red include the following.
Positive implications:
Power
Passion
Energy
Fearlessness
Strength
Excitement
Negative implications:
Anger
Danger
Warning
Defiance
Aggression
Pain
Orange
At the crossroads of red and yellow sits orange. Orange is stimulatory, conjuring feelings of excitement, enthusiasm, and warmth. It is a fun, energetic hue found in the branding of many sports teams. Not unlike red or yellow, orange is used to draw attention—in traffic cones and advertising collateral. Consumers tend to associate the color orange with value, in fact, a reality that brands like Home Depot have capitalized on. On the physical end of the spectrum it evokes comfort like food, warmth, and shelter. It is the color of sunset, citrus, and pumpkins, forever linked to fall and Halloween for American customers. This is especially the case when it is paired with black, which lends it a tone of cartoonish dread and frivolity. Emotions central to the color orange comprise the following.
Positive implications:
Courage
Confidence
Warmth
Innovation
Friendliness
Energy
Negative implications:
Deprivation
Frustration
Frivolity
Immaturity
Ignorance
Sluggishness
Yellow
Yellow seems to have the smallest fan club of all the colors, but those who do like it are passionate about their preference. It is widely considered a cheerful hue, but too much yellow can also trigger feelings of anger, frustration, fear, and anxiety. This is because it’s the most difficult color to take in. It’s enough to make babies cry in some studies. Yellow has been shown to increase metabolism, and can lift self-esteem when utilized correctly. Because it has a relatively long wavelength, it is the most visible color; it’s stimulating and attention-grabbing. Traffic signs, advertisements, legal pads, and certain warning labels take advantage of this fact. Other feelings evoked by yellow include:
Positive implications:
Optimism
Warmth
Happiness
Creativity
Intellect
Extraversion
Negative implications:
Irrationality
Fear
Caution
Anxiety
Frustration
Cowardice
Green
The color green is the easiest on our eyes because it requires no adjustment when it hits the retina. It’s therefore calming, restful, and pleasing. Performers waiting to go on stage or television wait in “green rooms” to relax. Green can actually improve vision, and is used in night vision because our eyes can discern the most shades of it. Sitting comfortably in the middle of the spectrum, green is the color of balance. It represents nature, fertility, and even sexuality. The myth of the green M&M is an enduring one. A green world is a safe world, one that is lush, full of water, and life-giving. For this reason it’s a reassuring color. Like all colors, though, green has its negative side. It is at once the symbol of health and sickness, luck and jealousy. The list of green’s emotive attributes includes:
Positive implications:
Health
Hope
Freshness
Nature
Growth
Prosperity
Negative implications:
Boredom
Stagnation
Envy
Blandness
Enervation
Sickness
Turquoise
Turquoise is a transformational color, embodying its spectral position between the contemplative security of blue and the organic ease of green. It suggests clarity of thought and communication. It is an inspiring color, associated with recharging the spirit, replenishing energy levels, and provoking positive thought. Turquoise is at once introspective and outwardly expressive, suggesting creativity and self-expression. In the marketplace, turquoise is often found in brands centered on communication, including education, media, and computer technology. It is an ideal color for cleaning products as it evokes cleanliness and purity without being too sterile. As a color of transformation, turquoise can suggest indecision and a lack of grounded deliberation when used in the wrong context. Other psychological traits associated with turquoise are:
Positive implications:
Communication
Clarity
Calmness
Inspiration
Self-expression
Healing
Negative implications:
Boastfulness
Secrecy
Unreliability
Reticence
Fence-sitting
Aloofness
Blue
Where red is the color of the body, blue is evokes the mind. Serene and calming, it is the color of clarity and communication. According to color psychology studies, blue has been shown to be the most common favorite color among the world’s population, and is particularly preferred by men. It is, of course, everywhere in our daily lives. It’s the color of the sky, the oceans, and the lakes. This global preference and environmental omnipresence makes blue non-threatening, conservative, and traditional. Brands are not taking any risks when they call on a shade of blue for their identity. It is seen as a sign of stability and reliability, and it’s been shown that workers are more productive in blue rooms. Blue, of course, is also the color of sadness and coldness. It is among the least appetizing of colors as it is an indicator of spoilage and poison. Weight loss plans suggest you eat food off a blue plate as you’re liable to eat less of it. Across the spectrum, blue’s emotional attributions include:
Positive implications:
Trust
Loyalty
Dependability
Logic
Serenity
Security
Negative implications:
Coldness
Aloofness
Emotionless
Unfriendliness
Uncaring
Unappetizing
Purple
At the intersection of red and blue, purple is an intriguing balance of masculine and feminine traits—at once warm and cool, yet neither. This melding of blue’s calmness and red’s stimulation can be unnerving unless the dominance of one or the other is clear. Blueish purple, then, is patently cool, while redish purple is patently warm. Purple is the color of royalty and bravery, and connotes wealth, luxury, and sophistication. It is among the rarest colors in nature and as such can come across as either special or artificial. It sits in the shortest wavelength and is the last to be visible. For this reason, purple is associated with time, space, and the cosmos. It’s imbued with spirituality, contemplation, and mediation, suggesting creativity and imagination. Purple’s attendant values include the following.
Positive implications:
Wisdom
Luxury
Wealth
Spirituality
Imaginative
Sophistication
Negative implications:
Introversion
Decadence
Suppression
Inferiority
Extravagance
Moodiness
Magenta
Not quite red and not quite purple, Magneta is very much its own hue with a slew of distinct and psychological implications. Magenta is a color of emotional balance and physical harmony. It’s sophisticated yet pragmatic, evocative of logic and perspicacity. Magenta is redolent of compassion, support, and kindness, and is associated with feelings of self-respect and contentment. It’s a color of transformation, suggesting the sloughing off of old ideas and the embrace of new ones. It retains a certain level of boldness from red and can thusly appear either outrageous and shocking or innovative and imaginative, depending on the context. Magenta is well suited to creative, nonconformist endeavors. The psychological implications of magenta include the following:
Positive implications:
Imaginative
Passion
Transformation
Creative
Innovation
Balance
Negative implications:
Outrageousness
Nonconformity
Flippancy
Impulsiveness
Eccentricity
Ephemeralness
Brown
Brown is made up of constituent hues red and yellow, with a large percentage of black. For this reason, it is imbued with much of the same seriousness as black, but with a warmer, softer tone. Brown is sturdy and reliable, the color of earth and abundant in nature. It has the dependability and authenticity of wood or leather and is more often among the preferred colors of men than women. It has quietly supportive overtones, but can also be sad and wistful. At heart a practical and utilitarian color, brown can be sophisticated if used correctly. Its psychological attributes include:
Positive implications:
Seriousness
Warmth
Earthiness
Reliability
Support
Authenticity
Negative implications:
Humorlessness
Heaviness
Lack of sophistication
Sadness
Dirtiness
Conservativeness
Black
Black is the total absorption of all color. This fact alone has profound psychological implications. Black is a symbol of power. It is a barrier color: it absorbs energy and enshrouds the personality. It is essentially the absence of light, which gives it its ominous overtones. There is no nuance to black, at least not conceptually. With its diametric partner in crime, white, black stands for sophistication, weight, and seriousness. Black is timeless and effortlessly stylish. Think the little black dress or a certain iconic black turtleneck. It is the color of sophistication, but also of mourning. Worn by both priests and villains, black can imply submission (to god) or nefariousness and evil. The complete psychological attributes of black comprise the following.
Positive implications:
Sophistication
Security
Power
Elegance
Authority
Substance
Negative implications:
Oppression
Coldness
Menace
Heaviness
Evil
Mourning
Gray
Pure gray is the one color that’s been shown to have no dominant psychological characteristic. But that doesn’t mean it’s not powerfully suggestive. Gray is modern and sophisticated, a hue that has worked well for technology and luxury brands. Its inherent subtlety can be both a strength and a weakness. Skillful use of gray evokes power and sophistication; it is a crisp slate on which bold concepts thrive. Gray is the color of ominous but powerful weather—a cloak over the existence of color rather than the absence of it. It has a profound effect on the colors around it, working both to balance tones and establish negative space in lieu of white. The attributes of gray comprise:
Positive implications:
Timelessness
Neutrality
Reliability
Balance
Intelligence
Strength
Negative implications:
Lack of confidence
Dampness
Depression
Hibernation
Lack of energy
Blandness
White
Where black is the absorption of all light and the embodiment of all color, white is the reflection and absence. For this reason, it has long been a symbol of purity and innocence. In healthcare settings, white implies cleanliness and sterility. Outside of the hospital, it is an irrevocable indicator of the fairer seasons—rare is the fashion faux pas more egregious than wearing white after Labor Day. White’s association with marriage and wedding dresses is deeply entrenched. It is also modern, leveraged by brands like Apple to denote a chic, sleek style. It is the most minimal of all the colors, imbuing a heightened perception of space. White is the color of blank slates, symbolizing freshness and new, untarnished beginnings. The sterility that is a positive for white in the healthcare sphere can count against it elsewhere. Used haphazardly, white can bring to mind coldness, emptiness, and isolation.
Positive implications:
Cleanness
Clarity
Purity
Simplicity
Sophistication
Freshness
Negative implications:
Sterility
Coldness
Unfriendliness
Elitism
Isolation
Emptiness
Conclusion
Your brand identity defines how the world perceives your brand. Color is an integral component to that perception. Choosing the hue that best embodies your brand personality is critical to building a truly authentic brand. It isn’t a decision that should be left to whim. By understanding the psychology of color, you can make a selection based on insight gleaned from innumerable scientific surveys. So, which color is right for your brand? |
Q:
Timestamp does not work with built in variables
If I hard code the date/time into the timestamp (in line 3), that day's open is plotted as I would expect. However, using trading view's built-in variables (commented out in line 4), nothing is plotted. I cant understand the difference, maybe I'm not using the built-in variables correctly.
I did a test to see if the built-in variables matched the hard-coded values and from what I saw, they did match.
//@version=4
study( "Session Open", overlay = true)
t = timestamp(2019, 8, 30, 9, 30)
//t = timestamp(year, month, dayofmonth, 9, 30)
l = float(na)
l := time >= t and na(l[1]) ? open : l[1]
plot(l)
Assuming you hard code the current date into line 3, I would expect lines 3 and 4 to properly create a timestamp that can be used to plot the open.
A:
The variables year, month and dayofthemonth return their information relative to the bar the script is running on. Today for them, is the date of the bar—not what today means to you.
|
haha you're one of those guys eh? all about snowboard/skate only, i went to a couple of those shops at the snow show, asked about K2, they laughed saying it wasn't a "snowboard company" i laughed and walked outta their store with 5 friends who were looking to buy things from them
Actually i'm one of the guys who goes to all the shops in the area (nothing else to do since theres no snow yet). Kenmark, Senecal, Sanction, Skiis & bikes, Sign of the skier, sporting life. I've ordered lots online from brociety & dogfunk & Empire. I try to support local, but i've got to think with my wallet as well. It is nice to go to a store thats dedicated as well. Some stores just seem to have boards as an afterthought & the sales guys don't really know alot about the product. I'm noticing a lot of the stores seem to have ordered much less product this year and even the lines of snowboards are kind of thin. Like big on burtons mid to lower end, then some elans. But Sanction has the most diverse product in the area. But the highest end stuff that i've seen has been at the sporting life downtown.
So actually i'm not one of those 'core' guys, to each his own.
Actually I used to have the old K2 brian savard w/ the wolf and the moon graphic. Nice board till i popped it. |
Spectrophotometric methods for determining meloxicam in pharmaceuticals using batch and flow-injection procedures.
Two sensitive and fast spectrophotometric methods using batch and flow-injection procedures for the determination of meloxicam (MX) are proposed. The methods are based on the formation of a green complex between this drug and Fe(III) [2MX/Fe(III)] in a methanolic medium. The calibration graphs resulting from measuring the absorbance at 570 nm are linear over the ranges 2.0-200 and 5.00-250 mg l(-1) with detection limits of 0.47 and 0.72 mg l(-1), respectively. Furthermore, a flow-injection spectrophotometric method involving measurement of the absorbance of the drug at 362 nm in 0.1 M NaOH is presented. The calibration graph is linear over the range 0.5-20 mg l(-1) with a detection limit of 0.04 mg l(-1). The methods are applied to the routine analysis of MX in pharmaceuticals. |
Pages
Thursday, May 28, 2009
OSU Athletics: Ohio State vs. Georgia at the Tallahassee Regional
COLUMBUS, Ohio - Big Ten Conference champion Ohio State will compete in its 13th NCAA tournament under the direction of coach Bob Todd and the 19th NCAA in school history this weekend as the No. 3 Seed in the Tallahassee Regional.
The 40-17 Buckeyes, ranked 30th this week by the National Collegiate Baseball Writers Association, meet the No. 2 Seed Georgia Bulldogs, 37-22, in a noon game at Mark Martin Field in Dick Howser Stadium. No. 1 Seed and 42-16 Florida State and No. 4 Seed and 31-26 Marist meet in the 4 p.m. game Friday. The winners of these games play at 4 p.m. Saturday while the two losing teams play in an elimination game at noon Saturday.
BROADCAST INFORMATIONAll of the games at the Tallahassee Regional will be carried live on ESPNU. The games can be heard locally and over the internet on 103.9 WTDA Talk FM with Frank Fraas and former Buckeye pitcher Bob Spears describing the action.
19th NCAA APPEARANCEOhio State is making its 19th NCAA tournament appearance, its 13th under the direction of head coach Bob Todd and first since 2007. No Big Ten team has more NCAA appearances since 1988 (Todd’s first year) and only Minnesota (29 NCAAs) and Michigan (21) have more NCAA appearances among Big Ten teams than Ohio State. |
Gardner’s Trump Apologetics Are Now Just Plain Ridiculous
During a Fox News interview on Tuesday, Sen. Cory Gardner (R-CO) was asked to respond to controversial comments President Trump made earlier in the day about his upcoming meeting with Russian President Vladimir Putin. Gardner responded by flatly denying Trump actually meant what he said.
Just before boarding Air Force One, Trump, who repeatedly attacked the NATO alliance on Twitter on Tuesday, told reporters that his meeting with Putin “may be the easiest” he has during his trip to Europe.
“So I have NATO; I have the UK, which is in somewhat turmoil; and I have Putin,” Trump said, referring to meetings he has during his trip to Europe. “Frankly, Putin may be the easiest of them all. Who would think? Who would think?” [Pols emphasis]
President Donald Trump’s repeated statements that he prefers to meet with adversaries as opposed to allies of the United States helps feed the perception that his foreign policy is entirely capricious and personality-driven, with no respect for the long-term relationships with close Western allies that have given American power the consensus needed for global leadership. Obviously, when the President is doing better cultivating relationships with with the nation’s enemies than our allies, something is amiss.
Into this latest morass steps Sen. Cory Gardner, Republican member of the Senate Foreign Relations Committee and chairman of the National Republican Senatorial Committee–with the unenviable task of making Trump’s brashness comport with the grownup world:
After being played a video clip of Trump’s remarks and being asked whether what he said is “true,” Gardner uttered an uncomfortable chuckle and said, “No. I think the president knows that’s not true as well.” [Pols emphasis]
“I think he’s simply trying to say to our great NATO allies and friends, ‘let’s make sure that we’re all rowing in the same direction, so to speak. Let’s make sure that we’re living up to our expectations and obligations,’” Gardner said. “I think the president knows the challenges he has with Vladimir Putin, we all know that, and I hope that when he meets with our NATO allies he will talk about the violations of international law that Russia has created, and indeed, it sounds like he may have an opportunity at some point to even address that very same concern with Vladimir Putin himself.”
So we are now at the point of hearing the verbatim words of the President of the United States, and Cory Gardner is reduced to simply denying the President meant what he plainly said. Gardner has sometimes been able to redirect the President’s outlandish pronouncements back into a coherent framework that doesn’t do huge damage to the nation’s stated policy objectives, but there’s just nothing to work with here.
Wonder how Sen. Gardner, member of the Commission on Security and Cooperation in Europe — a joint committee of the Senate and House — would characterize Trump's new demand that NATO nations should be spending 4% of GDP on defense. Is he in favor of the US boosting defense spending to that level? Given the current situation of most NATO members trying to rise to 2%, will Trump asking for more contribute to Security and Cooperation? |
Archive
DELRAY BEACH, Florida–The story appeared in the Jerusalem Post of September 21. It was headed “Oren urges Jewish leaders to support peace moves.” The story described a meeting Israeli Ambassador Michael Oren held in Washington with Israeli and Jewish reporters.
Some background. Since 1948 American Jewish leaders have listened closely to the Israeli Embassy. The ambassador never had to ask for support. He described Israeli policy and Jewish leaders followed even when Israeli actions were contrary to American policy.
Support for Jewish settlements in the West Bank is a notable example. The United States has opposed every settlement as contrary to international law on occupied territory and a serious obstacle to peace . But American opposition to settlements, for political reasons, was never forceful, and almost 300,000 Jews have settled in the West Bank.
Which explains why, for the first time, Ambassador Oren’s plea for support was greeted with silence. Even by Abe Foxman of the Anti-Defamation League. For years he has acted as the self-appointed spokesman for Israeli policies. Now he is occupied in wiggling his opposition to the Islamic center, two blocks from ground zero. Read more…
PHILADELPHIA — Editors at Time Magazine may be unfairly accused of anti-Semitism, but they are reckless with their semantics. As experienced journalists, they should understand that misleading language can be dangerous.
The magazine’s Sept. 13 cover headline – “Why Israel Doesn’t Care About Peace” – brought its editors condemnation from supporters of Israel. The Anti-Defamation League slammed the Time article for stressing Israelis’ inclination to make money.
Academy Award-winning actor Jon Voight, a staunch gentile supporter of Israel, called Time “anti-Semitic” because of the headline and its accompanying article inside which contends that Israelis are apathetic toward the peace process with the Arabs.
Karl Vick, the writer, indeed succeeds in reaching this conclusion. Who can blame the Israelis?
Hostilities resulted from the offer of a Palestinian state in 2000 and withdrawal from Gaza in 2005.
Personally, I long ago ceased understanding what Israel gets out of negotiating a pact with Arabs over Israel’s territories.
Vick and his editors made three mistakes. First, a Time spokesman boasted that the article is a scoop. Oh yeah? A Newsweek article reached the same conclusion last January.
No doubt that claim is factually true for many Israelis, but the phrase “they’re making money” is delicate wording when applied to Jews, who have been stereotyped as greedy throughout the ages.
The most gaping blunder is the headline, which presumes that Israel is apathetic to peace.
“Peace” is not what Israelis need from Arabs in the territories. They already have a relative level of peace within Israel proper. Terrorist bombings from the West Bank ended after the security barrier started going up. Rocket attacks from Gaza and southern Lebanon dwindled after recent military confrontations with Hamas and Hezbollah.
Time would have been more factual, if tedious, had they composed this headline: “Why Many Israelis Don’t Care About Reaching Terms.”
The word “peace” is tossed around too casually in the context of this conflict, and Time is far from alone in committing this offense. “Peace” has evolved as shorthand for a process that is too convoluted to be reduced to a single five-letter word. It allows for a catchy phrase, but Time editors may disdain letting the facts get in the way of a good headline.
The only objective that seems plausible is the handover of land – namely, Gaza and the West Bank – so the Arabs can form their own society. That’s fine, but a treaty will not ensure “peace” and “peace” need not be achieved through a treaty. Even if it agrees to a near-perfect deal, Israel must still worry about Iran’s nuclear designs and the ongoing arms build-up in Gaza and southern Lebanon.
The same obstacles persist – security needs, excessive Arab demands, settler resistance, Hamas’ control of Gaza and right-wing pressures within the Israeli government.
Hawkish advocates for Israel will insist that the West Bank is not peaceful, but what do the settlers expect when they choose to live amid a hostile population? “Peace” can only be accomplished there by removing the settlers, even unilaterally; expelling the Arabs; or negotiating a pact that is fully enforced. Israelis who live in Israel proper care about West Bank “peace” when their sons and daughters in uniform are assigned to protect the settlements.
For the record, it would be valuable if an accord is reached, but it is still a feat that most Israelis can live without…in peace. Violence can erupt at any time, as was the case with riots in east Jerusalem and the murder of four settlers in recent weeks. Even if a “peace” treaty is ever implemented.
NEW YORK –Under relentless pressure by the Obama administration, Israel’s Prime Minister Netanyahu agreed, last November, to a one-sided one-time, 10-month Jewish construction freeze on the six percent of the West Bank where Jews live. Since the Oslo accords were signed in 1993, Israel hasn’t built a single new settlement and has only built within the settlement borders as of 1993. On November 30, 2009, Netanyahu pleaded with Israelis to accept this unilateral and extraordinary concession by promising, “This is a one-time decision and it is temporary.” Now that the 10 month freeze period has ended, Netanyahu has done the right thing by ending the freeze and he has urged Palestinian Authority (PA) President Mahmoud Abbas “to continue the good and sincere talks that we have just started.”
It was hoped that the unprecedented Israeli construction freeze was to have motivated the Palestinians to implement their yet unrealized pro-peace actions. Tragically, no positive actions were taken by the Palestinians during this ten-month period.
They haven’t arrested anti-Israel terrorists, outlawed terrorist groups or ended the incitement to hatred and murder against Jews in their PA-controlled media, mosques, schools and youth camps. They have even refused direct negotiations until now.
The PA still glorifies terrorists and violence. Last month, Abbas told Arab journalists in Jordan that, “If you [the Arab states] want war, and if all of you will fight Israel, we are in favor.” In July, he honored Muhammad Daoud Oudeh, the mastermind of the 1972 Munich Olympics where Palestinian terrorists murdered eleven Israeli athletes. Abbas called him ‘a wonderful brother, companion, tough and stubborn, relentless fighter.’
The PA has obscenely and publicly celebrated the 1978 coastal road massacre carried out by Palestinian terrorists led by Dalal Mughrabi, in which 37 Israelis, including a dozen children, were murdered. The PA has also named two youth summer camps in Mughrabi’s honor. Abbas has named literally scores of streets, schools, computer centers, sports teams and other institutions after terrorists who have murdered Israelis.
All of these continuing and horrifying anti-peace, pro-terror actions by the Palestinian Authority makes it clear that even major Israeli concessions like the freeze, giving up all of Gaza and half of the West Bank won’t cause the Palestinians to change their belligerent actions.
Until this incitement ends, all talk of peace is a farce. As the distinguished British historian Paul Johnson has written in his History of the Jews, ‘one of the principle lessons of Jewish history has been that repeated verbal slanders are sooner or later followed by violent physical deeds.
And look at the history of concessions since Oslo began in 1993. Israel withdrew from southern Lebanon in 2000, but this did not lead Hizballah to become peaceful and moderate. On the contrary, Israel was subjected to new assaults and waged a war in 2006 which cost the lives of over 100 Israeli servicemen. Israel withdrew from Gaza in 2005, only to face an exponential increase in rocket assaults and the violent seizure of the territory by Hamas.
When Ehud Barak offered Yasser Arafat huge concessions in 2000 it resulted in a terrible terrorist campaign by the PA which claimed almost 2,000 Israeli lives and over 10,000 wounded and maimed.
Unilateral concessions don’t work. Clearly, the Palestinians simply want to continue these unilateral concessions. Why else would they consider to now refuse to negotiate when negotiations will only lead to more Israeli land concessions to them – but will require Palestinian concessions and a final written peace agreement ending all Palestinian claims.
We must understand that peace can only occur when the Palestinians realize they will receive no more concessions and no more international support, which includes the $1.3 billion the US now provides to the PA, until they change their schools, media, and political speeches from supporting violence and the Jewish state’s destruction to supporting peace and the right of Jews to live in their sovereign ancient homeland.
Had Israel decided to continue the freeze, a message would be sent that, by applying pressure, Israel can be made to increase and expand any concession it has already made. Ending the freeze makes it clear to the Palestinians that time is not on their side and they must finally act to promote a real peace.
SAN DIEGO — It’s not hard to agree that the settlement movement in Israel—a hybrid of indigenous religious zealots and immigrant fundamentalists from places like Chicago, Toronto, and Johannesburg—is something of a complication for the peace process. This is true even though the overwhelming majority of Israelis—people making car payments, trying to keep their jobs, and maintain their health benefits—are neither settlers, would-be settlers, or even particularly observant Jews.
The Palestinian obsession with the settlements is peculiar and out-of-touch with a) the far more urgent issue of salvaging their own state (deserved) from a smoldering splinter of terror groups and ostensibly more “moderate” factions that remain in bloody stalemate among each other (primarily Hamas v. Fatah) and b) the more cogent realization that to ask Israel to stop building communities when you haven’t even offered to stop destroying communities is absurd and disingenuous.
The Palestinians, with their funny caveats, and the Obama imposers, with their tongue-clucking demands that Israel “take risks for peace” (as if every single day since Israel was created in 1948 has not been a risk) don’t seem to grasp the bigger picture: Israel is about life and growth and science and creativity.
Over 80% of the nation consists of secularists who watch cable news, shop in trendy malls, love to linger in fashionable coffee shops, drive late-model cars across a national freeway system, and like to travel to Turkey, India, Hong Kong, and North America. They want college, not conflagration. Read more…
JERUSALEM — It was they who put on the table the demand for a total freeze in Jewish construction throughout the West Bank and East Jerusalem.
The result was to increase the political demands of the Palestinians, as well as the Israeli settlers and their supporters.
Increasing demands of both sides before the start of intense negotiations is not my understanding of wise guidance.
Perhaps the damage was slight, insofar as there never were great chances for a full blown agreement on the issues separating Israel and Palestine. However, the flub distracted the leaders of Palestine and Israel from domestic concerns. For Palestinians of the West Bank, the great advances of recent years came from foreign investments in housing, infrastructure, and industry, plus the upgrading of security forces with the help of the United States and Jordan. More effective security allowed Israel to reduce its own military incursions and restrictions of travel, and those provided further boosts to Palestinian development.
MELBOURNE, 23 September – Communal organisations
have called into question the effectiveness of the Jewish Community Council of Victoria’s (JCCV) campaign calendar.
Despite paying a large annual sum for the exclusive right to fundraise during certain weeks of the year, groups say this schedule is not being enforced.
Magen David Adom (MDA) has accused a number of community not-for-profits of failing to respect its exclusive appeal period, which falls for a week at the end of August and another at the start of October.
A JCCV affiliate, the Australian arm of the Israeli ambulance service like other organisations pays to guarantee a sole fundraising window. However, it claims some bodies have not respected its two-week block. Read more…
WASHINGTON, D.C. — His was an odd speech for a President. He stood before the world and trashed the United States. “The blocks and neighborhoods of this great city tell the story of a difficult decade,” he said of New York, beginning with the attack on the World Trade Center and through the economic collapse that “devastated American families on Main Street.” And he worried that, “Underneath these challenges to our security and prosperity lie deeper fears: that ancient hatreds and religious divides are once again ascendant; that a world which has grown more interconnected has somehow slipped beyond our control.”
America has had a bad decade. We’re devastated. We may turn to ancient hatreds. The world is beyond our control. Is that what Barack Obama thinks of us?
We expected the president of Iran to start his speech with, “President Obama admits his country is on the skids.” He did. “The system of capitalism and the existing world order has proved to be unable to provide appropriate solution to the problems of societies, thus coming to an end.” He noted the horrors of Western colonialism and two World Wars. His take on the September 11th bombings it that there are three theories – all of which implicate the government of the United States. |
Day: August 3, 2015
Noble Energy, a driller with a massive joint venture with CONSOL Energy on 663,350 acres of Marcellus and Utica Shale leases in the northeast, has confirmed they are “cutting back” the number of rigs they operate in the Marcellus Shale due to “the current environment.” What “cutting back” means is that they will go from operating a single rig to operating no rigs beginning in the middle of the third quarter (which means next month). Two other Marcellus rigs operated by CONSOL Energy will go off line by the fourth quarter…Continue reading
Last week Hess released their second quarter 2015 earnings and operations update. It didn’t really say too much at all about their drilling program in the Ohio Utica Shale. We did, however, get some color commentary from CEO John Hess on last week’s conference call with analysts. We learned from that call that Hess drilled, with joint venture partner CONSOL Energy, just 10 wells in 2Q15. They completed 15 wells (some previously drilled) and brought 9 wells online into production. Hess is dropping from 2 active rigs in the Ohio to just 1 rig for the balance of 2015 but even so, they expect to bring 25-30 new wells online for all of 2015. The interesting (kind of funny) thing to MDN was an off-the-cuff statement by Hess President & COO Greg Hill on the call. Hill said that Hess will continue to concentrate their Utica drilling in Harrison County, OH. Why? Not because that’s where most of their remaining Utica acreage is located–oh no. But because Harrison County is, according to Hill, “truly the sweet spot of the play” and “the wettest part of the play.” There you have it. Forget about Belmont, Monroe, Noble and Guernsey counties. Harrison is where it’s at…Continue reading
The editors of the top-flight NGI Shale Daily publication have put together a free special report on the Rogersville Shale–and you can download it by providing only your name and email address. So far, the Rogersville Shale, a formation that’s part of the Rome Trough in the Appalachian Basin, has largely flown under the radar. A new special report from the editors of NGI’s Shale Daily exposes what some E&Ps had hoped to keep secret. A half dozen or more E&Ps are clandestinely attempting to learn more about the Rogersville Shale–and a land grab is on to lock up lease rights for thousands of acres before the word gets out. An E&P early pioneer in the Rogersville drilled a test well in October 2013 that was later permitted for full production. The company secured a one-year confidentially agreement before they are required to release a completions report. On or about August 20, the one-year time limit expires. What new information will be disclosed?…Continue reading
An open season–a time when customers can sign multi-year contracts with a pipeline company–begins today…but not for a pipeline. This open season connects to pipelines but is for storage of natural gas in the Marcellus/Utica region. Chestnut Ridge Storage, LLC is a proposed underground storage facility that will be built in the West Summit Field located under portions of Fayette County, PA and Monongalia and Preston counties in WV. The new facility will be able to store an initial 15 billion cubic feet (Bcf) of natural gas, and eventually 25 Bcf. The facility, if it gets approved by the Federal Energy Regulatory Commission (FERC), will not be fully operational for another three years–in 2Q18. The open season is “non-binding” meaning customers don’t yet have to sign on the dotted line. We don’t often talk about it, but a key part of the natural gas infrastructure that delivers gas to customers is storage. Not all gas can be used as soon as it’s extracted and flowed through a pipeline. There are a series of (mostly) underground storage facilities that act as a temporary rest stop along the journey to market. A very necessary and important rest stop. The interesting thing to MDN about this particular open season announcement, aside from the fact that it’s meant to store Marcellus and Utica Shale gas, is who is building it: eCORP International…Continue reading
Last Friday MDN told you about an ongoing FBI investigation into death threats made by anti-drilling zealots against workers of the PennEast Pipeline (see FBI Investigates Death Threats Against PennEast Pipeline Workers). Multiple choice question: When one of their own tips over the edge into violence or proposed violence, anti-drillers (a) act shocked and surprised, (b) deny it’s true, implying it’s a made-up story by the pipeline company, or (c) both. If you guessed (c) you would be correct…Continue reading
Flat-out, 100% lies is what best describes the claims being made by anti-pipeline groups like Stop the Pipeline in New York State in a letter sent to Gov. Andrew Cuomo, with respect to charges that the already-FERC-approved Constitution Pipeline would, if built, incite an environmental Holocaust in the state. These are the VERY SAME people who successfully pressured Cuomo into banning fracking in the state–so they’re hoping they can bully the pathetically weak Cuomo once again, this time to reject the Constitution Pipeline. The renewed and shrill campaign against the pipeline comes because last week Cabot Oil & Gas CEO Dan Dinges said he expects the NY Dept. of Environmental Conservation (DEC) to issue permits allowing the pipeline to cross streams and swamps (i.e. “wetlands”) any day now. The fact that this pipeline WILL get built is eating anti-drillers alive. They can’t stand it. So they whip up an email “letter” to Cuomo, and then get their sympathetic buddies at the Democrat Albany Times Union to run a story on their efforts, trying to manufacture the appearance that there is a groundswell of support against the pipeline–when there isn’t…Continue reading
Once again the Philadelphia Inquirer and its Daily News subsidiary show why their circulation numbers (and profits) continue to plummet: Because they are nothing more than a Democrat house organ propaganda outlet. They don’t report news–they manufacture and repeat, endlessly, Dem lies. Note the latest “editorial” written by the same people who supposedly report the news in what has become a Democrat rag. The editorial, reproduced below, blames the budget stalemate in the Pennsylvania on Republicans because Republicans are supposedly in the back pocket of Marcellus big oil and gas companies. The self-righteous and pure as the wind-driven snow Democrats only want all remaining profits from Marcellus Shale drilling for the chil’ren (those evil, nasty, vile big oil and gas companies, anyway). Of course the editorial says NOTHING about Democrat lust and desire for OPM–other people’s money–to fund Big Education and to repay Tom Wolf’s election debt to teachers’ unions. Nope, not a word. And that’s why rags like the Philly Inquirer and crashing and burning…Continue reading
Back in February MDN told you about a group of aging hippies, er, a, New Englanders from Deerfield, MA who decided to sue the federal government to block Kinder Morgan’s Northeast Energy Direct (NED) pipeline project from being built across their property (see Mass. Town Sues FERC to Stop Pipeline Claiming Gas is for Export). The Town of Deerfield is using the pro bono services of a lawyer that doesn’t live in Deerfield, Cristobal Bonifaz. Bonifaz filed the lawsuit in federal court. His argument is that “most of the gas” flowing through NED will be exported and not even used in New England, and taking private property via eminent domain to do so is illegal. His claim is false–but truth isn’t what always wins in court cases. These days it’s finding a liberal judge you can influence that wins in court. Bonifaz is back and he’s filed the same exact lawsuit a second time–with a different (small) group of people from Deerfield and surrounding areas…Continue reading
Yet another hit piece against the shale industry from the taxpayer-funded, left-leaning, anti-drilling PBS StateImpact Pennsylvania. This time it’s about pipelines. Reporter Susan Phillips says there’s so darned many of the stupid things under our feet, we don’t even know where they all are and “POOF!” they may explode at any minute if you look at ’em wrong. Case in point: A man operating a bulldozer whose company called One Call before digging, dug up a pipeline that wasn’t mapped and had evil, nasty natural gas running through it. It exploded and sent the man to the hospital with burns over 70% of his body. We’re not making light of the accident or this man’s plight (which is truly tragic). We are making light of the silly notion implied by Phillips in her wide-ranging hit piece that pipelines are “risky” and a “mystery” with the implication we shouldn’t build another single pipeline until we can get pipelines already in the ground fully mapped down the square centimeter. This is a new, coordinated attack on the industry from the usual suspects. Stop the pipelines and you stop the evil fossil fuel natural gas from getting to market…Continue reading
The non-partisan website InsideGov, a site built and maintained by technology company FindTheBest, used public statements, press releases, campaign platforms and voting records to score each state governor’s view on important issues. InsideGov then used the data they collected to assign values for the most conservative political philosophy, and the most liberal. No lie–the single most liberal state governor in the United States is not Andrew Cuomo–he’s #5 in the list of most liberal. Nope. The single most liberal governor in these United States is (trumpet fanfare): Tom Wolf, from Pennsylvania. Wolf is ahead of the whack-a-doos in New York, Vermont, Connecticut and even Minnesoooota. Yeah, the same Tom Wolf who wants to steal the profits from Marcellus drillers to give to teachers’ unions to pay them back for voting him into office. That Tom Wolf. Most liberal. And what do the libs at Philadelphia Magazine write? (This is hilarious.) They write that even though Wolf walks like a liberal duck, quacks like a liberal duck, swims like a liberal duck–he isn’t really all THAT liberal…Continue reading |
[Parodontal microhemodynamics status in patients with vascular dystonias].
The state of peridontal microhemodynamics was investigated in 80 patients with an initial arterial hypotension (IAH) and 70 patients with an arterial hypertension (AH) of different age-groups (6, 15, 20-24, 40-45 years) according to the laser dopplerography method. A decrease of a bloodflow intensity in all agt-groups with IAH and in senior group with AH was estimated. Impairments of the regional hemodynamics were accompanied by the high rate of stomatological morbidity. |
Elmer G. “Geronimo” Pratt, a former Los Angeles Black Panther Party leader whose 1972 murder conviction was overturned after he spent 27 years in prison for a crime he said he did not commit, has died. He was 63.
Pratt, whose case became for many a symbol of racial injustices during the turbulent 1960s, died Thursday at his home in a small village in Tanzania, said his sister Virginia. The cause was not given.
Pratt’s case became a cause celebre for a range of supporters, including elected officials, activists, Amnesty International, clergy and celebrities who believed he was framed by Los Angeles police and the FBI because he was African American and a member of the radical Black Panthers. Pratt maintained that the FBI knew he was innocent because the agency had him under surveillance in Oakland when the slaying was committed in Santa Monica.
“Geronimo was a powerful leader,” Stuart Hanlon, Pratt’s longtime San Francisco attorney, told The Times. “For that reason he was targeted.”
Pratt was arrested in 1970 and two years later convicted and sentenced to life in prison for the 1968 fatal shooting of Caroline Olsen and the serious wounding of her husband, Kenneth, in a robbery that netted $18. The case was overturned in 1997 by an Orange County Superior Court judge who ruled that prosecutors at Pratt’s murder trial had concealed evidence that could have led to his acquittal.
A federal judge later approved a $4.5 million settlement in Pratt’s false-imprisonment and civil rights lawsuit.
Pratt, who also went by Geronimo Ji Jaga Pratt, was born on Sept. 13, 1947, in Morgan City, La., a small town about two hours from New Orleans. The youngest of seven children, Pratt was raised as a Roman Catholic by his mother and his father, who operated a small scrap-metal business.
Growing up in the segregated South amid a tight-knit black community had a profound effect on Pratt, he later told interviewers.
“The situation was pretty racist, on the one hand,” he said in an interview with Race and Class magazine. “On the other, it was full of integrity and dignity and the pride of being part of this community … the values, the work ethic, very respectful to everyone.”
Pratt volunteered to join the Army and served with the 82nd Airborne in Vietnam, where he was awarded two Bronze Stars, a Silver Star and two Purple Hearts. After he was discharged, Pratt moved to Los Angeles in 1968 and enrolled at UCLA. While attending classes, he met Alprentice “Bunchy” Carter, a Louisiana native and an early member of the Black Panther Party who recruited him to the cause and gave him the “Geronimo” nickname.
Pratt was convicted in the 1968 shooting after compelling testimony by Julius C. (Julio) Butler, a one-time Black Panther associate who told jurors that Pratt discussed “the mission” with him before the attack and admitted later that evening that he had shot the couple. Government records later showed that Butler was an FBI informant at the time. Butler denied being an informant.
Nonetheless, three jurors who convicted Pratt said they would have held out for acquittal if they had known of Butler’s relationship with the FBI.
For more than two decades, Pratt’s legal team — led by Hanlon and Los Angeles attorney Johnnie L. Cochran Jr. — struggled to win Pratt’s freedom. Cochran, who was a key member of O.J. Simpson’s “Dream Team” before his death in 2005, said Pratt’s case was the most important of his career.
After he was released from Mule Creek State Prison in Amador County, Pratt held no animosity toward authorities who had imprisoned him, Hanlon said. “He was at peace with himself,” the attorney said.
Pratt is survived by a daughter, three sons, two sisters and two brothers.
robert.lopez@latimes.com |
Pituitary hormones released during sexual maturation of the rat appear to influence the rate of retinal degeneration after exposure to continuous photoperiod. Retinas of young, sexually immature rats are more resistant to damage by radiant energy than those after sexual maturity (6 to 8 weeks of age). Preliminary studies from this laboratory have shown that hypophysectomy (HYPEX), which inhibits sexual maturation and influences pituitary target organs, exerts a "protective influence" on retinas exposed to continuous radiant energy. The retinas of HYPEX rats do not degenerate as rapidly as those of adult, intact rats. Ovariectomy of rats inhibits the damaging effect of photoperiod exposure. The effects of the pituitary gland and the gonads on photically-induced retinal damage will be examined further in hypophysectomized and intact rats of different ages after the administration of pituitary extracts, pituitary transplantation, and substitution therapy with pituitary gonadotrophins. Additional studies will involve an analysis of retinal damage after overiectomizing rats of different ages and substitution therapy with ovarian steroids prior to and during exposure to cyclic photoperiod, low-intensity visible radiant energy, or high-intensity radiant energy. BIBLIOGRAPHIC REFERENCES: O'Steen, W.K. An Influence of the Pituitary Gland on Photically-Induced Retinal Photoreceptor Degeneration. Anat. Rec., 184: 194,1976. An Abstract. Olafson, R.P., and W.K. O'Steen. Reduced Retinal Photoreceptor Damage in Hypophysectomized and Ovariectomized Albino Rats. Invest. Ophthal., 1976, in press. |
[Comparative analysis of three length based methods for estimating growth of the tilapia Oreochromis aureus (Perciformes: Cichlidae) in a tropical lake of Mexico].
A comparative analysis of three length based methods for estimating growth of the tilapia Oreochromis aureus (Perciformes: Cichlidae) in a tropical lake of Mexico. Several methods are now available to estimate fish individual growth based upon the distribution of body lengths in a population. Comparative analyses of length-based methods have been undertaken mainly for marine species; nevertheless, limited information is available for inland species. Tilapia is one of the most important freshwater fisheries and its growth parameters have been estimated by several authors, usually using one length-based method. Thus, the main objectives of this study were: a) to estimate growth parameters of O. aureus from Chapala lake, Mexico, using three length-based methods ELEFAN, PROJMAT and SLCA; b) to quantify the effect of input data variations in growth parameters estimates by the jackknife technique; and c) to compare the new estimates with those previously reported, through the standard growth index phi. We collected and analyzed a total of 1,973 specimens from commercial landings from January to December 2010. The three length-base methods used in the present study resulted in parameter estimates within the range of those reported in other studies. Results derived from jackknife analysis revealed lowest values in the error percentage and coefficient of variation for L infinity when applying ELEFAN, while PROJMAT showed lowest values in the precision estimators for K, which was very similar to ELEFAN. Estimates of the comparative growth index phi were also very similar to those reported for the same species when studied in different reservoirs. Considering our results, we suggest the use of ELEFAN rather than SLCA due to its accuracy to estimate growth parameters for O. aureus. |
Warriors Klay Thompson to miss Cavaliers game
Warriors guard Klay Thompson will miss his first NBA game Friday against Cleveland as he travels to the Bahamas to attend his paternal grandfather's funeral, and according to the team, his status for Sunday's game at Portland is undetermined.
Dewitt Thompson, the father of former NBA player Mychal Thompson, recently passed away in the Bahamas at age 94.
"Hopefully he takes as much time as he needs," center Andrew Bogut said.
"Those things are more important than basketball, so we respect his time and his needs."
Thompson has a streak of 214 consecutive games played and in a 26-point performance in Wednesday's 111-98 loss to the Los Angeles Clippers became the first player in NBA history to reach 500 made 3-pointers through his first three seasons.
Thompson is tied for second in the NBA with 178 3-pointers this season. |
Retreating Empire and Bellicose Bluster
"Washington is forced to watch other powers shape events." — (Financial Times August 25, 2008)
Introduction
Everywhere one looks, US imperial policy has suffered major military and diplomatic defeats. With the backing of the Democratic Congress, the Republican White House’s aggressive pursuit of a military approach to empire-building has led to a world-wide decline of US influence, the realignment of former client rulers toward imperial adversaries, the emergence of competing hegemons and loss of crucial sources of strategic raw materials. The defeats and losses have not dampened militaristic policies nor extinguished the drive for empire building. On the contrary, both the White House and the Congressional incumbents have embraced a hardening of military positions, reiterated a confrontational style of politics and an increased reliance on overseas, bellicose posturing to distract the domestic populace from its deteriorating economic conditions. As the economic and political cost of sustaining the empire increases, as the Federal government allocates hundreds of billions to the crises-ridden financial sector and cuts tens of billions in corporate taxes, avoiding collapse and recession, the entire economic burden is borne by the wage and salaried class in the form of declining living standards, while 12 million immigrant workers are subject to savage police state repression.
The overseas failures and domestic crises however have not led to progressive alternatives; the beneficiaries are overseas competitors and the domestic elite. In large part where public opinion majorities have expressed a desire or clamored for progressive alternatives, they have been thwarted by political representatives linked to militarist ideologues and the corporate elites.
Paradoxically the defeats and decline of US military directed empire building has been accompanied by the retreat of the anti-war movements in North America and Western Europe and the sharp decline of political parties and regimes opposing US imperialism in all the advanced capitalist countries. In other words, the defeats suffered by the US Empire have not been products of the Western Left, nor have they led to a ‘peace dividend’ or improved living standards for the working classes or peasants. To the extent that there are beneficiaries, they are found largely among the newly aspiring economic imperial countries, like China , Russia and India , among the oil rich countries of the Middle East, and especially among a broad swath of large agro-mineral export countries like Brazil , South Africa and Iran , which have carved out important niches in their region’s.
The growth and overseas expansion of the new economic empire building countries and their agro-mineral-financial ruling classes (with the possible exception of Venezuela ) have greatly benefited a tiny elite, comprising not more than twenty percent of the population. The relative decline of US military imperialism and the rise of new economic imperialist powers have redistributed wealth and market share between countries but not among classes within the ascendant powers. While the militarists-Zionists-financial speculators rule the US Empire, the new billionaire manufacturers, real estate speculators and agro-mineral exporters rule the emerging economic empires.
The second paradox is found in the fact that the political forces militarily defeating the US military-centered empire are not the forces benefiting from the struggle.
While the Iraqi and Afghan resistance has imposed almost a trillion dollar cost on the US Treasury and tied down over 2 million rotating US troops over the past six years, it is the Chinese, Indian, Russian, European, Gulf Oil and financial ruling classes which have reaped the benefits from massive US non-productive expenditures. While the new economic beneficiaries are, in large part, secular, imperial and elitist, the politico-military forces undermining and defeating the US military empire are religious (Islamic), nationalist and mass-based.
The contemporary defeats of US military empire building are not a product of Western, secular, mass leftist movements. Nor do they result in a progressive, egalitarian society. Instead we have fast-growing highly unequal economies, led by ruling classes promoting their own ‘national’ versions of free market/neo-liberal strategies, which maximize profits through economic exploitation of labor, resource extraction and pillage of the environment. Until the mass movements, intellectuals and activists of the West break from their passivity and blind allegiance to the existing major parties, the defeat of US militarism will be a costly burden assumed by the masses of the Third World while the benefits will accrue to the rising new billionaire economic imperialists.
The Geography of Imperial Failures and Retreat Middle East: Iraq and Iran
The ascendancy of military-directed empire building in the US has once again put into evidence its utter incapability to impose a new imperial order. After six and a half years of war and occupation in Iraq , the US has suffered enormous military casualties and over half a trillion in economic losses, without securing any political or military or natural resource gains. The losses from the war have generated domestic opposition to US military intervention, undermining current and future imperial military capacity. Even the US designated puppet ruler in Iraq , Al Maliki, has demanded a set date for US withdrawal. US client Afghan President Karzai has called for greater oversight over US military operations which have killed thousands of non-combatants and civilians, thus deepening and extending support for the national resistance which now operates throughout the country.
For those in the US, particularly on the ‘Left’ who mistakenly argued that the invasion of Iraq was a ‘War for Oil’ (rather than a war in support of Israeli hegemonic ambitions), Iraq’s signing of a $3 billion dollar oil contract with the China National Petroleum Corporation in late August 2008 (Financial Times August 28, 2008) demonstrates the contrary, unless one wishes to revise the slogan to ‘US War for Chinese Oil’. In the 6 years since the US invaded Iraq , US oil companies have still failed to secure major oil deals.
On October 4-5, 2008, Shell, one of the world’s biggest petroleum multinationals and OMV, an Austrian energy corporation will sponsor a conference in Teheran under the auspices of the National Iranian Gas Export Company to promote ‘gas export opportunities and potentials of the Islamic Republic of Iran’. This conference is simply one more example of the role of major petroleum companies attempting, through peaceful means, to build their overseas holdings (‘economic empire’). The major opposition to this ‘oil for peace’ move on the part of Shell Oil came from the leading Jewish-Zionist promoter of US engaging in Middle East wars for Israel – the Anti-Defamation League, which criticized Big Oil. According to its two principle leaders, Glen Lewy and Abe Foxman, “…these two companies are co-sponsoring a conference with the state-owned energy company of the leading state-sponsor of terrorism and human rights violator. Bu promoting one of Iran ’s strategic industries, natural gas, OMV and Shell are hindering the effort of responsible states (sic) and corporations to isolate Iran .”
The conflict between Shell/OMV and a leading American Zionist-Jewish organization highlights the fundamental conflict between economic-centered empire building and military-centered empire building. The fact that Shell and OMV went ahead with the Iranian conference shows that at least some sectors of the oil industry are finally beginning to challenge the stranglehold that Zionist-militarists have over US Middle East policy. After having lost tens of billions of dollars in lucrative oil contracts thanks to Zionist-dictated policies , the oil companies are finally taking the first tentative steps toward formulating a new policy.
By pursuing the Israeli-US Zionist agenda of sequential wars and sanctions against oil-rich Muslim countries, Washington has lost access, control and profits to global economic competitors in a strategic region.
Africa
In the African nation of Somalia Washington opted for military intervention via the proxy Ethiopian dictatorial regime of Meles Zenawi to bolster the discredited and defeated pro-US puppet regime of Abdullah Yusuf. After almost 2 years the Ethiopian and the puppet regime only control a few blocks of the capital, Mogadishu , while the rest of the country is in the hands of the Somali resistance. According to the Financial Times (August 28, 2008), the Ethiopian regime “expressed a desire to curtail its military engagement in Somalia ”. The US surrogate has been militarily and politically defeated; the US failed to secure support for its proxy occupation from the African Union. Throughout Africa, China, the EU, Japan, Russia and to a lesser degree India and Brazil all have made inroads in securing joint ventures in oil, raw materials export markets and large-scale, long-term infrastructure investments, while the US backs armed separatists in the Sudan and subsidizes the corrupt Mubarak regime in Egypt for over a billion dollars a year. Not only has the US empire lost out economically to its global competitors, it has suffered a major military-diplomatic defeat in Somalia and severely politically and financially weakened its Ethiopian client.
South Asia
In South Asia, the US strategic puppet ruler, Pakistani dictator Mushareff has been forced to resign – and the weak and divided electoral coalition which has replaced him has not been able to match the military, diplomatic and intelligence support for the US war in Afghanistan which Mushareff provided. The Pakistan-Afghan border is virtually open territory for cross border attacks, recruitment and military supplies by Afghan resistance organizations. The empire’s loss of Mushareff further undermines US efforts to impose an outpost in Afghanistan .
Through frequent ground and air attacks on Pakistan regions bordering Afghanistan, the US-NATO ‘coalition’ has multiplied, deepened and made massive civilian political and armed opposition throughout the country. The ‘election’ of the US client and convicted warlord and thug, Asif Ali Zadari, as President of Pakistan, will not in anyway contribute to the recovery of US influence outside of very limited elite political and military circles. Washington ’s pursuit and extension of military imperialism from Afghanistan to Pakistan has led to even more severe political defeat among a much wider population in South Asia .
Top NATO generals and officials have recognized that the ‘Taliban’ has reorganized and extended its influence throughout the country, controlling most
throughways to the major cities and even operating in and around the capital Kabul . Repeated US bombing and missile strikes of civilian housing, cultural events and markets have alienated vast numbers of Afghans and led to widespread opposition to US client ruler Karzai. The promises of both US presidential candidates to vastly expand the US occupation forces in Afghanistan upon taking office, will only prolong the war and deepen the weakening of the economic empires and its domestic foundations.
Caucasus
Washington ’s attempt to extend its sphere of influence in the Caucasus through a territorial grab by its authoritarian Georgian client, President Mikheil Saakashvili, led instead to a profound defeat of the local satrap’s regional ambitions. The political break and integration with Russia of South Ossetia and Abkhazia represents the end of unrestricted expansion of the US and EU in the region – and a rollback in contested terrain. The rash adventurism and subsequent destruction of the Georgian economy by Saakashvili has provoked widespread internal unrest. Worse still, Georgia, the US and its Eastern European clients call for ‘sanctions’ against Russia, threatens to undermine Western European strategic energy supply lines, as well as end Moscow’s collaboration with US military policies in Afghanistan, Iran and the Middle East. If Washington escalates its military and economic threats to Russia , the latter can provide Iran , Syria and other US adversaries with powerful middle range ultra-modern anti-aircraft missiles. Equally important Russia can dump over $200 billion in US Treasury notes, further weaken the US dollar and set in motion a global run in the currency.
In Georgia as elsewhere, US military-centered empire building gives priority to a failed marginal land grab by a third rate client over lucrative strategic economic and military relations with one of the world’s global oil and gas powers and a crucial collaborator in its ongoing military operation in the Middle East. While US economic relations with Russia crumble in the wake of its aggressive military encirclement of Moscow—military bases in the Czech Republic, Poland, Georgia, Bulgaria, Rumania – Western European empire builders resist making military threats in favor of harsh rhetoric and ‘dialog’ in order to sustain strategic energy ties.
Middle East: Israel and the Arabs In the Middle East, the US unconditional backing of Israeli military aggression in Lebanon , Palestine and Syria , and US backing of weak and ineffective Arab clients has led to a sharp decline in US influence. In Lebanon , since the defeat of the Israeli invasion in 2006, Hezbollah literally rules the southern half of the country – and holds veto power within the national government, reversing US client rule.
In Gaza , US and Israeli military attempts to seize power and oust Hamas via its client Abbas and Dahlen were rounded defeated and the independent nationalist movement led by Hamas consolidated power.
Washington’s effort to regain its influence and improve its image among conservative and moderate Arab rulers by ‘mediating’ a peace agreement between Israel and Palestine in Annapolis in November 2007 was utterly destroyed by Tel Aviv’s open and total repudiation of all the basic conditions set forth by the Bush Administration. Washington has no influence on Israel ’s colonial expansion. On the contrary, the US Middle East policy is totally subject to the Israeli state through the Zionist Power Configuration and its control over Congress, Presidential selection, the mass media and major propaganda ‘think tanks’. The Zionists demonstrated their power by even dictating who could or could not even speak at the Democratic National Convention with the unprecedented censoring of former President James Carter because of his humanitarian criticism of Israel ’s policies toward the Palestinians. Zionist-Israeli usurpation of US Middle East policy has led to strategic losses of investments, markets, profits and partnerships for the entire multi-national oil and gas industry.
The political fusion of imperialist militarists confronting Russia at the cost of strategic economic relations and Zionist-militarists pursuing Israeli regional power has led to multiple failed military adventures and tremendous global economic losses.
The Western Hemisphere
The application of the militarist strategy as well as the relative decline of economic hegemony has led to strategic defeats and failures in the Western Hemisphere. In late 2001, Washington challenged and threatened to take reprisals against President Chavez for refusing to submit to Bush’s ‘war on terror.’ Chavez at the time informed a bellicose representative of the State Department (Grossman) that, “We don’t fight terror with terror.” Less than 6 months later in April 2003, Washington backed a failed military coup and between December 2002 to February 2003, a failed bosses lockout. The failure of the US militarist strategy devastated Washington ’s military and ruling class clients, and radicalized the Chavez Government. As a consequence, the Venezuelan leader proceeded to nationalize oil and petrol sectors and develop strategic ties with countries that compete with or oppose the US Empire, such as, Cuba , Iran , China and Russia . Venezuela signed strategic economic agreements in Latin America with Argentina , Bolivia , Ecuador , Cuba and Nicaragua . While Washington poured over $6 billion dollars in military aid to Colombia , Venezuela signed petrol and gas investment and trade agreements with most of the Central American and Caribbean countries, severely challenging Washington ’s influence in the region.
High commodity prices, booming Asian markets, unacceptable US tariffs and subsidies led to the relative independence of Latin America’s ‘national capitalist’ regimes, who embraced ‘neo-liberalism’ without the constraints of the IMF or the dictates of Washington. In these circumstances the US lost most of its leverage – except Colombia ’s military threats – to pressure Latin America to isolate Chavez – or even Cuba . Washington ’s military strategy led to its self-isolation.
Overseas Consequences of Failed Military Strategies
Isolation in Latin American can not be overcome because Washington’s pursuit of empire via prolonged military aggression – in the rest of the world and in Latin America –can not compete with the profits, wealth, investment and trade opportunities offered to the ruling classes of Latin America by the new markets in Russia, the Middle East, Asia and by oil rich Venezuela.
Washington’s militarist imperial strategy is evident in its dual policies: Prioritizing the spending of $6 billion in military aid to repressive Colombia while sacrificing $10 billion in trade, investments and profits with oil rich Venezuela . Washington has spent over $500 billion in wars in Afghanistan and Iraq; billions are spent in war preparations against Iran; over $3 billion annually for Israel’s military; all the time losing hundreds of billions of dollars in trade and investment with Latin America.
The most striking aspect of this historical contrast is that the military spending embedded in military-centered empire building has failed even its minimum goal of gaining political control, military outposts and strategic resources for war. In contrast, global market competitors have secured access and control over strategic economic resources, and signed lucrative political co-operation agreements without costly military commitments.
Domestic Consequences of Failed Military-Driven Empire Building
The cost of military-Zionist driven empire building to the domestic economy has been devastating: Competitiveness has declined, inflation is eroding living standards, employment with stable living wages is disappearing, unemployment and loss of jobs is skyrocketing, the financial system is disconnected from the real economy and on the verge of collapse, home foreclosures are reaching catastrophic levels and taxpayers are being bled to death to bail out the trillion dollar home mortgage debt speculators. Political malaise is widespread. In the midst of system-wide crisis, an emerging police state has taken hold: thousands of legal and undocumented immigrant workers have been seized at their factories and detained in military camps away from their children. Muslim and Arab associations are raided and prosecuted on the bases of paid informers, including hooded Israeli ‘witnesses’. The federal and local police practice ‘preventative detention’ of activists and journalists prior to the Presidential conventions, seizing protestors before they can exercise their constitutional rights and systematically destroying the cameras and tapes of citizens attempting to document abuses. Failed military imperialism brings in its wake a burgeoning police state – backed by both political parties – in the face of economic crises which threatens the political and social foundations of the empire.
Conclusion
The economic crisis in the run up to the Presidential elections has not led to the emergence of a mass based progressive alternative candidate. Both the Democratic and Republican contenders promise to prolong and extend the imperial wars and submit to unprecedented Israeli-Zionist military dictates with regard to Iran.
Crises and military defeats have not led to a re-thinking of global economic and military commitments. Instead we witness a right-wing radicalization, which seeks to escalate confrontations with China, Russia and Iran. The US draws in its wake the client regimes of Eastern Europe and the Caucasus and Baltic regions to counter Western Europe’s emphasis on ‘economic-centered’ empire building.
The reality of a multi-polarized economic world however undermines US efforts to impose a bipolar military confrontation. China holds $1.2 trillion dollars in US debt. Western Europe, in general, depends on over one-third of its energy for its homes, offices and factories from Russia . Germany relies on Russia for almost 60% of its gas. The economies of Asia: Japan, India, China, Vietnam and South Korea all depend on oil from the Middle East and not on the Middle East war plans of the Israeli-American militarists.
Brazil, Russia, India , China, South Africa, Venezuela and Iran are essential to the functioning of the world economy. In the same way that the US-Israel-United Kingdom cannot support their empire on the bases of failed military strategies abroad and economic disaster and police state policies at home.
-James Petras, a former Professor of Sociology at Binghamton University, New York, owns a 50-year membership in the class struggle, is an adviser to the landless and jobless in Brazil and Argentina, and is co-author of Globalization Unmasked (Zed Books). His latest books are The Power of Israel in the United States (Clarity Press, 2006) and Rulers and Ruled in the US Empire: Bankers, Zionists, Militants (Clarity Press, 2007). He contributed this article to PalestineChronicle.com. Contact him at: jpetras@binghamton.edu.
Know the Truth about Palestine
Dear Reader,
You have carried us through years of honest and accurate coverage and we are confident that you will carry us through the next stage, which promises to be more critical than ever, for Palestine and for all of us.
Make a contribution to support the Palestine Chronicle.
Newsletter
Enter your email address to subscribe to our mailing list.
Know the Truth about Palestine
Dear Reader,
You have carried us through years of honest and accurate coverage and we are confident that you will carry us through the next stage, which promises to be more critical than ever, for Palestine and for all of us.
Make a contribution to support the Palestine Chronicle.
Our Network
About Us
The Palestine Chronicle is a 501(c)3 non-profit organization whose mission is to educate the general public by providing a forum that strives to highlight issues of relevance to human rights, national struggles, freedom and democracy in the form of daily news, commentary, features, book reviews, photos, art, and more. Read More |
1. Introduction {#sec1-materials-09-00892}
===============
Modern research is offering such forms of bio-engineering which are reliable and revolutionary enough to transform the conditions of our existence. Nature is full of infinite enigmas awaiting an answer and implementation in the best human interest. Among the unbounded natural processes, the self-cleaning phenomenon in living beings captured the attention of scientists and researchers owing to its vast applications in discrete fields. This phenomenon was first discovered by two German botanists, Barthlott and Neinhuis, in lotus plant leaves which get washed off by rolling water droplets on the surfaces. They noticed that the waxy surface structure of lotus leaves has low adhesion of water droplets which renders it non-wettable \[[@B1-materials-09-00892],[@B2-materials-09-00892]\]. The lotus leaf has been a sign of sacred purity. The verse by a Chinese poet "the lotus and leaves all over the pond, and breeze blows beads roll down" describes the self-cleaning phenomenon of lotus leaves as water drops falling them roll off and wash dirt from the leaves to make them clean. This self-cleaning effect is worldly known as the "lotus effect" \[[@B3-materials-09-00892],[@B4-materials-09-00892]\]. Studies have revealed that the lotus effect is not unique to lotus leaves; some other plants and insects have the natural tendency to get cleaned by rolling water drops on their surfaces, such as rice leaves, fish scales, butterfly wings, salviniamolesta, mosquito eyes and shark skin \[[@B5-materials-09-00892],[@B6-materials-09-00892],[@B7-materials-09-00892],[@B8-materials-09-00892],[@B9-materials-09-00892],[@B10-materials-09-00892]\].
This lotus effect is directly related to the interaction of a water droplet with a solid surface. A considerable number of studies have been conducted to explain the interacting behavior of water droplets on solid surfaces and, in this regard, various theories have been established including Young's equation, and Wenzel and Cassie--Baxter theories \[[@B11-materials-09-00892],[@B12-materials-09-00892],[@B13-materials-09-00892]\]. However, a complete description has not been given yet to explain the exact mechanism of wetting of surfaces with water droplets and still this is a hot topic of research in academia and industries. In this review, a concise attempt has been made to discuss recent research advances in self-cleaning of hydrophobic surfaces with regard to the basic theories of wetting, measurement of contact angles, factors affecting the wetting process and future prospects in this cutting-edge field of study.
1.1. Wetting Process {#sec1dot1-materials-09-00892}
--------------------
Wetting of a solid surface is termed as the contact of a liquid with the solid surface as a result of intermolecular interactions. The balance between adhesive and cohesive forces determines the extent of wettability of the solid surfaces. Adhesive forces between the solid surface and liquid droplets result in spreading on the solid surface while asymmetric cohesive forces among the liquid molecules cause surface tension and thus reduce the area of interaction between liquid and solid surface and make the droplets spherical in shape. When a liquid drop comes into contact with a solid surface, a contact angle θ (CA) between liquid--air interface and the solid--liquid interface is formed as shown in the [Figure 1](#materials-09-00892-f001){ref-type="fig"}.
In the wetting process, an area of solid--air interface is replaced by an equivalent area of solid--liquid interface along with some extension of the liquid--air interface. These surface relations depend on the conditions of wetting, nature of the liquid and surface properties of the solids. Furthermore, these surface relations are associated with the energy content of each interface. As wetting is a thermodynamic process, the total energy content of each interface changes after wetting. The sign of the change in surface energy involved determines whether the wetting process will occur spontaneously or non-spontaneously. These surface energy changes also help to determine the rate of the wetting process, how far it proceeds against the external forces that may resist to the wetting and how much external force will be needed to overcome the resistance to wetting \[[@B11-materials-09-00892]\].
1.2. Young's Equation and Contact Angles {#sec1dot2-materials-09-00892}
----------------------------------------
In order to explain the behavior of water droplets on a solid surface, Thomas Young, in the 19th century, proposed a mathematical equation which explicitly relates the contact angle θ (Young Contact Angle) to interfacial energies (surface tensions). In detail, when a liquid drop comes into contact with an ideal flat, rigid, homogeneous and inert surface, three interfaces---solid--liquid (SL), solid--gas (SV) and liquid--gas (LV) co-exist with a contact line formed between these interfaces. Interfacial energies play a major role in determining the contact angle (θ) of a liquid drop with the solid surface. The equation was derived by balancing the forces (surface tensions) on the contact line of the liquid drop and solid surface (x-axis): where γ is interfacial tension expressed in terms of energy per unit area of the interface and θ is the contact angle between the liquid droplet and solid surface respectively, as shown in the [Figure 1](#materials-09-00892-f001){ref-type="fig"}a.
According to Young's equation, the contact angle θ quantifies the wettability of a solid surface by liquid droplets. For a smooth surface, Young's contact angle increases when γ~SV~ decreases or γ~LV~ increases. If the Young's contact angle is less than 90°, the wetted surface will be energetically more favorable than the dry solid surface and is thus said to be hydrophilic. If the Young's contact angle is greater than 90°, the dry solid surface will be energetically more stable and the surface is termed as hydrophobic. If the contact angle is greater than 150°, the surface is termed superhydrophobic \[[@B14-materials-09-00892],[@B15-materials-09-00892]\]. For oils, the corresponding terms describing favorable and non-favorable conditions are oleophilic, oleophobic and superoleophobic; for other non-aqueous liquids, lyophilic and lyophobic terms are used, while for all kinds of liquids, omniphilic and omniphobic words are commonly used.
1.3. Wenzel Model {#sec1dot3-materials-09-00892}
-----------------
However, an ideal flat, rigid, homogeneous and inert surface does not exist in nature and real surfaces vary in their surface properties. Every surface has some proportion of roughness at molecular or atomic levels, thus Young's equation cannot be used to explain the exact mechanism of wetting. Wenzel then developed an equation to explain the effect of surface roughness and surface energies on the contact angle \[[@B11-materials-09-00892],[@B16-materials-09-00892]\]. Wenzel's equation is given as: where θ\* is the Wenzel contact angle and r is surface roughness of the solid surface. Roughness is defined as "ratio of the actual surface to that of a smooth surface having the same geometrical shape and dimensions".
According to the Wenzel model, a liquid drop completely wets the solid surface by entering into all the anfractuosities caused by the surface roughness and solid--liquid interface is increased as shown in [Figure 2](#materials-09-00892-f002){ref-type="fig"}d. From Wenzel's equation, superhydrophobicity and superhydrophilicity can be predicted. Surface roughness decreases the hydrophobic character of an intrinsically hydrophilic surface (\<90°) and increases the hydrophobic properties of an intrinsically hydrophobic surface (θ \>90°) θ \[[@B17-materials-09-00892],[@B18-materials-09-00892],[@B19-materials-09-00892]\].
1.4. Cassie--Baxter Model {#sec1dot4-materials-09-00892}
-------------------------
The Wenzel model is only applicable to a homogeneous regime in which a liquid droplet fully penetrates into the grooves of the surface. Later, it was proposed by Cassie and Baxter that some air is entrapped in the grooves of the solid surface and liquid droplets sit on the top of protrusions, thus this surface is termed as a heterogeneous regime \[[@B12-materials-09-00892]\]. The fraction of the solid surface that directly contacts with the liquid droplets is denoted as Φs. Cassie and Baxter developed an equation to highlight the effect of the actually wetted area of the solid surface on the contact angle given as: where θ\* is the apparent contact angle. This equation shows that roughness alone is not enough to explain the contact angle of the liquid drop with the solid surface but it is the total area that is directly in contact with the solid surface which determines the contact angle, thus total wettability of the solid surface can be calculated. To this point, it is suggested that Young's equation gives the basic idea for wetting phenomena on an ideal, smooth and non-reactive surface, Wenzel's equation applies to a homogeneously wetted surface and the Cassie--Baxter equation is only applicable to a heterogeneous state in which air is entrapped underneath the liquid droplet as shown in the [Figure 2](#materials-09-00892-f002){ref-type="fig"}b. However, the wetting phenomenon is not as simple as it seems in these theories because these three models do not explain the stability of the Cassie--Baxter state, transitions from the Cassie--Baxter state to the Wenzel state, the effect of size of water drops and the nature of solid surfaces. To explain it in more detail, further studies have been conducted \[[@B20-materials-09-00892],[@B21-materials-09-00892],[@B22-materials-09-00892]\].
1.5. Dynamic Contact Angles and Contact Angle Hysteresis {#sec1dot5-materials-09-00892}
--------------------------------------------------------
Three thermodynamic parameters, γ~LV~, γ~SV~, and γ~SL~ in Young's equation are used to determine a single static contact angle θ. In reality, a liquid droplet undergoes many metastable states on a solid surface and contact angles measured for these states are usually not equal to Young's contact angle θ. Hence, wetting behavior of a solid surface cannot be explained by measuring a single static contact angle. When contact lines of all the three phases are in motion, a dynamic contact angle is formed with the solid surface. This dynamic contact angle varies either by the contact motion with the surface or by increasing or reducing the size of the liquid droplet. The variation is in between a range of minimum and maximum values. The maximum contact angle of this range is usually termed as the advancing contact angle (θa) and the minimum angle is usually termed as the receding contact angle (θr) as shown in [Figure 1](#materials-09-00892-f001){ref-type="fig"}e, but this association of θa and θr as maximum and minimum are under study, so one should be cautious when assigning these angles \[[@B23-materials-09-00892]\]. The difference between the advancing contact angle and the receding contact angle is called the contact angle hysteresis. The contact angle hysteresis value depicts whether the surface is wettable or non-wettable. For an aqueous system, a higher value of H is associated with hydrophilic surfaces (wettable) and a low value approaching zero is associated with superhydrophobic surfaces (non-wettable) \[[@B14-materials-09-00892],[@B24-materials-09-00892]\].
1.6. Importance of Contact Angle Hysteresis {#sec1dot6-materials-09-00892}
-------------------------------------------
Measurement of dynamic contact angles and contact angle hysteresis is very important for complete understanding of the mechanism of the wetting phenomenon. Its significance has been studied by many researchers. Tsujii and his team prepared fractal surfaces from alkylketene dimer (AKD) to study the contact angles and water repellency of the surfaces. They observed the maximum contact angle of 174° and they suggested that maximum contact angle of 180° can be achieved if liquid droplets have no adsorption on the solid surfaces \[[@B25-materials-09-00892],[@B26-materials-09-00892]\]. Their study opened new doors for researchers to prepare superhydrophobic materials for practical applications having extremely high contact angles, even approaching up to 180° \[[@B27-materials-09-00892],[@B28-materials-09-00892],[@B29-materials-09-00892],[@B30-materials-09-00892],[@B31-materials-09-00892],[@B32-materials-09-00892],[@B33-materials-09-00892]\]. However, in these studies they did not give the complete measurements of contact angle hysteresis. As mentioned earlier, a single maximum value of contact angle is not adequate to explain the wetting phenomenon and get the stable superhydrophobic surfaces. To describe the stability of the superhydrophobic surface, both static contact angle and dynamic contact angles are necessary to be measured. To get a very stable superhydrophobic surface, the static contact angle should be very high and contact angle hysteresis should be as low, approaching zero. Contact angle hysteresis is normally lower in the Cassie--Baxter state which makes it more stable than the Wenzel state \[[@B11-materials-09-00892]\]. If the contact angle hysteresis difference is higher between the Wenzel and Cassie--Baxter states, then there might be a transition from the Wenzel to the Cassie--Baxter state making the wetting metastable \[[@B34-materials-09-00892],[@B35-materials-09-00892]\]. Moreover, both the Cassie--Baxter and Wenzel states are extreme states and when external pressure is applied on the Cassie--Baxter surface, a transition will occur from the Cassie--Baxter state to the Wenzel state while passing through the various intermediate states shown in [Figure 2](#materials-09-00892-f002){ref-type="fig"}c.
1.7. Stability of Cassie--Baxter State {#sec1dot7-materials-09-00892}
--------------------------------------
Obtaining superhydrophobic surfaces with high stability requires surfaces which can support high external pressure without transitioning from the Cassie--Baxter state to the Wenzel state. These stable surfaces are termed as robust surfaces. Stability or robustness of the the Cassie--Baxter state is highly dependent on the substrate surface morphologies. The surface treatment of substrates at micro and nano-scale level may increase its roughness and robustness. The major parameter that enhances the robustness of the surface is the presence of re-entrant topographies.
1.8. Re-Entrant Topographies {#sec1dot8-materials-09-00892}
----------------------------
The presence of re-entrant structures on the surface stabilizes the Cassie--Baxter states for robust superhydrophobic surface. Re-entrant topographies have been reported in two types of patterns i.e., random and regular patterns. Re-entrant structures with random patterns have been reported by using nano-particles, nano-wires and nano-pores prepared by simple cost effective methods such as chemical synthesis, electrospinning and candle soot depositions \[[@B36-materials-09-00892],[@B37-materials-09-00892],[@B38-materials-09-00892]\]. However, it has been found that, in random patterns, it is difficult to control the uniform surface morphologies on large areas. Re-entrant structures with regular patterns have been prepared in the form of T-shaped micropillars \[[@B39-materials-09-00892],[@B40-materials-09-00892],[@B41-materials-09-00892]\], nanonails \[[@B42-materials-09-00892]\], microhoodoos \[[@B43-materials-09-00892]\], textile fibers \[[@B44-materials-09-00892],[@B45-materials-09-00892]\] and inverse trapezoids \[[@B46-materials-09-00892],[@B47-materials-09-00892]\]. These regular re-entrant topographies have been developed by chemical etching and microinjection compression molding (µ-ICM).
2. Measurement of Contact Angle {#sec2-materials-09-00892}
===============================
The wetting process of a solid surface is a complex phenomenon and detailed studies of how liquid droplets interact with the solid surfaces and of how wetting occurs are under research. Exact measurement of Young's contact angle and dynamic contact angles is of great importance to explain the wetting mechanism in detail. With the development of theories of the wetting process, the tools and techniques used to measure the contact angle of liquid drops with solid surfaces are also being developed from very basic to some advanced techniques.
2.1. Methods Used for Sessile Drops on Solid Surfaces {#sec2dot1-materials-09-00892}
-----------------------------------------------------
According to Young's theory, when a sessile liquid droplet comes into contact with an ideal flat, rigid, homogeneous and inert surface, it makes a contact angle with the surface. In the early stages of contact angle measurement, some basic techniques were used.
### 2.1.1. Direct Goniometer Method {#sec2dot1dot1-materials-09-00892}
The direct goniometric method is the most commonly used method for the measurement of liquid contact angles on solid surfaces. For the first time, the contact angle of liquids on solid surfaces was measured by Bigelow and his co-workers in 1946 during the study of oleophobic and hydrophobic films on solid surfaces. They developed a simple set up and named it telescope-goniometer \[[@B48-materials-09-00892]\]. The first commercial instrument for the measurement of contact angles in the world was manufactured by a ramé-hart company. This instrument was designed by William Zisman in the early 1960s. The instrument consists of four basic components: (1) a horizontal surface to mount a liquid or solid sample; (2) a micropipette to form a liquid droplet on the surface; (3) an illuminating source; and (4) a telescope assembled with a protractor eyepiece.
The basic working principle of this instrument centers on the assignment of a tangent line to the sessile drop at the contact point with the solid surface. In detail, a sessile droplet of a liquid of known boiling point and density is placed on the horizontal surface by an equipped micropipette. Then, the tangent line is aligned to the contact line of the droplet with the solid surface and the contact angle reading is noted with the help of a protractor eyepiece. Modern systems now fit a curve to the contour of a video image and employ computer software to determine the contact angle.
Advantages of the method:
The direct telescope-goniometric method is very simple to use and it has the following advantages: Only a few microliters of the liquid sample are required.Surface contact angle of very small substrate surface i.e., only few square millimeters can be measured.An accuracy of direct contact angle of approximately ±2° is generally achieved by using the telescope-goniometric method \[[@B49-materials-09-00892],[@B50-materials-09-00892]\].With the passage of time, modifications have been made in the method to get better accuracy and precision i.e., (1) integration of a camera to take images for future analysis and presentation; (2) use of high magnification lenses to get an in detail examination of the intersection profiles of contact lines of all the phases in contact; and (3) assembly of a motor driven micro syringe to control the volume of the liquid droplet \[[@B23-materials-09-00892],[@B51-materials-09-00892],[@B52-materials-09-00892]\].Zisman and his co-workers used a very simple method for the measurement of contact angle of sessile drops on solid surfaces by using a platinum wire. In this method an 8 cm long platinum wire of about 0.05--0.1 mm diameter is cleaned by heating with a Bunsen burner. This cleaned wire tip is dipped into the liquid and gently removed from the liquid to get a suspended drop on the tip of the platinum wire. This pendent drop is smoothly brought into contact with the solid surface, forming a sessile drop on the surface and the wire is gently removed from the drop. Furthermore, the contact angle was noted with the help of telescope-goniometer. Reproducibility for this method is claimed to be of ±2°.
Precautions of using this method:
While measuring the accurate contact angle using this method, the following precautions are very important: To avoid inconsistency and uncertainty in measuring the contact angle, it is suggested to establish general guidelines for the users.A background light as an illumination source is used, but it is necessary to use a light source of specific intensity to avoid the undesired heating and evaporation of the droplet.To measure the dynamic contact angle, a micro syringe with a stainless steel needle is used to increase or decrease the volume of the liquid droplet. During this process, the needle must remain in the droplet to avoid unnecessary vibrations.If the substrate is of a large area, it is important to measure the contact angles at different points to get an average value representing the whole surface of the substrate.An enclosed chamber should be used for all the measurements to prohibit airborne contamination and vapor pressure equilibrium of the liquid under study must be obtained for volatile liquids.The droplet may have unsymmetrical attachment with the surface; it is appropriate to measure the contact angles on both sides of the liquid droplet to get more accuracy.
Limitations of the method:
Although the direct telescope-goniometric method has advantages because of its simplicity and ease of use, it has some shortcomings which reduce its use for further insights into the wetting processes and dynamic contact angle measurements. Some of the drawbacks are shortlisted here: The accuracy and reproducibility of the contact angle measurements rely on the consistency of the user in assigning the tangent line. When measurements are taken by multiple users, a significant error and inconsistency might occur.The direct telescope-goniometric method has another serious limitation. On superhydrophilic surfaces, water droplets are almost flat and it is very difficult to assign a tangent line, thus accurate contact angles below 20° cannot be measured by this method.
### 2.1.2. Conventional Tilting Plate Method {#sec2dot1dot2-materials-09-00892}
To study dynamic contact angles and contact angle hysteresis, McDougall and Ockrent \[[@B53-materials-09-00892]\] modified the sessile drop method ([Figure 3](#materials-09-00892-f003){ref-type="fig"}). In this approach, a sessile drop is formed on the solid surface and the surface is inclined slowly until the drop rolls off or slides on the surface. At the time of sliding of the drop, it forms two angles with the solid surface. One at the lower side of surface termed as the advancing contact angle and one on the upper side of the surface which is termed as the receding contact angle as shown in [Figure 1](#materials-09-00892-f001){ref-type="fig"}e. Extrand and Kumagai used this method to study the dynamic contact angles and contact angle hysteresis for liquid drops on various solid surfaces including silicon wafers, polymer surfaces and elastomeric surfaces \[[@B54-materials-09-00892],[@B55-materials-09-00892]\].
Limitations of the method:
The dynamic contact angle values obtained by this method are not reliable as studies have shown that the values of the sliding angle, advancing contact angle and receding contact angle may vary to a noticeable extent depending on the nature of solid surface, local surface energies, nature of liquid drops, interplay with drop volume, drop shape and the point of placement of liquid drop on the tilting plate \[[@B56-materials-09-00892],[@B57-materials-09-00892],[@B58-materials-09-00892]\].
### 2.1.3. Tangentometric Technique {#sec2dot1dot3-materials-09-00892}
This approach was used by Phillips and McIntyre in their studies. In this method, the drop profile on the solid surface is analyzed by a setup named as tangentometer-protractor device. This system consists of a mirror placed underneath the baseline of the water drop and the reflected image of the drop is taken. Then the mirror is placed vertical to the image at the drop tip and is rotated to get a smooth curvature and this curvature is matched with that of the reflected image and the contact angle is observed by the protractor attached with the mirror \[[@B59-materials-09-00892]\]. However, this method is not useful as it has uncertainty in the practice of users.
2.2. Methods Used for the Measurement of Contact Angles on Solid Surfaces with Different Geometries {#sec2dot2-materials-09-00892}
---------------------------------------------------------------------------------------------------
In the methods above, the most common techniques used for the contact angle measurements have been discussed in which the liquid drops are mostly sessile. In this section, the techniques and instruments used for the contact angle measurements for the solid surfaces with different surface arrangements are discussed.
### 2.2.1. Captive Bubble Method {#sec2dot2dot1-materials-09-00892}
This method was first introduced by Taggart and coworkers \[[@B60-materials-09-00892]\]. With the passage of time and several modifications, it is now most commonly called the "captive bubble method". In this method, the solid sample is immersed in the liquid under study and then an air bubble is introduced beneath the solid surface. The air bubble makes a contact angle inside the liquid which can be directly measured.
Advantages of this method:
This method offers following advantages: This method ensures that the solid surface is immersed in the saturated environment.Minimum air born contamination on the solid--air interface.Easy to control the temperature of the system under study which makes it easier to study the effect of temperature on contact angles.For clean polymeric surfaces, the contact angle measurements are in good agreement with that of the sessile drop methods \[[@B61-materials-09-00892]\].
Limitations of this method:
This method suffers with following limitations: It requires large amount of liquid as compared to the sessile drop methods.It is not easy to measure the contact angle of solid surfaces that swell when coming into contact with the liquid or substrates with soluble thin films present.
### 2.2.2. Tilting Plate Method {#sec2dot2dot2-materials-09-00892}
The simple titling plate method used for measurement of the contact angle was developed by Adam and Jessop. In this technique, a simple solid plate is used. The plate is gripped from one end and the other end is slowly immersed in the test liquid so that a meniscus forms on both sides of the plate. Then the plate is tilted to one side until one of the meniscuses becomes flat with the liquid surface. At this stage, the contact angle formed between the tilted solid plate and the flat liquid surface is measured. They reported an error of ±5°attributed to the contamination in the liquid. To control the movement of the solid plate and avoid surface contamination, glass barriers are used on the surface of the liquid. This method has been improved by equiping the system with a scanning laser beam and thermocapillary (TC) responsive tool in order to observe the moving contact line and static curvature of the liquid meniscus respectively. The major advantage of this method is easy measurement of the low contact angle \[[@B23-materials-09-00892],[@B62-materials-09-00892],[@B63-materials-09-00892]\].
Limitations of the method:
Major limitations reported in this method are: When the solid plate is immersed in the test liquid, a disturbance in the liquid appears that may affect the exact measurement of the contact angle.Observation of the moving solid plate in the test liquid when the meniscus on one side becomes parralal to the plate requires highly skilled persons for accurate measurement of the contact angles \[[@B23-materials-09-00892]\].
### 2.2.3. Wilhelmy Balance Method {#sec2dot2dot3-materials-09-00892}
In this technique, a vertically oriented, solid thin plate suspended from a micro balance is brought into contact with the test liquid ([Figure 4](#materials-09-00892-f004){ref-type="fig"}). The contact angle can be determined indirectly from the force that applies on the solid plate when it penetrates the surface of the liquid and produces a weight change of the system. The force change on the balance that is associated with the combination of wetting force and buoyancy is noted. The force change on balance is shown in (8): where mg is weight of the solid plate, γ~L~ is surface tension of the liquid, P is perimeter of the cross section of the solid plate which is in contact with the liquid, θ is the contact angle, ρ is density of the liquid, V is volume of the liquid displaced by the solid plate and g is gravity acceleration. In this equation γ~L~Pcosθ represents the wetting force and Vρg represents the buoyancy. When surface tension of the liquid and perimeter of the cross section of the solid plate are known, the contact angle can be measured using this equation \[[@B64-materials-09-00892]\].
Advantages of the method:
This method has several advantages: The contact angle is indirectly calculated from the measurement of weight force and length which can be measured with more accuracy that direct observation of the contact angle.The force can be measured from any depth in the liquid which is always an average value.Measurement of the contact angle by this method is more accurate and the advancing and receding angles can be measured by this approach as shown in the [Figure 5](#materials-09-00892-f005){ref-type="fig"}.
Limitations of the method:
Along with the advantages, it also has some drawbacks: From this method, surface properties of the solid-like homogeneity and heterogeneity cannot be predicted.In this method, the solid sample must be of a known cross sectional area, making it limited for only rods, plates and fibers.It can be difficult to measure the precise perimeter of the wetted area of the solid sample.Along with the geometry, the solid sample must be the same in composition and topography in all sides which is difficult to obtain if one wants to study the films of anisotropic systems.
### 2.2.4. Capilary Rise on a Vertical Plate {#sec2dot2dot4-materials-09-00892}
This approach is also applied for indirect measurement of the contact angle. In this method, an about 2 cm wide plate is immersed in the liquid of known surface tension as shown in the [Figure 6](#materials-09-00892-f006){ref-type="fig"}. Liquid rises due to the capillary effect on the plate surface. The rise of the liquid by capillary action is measured in terms height (h) at a fixed immersion depth. The contact angle can be measured from this height of cappilary rise by using the modified Laplace equation \[[@B65-materials-09-00892]\]. where ρ is density of the liquid, g is the gravity acceleration, h is height of cappilary rise on the solid plate and γ~L~ is surface tension of the test liquid. This method is more suitable for the temperature dependent contact angles \[[@B66-materials-09-00892],[@B67-materials-09-00892]\]. Budziak, Neumann and Kwok et al. \[[@B68-materials-09-00892],[@B69-materials-09-00892]\] automated this method for direct measurement of contact angles. Also, in some studies, the above equations have been combined by using the sin^2^θ + cos^2^θ = 1 relation to get the surface tension and contact angles at the same time \[[@B70-materials-09-00892],[@B71-materials-09-00892]\]. Precise observation of h plays a key role in the exact measurement of the contact angle.
### 2.2.5. Capillary Rise in a Vertical Tube {#sec2dot2dot5-materials-09-00892}
A cappilary tube is used in this approach in order to obtain the contact angle. The capillary tube of known radius is placed in the test liquid with known density and surface tension. The liquid rises with capillary action and makes a minescus with walls of the tube. The height of cappilary rise in the tube is measured and the contact angle is measured by using Jurin's law. where ρ is density of the liquid, g is the gravity acceleration, h is height of cappilary rise in the tube, r is radius of the tube and γ~L~ is surface tension of the test liquid. The schamtic diagram of this method is given in [Figure 7](#materials-09-00892-f007){ref-type="fig"}.
### 2.2.6. Measurement of Contact Angle on Fibers {#sec2dot2dot6-materials-09-00892}
In various studies, researchers have tried to measure the contact angle directly on the individual fibers \[[@B72-materials-09-00892]\]. In this method, the individual fibers are suspended horizontally under a microscope and the goniometer eyepiece is used to note the contact angle of the liquid drops present on the surface of the fibers. Approximate dynamic contact angles can be measured by rotating the fiber longitudinally. In every method, modifications have been made with the passage of time to get better results in terms of accuracy and operating procedures. To get better results of contact angle measurements by this method, Bascom and Romans \[[@B73-materials-09-00892]\] placed the liquid drop in a small platinum ring and passed a glass fiber through it vertically. Dynamic contact angles were noted while passing the glass fiber from the center of the drop with the help of a microscope. This method has made it easy for many researchers to observe the effect of diameter of individual fibers on the contact angles. It has been reported in some articles that, if the diameter of the liquid drop is greater than that of the fiber, misleading results are obtained as drop curvatures and weight of the drop disturb the drop profile at the intersection of the drop and fibers \[[@B74-materials-09-00892],[@B75-materials-09-00892],[@B76-materials-09-00892]\].
3. Theories for Analysis of Drop Profile {#sec3-materials-09-00892}
========================================
As discussed in various previous sections, properties such as drop shape, drop size, drop formation, surface tension and surface morphologies are major parameters that determine the contact angle. Along with the method development to get the contact angle, it is also important to develop the theoretical models that completely describe the contact angles measured experimentally from the drop shape and explain the individual effects of all these parameters on the contact angle. In the early beginning of this research area, it was found that interfacial and gravitational forces have the combined effect on the shape of drop. Surface tension reduces the surface area and makes the drop spherical while gravitational forces either make the pendant drop sag or flatten the sessile drop. To completely analyze the drop profile, it is very important to consider the force balance of these parameters. This force balance, including the Laplace equation, gives a way to measure surface tension and the drop shape precisely \[[@B77-materials-09-00892]\]. Two basic methods that have been widely used to analyze the drop shape are (1) θ/2 method; and (2) Axisymmetric Drop Shape Analysis (ADSA) \[[@B78-materials-09-00892],[@B79-materials-09-00892],[@B80-materials-09-00892]\].
3.1. Drop Shape Analysis by θ/2 Method {#sec3dot1-materials-09-00892}
--------------------------------------
This method has been mostly used for the analysis of sessile drops on a flat surface ([Figure 8](#materials-09-00892-f008){ref-type="fig"}). In this method, the drop is considered as a part of a sphere and the geometrical contact angle is obtained by observing the diameter of the drop and height of the apex from the solid surface. A simple equation that has been used to calculate the contact angle from the height of the apex and the diameter of the drop is given as: where h is the height of the apex and the d is diameter of the base of the drop. This method is applicable only when the drop is spheroidal, even when the drop size is very small. If the drop size is large and the drop shape is not spherical due to external forces, this method is of no use. Bashforth and Adams formulated a table of surface tension values generated from the Laplace equation manually for various drop profiles. Later, this table was extended for the pendent drops as well, but with the development of digital computers, tremendous developments in theoretical models have been made to analyze the drop profile \[[@B81-materials-09-00892],[@B82-materials-09-00892],[@B83-materials-09-00892]\].
3.2. Axisymmetric Drop Shape Analysis (ADSA) {#sec3dot2-materials-09-00892}
--------------------------------------------
In last few decades, significant developments have been made in the design of hardware and computational theories that led researchers to explain the drop profile and analyze the surface science. Axisymmetric Drop Shape Analysis (ADSA) is the most widely used technique for analysis of the drop profile and it was first developed by Rotenberg and coworkers \[[@B84-materials-09-00892],[@B85-materials-09-00892]\]. Later, various modifications have been made in this model to provide better reproducibility and precision. The ADSA method has improved the precision of contact angle values by an order of magnitude as compared to direct tangent measurements. The ADSA method uses a basic principle in which the theoretical model is developed that explains the drop profile obtained from the experimental image. The analysis gives values of contact angle, drop shape, drop volume, surface tension and wetted surface area. This ADSA method has many versions, improved at various stages of the developments i.e., (1) first model termed as ADSA-P \[[@B86-materials-09-00892]\]; (2) second model named as ADSA-S \[[@B80-materials-09-00892]\]; (3) third model termed as ADSA-D \[[@B87-materials-09-00892],[@B88-materials-09-00892]\]; and (4) fourth model termed as theoretical image fitting analysis (TIFA). Many studies have been reported in the development of these models \[[@B89-materials-09-00892],[@B90-materials-09-00892],[@B91-materials-09-00892]\].
4. Superhydrophobic Surfaces in Plants {#sec4-materials-09-00892}
======================================
Naturally designed functional systems in living bodies inspire scientists and engineers worldwide to mimic the system for practical applications by human beings. One of these natural phenomena is the water repellent self-cleaning surfaces observed in many plants and animals \[[@B92-materials-09-00892]\]. Lotus plant leaves were first to be observed, having hydrophobic surfaces \[[@B1-materials-09-00892]\]. The Lotus leaves are not only water repellent but also have low adhesion with particulate contamination, thus demonstrating the self cleaning phenomenon perfectly. The reported contact angle for lotus plant leaves is 160° with a contact angle hysteresis of 4. The hierarchical surface of lotus leaves is composed of convex cells and three dimensional waxy tubules. Air is entrapped in the convex cell grooves resulting in the Cassie--Baxter state in which the water droplet rests mostly on the entrapped air and has minimum contact with the leaf structure which makes it superhydrophobic \[[@B2-materials-09-00892]\]. Furthermore, there are some other plants which have a water repellent hairy surfaces on the leaves. Some of these are the leaves Lady's Mantle and water ferns Salvinia. Water repellency of these surfaces results from the presence of waxy crystals present in the micro surface protrusions \[[@B93-materials-09-00892]\].
Micro scale elliptic protrusions and nano scale pins on the surface of taro plant (*Colocasia esculenta*) leaves make hierarchical morphology which imparts superhydrophobic self-cleaning properties to it \[[@B88-materials-09-00892]\]. A similar kind of binary surface structures (micro and nano-scaled) have been reported in rice and Indian canna (*Canna generalis bailey*) leaves. Wilhelm Barthlott and coworkers demonstrated that the lotus leaves, taro leaves and Indian canna leaves have tubular-platelet type waxy crystals. These waxy protrusions are the most important and prominent factors in making the surface structures water repellent \[[@B94-materials-09-00892],[@B95-materials-09-00892]\].
5. Superhydrophobic Surfaces in Animals and Insects {#sec5-materials-09-00892}
===================================================
Roughness and hierarchical morphology based superhydrophobicity is present not only in plant surfaces; some animals and insects also have micro and nano-scaled surfaces topographies with needle shaped and overlapping edges such as protrusions \[[@B6-materials-09-00892],[@B96-materials-09-00892],[@B97-materials-09-00892],[@B98-materials-09-00892]\]. These surface topographies result in low adhesion, low drag and superhydrophobicity. The non-wetting superhydrophobic surface of water strider's (*Gerris remigis*) legs prevents it from shrinking and enables it to move on the water surface more quickly. It has been mentioned that this remarkable superhydrophobicity is due to the wax secreted by the surface of the legs. The reported force of repulsion caused by surface tension of this waxy layer on a single leg is 152 dynes \[[@B99-materials-09-00892]\] and the water striders can walk on the water surface because their weight is low. Superhydrophobicity and low adhesion morphologies of butterfly wings are due to the regular arrangement of overlapping roof tiles-like edges. Moreover, shark skin exhibits antifouling, self cleaning and low drag which enable it to move fast in water. The shark skin surface is considered to have micro-structured riblets which reduce the adhesion and drag to prevent fouling \[[@B6-materials-09-00892]\].
However, it is important to mention here that the exact mechanism and factors that make the surfaces superhydrophobic are still under study, making it a field of research. Not all the surfaces having hierarchical surface topographies exhibit superhydrophobicity. For example, the hierarchical morphology found on the gecko foot surfaces has hundreds of micron and sub-micron keratinous hairs and spatula, but it still lacks the superhydrophobicity. Some other animals and plants such as rose petals have both high apparent contact angles and high hysteresis, which is very interesting for other applications, such as in water harvesting.
Along with the surface morphology, surface chemistry and pattern of surface structures play a major role in determining the superhydrophobicity and superhydrophilicity of surfaces. Water flow on the animal and plant superhydrophobic surfaces is illustrated in the [Figure 9](#materials-09-00892-f009){ref-type="fig"}. Physical properties of natural superhydrophobic systems are summarized in the [Table 1](#materials-09-00892-t001){ref-type="table"}.
6. Superhydrophobic Textiles {#sec6-materials-09-00892}
============================
Human beings have a highly developed anatomy and physiology but from the beginning of their evolution they found inadequate protection of their bodies from a variety of unfavorable and harsh environmental conditions. To protect their bodies they used additional coverings in the form of clothing on their body parts in different manifestations. Textile materials have been used throughout the human history for clothing. The term "textiles" has been derived from the Latin word "texere" which has the meaning of "to weave". Earlier, this term was used only for woven fabrics but now-a-days textile fabrics have been manufactured via many processes including weaving, knitting and other technologies. The weaving process involves the interlacement of many perpendicular threads or yarns over each other while in the knitting process a single unbroken strand of yarn goes on intertwining into loops forming the fabric one row at the time. Weaving and knitting patterns can be changed to develop a variety of textile fabrics with many advanced properties. Non-woven fabrics can also be developed by the entanglement of the fibers. In other words the term textiles may be defined as "a thin, soft and flexible sheet of fabric made up of natural polymeric or synthetic fibers with enough strength and tear resistance to be used for clothing and other protective functions" \[[@B100-materials-09-00892]\].
Since the last century, science and technology have made revolutionary developments at an extraordinary rate in many aspects of textiles and clothing industry. Tremendous advances in scientific knowledge have been made to guide not only the better usage and processing technology of natural fibers but also the finishing technologies of textile fabrics \[[@B101-materials-09-00892]\]. Synthetic polymers with high performance and environmentally friendly cotton fabrics with softness, breathability and biodegradability are most commonly used in textiles and clothing industries. Textile products have been widely used in many fields, including health safety and protection, medical and hygienic, clothing, construction, agriculture, transport, electronics, geo-textiles and packaging and containment \[[@B102-materials-09-00892]\]. In the last few decades, surface treatment and functionalization of textile fabrics is a major focus of scientists and technologists. Cotton fabric is composed of natural cellulose polymer chains which have hydroxyl groups (OH) on their surfaces which impart hydrophilic, lyophilic and omniphilic properties to the cotton fabrics. These properties of the fabric render it vulnerable to contamination by biological and chemical agents and reduce its applications in many fields. To make textile fabric water repellent and resistant to organic contaminants, cotton fabric has been coated with hydrophobic agents. However, when cotton fabric is treated with some reagents it loses its inherent properties such as breathability, softness and mechanical properties. Hence, it is of great importance to create superhydrophobic textiles which retain their inherent properties. In this section, development of superhydrophobic textiles with their applications in various fields will be discussed.
6.1. Robust Superhydrophobic Textiles {#sec6dot1-materials-09-00892}
-------------------------------------
As discussed in the previous sections, the superhydrophobicity of surfaces is attributed to two major parameters: (1) the presence of nano or micro hierarchical topographies and re-entrant structures on the surface of substrate; (2) the attachment or coating of low surface energy materials on the surface of substrate. Textile fabrics have inherently hierarchical structures on the surface. Hierarchy of the textile fabrics varies according to the nature and pattern of weaving and knitting processes which play a major role to develop superhydrophobic textiles. However, the polar groups (OH) present on the surface of textile fabric make it highly hydrophilic. To make it hydrophobic, the surface chemistry of textile fabrics needs to be changed either by the chemical modification of the surface or by attaching hydrophobic material on the surface. Many techniques have been used to develop superhydrophobic surfaces on the textile fabrics.
### 6.1.1. Sol--Gel Method {#sec6dot1dot1-materials-09-00892}
This process is commonly known to be universal due to its flexibility with regard to productive capacity and coating technology. It has many advantages over other techniques used for the functionalization of textile fabrics due to following reasons \[[@B103-materials-09-00892]\]: Silica, modified silica and other metal oxide nano-sols with particle diameters ranging from 1 to 100 nm can make transparent and well adhered oxide layers on textiles.The oxide layers formed impart and enhance mechanical properties to the fabrics, e.g., wear and abrasion resistance.The metal oxide layers formed offer further possible ways to modify and enhance the surface functionality of the fabrics.The oxide layers formed by this method are stable against heat, light, microbial and chemical attacks.The oxide layers formed can carry other functional additives such as inorganic particles and polymers. It is easy to control the pore size, porosity level and immobilization of imbedded compounds.This process can be performed in conventional coating systems such as pad-dry-cure and simple dip-coating methods under normal temperature and pressure conditions.
This method consists of three basic steps: First, nano-particulate sols are prepared by acid or base catalyzed hydrolysis of corresponding precursors, including metal or silicon alkoxides in aqueous media or other water miscible solvents (e.g., the Stober method). Organic solvents, such as alcohols, are mostly used because they provide high storage stability, excellent adherence on textile fabrics and easy evaporation of the solvent at low temperature. Second, these nano-sols are applied on the textile substrates using the simple pad-dry-cure or dip-coating method. In this step, the silica, metal oxide or other nano-particles are condensed to form a lyogel layer on the substrate surface. Third, the solvent is evaporated resulting in a xerogel layer with a rough structure \[[@B103-materials-09-00892]\].
Final properties, such as density, porosity, roughness, critical thickness and mechanical properties can be controlled by governing the condensation and drying parameters of the sol--gel method. The nano-sols obtained by acid hydrolysis result in dense layers with weak cross-linked products in the condensation step whereas the nano-sols obtained by alkali catalysis form nano-particle layers with larger pores. In order to enhance the surface roughness and water repellency, some hydrophobic additives with long alkylsilane chains, alkyl groups (R) or perfluoroalkyl groups are introduced in the metal oxide nano-layers by chemical modifications. Many studies have been conducted to develop superhydrophobic textiles using the sol--gel method for perspective practical applications, e.g., rain clothes and tents and oil repellent fabrics \[[@B104-materials-09-00892],[@B105-materials-09-00892],[@B106-materials-09-00892]\].
### 6.1.2. Admicellar Polymerization Technique {#sec6dot1dot2-materials-09-00892}
The admicellar polymerization process is another field of surface functionalization of fabrics. The working principle of this technique is a surface analogous to the emulsion polymerization process. It mainly consists of two steps: Firstly, surfactant is adsorbed on the substrate surface to form a bilayered aggregate of monomer at the substrate/solution interface. After a specific level of adsorption (critical admicelle concentration), the surfactant starts changing in morphology and orientation. This process of re-orientation allows the monomer to concentrate in the surfactant, termed as adsolubilization \[[@B107-materials-09-00892],[@B108-materials-09-00892]\]. Secondly, in-situ polymerization starts by adding a suitable initiator in the admicelle and thin films are formed on the substrate surface to generate required morphology and functionality depending on the nature of the monomers. Many polymeric thin films have been applied on different solid substrates using this method. Recently, this approach has been applied on textile substrates to develop flame retardant, hydrophobic and UV-absorbing fabrics \[[@B109-materials-09-00892],[@B110-materials-09-00892],[@B111-materials-09-00892],[@B112-materials-09-00892],[@B113-materials-09-00892]\]. A rear research group developed a stain resistant cotton fabric by using admicellar polymerization. They used partially fluorinated alkyl acrylates as monomers in the presence of fluorosurfactants and a acrylamide bonding agent resulting in durable stain resistant finishes on the knitted cotton fabric \[[@B113-materials-09-00892],[@B114-materials-09-00892]\].
### 6.1.3. Direct Fluorination Modification {#sec6dot1dot3-materials-09-00892}
Modification of the substrate by introducing some fluoro groups on the surface lowers its surface energy. The lowering of surface energy induces hydrophobic properties in the substrate. One of the commonly used methods to introduce fluoro groups on the textile surface is direct fluorination. The direct fluorination is carried out in the presence of fluorine gas or plasma and the fluorine atoms attach covalently with the surface \[[@B115-materials-09-00892]\]. The main advantages of this method are: (1) In this process, only gases are used and it is said to be a dry process and needs no extra catalyst or initiator; (2) This process is carried out at room temperature or even low temperature; And (3) only a thin layer of the substrate is modified and bulk properties of the material remain unchanged. However, this modification process is highly exothermic and there is pressure of the fluorine gas in the reaction gaseous mixture renders the reaction dangerous thus requires careful handling of the reaction. \[[@B110-materials-09-00892]\].
### 6.1.4. Electrospinning {#sec6dot1dot4-materials-09-00892}
Electrospinning is one of the promising techniques applied for the production of superhydrophobic textiles. This system is easy to operate and offers many controllable parameters in order to obtain the required surface geometries. It can be used to obtain very similar fibers to those that are found in the natural hydrophobic systems. The electrospinning system basically consists of three main parts: a feeding system that consists of a container with precursor sols connected with a metallic needle and a pump, a high-voltage power supply to which a needle is connected that creates the charge on the precursor droplet and a collector on which the resulting nano fibers are deposited. The precursor sol can be of polymer solutions, melt or sol-gels etc. The pump injects the precursor at a constant rate. The electrical field works against the surface tension of the precursor solution and the droplet is converted to a conical shape called a Taylor cone and when electrical force is increased to an extent where it overcomes the surface tension, a thin jet of the precursor ejects from the Taylor cone tip. The jet finally reaches the collector and makes a non-woven mat of fine fibers. A wide range of materials can be used to obtain a variety of micro and nano fibers using this approach. In addition to the raw material selected, the processing parameters play a critical role in the final properties of electrospun fibers. The diameter, morphology, and fiber arrangements on the substrate surface greatly depend on the processing conditions. In order to create superhydrophobic surfaces by using this technique, beaded and nano-particles are preferred \[[@B116-materials-09-00892],[@B117-materials-09-00892]\]. In this section, few parameters related to the raw material selection, processing conditions and system design are summarized in the [Table 2](#materials-09-00892-t002){ref-type="table"}. However, detailed effects of these parameters can be found in some other articles \[[@B118-materials-09-00892]\].
### 6.1.5. Polymerization {#sec6dot1dot5-materials-09-00892}
Graft polymerization of hydrophobic monomers on the surface of textile fabric is the most effective method to achieve the robust superhydrophobic textiles. In this method, one end of the polymer makes covalent bonds with the textile fabric thus enhancing the durability and abrasion strength of the fabric, while the other end of the polymer renders the substrate textile fabric superhydrophobic. Organo-silanes \[[@B119-materials-09-00892],[@B120-materials-09-00892],[@B121-materials-09-00892],[@B122-materials-09-00892]\], metal oxide with some hydrophobic materials \[[@B123-materials-09-00892],[@B124-materials-09-00892],[@B125-materials-09-00892],[@B126-materials-09-00892],[@B127-materials-09-00892],[@B128-materials-09-00892]\], polymers \[[@B129-materials-09-00892],[@B130-materials-09-00892],[@B131-materials-09-00892],[@B132-materials-09-00892],[@B133-materials-09-00892],[@B134-materials-09-00892]\], metals \[[@B135-materials-09-00892],[@B136-materials-09-00892]\] and polymer composite materials \[[@B137-materials-09-00892],[@B138-materials-09-00892]\] have been used on textile surfaces to achieve robust superhydrophobicity \[[@B139-materials-09-00892]\].
### 6.1.6. Initiated Chemical Vapor Deposition (iCVD) and Atom Transfer Radical Polymerization (ATRP) {#sec6dot1dot6-materials-09-00892}
Initiated chemical vapor deposition (iCVD) and atom transfer radical polymerization (ATRP) techniques have been used to grow hydrophobic polymer chains on the textile surface. The iCVD process is a solvent free single step process used for the deposition of polymer chains on the surface of a variety of substrates. In this process, the monomer and an initiator are vaporized in a closed chamber. Vaporized initiator molecules, upon contact with a hot filament, generate free radicals by thermal decomposition. These free radicals strike with the monomer molecules and activate the free radical polymer chain reaction. As a result, the polymer films are deposited on the substrate at mild temperature (15--40 °C). Im and coworkers used this technique to produce robust superhydrophobic polyester fabrics with high mechanical and chemical stability. They deposited a first layer of poly(1,3,5,7-tetravinyl-1,3,5,7-tetramethylcyclotetrasiloxane) and a second layer of poly(1H,1H,2H,2Hperfluorodecylacrylate) \[[@B138-materials-09-00892]\]. A similar technique termed as mist polymerization has been used to create superhydrophobic cotton fabrics by grafting lauryl methacrylate using ethylene glycol dimethacrylate as a crosslinker. Mist polymerization is a two step process. In the first step, the substrate surface is activated by some chemical agent and in the second step the vaporized monomer is grafted on the surface \[[@B130-materials-09-00892]\]. In their next study, Wang and coworkers modified the mist polymerization process by mixing the initiator and different kinds of monomers in one pot. Later, that mixture was atomized on the cleaned cotton fabric. The block co-polymerization phenomenon was observed in which three monomers had undergone co-polymerization on the surface of the cotton fabric as shown in the schematic diagram in the [Figure 10](#materials-09-00892-f010){ref-type="fig"}a. These block co-polymers imparted superhydrophobic properties to the fabric and a high contact angle (\>151°) was obtained. The surface morphology largely depends on the polymerization conditions, concentration of the monomers and length of polymer blocks on the of substrate surface \[[@B129-materials-09-00892]\].
Atom transfer radical polymerization (ATRP) is the most widely used "grafting from" in which polymer chains grow from the surface of substrates. A controlled rate of polymerization with specific site architecture on the surface of the substrate, versatility and compatibility for a large variety of solvents and monomers make the ATRP the most suitable synthetic technique to graft superhydrophobic moieties on the surface of substrates \[[@B140-materials-09-00892]\]. The ATRP process is carried out in three steps. In the first step, the substrate surface is washed and prepared by etching for grafting of polymers. Then ATRP initiator is applied on the substrate surface. In the last step, a polymer of desired properties is grown on the surface of the activated substrate surface. Polymerization conditions i.e., reaction time and monomer flow rate are the key parameters to control the degree of polymerization. The degree of polymerization may be defined as the number of monomer units that have been polymerization into the polymer chain. Superhydrophobicity of the substrate surface is controlled by the degree of polymerization or degree of grafting from the substrate surface. The degree of grafting (DG) is calculated from the weight increase of the substrate using this equation: where W~0~ and W~1~ are the weight of substrate before and after grafting. The Jia research group grafted fluorinated methacrylates on poly(ethylene terephthalate) fabrics \[[@B128-materials-09-00892]\]. The degree of grafting increased linearly with time but surface roughness and superhydrophobicity first increased with an increasing degree of grafting, however, after some time, with an increasing degree of grafting, the roughness decreased which resulted in a decrease in the superhydrophobicity as shown in the [Figure 11](#materials-09-00892-f011){ref-type="fig"}c,d, respectively. The polymer grafted fabric shows robust superhydrophobicity even after 100 laundering cycles, 2500 abrasion cycles and exposure to UV irradiation as shown in [Figure 11](#materials-09-00892-f011){ref-type="fig"}b.
6.2. Superhydrophobic Textiles for Oil--Water Separations {#sec6dot2-materials-09-00892}
---------------------------------------------------------
Environmental and water pollution due to chemical and oil leakage caused some of the most serious and harmful incidents in the world since the last century. Owing to these incidents, there is a huge demand for the development of functional materials for the control and removal of harmful contaminants from the environment such as oil--water separation and the removal of toxic metals from water \[[@B141-materials-09-00892],[@B142-materials-09-00892]\]. Much advancement has been made in this regard and functional membranes have been developed via self assembly, electro spinning, selective etching and lithographic techniques \[[@B143-materials-09-00892],[@B144-materials-09-00892],[@B145-materials-09-00892]\]. However, the materials and methodologies used have limitations for the production of such materials on an industrial scale because of the complex fabrication procedures, low flexibility, poor stability, high cost and poor recyclability. Therefore, it is of great importance to develop simple, cost effective and environmentally friendly membrane materials to overcome the above mentioned problems. The development of materials for the separation of oil from aqueous media requires specific surface functionality and selective wettablity to liquids with different surface tensions. Superhydrophobicity and superoleophilicity of the membrane surface are required for the most efficient oil--water separations \[[@B146-materials-09-00892],[@B147-materials-09-00892],[@B148-materials-09-00892],[@B149-materials-09-00892]\]. Selective wettability of solid surfaces is achieved by controlling the surface chemistry and topography. Creating surface roughness by the introduction of controlled nano and micro architecture on the solid surface supports the entrapment of an air cushion on the solid surface which, in turn, makes the hydrophobic surface superhydrophobic and oleophilic surface superoleophilic \[[@B132-materials-09-00892],[@B150-materials-09-00892],[@B151-materials-09-00892]\]. Superhydrophobic surfaces that have been used for oil--water separation include metal meshes \[[@B152-materials-09-00892],[@B153-materials-09-00892],[@B154-materials-09-00892]\], polymer composites \[[@B155-materials-09-00892],[@B156-materials-09-00892]\], metal oxides \[[@B157-materials-09-00892]\] and filter papers \[[@B158-materials-09-00892]\]. However, these materials face some limitations for large scale applications due to potential toxicity, poor mechanical stability and low flexibility. Textile based superhydrophobic materials for practical applications in the field of oil--water separation have received rigorous attention owing to their high absorption ability, flexibility, low density, high mechanical stability and low cost under harsh environmental conditions. Several studies have been conducted to develop robust superhydrophobic textile fabrics for the separation of oils from aqueous media. The Seeger research group has developed superhydrophobic fabric by chemical vapor deposition (CVD) of silicon nanofilaments on a polyester substrate. Their study shows a good level of oil absorption from aqueous media repelling the water but poor oil recovery from the fabric and no recyclability was evaluated, as shown in the [Figure 12](#materials-09-00892-f012){ref-type="fig"} \[[@B149-materials-09-00892]\].
In another study, stearic acid modified ZnO/polystyrene nanoparticles were coated on the cotton fabric by the simple drop coating method for the separation of oil from water. Oil passed through the ZnO/polystyrene coated cotton fabric while the fabric showed high water repellency with a water contact angle of 153°--155° \[[@B159-materials-09-00892]\]. Oil--water separation efficiency can be calculated from the ratio of weight of water collected after separation to the weight of water initially added. where W~1~ and W~2~ are the weight of water initially added and the weight of water after separation respectively. Oil--water efficiency was evaluated at different weight concentrations of modified ZnO/polystyrene in THF. Coating with 2.22 wt % of ZnO/polystyrene in THF had oil--water efficiency of 92%. Cotton fabric coated with SiO~2~ nanoparticles along with octadecyltrichlorosilane (OTS) by the sol gel method shows 50 times greater absorption of oil from water than its own weight. A total of 90% of oil was recovered from the coated fabric by vacuum filtration \[[@B160-materials-09-00892]\]. Zhou et al. developed a robust superhydrophobic/superoleophilic cotton fabric for oil--water separation by using in-situ vapor phase deposition of fluorinated alkyle silane and polyaniline (PAN) \[[@B161-materials-09-00892]\]. The coated cotton has high stability under harsh conditions of temperature, acid and bases. A high water contact angle of 156° and 97.8% oil--water efficiency was obtained. Moreover, the fabric has high recyclability. After 30 cycles, the water contact angle was decreased to 140° while oil--water efficiency of 94% was observed. In this study, hexadecane with low surface tension (γlv = 27.5 mN/m) liquid was used. Surface tension of the coated fabric lies between water and hexadecane which renders it superoleophilic, showing permeability and wettability to hexadecane. Additionally, a mirror-like bright and reflective surface underneath the water droplet, as shown in [Figure 13](#materials-09-00892-f013){ref-type="fig"}c,e confirms the presence of an entrapped air cushion, thus stabilizing the Cassie--Baxter state.
The Jia research group decorated --Si(CH~3~)~3~ functionalized SiO~2~ nanoparticles on poly(ethylene terephthalate) (PET) fabric to achieve syperhydrophobic/superoleophilic surface morphology \[[@B127-materials-09-00892]\]. The schematic illustration of the sol--gel process is given in the [Figure 14](#materials-09-00892-f014){ref-type="fig"}a.
The development of superhydrophobic surfaces requires micro/nano level surface roughness and low surface energy. Polystyrene modified SiO~2~ nanoparticles, when deposited on the probe surface, create micro/nano level roughness and lower the surface energy, thus making the surface highly water repellent. The Zhang research group used a polystyrene/SiO~2~ nano-composite coating on the textile fabric (70% cotton and 30% polyester) to create a superhydrophobic/superoleophilic surface for oil--water separation. They reported oil--water separation efficiency of 93%--98.7%. Flexible and thermally stable superhydrophobic fabric was obtained as shown in the [Figure 15](#materials-09-00892-f015){ref-type="fig"} \[[@B126-materials-09-00892]\].
6.3. Superhydrophobic Textiles for Ultraviolet Radiation Shielding {#sec6dot3-materials-09-00892}
------------------------------------------------------------------
The ozone layer has been protecting life on Earth for hundreds of years by absorbing harmful radiations coming from sun. The major part of harmful radiations coming from the sun consists of ultraviolet (UV) radiations. UV radiations have been divided into three categories depending on the wavelength i.e., ultraviolet-A (UV-A), ultraviolet-B (UV-B) and ultraviolet-C (UV-C). Wavelengths of UV-A, UV-B and UV-C range, 315--400 nm, 280--215 nm and 200--280 nm respectively. The most dangerous for life on Earth is the UV-B region, which is absorbed by the ozone layer. However, the ozone layer has been depleted by many chemicals, including halocarbons and green house gases released by human activities. This ozone depletion allows the UV-B radiation to pass through and affect human life \[[@B162-materials-09-00892]\]. The UV-B radiation has deteriorating effects on human health, causing skin damage such as premature skin aging, allergies, sunburn and even increasing the rate of skin cancer \[[@B163-materials-09-00892],[@B164-materials-09-00892],[@B165-materials-09-00892]\].
UV blocking products such as cosmetics have been used to protect human skin from UV radiations. However, it is of high demand to develop UV blocking textile products as most parts of the body are covered by textile clothing. Various studies have been conducted to prepare UV blocking fabric using white pigments \[[@B165-materials-09-00892],[@B166-materials-09-00892],[@B167-materials-09-00892],[@B168-materials-09-00892],[@B169-materials-09-00892],[@B170-materials-09-00892],[@B171-materials-09-00892],[@B172-materials-09-00892]\]. Moreover, innovations in green technologies, development of multifunctional textile fabrics with self-cleaning properties, superhydrophobicity, antibacterial activity and UV blocking ability are emerging research fields in textiles and clothing industries. The Jia research group observed that when PET fabric is coated with ZnO/SiO~2~ pencil-like rods with diverse diameters, it shows absorption of UV radiations. This absorption of UV radiation results from the quantum confinement effect. This effect can be explained as follows: when the size of nano-particles decreases to a certain point where its radius becomes comparable to the wavelength of an electron, the electronic structure of the particles becomes discrete in defined energy levels. This confinement leads to the efficient separation of electron whole pairs and absorption occurs in the UV region. Also, light scattering from the ZnO nano-particles coating on the surface of the fabric results in the UV radiation shielding. Moreover, this pencil-like rods coating of ZnO/SiO~2~ also created superhydrophobicity with a water contact angle of 160° ± 5° as shown in [Figure 16](#materials-09-00892-f016){ref-type="fig"} \[[@B173-materials-09-00892]\]. However, the water contact angle decreases to 90° when exposed to UV light as hydrophilic groups appear on the surface due to UV radiation absorption.
The coating of CeO~2~ nanoparticles also imparts superhydrophobic and UV protection properties to the cotton fabric. The band gap energy in the UV region and large refractive index of CeO~2~ result in UV absorption and UV scattering on the surface, respectively. Nano/micro level valleys and hills, such as roughness created on the surface of cotton fabric by dip-pad-dry coating of CeO~2~ nanoparticles, results in the superhydrophobic surface with a static water contact angle of 158° \[[@B174-materials-09-00892]\]. Layered double hydroxides (LDHs) have also been observed to exhibit the UV blocking and superhydrophobic characteristics when coated on textile fabrics. LDHs are inorganic materials with the general formula \[M^2+^~1−x~M^3+^~x~(OH)~2~\]^An−^~x/n~·mH~2~O, which form layer-by-layer assembly of hydrated anions and positively charged hydroxide layers. M^2+^ and M^3+^ are metal ions which occupy octahedral sites in the layer-by-layer crystalline structure of the host layer and A^n−^ is the anion present between the layers. In the layer-by-layer structure, trivalent metal ions are partially substituted by bivalent metal ions which result in the appearance of positive charge on the hydroxide layer. The Lin research group used an organic based UV absorber intercalated into the LDH nano layers. This electrostatic layer-by-layer (LBL) assembly imparted dual-functions of UV-blocking and superhydrophobicity to the substrate textile fabrics \[[@B175-materials-09-00892]\].
6.4. Flame Retardant Superhydrophobic Textiles {#sec6dot4-materials-09-00892}
----------------------------------------------
Fire accidents occurring every year in the whole world cause a serious loss of human lives and properties. Fire risk is the potential of materials to ignite and contribute to fire propagation. All materials containing carbon are flammable and combust when heat and oxygen are present. Cotton, most commonly used as textiles, is highly flammable. The potential of a material to ignite with increase a fire is measured in terms of flammability. Measurement of the limiting oxygen index (LOI) is one of the best and most commonly used methods to evaluate the flammability of materials. The limiting oxygen index (LOI) can be defined as "the minimum amount of oxygen gas required for the ignition of a material in an oxygen--nitrogen mixture". The lower the value of LOI, the higher the flammability of materials. Cotton has the LOI value of 18%--19% which renders it highly flammable in the presence of heat, as oxygen is present in a sufficient amount in the air. The large scale applications of cotton fabrics in daily life thus require cotton fabric to be flame retardant to reduce the fire risk. Flame retardant materials are those materials which have low fire risk and are resistant to ignition. Flame retardant materials reduce fire risk and lower the heat release rate during combustion in three different ways: (1) Gas phase flame retardancy; in this mechanism the flame retardant material reduces the heat release in the gas phase by scavenging the free radicals that propagate ignition. These flame retardant materials consist of halogen and phosphorus based additives; (2) Endothermic flame retardancy; this mode of flame retardancy is based on metal hydroxides and carbonates as a flame retardant additive. These additives undergo endothermic degradation, thus reducing the heat responsible for ignition and also producing non-flammable gases such as CO~2~ and water vapors that dilute the fuel gases resulting in low fire risk; (3) Char formation; in this mechanism, the flame retardant additives form a layer of non-pyrolyzable and heat insulator char on the surface of the substrate to reduce the heat release and thus prevent fire propagation. These flame retardant additives mostly consist of intumescents and nano-composite materials \[[@B176-materials-09-00892]\].
The development of flame retardant textiles with superhydrophobicity has been reported in various studies. Char formation by intumescent and nano-composite materials is the most common way to prevent the textile products from fire risk. The Sun research group has used layer by layer assembly of branched poly(ethylenimine) (bPEI), ammonium polyphosphate (APP), and fluorinated-decyl polyhedral oligomeric silsesquioxane (F-POSS) to create multiple functionality on the cotton fabric such as superhydrophobicity and flame retardancy. They have reported that, on exposure to fire, cotton cellulose and bPEI undergo dehydration catalyzed by APP and produce a heat insulating char layer on the cotton surface and the gases produced in decomposition of bPEI generate the porosity in the char layer. This porous char layer imparts flame retardant properties to the cotton fabric. Superhydrophobicity of the fabric was reported as a result of the F-POSS layer on the fabric. The LOI value of the coated fabric was increased to 20% \[[@B177-materials-09-00892]\].
ZnO nano-particles and 3-aminopropyl(diethoxy)methylsilane/ZnO nano composites have also been reported to impart flame retardant and superhydrophobic properties to the cotton fabric. The flame retardant properties are resulted from the heat insulating barrier developed on the cotton surface by the nano-composite layer and the roughness induced by the ZnO nano-layer resulted in superhydrophobicity with a water contact angle of 152 ± 2 \[[@B125-materials-09-00892],[@B178-materials-09-00892]\]. In another study, it has also been reported that branched poly(ethylenimine), Polymethacryloxypropylsilsesquioxane (PSQ) latex particles and ammonium polyphosphate produce a char layer on the surface of cotton fabric on burning, which further reduces the fire propagation and the LOI value was increased to 24% \[[@B179-materials-09-00892]\]. The schematic illustration of the coating of flame retardant particles on the cotton fabrics is shown in [Figure 17](#materials-09-00892-f017){ref-type="fig"}a.
7. Conclusions and Future Work {#sec7-materials-09-00892}
==============================
In this review article, a concise and emphasized study has been conducted to explain the fundamental principles, mechanisms, past experimental approaches and ongoing research in the development of superhydrophobic textiles. Various theories have been developed to explain the mechanism of the wetting process and the creation of superhydrophobic surfaces. Young's equation, and Wenzel and Cassie--Baxter models are the most important and fundamental theories to explain superhydrophobicity. According to these theories, the substrates with a water contact angle of greater than 150° and a water droplet sliding angle of lower than 10° are defined as superhydrophobic. The superhydrophobicity of a surface depends on its surface geometry, surface chemistry and surface energy. Development of hierarchical re-entrant topographies and coating of the surfaces with low surface energy materials are the major factors to develop superhydrophobic surfaces. Textile fabrics have inherently hierarchical structures on the surface of fibers which play a major role in the development of superhydrophobicity. However, in this review, some major study gaps have been found that are not addressed clearly: (1) Hierarchy of the textile fabrics varies according to the nature and pattern of the weaving and kitting processes. In the weaving process, various weave structures are followed to develop plain, twill, satin and sateen fabrics. While, in the knitting process, single jersey, double jersey, interlock, rib, tricot and pearl strucutre based fabrics have been developed and used on industrial scales. When persuing the studies at nano-scale level, these structures may play a major role in surface geometry analysis. It has been observed in this review that no systematic study has been conducted to evaluate the effect of these parameters in surface topographies analysis; (2) Superhydrophobic textiles for ultraviolet shielding have been developed, however the sun protection factor (SPF) and standard UV protection analysis parameter have not been evaluated for the UV shielding superhydrophobic textiles. It is suggested that these study gaps should be explored in analysing the surface topographies at nano-level and UV shielding evaluation of the superhydrophobic textile fabrics.
The project is supported by Institute of Textiles and Clothing, The Hong Kong Polytechnic University Research Grant.
Ishaq Ahmad conducted the literature review, collected data and prepared and wrote the review article manuscript; Chi-wai Kan supervised and finalized the draft for publication.
The authors declare no conflict of interest.
{#materials-09-00892-f001}
{#materials-09-00892-f002}
{#materials-09-00892-f003}
{#materials-09-00892-f004}
{#materials-09-00892-f005}
{#materials-09-00892-f006}
{#materials-09-00892-f007}
{#materials-09-00892-f008}
![Schematic illustration of water flow on natural superhydrophobic surfaces. Images (**a**--**e**) represent the flow of water droplet on the natural surfaces of lotus, images (**f**--**j**) represent the schematic microstructure of natural surfaces and images (**k**--**o**) are micrographs of the natural surfaces. Images (**k**--**o**) reprinted from the \[[@B6-materials-09-00892]\]. Copyrights, The Royal Society of Chemistry 2012.](materials-09-00892-g009){#materials-09-00892-f009}
![(**a**) Mechanism of mist copolymerization on the cotton fiber surface; (**b**) Variation of WCA values of modified surfaces with the mist feeding times. Reprinted from \[[@B129-materials-09-00892]\], Copyright Springer Science, 2015.](materials-09-00892-g010){#materials-09-00892-f010}
![(**a**) Schematic illustration of polymer grafting on the substrate surface; (**b**) total light reflection on the polymers grafted surface showing robustness; (**c**) DG increase with time of polymerization; and (**d**) water contact angle and sliding angle with increasing time of polymerization. Reprinted from \[[@B128-materials-09-00892]\], 2015 Copyrights American Chemical Society.](materials-09-00892-g011){#materials-09-00892-f011}
![(**a**) Experimental setup for oil--water separation; (**b**) water flow on coated surface; and (**c**) selective absorption of crude oil from water Reprinted from \[[@B149-materials-09-00892]\]. Copyrights 2011 Wiley-VCH Verlag GmbH & Co. KGaA, Weinheim, Germany.](materials-09-00892-g012){#materials-09-00892-f012}
![(**a**) Schematic illustration of vapor phase deposition of PAN on cotton fabrics; (**b**) Water droplet and hexadecane droplet on the superhydrophobic cotton fabric; (**c**) Water droplets on the coated textile; (**d**) water bouncing off the surface; (**e**) coated fabric immersed in water; (**f**) water droplets on the oil contaminated textile; (**g**) schematic illustration of the oil--water separation process; (**h**) hexadecane--water mixture on the superhydrophobic fabric; and (**i**) hexadecane--water mixture on raw fabric. Reprinted from \[[@B161-materials-09-00892]\]. Copyrights 2013 American Chemical Society.](materials-09-00892-g013){#materials-09-00892-f013}
![(**a**) Schematic illustration of --Si(CH~3~)~3~ functionalized SiO~2~ nanoparticles fabrication on poly(ethylene terephthalate) (PET) fabric; (**b**) change in CA with monomer ratio; (**c**) original PET fabric; (**d**) coated fabric with TEOS:HMDS molar ratio of 1:0.5; (**e**) 1:0.75; (**f**) 1:1.25; and (**g**) 1:1.75; inset in (**g**) shows the rolling state of water drop. Reprinted from \[[@B127-materials-09-00892]\]. Copyrights 2013 Elsevier B.V.](materials-09-00892-g014){#materials-09-00892-f014}
![(**a**) simple oil--water separation setup; (**b**) SEM images of fabrics after being treated with SiO~2~/PS suspensions; (**c**--**f**) Water droplet at different temperatures standing on the fabric coated with SiO~2~/PS. Insets in the lower left-hand corner of each panel are images of the static water droplets (4 µL). Reprinted from \[[@B126-materials-09-00892]\]. Copyrights 2013 Elsevier B.V.](materials-09-00892-g015){#materials-09-00892-f015}
![Schematic illustration of superhydrophobic PET fibers fabrication. Reprinted from \[[@B173-materials-09-00892]\]. Copyrights 2013 Elsevier B.V.](materials-09-00892-g016){#materials-09-00892-f016}
![(**a**) The schematic illustration of the coating of a flame retardant additive on the cotton; (**b**) digital image of pristine cotton; and (**c**) image of flame retardant coated cotton fabric. Reprinted from \[[@B179-materials-09-00892]\]. Copyrights Springer Science + Business Media Dordrecht 2016.](materials-09-00892-g017){#materials-09-00892-f017}
materials-09-00892-t001_Table 1
######
Physical properties of natural superhydrophobic systems. Data adopted from ref. \[[@B93-materials-09-00892],[@B95-materials-09-00892]\].
Natural Surface Surface Structure Contact Angle (θ) Properties
-------------------- ------------------------------------------------------------ ------------------- --------------------------------------
**Lotus leaf** Hierarchical, wax tubules 160° SuperhydrophobicLow dragLow adhesion
**Rice leaf** Sinusoidal grooves covered with micropapilla and nanobumps 164° SuperhydrophobicLow dragLow adhesion
**Butterfly wing** Shingle-like scales with aligned microgrooves 161° SuperhydrophobicLow dragLow adhesion
**Fish scale** Overlapping hinged scales 58° MucusHydrophilicLow adhesion
**Shark skin** Overlapping dermal denticles with triangular riblets n/a MucusHydrophilicLow adhesion
materials-09-00892-t002_Table 2
######
Electrospinning parameters governing the final properties of obtained fibers \[[@B117-materials-09-00892]\].
Material Properties Processing Conditions System Design Ambient Conditions
--------------------- --------------------------- --------------------------- ----------------------
Surface tension Electric field strength Design of the needle Temperature
Viscosity Type of electrical signal Geometry of the collector Humidity
Conductivity Solution charge polarity Air velocity
Polymer type Tip to collector distance Medium of the system
Polymer MW Flow rate
|
Q:
Homotopy pullback of $\mathbb{A}^1$-projections in the Nisnevich localization
Let $L_{Nis}(sPre(Sm_S))$ be the Nisnevich localization of the category of simplicial presheaves,
how to see that whether $\mathbb{A}^1$-projections $\mathbb{A}^1\times_S X\to X$ are closed under homotopy pullback in $L_{Nis}(sPre(Sm_S))$? How to compute the homotopy pullback of maps $\mathbb{A}^1\times_S X\to X$ along itself in $L_{Nis}(sPre(Sm_S))$?
A:
First, in any model category, weak equivalences are closed under homotopy pullback. That's the whole point of the "homotopy" in "homotopy pullback."
In your question, you are missing a step. Generally, $Sm_S$ is the category of smooth and finite type schemes over a scheme S of finite dimension. This category doesn't have good categorical behavior (it's not bicomplete, for example), so Voevodsky embedded it into simplicial presheaves $SPre(Sm_S)$, i.e. functors into simplicial sets. This has a model structure and you can do the localization $L_{Nis} SPre(Sm_S)$ that you wanted. To get the statement about $\mathbb{A}^1$-weak equivalences, you do a further localization to make $\mathbb{A}^1$ contractible, and it's this model structure that tells you homotopy pullbacks preserve weak equivalences. See Morel-Voevodsky.
The resulting model category is proper, meaning that if you look at a diagram $A \to B \gets C$ where one of those maps is a fibration, then you can compute homotopy pullback as just the regular old pullback, which is easy in presheaf categories. For a proof, see Jardine. If neither of those maps is a fibration, you can do fibrant replacement to replace one by a fibration.
|
Q:
Is there a way to get v$y to not copy the newline character in Vim on Mac and Linux?
I've used the Windows version of Vim in the past, but am
new to MacVim. In MacVim, when I switch to visual mode, use the $
motion (highlighting from my cursor to the end of the line), and yank,
when I paste the copied content, it includes the carriage return,
bumping everything after the paste point down to a new line.
This behavior seemed unfamiliar (not to mention annoying) to me. Is there any way to change this behavior to match the Windows version, where the newline is not included in the yank?
A:
Is just copying the text until the end of the line inappropriate? y$ will just copy from your current cursor until the end of the line, without the newline.
A:
There's a little-known motion that serves this need regardless of configuring Windows behaviors and can generally be useful in other contexts: g_. Quoth :help g_:
g_ To the last non-blank character of the line and
[count - 1] lines downward |inclusive|. {not in Vi}
Personally I don't tend to use this for yanking because I avoid the extra visual mode keystroke and use y$ (which doesn't copy the newline, as @zigdon suggested). Or better yet, nnoremap Y y$ so that Y works consistently with C and D.
I do however often use g_ with surround.vim where the mappings to add surrounds are often harder to remember for me than using visual selection. If you want to select until the end of the line and surround with parens, for instance, it would be ys$), which isn't bad but I tend to forget the ys mnemonic. v$S) seems natural but has the same problem as your question: it includes the newline, and that's a total mess when adding surrounds. vg_S) is exactly what you usually want.
One nice thing about doing it visually is that you can correct mid-selection: I still tend to hit v$ by muscle memory a lot, but if you see that you've overshot before acting, you can still hit g_ and fix the selection.
A:
You may try Du. Effectively it does exactly what you want and it is more finger-friendly if you intend to use it in raw editing.
|
A Forbes columnist has matter-of-factly opined that “the only reason” bitcoin has any value is due to illegal usage.
In a published column yesterday, Jason Bloomberg, the president of an analyst firm that proclaims itself as ‘the first and only industry analysis and advisory firm focused on agile digital transformation’, reveals his “chilling realization”, one that we must all face.
Bloomberg references the IRS-Coinbase tax case and bitcoin’s usage among ransomware extortionists in his opinion piece, stating “the underlying value of Bitcoin really has little if nothing to do with its artificial scarcity or popularity as a medium of speculation.”
In a sweeping statement, Bloomberg added:
On the contrary – the only reason bitcoin has value to anyone is because of the underlying value as a medium of exchange for lawbreakers. If we could flip a switch and eliminate all illegal uses of Bitcoin, there would be nothing left of the cybercurrency.
Bloomberg leans heavily on the IRS-Coinbase case to base his opinions on the world’s most prominent cryptocurrency, due to become a valid method of payment in Japan this Saturday after the country’s legislature recognized it to have the same properties of the Japanese yen.
The opinion piece includes counter-arguments to the analyst’s analysis but predominantly sticks to one rationale with subheadings the likes of ‘Tax Evasion Merely the Nail in Bitcoin’s Coffin’.
“[The IRS] subpoena is but the latest skirmish in a years-long war against criminals who have been leveraging Bitcoin for a wide variety of nefarious purposes,” writes Bloomberg, adding that “the majority of Americans who trade in Bitcoin are likely breaking the law.”
For ‘law-abiding, tax-paying citizens’ who may be interested in Bitcoin, Bloomberg has one final question. “Does the fact that the cybercurrency is primarily used for criminal purposes taint it for other uses, a la blood diamonds?” asks the analyst.
Featured image from Shutterstock. |
Voters in four states and Washington, DC, have approved marijuana legalization. But the drug remains illegal under federal law, creating all sorts of legal hurdles that state-legal marijuana businesses have to overcome.
One of those hurdles is federal taxes. Due to a section of the tax code known as 280E, many state-legal marijuana businesses have to pay taxes on basic expenses like rent, employee salaries, and utility bills — unlike other legal businesses, which are allowed to deduct these types of expenses.
For some businesses, this can drive their effective tax rates to 70 to 90 percent of their profits, which is enough to force many shops out of business. In comparison, other types of businesses can expect effective tax rates closer to around 30 percent.
The New York Times's Jack Healy reported on one medical marijuana business in Seattle that paid nearly 87 percent of its profits to federal taxes:
In Seattle, John Davis earned $53,369 in profits last year from his medical marijuana dispensary, the Northwest Patient Resource Center. Because he complied with all of the tax rules prohibiting deductions, he said, he ended up owing $46,340 in taxes.
"It's basically a dagger at the throat of the entire legal cannabis industry," Steve DeAngelo, co-founder of California-based medical marijuana dispensary Harborside Health Center, told me.
Section 280E was originally meant for criminals, not state-legal businesses
Section 280E was originally passed in 1982 to prevent drug dealers from deducting expenses related to the trafficking of schedule 1 or 2 substances, including marijuana, from their federal taxes. It was in part inspired by a Minneapolis drug dealer who ran up deductions for expenses related to his dealing, including the cost of gas, trips to other cities, and even rent on his apartment, which he classified as his place of business.
But in recent years the IRS has used section 280E to go after state-legal marijuana businesses, since they technically deal in a schedule 1 substance, the federal government's strictest classification for an illegal drug. The move has netted the US millions in extra revenue from pot shops and growers, but it's also forced some state-legal marijuana businesses to shut down.
DeAngelo of Harborside Health Center worries that section 280E could actually help illicit drug traffickers. To cope with the tax burden of 280E, many marijuana businesses raise their prices. But raising prices could make legally sold pot more expensive than illegally sold pot, giving consumers more incentive to buy from illicit drug dealers. So by treating businesses that are legal under state law like criminals, the federal government may be giving more leverage to actual criminals in the pot market.
Some businesses are trying to get around 280E — and calling for change
Pot shops have tried to mitigate the cost of 280E by hiring attorneys and accountants to help them restructure their businesses to include more expenses in limited deductible categories. As marijuana business attorney Henry Wykowski explained, businesses are still able to deduct the cost of goods sold, including — in a bizarre twist — the actual marijuana bought wholesale from growers, and some services unrelated to marijuana sales, such as massages, psychotherapy, and social activities.
"The impact of intense federal enforcement actions is felt most by the smaller, less well-funded dispensaries," said DeAngelo of Harborside Health Center. While smaller dispensaries closed, DeAngelo said Harborside was able to stay open because it had "the financial resources to hire the best legal talent available."
"We will pay taxes. We just want to pay fair taxes."
The National Cannabis Industry Association, legal pot's lobbying arm, has called on Congress to exempt marijuana businesses operating legally under state law from 280E. They've been joined by a bipartisan cast of political players, including conservative Grover Norquist, head of Americans for Tax Reform.
Advocates acknowledge that the chances of reform passing are slim, particularly in the upcoming Republican-controlled Congress. Taylor West, deputy director of the National Cannabis Industry Association, said changes to 280E will most likely need to come through a broader tax reform bill. The goal, she said, is to make sure legislators understand this isn't necessarily about supporting legalization.
"This is not about how you feel about marijuana one way or the other. This is about simple fairness," West said. Businesses "are saying, 'We will pay taxes. We just want to pay fair taxes.'"
Watch: Why marijuana isn't as dangerous as alcohol |
Q:
JSON to CSV and CSV to JSON in C#
I have been searching and searching for a way to convert a json file to a csv and the vice versa using C#. I have searched google and have not come up with anything. Everything I've tried so far from the answers on stack overflow just do not work from me. Does anyone know of any tooling or tutorials I could have look at how to accomplish this with the .NET Framework? Usually I post what I've tried however I'm clearly far off here so it is pointless.
A:
Compromises and Problems
You can accomplish this with the .NET Framework but there's not a clear and obvious way to just do this straight-up because of hierarchies and collections. What I mean by that is that CSV data is very flat and unstructured whereas JSON data is very organized and iterative. Let's take a simple chunk of JSON data that could look like this:
{
"Data": [
{
"Name":"Mickey Mouse",
"Friends":[ "Pluto", "Minnie", "Donald" ]
},
{
"Name":"Pluto",
"Friends":[ "Mickey" ]
}
]
}
The most obvious CSV file for that could be:
Name,Friend
Mickey Mouse,Pluto
Mickey Mouse,Minnie
Mickey Mouse,Donald
Pluto,Mickey
That's the easier conversion but let's say you just have that CSV file. It's not so obvious what the JSON should look like. One could argue that the JSON should look like this:
{
"Data": [
{ "Name":"Mickey Mouse", "Friend":"Pluto" },
{ "Name":"Mickey Mouse", "Friend":"Minnie" },
{ "Name":"Mickey Mouse", "Friend":"Donald" },
{ "Name":"Pluto", "Friend":"Mickey" },
]
}
That resulting JSON file is very different than the input JSON file. My point is that this isn't a simple/obvious conversion so any off-the-shelf or copy/paste solution will be imperfect. Whatever your solution is, you're going to have to make compromises or intelligent decisions.
.NET Framework Options
Now that we've gotten that out of the way, .NET gives you some capabilities to accomplish this out of the box and there are some good Nuget-supplied options as well. If you want to utilize pure .NET capabilities, you could use a combination of these two SO Answers:
Not perfect but this answer has some great code to get you started in the logic to generate a CSV file
This question and the resulting answers have some good info about generating JSON using just the .NET Framework and without any third-party utilities.
You should be able to apply the concepts in those two links PLUS the compromises and intelligent decisions you need to make from my first "Compromises and Problems" section of this post to accomplish what you need.
Something I've Done Before
I've done something similar where I actually used some functionality in the Microsoft.VisualBasic.FileIO namespace (works great in a C# app) in addition to Web API's serialization functionality to accomplish a CSV->JSON conversion using Dynamic objects (using the dynamic keyword) as an intermediary. The code is provided below. It's not terribly robust and makes some significant compromises but it has worked well for me. If you want to try this, you'll have to create your own version that goes in reverse, but as I mentioned in my first section, that's really the easy part.
using System.Collections.Generic;
using System.Dynamic;
using System.IO;
using System.Linq;
using System.Web.Http;
// NOTE: This is not purely my code. This was put together
// with the help of other SO questions that I wish I had the
// links to so I could credit them. You probably will find
// some chunk(s) of this code elsewhere on SO.
namespace Application1.Controllers
{
public class Foo
{
public string Csv { get; set; }
}
public class JsonController : ApiController
{
[HttpPost]
[Route("~/Csv/ToJson")]
public dynamic[] ConvertCsv([FromBody] Foo input)
{
var data = CsvToDynamicData(input.Csv);
return data.ToArray();
}
internal static List<dynamic> CsvToDynamicData(string csv)
{
var headers = new List<string>();
var dataRows = new List<dynamic>();
using (TextReader reader = new StringReader(csv))
{
using (var parser = new Microsoft.VisualBasic.FileIO.TextFieldParser(reader))
{
parser.Delimiters = new[] {","};
parser.HasFieldsEnclosedInQuotes = true;
parser.TrimWhiteSpace = true;
var rowIdx = 0;
while (!parser.EndOfData)
{
var colIdx = 0;
dynamic rowData = new ExpandoObject();
var rowDataAsDictionary = (IDictionary<string, object>) rowData;
foreach (var field in parser.ReadFields().AsEnumerable())
{
if (rowIdx == 0)
{
// header
headers.Add(field.Replace("\\", "_").Replace("/", "_").Replace(",", "_"));
}
else
{
if (field == "null" || field == "NULL")
{
rowDataAsDictionary.Add(headers[colIdx], null);
}
else
{
rowDataAsDictionary.Add(headers[colIdx], field);
}
}
colIdx++;
}
if (rowDataAsDictionary.Keys.Any())
{
dataRows.Add(rowData);
}
rowIdx++;
}
}
}
return dataRows;
}
}
}
If you want something more robust, then you can always leverage these great projects:
JSON.NET (This works VERY WELL with creating JSON from dynamic objects. Given that you're not using Web API, this would be the first place I would look to take the dynamic[] return value and convert it to JSON.)
CsvHelper
|
*Please cite this paper as:* Einollahi B, Motalebi M. Quality of life in different geographic areas; sharing an experience. J Nephropharmacol 2013; 2(2): 47-48.
Implication for health policy/practice/research/medical education: {#imp1}
==================================================================
Various factors such as perception of social support, expectations of life, healthy behaviors and outlooks, religious conviction may affect quality of life in dialysis patients.
Recently much attention had been directed toward the quality of life in dialysis patients. The published article by Cavalcante *et al.*, titled "factors associated with the quality of life of adults subjected to hemodialysis in a city in northeast Brazil"([@R1]), has focused on exploration of socioeconomic, demographic, clinical and laboratory factors that can affect quality of life (QoL) in hemodialysis (HD) patients in Brazil. We have also conducted a study to evaluate QoL on 6930 HD patients in Iran ([@R2]) applying the kidney disease component summary - Short Form 1.3 questionnaire (KDCS-SF). We would like to share our experience that may be helpful to others. Cavalcante *et al*. ([@R1]) found employment status, burden of kidney disease, general health, patient satisfaction and physical function were the domains with worsen QoL (≤50). We have also shown work status, burden of kidney disease, general health and physical function were the domains with worsen QoL ([@R2]) as well as role physical, role emotional and energy\\fatigue as shown in [Table 1](#T1){ref-type="table"}, of course with lower scores compared to current study ([@R2]). The low scores of physical domains in both studies obviously show that spending many times for hemodialysis can affect and disturb patient's daily activities every week. In addition, majority of QoL domains scores among our HD patients were lower than patients on Cavalcante *et al*. study, which indicated the difference of perception of QoL between two countries' people. Kutner *et al*. showed there are differences between QoL between white and black races ([@R3]). So it seems many factors such as perception of social support, expectations of life, healthy behaviors and outlooks, religious conviction and etc. are different among countries. It is interest of that Cavalcante *et al*. showed gender had no effect on HD patients' QoL, while we showed better QoL in males than that of females. Zender *et al.* ([@R4]) also reported a lower QoL in women when compared to men; in addition, they showed a high prevalence of psychological disorders with more severity that it can lead to lower QoL in females. We think it is due to differences of male roles in family and community between both countries. Although the current study shows dialysis duration has no effect on patients QoL, we found that there was the significant correlation between QoL and dialysis duration ([@R2]) so that more dialysis duration patients had lower QoL. Bayoumi *et al*. also considered that dialysis duration was a negative predictor for QoL ([@R5]). This different outcome may be due to two reasons: 1) patients older than 60 years old were 39.7% in our study while all of patients in the present study ([@R1]) were younger than this. 2) patients size in the present study ([@R1]) was smaller compared to our study which had a huge number of patients. Finally, we suggest a multi-center study or a meta-analysis to evaluate QoL in different countries to determine whether different geographic areas have effect on QoL or not.
###### Mean and Standard Deviation, of KDQOL-SF and SF-36 Items (Ref. 2)
----------------------------------------- ---------------
**Mean ± SD**
**Symptoms** 67.9 ± 19.8
Effects of kidney disease 50.42 ± 20.9
Burden of kidney disease 23.08 ± 19.78
Work status 22.3 ± 34.56
Cognitive function 66.26 ± 21.21
Quality of social interaction 67.07 ± 20.08
Sexual function 63.48 ± 30.4
Sleep 55.9 ± 19.9
Social support 72.8 ± 26.9
Dialysis staff encouragement 81.3 ± 21.87
Patient satisfaction 69.01 ± 24.24
Kidney disease component summary (KDCS) 57.97 ± 11.7
Physical function 40.46 ± 29.5
Rolephysical 25.6 ± 32.7
Pain 55.31 ± 25.73
General health 41.70 ± 19.71
Physical component summary (PCS) 40.79 ± 20.1
Emotional well-being 54.24 ± 18.03
Role emotional 36.28 ± 38.89
Social function 55.77 ± 22.3
Energy/ fatigue 44.76 ± 19.79
Mental component summary (MCS) 47.79 ± 18.31
SF-36 44.29 ± 17.7
SF-36 + KDCS 51.12 ± 13.41
----------------------------------------- ---------------
Authors' contributions {#s1}
======================
All authors contributed to study equally.
Ethical considerations {#s2}
======================
Ethical issues (including plagiarism, informed consent, misconduct, double publication and redundancy) have been completely observed by authors.
Conflict of interests {#s3}
=====================
The authors declared no competing interests.
Funding/Support {#s4}
===============
No funding from any source.
|
Q:
Automatical creation of nuget package from existing project
We are using Visual Studio 2010, we develop ASP.NET MVC applications.
Our deploy process includes manually building a nuget package on the UI and uploading it.
We need to figure out how to create a nuget package from code including adding the files, adding properties, adding the changelog as description.
Is there a solution to achieve this goal?
Thanks
EDIT:
After a lot of painful work, not knowing what is the goal and how can I achieve the goal I've come up with the following code:
NuGet Update -self
nuget spec -f
mkdir bin
mkdir Scripts
mkdir Styles
copy ..\TestProj\TestProj\bin bin
copy ..\TestProj\TestProj\Scripts Scripts
copy ..\TestProj\TestProj\Styles Styles
copy ..\TestProj\TestProj.sln
I'm not sure the NuGet operations are correct and I'm not sure at all the files should be migrated into a package this way, as I'm new to NuGet. I would be very grateful if somebody would show me the right direction about:
how should I add files
how should I add properties
how should I add changelog as description
Thanks.
A:
In my case the solution was the following:
cd C:\myfolder
mkdir content
mkdir Styles
del content /F /S /Q /A
del Styles /F /S /Q /A
copy C:\myotherfolder\Scripts Content
copy C:\myotherfolder\Styles Styles
NuGet Update -self
NuGet pack mypackage.nuspec
Note that mypackage.nuspec already existed.
|
Q:
Moving files from one share to another
I'm trying to move all the files on my Western Digital "My Book World" from the "Public" share to a new "Files" share I created. When I tried moving them over the network, the system thought that they were on two different filesystems, and wanted to "copy and delete" instead of simply moving, which would take days.
I've searched for a solution and found out that I could ssh into my "My Book World", and create a new share to the folder "/shares". That way, I could move files from /shares/Public to /shares/Files as fast as possible.
I can access the new global share, but when I try to move the files (either via ssh or via the file explorer), I get a "not enough space on disk" error, which I do not understand.
Is there a problem in the configuration of my share ? I edited /etc/samba/smb.conf, and added at the top :
[all]
path = /shares
comment =
browseable = yes
invalid users =
valid users = admin
read list = admin
write list = admin
map read only = no
A:
I found what the problem was : each share is mounted at a different point :
~ # df
Filesystem 1k-blocks Used Available Use% Mounted on
/dev/md0 1928980 121256 1709736 7% /
/dev/md3 972344 17944 905008 2% /var
/dev/md2 973391744 973391724 20 100% /DataVolume
/dev/ram0 63412 20 63392 0% /mnt/ram
/dev/md2 973391744 973391724 20 100% /shares/Public
/dev/md2 973391744 973391724 20 100% /shares/Download
/dev/md2 973391744 973391724 20 100% /shares/Fichiers
All I needed to do was cd /DataVolume and move files from there !
|
Q:
Limit with radicals, $\cos$, $\ln$ and powers
$\underset{x\rightarrow +\infty}\lim{\frac{\sqrt[6]{1-\cos{\frac{1}{x^3}}}\Big(2^{-\frac{1}{x}}\;-\;3^{-\frac{1}{x}}\Big)}{\ln(x-1)^{\frac{1}{x}}-\ln{x^{\frac{1}{x}}}}}=\underset{x\rightarrow +\infty}\lim{\frac{\sqrt[6]{1-\cos{\frac{1}{x^3}}}\Big(2^{-\frac{1}{x}}\;-\;3^{-\frac{1}{x}}\Big)}{\ln(\frac{x-1}{x})^{\frac{1}{x}}}}=\underset{x\rightarrow +\infty}\lim{\frac{\sqrt[6]{1-\cos{\frac{1}{x^3}}}\Big(\frac{\sqrt[x]{3}-\sqrt[x]{2}}{\sqrt[x]{6}}\Big)}{\frac{1}{x}\ln{\Big(1-\frac{1}{x}\Big)}}}=0$
My answer is rather imprecise:$$\underset{x\rightarrow +\infty}\lim{\cos{\frac{1}{x^3}}}=1\implies\underset{x\rightarrow +\infty}\lim{\sqrt[6]{1-\cos{\frac{1}{x^3}}}}=0$$
$$\underset{x\rightarrow +\infty}\lim{\frac{\sqrt[x]{3}-\sqrt[x]{2}}{\sqrt[x]{6}}}=0?$$
I am aware of the mistake I have made by writting $0$ for an undefined term.
$$\underset{x\rightarrow +\infty}\lim{\Big(1-\frac{1}{x^3}\Big)}=1\implies \ln{\Big(1-\frac{1}{x}\Big)}<0\implies\underset{x\rightarrow +\infty}\lim{\Bigg(\frac{1}{\frac{1}{x}\ln{\Big(1-\frac{1}{x}\Big)}}\Bigg)=-\infty}$$
The limit of the denumerator is $0$ $\&$ the limit of the whole expression is $0$.
How can I prove this concisely?
A:
Your conclusion is wrong since we find an indeterminate form $\frac 0 0$ and we can't conclude that the limit is zero.
Indeed we have that by standard limits
$$\sqrt[6]{1-\cos{\frac{1}{x^3}}} = \frac1{x\sqrt[6]2}+O\left(\frac1{x^2}\right)$$
$$2^{-\frac{1}{x}}\;-\;3^{-\frac{1}{x}} = \frac1x\log \frac32+O\left(\frac1{x^2}\right)$$
therefore
$${\frac{\sqrt[6]{1-\cos{\frac{1}{x^3}}}\Big(2^{-\frac{1}{x}}\;-\;3^{-\frac{1}{x}}\Big)}{\ln(x-1)^{\frac{1}{x}}-\ln{x^{\frac{1}{x}}}}}= \frac{\frac1{x^2}\left(\frac1{\sqrt[6]2}+O\left(\frac1{x}\right)\right)\left( \log \frac32+O\left(\frac1{x}\right)\right)}{{\frac{1}{x}\ln{\Big(1-\frac{1}{x}\Big)}}}=$$
$$= \frac{\left(\frac1{\sqrt[6]2}+O\left(\frac1{x}\right)\right)\left( \log \frac32+O\left(\frac1{x}\right)\right)}{\frac{\ln{\Big(1-\frac{1}{x}\Big)}}{\frac1x}}\to -\frac1{\sqrt[6]2}\log \frac32$$
|
The lorry driver at the centre of one of most viral road accidents in 2018 has been accused of acting rashly in hurting the cyclist, The Straits Times reported.
The lorry driver is named Teo Seng Tiong, while the cyclist is named Eric Cheung.
Prosecutors are now seeking a jail term of at least two weeks for the lorry driver.
In case you need a refresher of what occurred:
Charge amended
Initially, Teo faced charges of causing hurt to others through negligent behaviour, as well as not making a police report within 24 hours of a car accident.
However, ST reported that the charge of causing hurt through negligent behaviour has since been amended to acting rashly so as to cause hurt.
Under the Penal Code, the maximum punishment for the charge of acting rashly to cause hurt is an imprisonment term of one year, or a fine of S$5,000, or both.
As for the second charge of not making a police report within 24 hours of a car accident, the maximum punishment is either a fine of S$1,000 or a jail term of three months.
Originally planned to plead guilty
Lianhe Zaobao reported in January 2019, that the driver had originally planned to plead guilty.
However, ST reported that the driver has since planned to claim trial in light of the amended charge.
Teo also revealed that the lawyer who has been representing him, Chia Boon Teck, would continue to represent him, free-of-charge.
Teo told ST:
"I was ready to plead guilty to negligence since before Chinese New Year. But they changed the charge to rash act, so I have no choice but to claim trial. Also because lawyer Chia Boon Teck will continue to help me free of charge."
Top image collage via Teo Seng Tiong, Roads.sg Facebook |
The Press' Email Narrative Now Has A Colin Powell Problem
Thanks to the release this week of a January 2009 email[1] from Colin Powell to Secretary of State Hillary Clinton, we now know definitively that the former Republican secretary of state advised Clinton on the wisdom of using private emails during her time at the State Department. We know that Powell thought it was fine to use that private email account to bypass[2] State Department servers to communicate with friends and even “foreign leaders.”
We know Powell advised[3] Clinton on how to circumvent federal records requirements while she was secretary of state: “Be very careful. … I got around it all by not saying much and not using systems that captured the data.” We know that while Clinton used private email for convenience, she didn't follow Powell's lead in seeking to deliberately use systems that avoided future public disclosures.
The Republican also complained that State Department officials didn’t want him using his PDA, what he termed an "ancient version" of Clinton's Blackberry: “[T]hey gave me all kinds of nonsense about how they gave out signals and could be read by spies, etc." But Powell said he ignored those warnings and used his PDA in his office suite.
As for the whereabouts of Powell’s own emails from his time at the State Department, “during his tenure, Powell had sent classified emails over his private AOL account - but as of July, had still not responded to a request to contact his service provider to retrieve them,” according[3] to USA Today. “In both 2014 and 2015, the State Department asked Powell to provide all of his records that were not in the agency’s record-keeping system.” As Powell's email to Clinton suggested, he no longer has the emails from his personal account; the records of those communications with national and international leaders during his tenure as secretary of state are gone. (Powell defends the contents[4] of his email to Clinton.)
That limbo status stands in sharp contrast to extraordinary scrutiny the press and Republicans have placed on Clinton’s private account emails, tens of thousands of which she voluntarily turned over to the government and have since been released to the public.
These helpful Powell revelations provide some welcome context to the email story. They also raise questions about how the press will deal with the new information, and why the press has seemed so uninterested[5] in including the context of Powell's actions over the last year-and-a-half as it relentlessly pursued the Clinton email “scandal” story.
Keep in mind that we’ve known for quite a while[6] that Powell used a private email account while serving secretary of state. And since March, we’ve known[7] that Powell "handled classified material on unclassified email systems," according to ABC News, and that some of Powell’s emails contained "information classified at the Secret or Confidential levels.'"
Yet for the most part, Powell’s name has been invoked sparingly by the media, despite the avalanche of Clinton email coverage and commentary.
Why the omission? I think it’s because including context about Powell and how previous secretaries of state handled their electronic communication undermines the media’s longstanding narrative about the current email story. The press has clung to the idea that it is uniquely and unequivocally about Hillary Clinton, and the reason it’s so important, and why it requires so much attention, is that it illustrated how Hillary Clinton, and Hillary Clinton alone, is secretive and tries to obfuscate the rules.
Except that’s just not true.
Is Powell absolutely central to the Clinton email story? No. Does his experience radically alter the contours of Clinton’s actions, for which she has repeatedly apologized? It does not. But does Powell’s email past provide much-needed and often missing context to the press’ Clinton email narrative? It sure does.
“To liken her to Powell does not excuse Clinton’s behavior or imply the media should ignore it. It contextualizes it,” wrote[8] Jonathan Chait at New York, following the release of Powell’s 2009 correspondence to Clinton. “And the context suggests that Clinton committed ordinary lapses of ethics and judgment.”
Correct. But if Clinton’s supposedly guilty of “ordinary lapses of ethics and judgment,” how does the press justify continuing to treat the email story like Watergate-meets-Iran Contra, even after the FBI has concluded there is no evidence of illegality?
Again, Powell’s inclusion in the story flattens and normalizes the narrative. Powell’s inclusion signals to news consumers that Clinton’s actions maybe weren’t so scandalous. In fact, maybe they weren’t even newsworthy.
In other words, Powell ruins the plot. That’s why the press has leaned over in a concerted effort to not provide helpful context in terms of how other prominent public officials archive their emails.
The Clinton email pursuit, the press decided long ago, is best told in a vacuum. But now that vacuum has been breached.
How is the press responding to the release of Powell’s eye-opening email to Clinton? On Thursday, CNN did describe[9] it as a “major bombshell,” so it’s not as if the story is being actively ignored. But I’d argue that in comparison to the never-ending, steroid-fueled pursuit of Clinton, the Powell story certainly is in no danger of being over-played by the press.
It's true that the Powell email was referenced in the FBI report released last week, and most news organizations covered it then. But in terms of the entire email being released and the important, additional context it provides to the email saga, there has been some notable silence. For instance, the Powell email was released Wednesday afternoon and as of today, The New York Times newsroom still hasn’t acknowledged that fact or detailed for readers what counsel Powell gave Clinton. Thursday’sWashington Post did cover the Powell news Thursday, but in a brief, 400-word article[10] that appeared on page six. (A Post editorial[11] in Friday's newspaper admonishes the press for making too much of the Clinton email saga.) A handful of major newspapers also covered the Powell story, but none of them put the story on their front page, according to a Nexis search.
A footnote. The Powell email revelation is, for the most part, being treated as a footnote that journalists don’t want news consumers focusing on. |
Blue Ridge Railway (1901)
The Blue Ridge Railway was a 19th-century railroad in the U.S. state of South Carolina. It was originally chartered in 1852 as the Blue Ridge Railroad of South Carolina. Original plans were for a 195-mile line from Anderson, South Carolina, to Knoxville, Tennessee going through the mountains with as many as 13 tunnels including the incomplete Stumphouse Mountain Tunnel.
By 1859, the railroad had built between Anderson and West Union, South Carolina and substantial work on several tunnels had started. However, with the outbreak of the Civil War, no further work was ever completed on the tunnels despite efforts after the war, including one by the Black Diamond Railroad. A final extension from West Union to Walhalla, South Carolina at the urging of the Town Council and local citizens saw the first train arrive November 14, 1877, but no more track would ever be laid along the alignment up Stumphouse Mountain. In 1880, the Columbia and Greenville Railroad acquired the of track that had been laid. In 1901 the Southern Railway, successor to the Columbia and Greenville, split out the line as the Blue Ridge Railway. The Southern leased the Blue Ridge to subsidiary Carolina and Northwestern Railway on July 1, 1951, and eventually merged the company.
References
External Links
Blue Ridge Railroad history
Blue Ridge History trail at Stumphouse Tunnel Park and Issaqueena Falls in Oconee County, South Carolina
Category:Defunct South Carolina railroads
Category:Predecessors of the Southern Railway (U.S.)
Category:Railway companies established in 1901
Category:American companies established in 1901 |
Rebound dating site dating aa member
Posted by
/ 23-Aug-2017 09:49
Sources connected with Tarek and Christina tell us ...
This usually happens when you are in fake closure mode (see Closure).He might even be *gasp* emotionally unavailable and use you only to fill his physical and companionship needs.Also, you never really know if he is still in love with her, or if he is just idling time with you while he’s trying to work things out with her.You have to patiently hope and pray that he will get over her, you have to patiently work and try in your relationship to be better than her, you have to patiently listen to him rant and rave about her, and you have to patiently prove time and time again that you are the best thing since sliced bread. Now I’m not saying that you should put up with him treating you like shit in the guise of being patient. If he doesn’t treat you like the goddess you deserve to be treated, if he abuses you mentally, emotionally or any other way, or if you feel belittled or hurt on a constant basis then he is not worth the distance you can throw him.
; and he eventually ended up falling head over heels in love with me. No matter how great I was, no matter how many wonderful things I did, no matter how fabulously wonderful I treated him–none of that mattered. |
Please include the date of your choosing, your full name,
phone number, email address, and method of payment in your email.
Chattanooga Aerials Student : Leslie Godwin
Emphasizing fun ABOVE all else.
Schedule Something
We offer aerial workshops to the public, and weekly classes and private lessons to the members of our studio. If this is your first time trying aerials, you can either come to an Introductory Workshop or take a private workshop/lesson that you organize.
We are also available for parties, performances and events of all kinds. Please feel free to contact us at chattanoogaaerials@gmail.com for details!
Wear Something
You'll want to wear a shirt that completely covers your armpit area and your stomach. You will be much more comfortable if the shirt isn't too loose, and can be tucked in easily as you will be upside down very often!
Wear pants that are easy to move around in, and that will cover the backs of your knees... longer Capri pants will work, but shorts will not. Avoid wind-pants and other slick materials unless you are an experienced aerialist.
We have found that full length cotton yoga pants or leggings are the most versatile and comfortable. Most of our students and teachers prefer to wear two layers (a tank top or leotard underneath, and a fitted long sleeve shirt on top that can be tucked in for certain moves) as it is the most suited for what we do at our studio!
Love Something
Once you have taken an Introductory Workshop, you are welcome to become a member of our studio when a spot becomes available in one of our existing weekly classes.
All of our members are required to participate on both pieces of equipment. We have discovered through years of training that in order to be the best aerialist one can be, the use of both pieces of equipment is necessary, making you stronger, both physically and mentally. |
Introduction {#s1}
============
Acute myocardial infarction (AMI) is one of the most serious cardiovascular conditions. The acute loss of myocardium post-AMI triggers a cascade of intracellular signaling processes, contributing to left ventricular (LV) remodeling, scar expansion, and heart failure. Beta-adrenergic receptor antagonists (β-blockers) effectively ameliorate post-AMI LV remodeling. Carvedilol, a third-generation, non-selective β-adrenoreceptor antagonist, possesses antioxidant, anti-apoptotic, anti-inflammatory, and anti-fibrotic properties \[[@B1]\]. Numerous studies have shown that carvedilol treatment improves the left ventricular ejection fraction (LVEF) and attenuates left ventricular remodeling in patients with chronic heart failure (CHF) \[[@B2]\]. The protective effects of carvedilol against AMI-induced myocardial injury have been attributed to the reduction of fibrosis \[[@B3],[@B4]\]. However, the precise mechanisms underlying the anti-fibrotic effect of carvedilol is unknown.
MicroRNAs (miRNAs) are endogenous 20--23-nucleotide non-coding RNAs that negatively regulate gene expression at the posttranscriptional level by degrading or deadenylating target mRNA or by inhibiting translation \[[@B5]\]. MiRNAs have been reported to play key roles in diverse biological and pathological processes, including cell differentiation, proliferation, apoptosis, heart disease, neurological disorders, and human cancers \[[@B6]-[@B10]\]. Several miRNAs, including miR-21 \[[@B11]\], miR-1, miR-206 \[[@B12]\], miR-31, and miR-499-5p \[[@B13]\] are reported to be dysregulated in myocardial infarction, suggesting a fundamental role in AMI. MicroRNA-29b, a regulator of fibrosis \[[@B14]-[@B16]\], is dysregulated in AMI \[[@B14]\]. The TGF-β/Smad3-dependent pathway plays an important role in the pathogenesis of cardiac fibrotic and hypertrophic remodeling \[[@B17]\]. The effect of carvedilol on the inactivation of Smad3 signaling is unknown. In this study, we assessed the hypothesis that Smad3 signaling and miR-29b mediate the effect of carvedilol on attenuating AMI-induced myocardial fibrosis in rat.
Materials and Methods {#s2}
=====================
Ethics Statement {#s2.1}
----------------
Male sprague-dawley (SD) rats weighing 180-240 g, license number SCXK (YUE) 2004--0011 (Department of Experimental Animal Research Center, Sun Yat-sen Medical College, Sun Yat-sen University, Guangzhou, China) were used. All animals were housed on a 12-h light/dark cycle under pathogen-free conditions and kept on standard mouse chow with free access to tap water. This study conformed to the Guide for the Care and Use of Laboratory Animals published by the US National Institutes of Health (8th Edition, National Research Council, 2011). The present program was also approved by the research ethics committee of Guangdong General Hospital, the approval number was No. GDREC2010093A.
A rat model of AMI and carvedilol treatment {#s2.2}
-------------------------------------------
AMI was induced by ligating the left anterior descending coronary artery as described \[[@B18]\]. Electrocardiography was used to demonstrate ST elevation and thereby confirm the success of surgery. Forty surviving rats that underwent ligation were randomly divided into five groups (N=8): (1) The Sham control group (Sham), (2) Saline treated AMI model group (AMI), (3) Low dose of carvedilol treated AMI group (CAR-L, 1 mg/kg/day), (4) Medium dose of carvedilol treated AMI group (CAR-M, 5 mg/kg/day), (5) High dose of carvedilol treated AMI group (CAR-H, 10 mg/kg/day). The second day after LAD surgery, four-week-oral dosing was conducted in rats in all groups except the sham group. All rats were fed ad libitum (the dose of standard rat fodder for one rat over 30 g/day).
Echocardiographic study {#s2.3}
-----------------------
Left ventricular (LV) function variables were assessed by transthoracic echocardiography. After the induction of light general anesthesia, the rats underwent transthoracic two-dimensional (2D) guided M-mode echocardiography with a 8.5-MHz transducer (Acuson, Mountain View, CA). From the cardiac short axis (papillary level), the LV anterior wall end-diastolic thickness (LVAWd), the systolic LV anterior wall thickness(LVAWs), the LV internal dimension at end-diastole (LVIDd), the LV internal dimension at end-systole(LVIDs), the LV posterior wall end-diastolic thickness (LVPWd), the LV posterior wall end-systolic thickness(LVPWs), the ejection fraction (EF) and fractional shortening (FS) were measured. Echocardiographic measurements were averaged from at least three separate cardiac cycles.
Histological analysis {#s2.4}
---------------------
Rats were killed by an intraperitoneal injection of 2 mL of pentobarbital. The heart was excised, and the LV myocardium fixed overnight in 10% formalin. Samples were embedded in paraffin and cut into 4 µm thick sections. They were mounted on normal glass slides and stained with Masson trichrome for histological examination. For the collagen volume fraction (CVF) analysis in the border zone of the infarcted region, eight separate views (magnification=original×400) were selected and assessment of CVF used the following formula: CVF=collagen area/ total area.
Rat cardiac fibroblasts (CFs) isolation, culture and treatment {#s2.5}
--------------------------------------------------------------
CFs were isolated from 1-3 days old SD rats by using a modification of previous report \[[@B19]\]. CFs were separated from cardiomyocytes by gravity separation and grown to confluency on 10-cm cell culture dishes in growth media (DMEM/LG 10% FBS 1% penicillin 1% streptomycin) at 37 °C in humid air with 5% CO2. CFs from the third passage were used for experiments. The passage 3-4 neonatal SD rat CFs were used for mechanism study *in vitro*. Fifty nM Smad3 siRNA, 5 µM Smad3 inhibitor SIS-3, 80 µM Smad3 inhibitor naringenin (Nar) were used to treat rat CFs.
Imaging of DCF Fluorescence {#s2.6}
---------------------------
Intracellular oxidants in mouse cardiac fibroblasts were measured by using the probe dichlorofluoroscin diacetate (DCFH-DA) and confocal microscopy as described \[[@B20]\]. In brief, cells were incubated with DCFH-DA (10 µM) for 15 min, and subsequently treated with Hoechst33342 (1 µg/mL) for 15 min before being imaged. Cells were washed twice with culture medium, and images were acquired from five or more randomly chosen fields using Leica SP5 Spectral scanning laser confocal microscope (Leica Microsystems, Wetzlar, Germany). The levels of DCF fluorescence were analyzed with Leica Application Suite 2.02 software.
Quantitative real-time PCR {#s2.7}
--------------------------
Total RNA was extracted using TRIzol reagent (Gibco-BRL, Grand Island, NY, USA) according to manufacturer's instruction. Methods for coding gene and miR-29b precursor expression detection were as follows: First-strand cDNAs were synthesized using a mixture of oligo (dT) 15 and random primers with Superscript reverse transcriptase (Invitrogen, Carlsbad, CA, USA). Real-time PCR was performed with the following thermal cycling profile: 95°C for 5 min, followed by 40 cycles of amplification (94°C for 25 s, 60°C for 25 s, and 72°C for 25 s). The absorption values of the SYBR Green I fluorescence in each tube were detected at the end of each cycle. The housekeeping gene GAPDH was used as an internal control. PCR primers for coding genes and miR-29b precursors used in this study, as well as the size of fragments amplified, are shown in [Table S1](#pone.0075557.s001){ref-type="supplementary-material"}. Methods for mature miR-29b level detection were as follows: the total RNA was used to detect mature miRNA level using Bulge-Loop miRNA qRT-PCR kit (Guangzhou Ribobio, China). In brief, the real-time miRNA assay has two steps: miRNA RT reaction and real-time PCR detection. miRNA RT primer binds to the 3′end of miRNA molecules and are transcribed with reverse transcriptase. RT product is quantified using real-time PCR with the following thermal cycling profile: 95 °C for 20 sec, followed by 40 cycles of amplification (95 °C for 10 s, 60 °C for 20 s, 70 °C for 10 s). To normalize RNA content, the U6 snRNA was the internal control. The above two kinds of real-time PCR assays were performed using the vii A7 Quantitative PCR System (Applied Biosystems, Carlsbad, CA, USA). The relative expression values of coding genes and mature miRNAs of interest were calculated using the 2^-∆∆Ct^ method \[[@B21]\].
Western blot analysis {#s2.8}
---------------------
The protein extract (40 µg) prepared from mouse myocardium was separated using 12% SDS-PAGE and transferred onto a polyvinylidene fluoride (PVDF) membrane. The membrane was then blocked for 1 h at room temperature with 5% milk in Tris-buffered saline solution (pH 7.6) containing 0.05% Tween-20 (TBS/T) and incubated with a high affinity anti-Col1a1 antibody (1:1000), anti-Col3a1 antibody (1:1000), anti-α-SMA (1:2000) (Santa Cruz Biotechnology, Santa Cruz, CA, USA), anti-smad3 antibody (1:10 000) and anti-p-smad3 antibody (1:10 000) (Epitomics, Burlingame, CA, USA) overnight at 4 °C. Membranes were then washed extensively with TBS/T and incubated with a horseradish peroxidase (HRP)-conjugated secondary antibody (1:5000) (Santa Cruz Biotechnology, USA) for 1 h at room temperature. Proteins were visualized using the ECL Plus detection system (GE Healthcare, WI, USA). As an internal control, membranes were also immunoblotted with an anti-GAPDH antibody (1: 2000) (Santa Cruz Biotechnology, USA).
Statistical analysis {#s2.9}
--------------------
The data represent the mean ± standard deviation (SD). In each experiment, all determinations were performed at least in triplicate. Differences between experimental groups were analyzed using Student's *t*-test. A value of *p*\< 0.05 indicated significance.
Results {#s3}
=======
Impaired left ventricular function was rescued by carvedilol treatment {#s3.1}
----------------------------------------------------------------------
Echocardiography findings are compared in [Table 1](#pone-0075557-t001){ref-type="table"}. The left ventricular (LV) anterior wall end-diastolic thickness (LVAWd) and the systolic LV anterior wall thickness (LVAWs) as assessed by echocardiography were significantly lower in the AMI group (0.36 ± 0.10 and 0.44 ± 0.11, respectively) compared to the sham surgery controls (1.92 ± 0.11 and 2.79 ± 0.28, respectively; *p* \< 0.001). However, the carvedilol treatment group had significantly higher LVAWd and LVAWs than did the AMI group (*p* \< 0.01, *p* \< 0.001, respectively). The LV internal dimension at end-diastole (LVIDd) and the LV internal dimension at end-systole (LVIDs) were also significantly higher in the AMI group (8.08 ± 0.41 and 5.35 ± 0.57, respectively) than in the sham surgery control group (5.94 ± 0.57 and 3.56 ± 0.46, respectively; *p* \< 0.001), but the LVIDd and LVIDs were significantly lower in the carvedilol group than in the AMI group (*p* \< 0.05, *p* \< 0.01, *p* \< 0.001, respectively). The EF (%) and FS (%) were significantly lower in the AMI group (55.45±5.04% and 30.19 ± 3.51%, respectively) than in the sham surgery control group (69.91±3.40% and 40.15 ± 2.69%, respectively; *p* \< 0.001); medium- and high-dose carvedilol treatment efficiently rescued the AMI-induced reductions of EF (%) and FS (%) (*p* \< 0.05, *p* \< 0.05, respectively).
10.1371/journal.pone.0075557.t001
###### Assessment of the cardiac function by echocardiography (N=8).
Group Sham AMI CAR-L CAR-M CAR-H
-------- ------------ ------------------- ------------------- ------------------- -------------------
LVAWd 1.92±0.11 0.36±0.10**^△^** 0.59±0.18^\*\*^ 1.54±0.08^\*\*\*^ 1.48±0.16^\*\*\*^
LVAWs 2.79±0.28 0.44±0.11**^△^** 0.68±0.19^\*\*^ 2.25±0.30^\*\*\*^ 1.93±0.20^\*\*\*^
LVIDd 5.94±0.57 8.08±0.41**^△^** 7.02±0.56^\*\*\*^ 6.69±0.51^\*\*\*^ 7.20±0.41^\*\*\*^
LVIDs 3.56±0.46 5.35±0.57**^△^** 4.67±0.32^\*^ 4.34±0.55^\*\*^ 4.75±0.55^\*^
LVPWd 1.70±0.12 1.94±0.08**^△^** 1.97±0.18 1.84±0.12 1.86±0.12
LVPWs 2.40±0.25 3.08±0.22**^△^** 3.13±0.35 2.92±0.11 3.05±0.38
EF (%) 69.91±3.40 55.45±5.04**^△^** 60.98±7.13 65.60±5.17^\*^ 64.87±6.26^\*^
FS (%) 40.15±2.69 30.19±3.51**^△^** 33.85±5.20 37.03±4.15^\*^ 36.80±4.78^\*^
Data represent the mean±SD, **^Δ^** *p* \< 0.001 vs. Sham group, ^\*^ *p* \< 0.05, ^\*\*^ *p* \< 0.01, ^\*\*\*^ *p* \< 0.001 vs. AMI group. N=8.
ECM-related genes and miR-29b expression in AMI-induced fibrotic myocardium treated with carvedilol {#s3.2}
---------------------------------------------------------------------------------------------------
Consistent with the echocardiography data, Masson's trichrome staining showed that the collagen volume fraction (CVF) in the AMI border zone was dramatically lower in the CAR-M and CAR-H AMI groups than in the AMI and CAR-L group (*p* \< 0.01 and *p* \< 0.001, *p* \< 0.05 and *p* \< 0.01, respectively) ([Figure 1](#pone-0075557-g001){ref-type="fig"}). Quantitative real-time PCR showed that Col1a1, Col3a1, and α-SMA mRNA were significantly decreased in the AMI border zone in the CAR-M and CAR-H groups (*p* \< 0.05 and *p* \< 0.01, respectively) ([Figure 2A](#pone-0075557-g002){ref-type="fig"}). Western-blot results showed that Col1a1, Col3a1, and α-SMA protein expression was also significantly lower in the AMI border zone in the CAR-M and CAR-H groups ([Figure 2B, S1](#pone-0075557-g002){ref-type="fig"}).
{#pone-0075557-g001}
{#pone-0075557-g002}
The quantity of mature miR-29b in the AMI border zone was significantly higher in the CAR-M and CAR-H groups (*p* \< 0.05 and *p* \< 0.01, respectively) than in the untreated AMI group ([Figure 2C](#pone-0075557-g002){ref-type="fig"}). In the sham surgery control group, the expression level of the mir-29b-2 precursor was much higher than that of the mir-29b-1 precursor (*p* \< 0.001) ([Figure 2D](#pone-0075557-g002){ref-type="fig"}). Only the expression of the miR-29b-2 precursor was significantly higher in all 3 carvedilol-treated AMI groups (*p* \< 0.05 and *p* \< 0.01, respectively) ([Figure 2D](#pone-0075557-g002){ref-type="fig"}).
ECM-related genes and miR-29b expression in carvedilol-treated rat cardiac fibroblasts *in vitro* {#s3.3}
-------------------------------------------------------------------------------------------------
A dose-course study of the effect of carvedilol on Col1a1, Col3a1, and α-SMA expression was demonstrated by quantitative real-time PCR and Western-blotting assay, respectively ([Figure 3A](#pone-0075557-g003){ref-type="fig"}, [Figure 3B, S2](#pone-0075557-g003){ref-type="fig"}). These data demonstrated that 4µM carvedilol inhibited Col1a1, Col3a1, and α-SMA expression at both the mRNA and protein level. Compared with the control group, mature miR-29b was significantly up-regulated in the 2 µM and 4 µM carvedilol-treated rat cardiac fibroblasts (*p* \< 0.05 and *p* \< 0.05, respectively) ([Figure 3C](#pone-0075557-g003){ref-type="fig"}). Quantitative real-time PCR showed that the expression of the mir-29b-2 precursor was much higher than that of the mir-29b-1 precursor (*p* \< 0.01) ([Figure 3D](#pone-0075557-g003){ref-type="fig"}). Expression of the miR-29b-2 precursor, but not the miR-29b-1 precursor, increased significantly in a dose-dependent manner in carvedilol-treated rat cardiac fibroblasts (*p* \< 0.05) ([Figure 3D](#pone-0075557-g003){ref-type="fig"}).
{#pone-0075557-g003}
Carvedilol inhibited ROS-activated Smad3 signaling involved in ECM related genes and miR-29b expression {#s3.4}
-------------------------------------------------------------------------------------------------------
By DCFH-DA staining, Ang ii(10^−5^ M) increased intracellular reactive oxygen species (ROS) generation in rat cardiac fibroblasts, while treatment of 10 mM N-acetyl-L-cysteine (NAC) (ROS scavenger) and 4 µM carvedilol reduced ROS production in cardiac fibroblasts induced by Ang ii(*p* \< 0.001, respectively, [Figure 4A](#pone-0075557-g004){ref-type="fig"}). Western-blot results demonstrated that the Smad3 pathway was activated in Ang ii-treated rat cardiac fibroblasts, NAC or carvedilol treatment decreased p-Smad3 expression (*p* \< 0.05, respectively, [Figure 4B](#pone-0075557-g004){ref-type="fig"}). Quantitative real-time PCR showed that Col1a1, Col3a1, and α-SMA mRNA expression was significantly lower in Smad3 siRNA-modified rat cardiac fibroblasts (*p* \< 0.05, and *p* \< 0.01, respectively, [Figure 4C](#pone-0075557-g004){ref-type="fig"}). The quantity of mature mir-29b was significantly higher in Smad3 siRNA-modified rat cardiac fibroblasts (*p*\<0.05) ([Figure 4D](#pone-0075557-g004){ref-type="fig"}). Consistent with this result, the quantity of miR-29b-2 precursor, but not miR-29b-1 precursor, was also dramatically higher in Smad3 siRNA-modified rat cardiac fibroblasts (*p* \< 0.01) ([Figure 4E](#pone-0075557-g004){ref-type="fig"}). Additionally, Col1a1, Col3a1, and α-SMA mRNA expression was significantly lower in SIS-3 or Naringenin-treated rat cardiac fibroblasts (*p* \< 0.05, *p* \< 0.01, and *p* \< 0.001, respectively) ([Figure 4F](#pone-0075557-g004){ref-type="fig"}). The quantity of mature mir-29b and miR-29b-2 precursors, but not miR-29b-1 precursor, increased significantly in SIS-3 or/naringenin-treated rat cardiac fibroblasts (*p* \< 0.05 and *p* \< 0.01, respectively) ([Figure 4G,4H](#pone-0075557-g004){ref-type="fig"}).
{#pone-0075557-g004}
miR-29b modulated expression of ECM-related gene in cardiac fibroblasts {#s3.5}
-----------------------------------------------------------------------
To study the expression of ECM-related genes after miR-29b mimic treatment, we transfected rat cardiac fibroblasts with the miR-29b mimic or scrambled oligonucleotide. After a 24-h incubation, real-time PCR analysis indicated that the miR-29b mimic inhibited Col1a1, Col3a1, and α-SMA expression at the mRNA level (*p* \< 0.05, *p* \< 0.01, and *p* \< 0.001, respectively) ([Figure 5A](#pone-0075557-g005){ref-type="fig"}). Consistent with these results, miR-29b also inhibited Col1a1, Col3a1, and α-SMA protein expression compared to that observed using the scrambled oligonucleotide (*p* \< 0.05 and *p* \< 0.001, respectively). ([Figure 5B, S3](#pone-0075557-g005){ref-type="fig"}.)
{#pone-0075557-g005}
Discussion {#s4}
==========
In this study, we demonstrated the anti-fibrotic effect of carvedilol *in vivo* and *in vitro* by inhibiting fibrosis-related genes expression. The fibrosis regulator, miR-29b, was validated to be modulated by carvedilol, contributing to the anti-fibrotic effect of carvedilol. Mechanism study revealed that carvedilol inhibited ROS-induced Smad3 activation, and Smad3 signal negatively modulated miR-29b expression, miR-29b could efficiently inhibit fibrosis-related genes expression in cardiac fibroblasts.
LV remodeling after AMI contributes to heart failure. β-blockers are first-line therapy for AMI and heart failure. Initiation of β-blockers within the first 24 h of the ischemic episode has been recommended in clinical practice guidelines \[[@B22]\]. Carvedilol is a β-blocker that also has α-blocking effects, reducing the mortality rate of patients with moderate to severe chronic cardiac failure by 35% to 65% and lowering re-hospitalization rates \[[@B23],[@B24]\]. The underlying mechanism whereby carvedilol attenuates AMI-induced cardiac remodeling seems to be multifactorial. Carvedilol has antioxidant activity \[[@B25]\], attenuates inflammatory mediators, and activates NF-kB \[[@B26]\]. Carvedilol treatment has been shown to delay oxidative-stress--induced apoptosis by improving Ca^2+^ handling \[[@B27]\] and increasing the expression of anti-apoptosis proteins \[[@B28]\].
Beneficial effects of carvedilol on left ventricular remodeling have been observed in patients with left ventricular dysfunction who had an acute myocardial infarction \[[@B29]\] and chronic heart failure \[[@B30]\]. In animal models of myocardial infarction-induced heart failure, carvedilol treatment was observed to protect against myocardial fibrosis and decrease myocardial collagen in the non-infarcted myocardium \[[@B3],[@B4]\]. Mechanistic studies have demonstrated that carvedilol can inhibit PDGF-induced signal transduction in human cardiac fibroblasts and is thus able to exert an anti-proliferative effect on these cells \[[@B31]\].
Consistent with previous reports \[[@B32]\], the echocardiography results of the present study show that carvedilol treatment can rescue AMI-induced cardiac changes in LVAWd, LVAWs, LVIDd, and LVIDs. In addition, medium- and high-dose carvedilol treatment significantly increased cardiac EF% and FS% compared to those in the untreated AMI group ([Table 1](#pone-0075557-t001){ref-type="table"}). Masson's staining demonstrated that the collagen volume fraction (CVF) was significantly lower in the border zone of the infarcted myocardium region in the medium- and high-dose carvedilol treatment groups compared with that of the untreated AMI group ([Figure 1](#pone-0075557-g001){ref-type="fig"}).
Quantitative real-time PCR and Western-blot assay revealed that Col1a1, Col3a1, and α-SMA expression were significantly lower in the border zone of the infarcted region in the medium- and high-dose carvedilol treatment groups compared with those in the untreated AMI group ([Figure 2 A, 2B,S1](#pone-0075557-g002){ref-type="fig"}). This result is similar to that of a previous report that found carvedilol inhibited Col1a1 and Col3a1 mRNA expression in fibrotic kidney \[[@B33]\]. To investigate the anti-fibrotic effect of carvedilol, SD rat cardiac fibroblasts were cultured and treated with carvedilol *in vitro*. Quantitative real-time PCR and Western-blot results revealed that carvedilol inhibited Col1a1, Col3a1, and α-SMA expression in a dose-dependent manner ([Figure 3A, 3B,S2](#pone-0075557-g003){ref-type="fig"}).
Activation of the renin-angiotensin system (RAS) has been implicated in the pathogenesis of acute myocardial infarction (AMI) \[[@B34]\]. Angiotensin II (Ang II) played a pivotal role in cardiac fibrosis through increasing the intracellular generation of ROS and stimulating the collagen production in cardiac fibroblasts \[[@B35]\], and ROS could activate TGF-β/smad3 pathway leading to fibrosis \[[@B36]\]. In the present study, we confirmed that Ang II increased ROS generation and Smad3 activation in cardiac fibroblasts ([Figure 4A, 4B](#pone-0075557-g004){ref-type="fig"}), however, NAC and cardvedilol could consistently abrogate the effect of Ang II on ROS generation and Smad3 activation ([Figure 4A, 4B](#pone-0075557-g004){ref-type="fig"}). Therefore, carvedilol, possessing ROS scavenging and ROS suppressive effects, could inhibit ROS-activated Smad3 signaling involved in cardiac fibrosis.
We further demonstrated that Smad3 siRNA and two Smad3 inhibitors, SIS-3 and Nar, inhibited Col1a1, Col3a1, and α-SMA mRNA expression in rat cardiac fibroblasts ([Figure 4C, 4F](#pone-0075557-g004){ref-type="fig"}). These results revealed that inactivation of the Smad3 pathway mediates the anti-fibrotic effect of carvedilol in AMI-induced cardiac fibrosis.
miRNAs have been shown to play roles in cardiac remodeling after AMI \[[@B37]\]. miR-29b was shown to regulate myocardial fibrosis \[[@B14],[@B16]\], but whether carvedilol could modulate miR-29b expression was unknown. In this study, we found that miR-29b was upregulated in the border zone of infarcted myocardium in the rat AMI model treated with medium- and high-dose carvedilol ([Fig. 2C](#pone-0075557-g002){ref-type="fig"}). miR-29b was also upregulated by carvedilol in rat cardiac fibroblasts *in vitro* ([Fig. 3C](#pone-0075557-g003){ref-type="fig"}). Mature rat miR-29b can be derived from miR-29b-1 and miR-29b-2 precursors, which are transcribed from two different loci in the rat genome ([[www.mirbase.com]{.ul}](http://www.mirbase.com)). We also confirmed that miR-29b-2 precursor expression was much higher than miR-29b-1 in myocardium ([Fig. 2D](#pone-0075557-g002){ref-type="fig"}) and cardiac fibroblasts ([Fig. 3D](#pone-0075557-g003){ref-type="fig"}); miR-29b-2, but not miR-29b-1, could be modulated by carvedilol *in vivo* ([Fig. 2D](#pone-0075557-g002){ref-type="fig"}) and *in vitro* ([Fig. 3D](#pone-0075557-g003){ref-type="fig"}). Using Smad3 siRNA and 2 Smad3 inhibitors, SIS-3 and Nar, we demonstrated that Smad3 signaling negatively regulates miR-29b expression derived from only from the miR-29b-2 precursor ([Figure 4E, 4H](#pone-0075557-g004){ref-type="fig"}). This result was consistent with previous reports that Smad3 signaling promotes renal fibrosis by inhibiting miR-29 \[[@B15],[@B38]\].
Previous studies indicated that miR-29b can regulate the expression of ECM-related genes, including Col1a1, Col1a2, and Col3a1 \[[@B16],[@B38]\]. Our results confirm that miR-29b inhibits Col1a1,Col3a1, and α-SMA expression at both the mRNA and protein level ([Figure 5A, 5B, S3](#pone-0075557-g005){ref-type="fig"}).
The anti-fibrotic effect of carvedilol contributed to the amelioration of AMI-induced cardiac remodeling and impaired cardiac function in rats. We showed that carvedilol specifically inhibits expression of the ECM-related proteins Col1a1, Col3a1, and α-SMA and promotes miR-29b expression in infarcted myocardium and cardiac fibroblasts *in vitro*. Taken together, these data demonstrate that inactivation of ROS-induced Smad3 signaling and miR-29b upregulation mediate the anti-fibrotic effect of carvedilol in MI-induced cardiac fibrosis ([Figure 6](#pone-0075557-g006){ref-type="fig"}).
{#pone-0075557-g006}
Supporting Information
======================
######
**Primers used in real-time qRT-PCR.**
(DOC)
######
Click here for additional data file.
######
**Col1a1, Col3a1, and α-SMA protein expression in the border zone of the infarcted region by Western-blot assay.** A. Significant inhibition of Col1a1 protein by carvedilol treatment. ^※^ *p* \< 0.001 vs. sham surgery control group, ^\*^ *p* \< 0.05, ^\*\*^ *p* \< 0.01, ^\*\*\*^ *p* \< 0.001 vs. AMI group, N = 6--8. B. Significant inhibition of Col3a1 protein by carvedilol treatment. ^※^ *p* \< 0.01 vs. sham surgery control group, ^\*^ *p* \< 0.01, ^\*\*^ *p* \< 0.001 vs. AMI group, N = 6--8. C. Significant inhibition of α-SMA protein by medium- and high-dose carvedilol treatment. ^※^ *p* \< 0.001 vs. sham surgery control group, ^\#^ *p* \< 0.01 vs. AMI group, N = 6--8.
(DOC)
######
Click here for additional data file.
######
**Significant inhibition of Col1a1, Col3a1, and α-SMA protein expression in rat cardiac fibroblasts treated by 2 or 4 µM carvedilol.** ^\#^ *p* \< 0.01, ^\#\ \#^ *p* \< 0.001 vs. control group, N = 4.
(DOC)
######
Click here for additional data file.
######
**Col1a1, Col3a1, and α-SMA protein expression in miR-29b-modified rat cardiofibroblasts.** ※ *p* \< 0.001, ^\*^ *p* \< 0.05 vs. control group, N = 4.
(DOCX)
######
Click here for additional data file.
[^1]: **Competing Interests:**The authors have declared that no competing interests exist.
[^2]: Conceived and designed the experiments: XYY ZXS. Performed the experiments: JNZ RC YHF QXL SH LLG MZZ CYD. Analyzed the data: XZ ZXS. Contributed reagents/materials/analysis tools: MY JZ XYY. Wrote the manuscript: ZXS.
|
Dirty Boots
Hang Gliding in Cape Winelands
The Cape Winelands is an area in the Western Cape, nestled between magnificent mountains and the Indian Ocean. The best way to see this amazing scenic beauty is obviously from above and luckily our operators in the Cape Winelands are standing by with an offer that you will not be able to resist – A Hang Gliding Adventure that will take your adventurous spirit to new heights! |
PLAYFAIR, JOHN, an eminent
natural philosopher and mathematician, was the eldest son of James Playfair,
minister of Benvie, in Forfarshire, where he was born on the 10th of March,
1748. He was educated at home until he reached the age of fourteen, when he
was sent to the university of St Andrews, where it was intended that he
should study for the Scottish church. The precocity of talent exhibited by
great men, generally so ill authenticated, has been strikingly vouched by
two remarkable circumstances in the early history of Playfair. While a
student at St Andrews, professor Wilkie, the author of the "Epigoniad," when
in bad health, selected him to deliver lectures on natural philosophy to the
class; and in the year 1766, when only eighteen years of age, he felt
himself qualified to compete as a candidate for the chair of mathematics in
the Marischal college of Aberdeen. In this, his confidence in his powers was
justified by the event. Of six candidates, two only excelled him,—Dr Trail,
who was appointed to the chair, and Dr Hamilton, who afterwards succeeded to
it. [Vide Life of Robert Hamilton in this collection.]
In 1769, having finished his
courses at the university, Mr Playfair lived for some time in Edinburgh, in
the enjoyment of the very select literary society of the period. "It would
appear," says his biographer, [His nephew, by whom a Life of Mr Playfair was
prefixed to an edition of his works, published in 1822.]"from
letters published in the ‘Life of the late Principal Hill,’ that, during
this time, Mr Playfair had twice hopes of obtaining a permanent situation.
The nature of the first, which offered itself in 1769, is not there
specified, and is not known to any of his own family; the second, was the
professorship of natural philosophy in the university of St Andrews, vacant
by the death of his friend Dr Wilkie, which took place in 1772. In this,
which he earnestly desired, and for which he was eminently qualified, he was
disappointed." During the same year, his father died, and the care of his
mother, and of the education of his father’s young family, rendered the
acquisition of some permanent means of livelihood more anxiously desirable.
He was immediately nominated by lord Gray to his father’s livings of Liff
and Benvie; but the right of presentation being disputed, he was unable to
enter on possession, until August, 1773. From that period, his time was
occupied in attending to the duties of his charge, superintending the
education of his brothers, and prosecuting his philosophical studies. In
1774, he made an excursion to Perthshire, to witness the experiments of Dr
Maskelyne, the astronomer royal, to illustrate the principles of
gravitation, from the effect of mountains in disturbing the plumb line. A
permanent friendship was at that time formed between the two philosophers.
"I met," says Playfair, in his Journal of a visit to London in 1782, "with a
very cordial reception from him (Dr Maskelyne), and found that an
acquaintance contracted among wilds and mountains is much more likely to be
durable than one made up in the bustle of a great city: nor would I, by
living in London for many years, have become so well acquainted with this
astronomer, as I did by partaking of his hardships and labours on
Schehallien for a few days."
In 1779, Playfair’s first
scientific effort was given to the public, in "An Essay on the Arithmetic of
Impossible Quantities," published in the sixty-eighth volume of the
Philosophical Transactions. In 1782, an advantageous offer prompted him to
give up his living, and become tutor to Mr Ferguson of Raith and his brother
Sir Ronald Ferguson. It was at this period that he paid the visit to London
in which he met Dr Maskelyne. By that gentleman he was introduced to some
literary men, and to institutions of literary or philosophical interest.
Some of these roused the calm enthusiasm for philosophical greatness which
was one of the principal features of his character. "This," he says, "was
the first time that I had seen the Observatory of Greenwich, and I entered
with profound reverence into that temple of science, where Flamstead, and
Halley, and Bradley, devoted their days and their nights to the
contemplation of the Heavens. The shades of these ancient sages seemed still
to hover round their former mansions, inspiring their worthy successor with
the love of wisdom, and pointing out the road to immortality."
From his thirst after
knowledge being untainted by political or local prejudices, Playfair had
early turned himself to the important discoveries of the continental
algebraists, and was the first man of eminence to introduce them to British
notice. He perceived the prejudices entertained on the subject in England,and probably the discovery sharpened his appetite for a subject which he
found was almost untouched. Speaking of Dr Maskelyne, he says, "He is much
attached to the study of geometry, and I am not sure that he is very deeply
versed in the late discoveries of the foreign algebraists. Indeed, this
seems to be somewhat the case with all the English mathematicians: they
despise their brethren on the continent, and think that everything great in
science must be for ever confined to the country that produced Sir Isaac
Newton." in the works of the eminent natural philosopher one may search long
before he will find anything which shows in explicit terms the exact
discipline of mind or system of reasoning, by which he has made it to happen
that all he has said, has so much the appearance of being truth; but a petty
remark, disconnected with the ordinary pursuits of the philosopher, may
often strikingly illustrate the operation of his mind, and the means by
which he has disciplined himself to approach as near as possible to truth;
and, such a passage occurring in this short diary, we beg to insert it. "An
anecdote of some Indians was told, that struck me very much, as holding up
but too exact a picture of many of our theories and reasonings from analogy.
Some American savages having experienced the effects of gunpowder, and
having also accidentally become masters of a small quantity of it, set
themselves to examine it, with a design of finding out what was its nature,
and how it was to be procured. The oldest and wisest of the tribe, after
considering it attentively, pronounced it to be a seed. A piece of ground
was accordingly prepared for it, and it was sown in the fullest confidence
that a great crop of it was to be produced. We smile at the mistake of these
Indians, and we do not consider, that, for the extent of their experience,
they reasoned well, and drew as logical a conclusion as many of the
philosophers of Europe. Whenever we reason only from analogy and
resemblance, and whenever we attempt to measure the nature of things by our
conceptions, we are precisely in the situation of these poor Americans." In
this Playfair exemplified the propensity to reason from certain qualities
perceived to be identical, when it is not known but that other qualities not
perceived, may be at variance. The wise American saw colour and form like
those of a seed, and from these he drew his conclusion. Had he been a
botanist, he would have discovered that the grain consisted of saltpetre and
charcoal, instead of kernel; and, whatever else he could have made of it, he
would have quickly perceived that it was not a seed. In connexion with this
it is to be held in mind, that Playfair was essentially a reasoner, and that
he was more celebrated for separating the true from the false in the
writings of others, or for establishing and applying truths accidentally
stumbled upon by others, than forextensive discoveries ofhis
own.
In 1785, Dr Adam Ferguson
exchanged the moral chair in the university for that of mathematics, taught
by professor Dugald Stewart, and, being in bad health, chose Playfair as his
assistant. He continued, however, to attend his two pupils until 1787, when
he took up his residence with his mother, who had for some time lived in
Edinburgh. He now commenced a series of papers which appeared in the
Transactions of the Royal Society of Edinburgh. The first of these was the
life of Dr Matthew Stewart, the late professor of mathematics in the
university of Edinburgh; a paper written in his usual flowing, simple, and
expressive style. A second was a paper on the causes which affect the
accuracy of Barometrical Measurements. A third was Remarks on the Astronomy
of the Brahmins. The early eastern astronomy was a subject to which he was
very partial, and to which some conceive he has paid more attention than its
importance warranted. He fought to a certain extent at disadvantage, from
ignorance of the language, and consequently of external evidence as to the
authenticity of the remarkable records containing the wisdom of the
Brahmins; but he calculated their authenticity from the circumstance, that
none but a European acquainted with the refinements of modern science could
have made the calculations on which they might have been forged. The death
of his brother James, in 1793, interrupted his philosophical pursuits, by
forcing on his management some complicated business, along with the
education of his brother’s son. In 1795, he published an edition of Euclid’s
elements for the use of his class. In this work he adopted the plan of using
algebraic signs instead of words, to render the proportions more compact and
apparent. The plan has been repeatedly practised since that period, and "Playfair’s
Euclid" is a book well known to the boys inmost mathematical
schools, by whom, however, it is not always so much admired as it is known.
In 1797 he suffered a severe attack of rheumatism, during which he sketched
an essay on the accidental discoveries which have been made by men of
science whilst in pursuit of something else, or when they had no determinate
object in view; and wrote the observations on the trigonometrical tables of
the Brahmins, and the theorems relating to the figure of the earth, which
were afterwards published in the Transactions of the Royal Society of
Edinburgh. About the same time, his friend Dr Hutton died, and Playfair, who
affectionately intended to have written his memoir, found in the study of
his works a vast field in which he afterwards distinguished himself, by the
preparation of the "Illustrations of the Huttonian Theory of the Earth." Few
observers of nature have possessed the power of describing what they have
seen, so as to make their facts and deductions perceivable to ordinary
thinkers. Playfair possessed the quality, however, to a rare extent; and it
was probably its deficiency in the works of his friend Hutton, which
prompted him to prepare the elegant and logical "Analysis of the Volcanic
Theory of the Earth,"which has been so much admired for its own
literary merits, and has been the means of rendering popular an important
theory which otherwise might have remained in obscurity. It has been said,
that the illustration of a theory of the earth was but a profitless
employment for so accurately thinking a philosopher, and that the task aught
have been left to more imaginative minds, whose speculations would have
afforded equal pleasure to those who delight in forming fabrics of theory on
insufficient foundations. It is true, that even the lucid commentary of
Playfair does not establish the Huttonian as a general and undeviating
theory, in an undoubted and indisputable situation; he seems not to have
aimed so high; and from the present state of science, no one can predicate
that the elementary formation of the earth, or even of its crust, will ever
be shown with chemical exactness. All that can be said is, that in as far as
the respective experiments and deductions of the theorists have proceeded,
the Huttonian Theory is not directly met by any fact produced on the part of
the Neptunians, and the phenomena produced in its favour strongly
show—indeed show to absolute certainty in some cases—the present formation
of a great part of the crust of the earth to have been the effect of fire,
how operating in respect to the whole substance of the globe it is
impossible to determine. The defence of a theory of the earth had for some
time been unpopular among many philosophers, from the production of such
majestic fabrics of theory as those of Whiston and Burnet, which, without a
sufficient number of ascertained facts for the analysis of the component
parts of any portion of the earth’s surfaces, showed in detail the method of
its abstraction from the rest of the universe, and the minutiae of its
formation. But Playfair never went beyond rational deduction on the facts
which were known to him, limiting the extent of his theories to reasonings
on what he knew; and it shows the accuracy of his logic, that, while the
experiments of Sir James Hall and others (which were in progress but not
complete while he wrote,) have tended to support his explication, especially
in justifying his opinion that the reason of calcination in bodies subjected
to heat was the necessity of the escape of the gases contained in them, we
are aware of none which have contradicted him.
The period between 1797 and
1802 was occupied by Mr Playfair in preparing his Illustrations, and in 1803
his biographical sketch of Hutton was published in the Society Transactions.
In 1805 he quitted the mathematical chair, and succeeded professor John
Robison in that of natural philosophy; during the same year his mother died
at the age of eighty-five, and he retired along with a younger brother, his
youngest sister, and two nephews, to Burntisland, that he might devote the
summer to uninterrupted preparation for the duties of his new class. In the
controversy with the clergymen of Edinburgh, regarding his successor to the
chair of mathematics, he took an active part. A letter which he addressed to
the provost of Edinburgh, in favour of the election of a scientific
man, as opposed to a clergyman, was answered by Dr Inglis, and from the
nature of the remarks directed against himself, he considered it necessary
to reply. The pamphlet produced under these circumstances, showed that his
calm temper might be made dangerous by interference: it is written in
considerable asperity of spirit, but without vulgar raillery or much
personality, and the serious reproof, mixed with occasional sarcasm which it
contains, shows great power to wield the weapons of literary warfare. He
next occupied himself in preparing papers on the solids of greatest
attraction, and on the progress of heat in spherical bodies, which appeared
in the Transactions of the Royal Society of Edinburgh. He also presented to
the London Royal Society, of which he was admitted a member in 1807, an
Account of the Survey of Schehallien. In 1814, he published for the use of
his students his well known Outlines of Natural Philosophy, in two volumes
octavo. The first volume of this work treats of Dynamics, Mechanics,
Hydrostatics, Hydraulics, Aerostatics, and Pneumatics. The second is devoted
to Astronomy. A third volume was intended to have embraced Optics,
Electricity, and Magnetism; but the work was never completed. In the
following year he presented to the Royal Society of Edinburgh a life of his
predecessor, professor Robison. His labours for this institution will be
perceived to have been very extensive, and they show him not to have been a
mercenary man. He was long its chief support, arranging and publishing the
Transactions, and gratuitously acting as secretary. In 1816, he published,
in the Supplement to the Encyclopaedia Britannica, a "Dissertation on the
Progress of Mathematical and Physical Science since the Revival of Letters
in Europe," a work of great erudition and research. This work interrupted a
new and much altered edition of his Illustrations of the Huttonian Theory,
which he had previously designed, but which unfortunately he was never
enabled to complete. "It was intended," says his biographer, "to commence
with a description of all the well authenticated facts in geology collected
during his extensive reading and personal observation, without any mixture
of hypothesis whatever. To this followed the general inferences which may be
deduced from the facts, an examination of the various geological systems
hitherto offered to the world, and the exclusion of those which involved any
contradiction of the principles previously ascertained; while the conclusion
would have presented the development of the system adopted by the author,
and the application of it to explain the phenomena of geology." Previously
to 1815, Mr Playfair had confined his geological observations to Britain and
Ireland; nor was he able, from causes public or private, previously to that
period, to extend them to the continent. His nephew accompanied him on a
tour which he designed to extend as far as he could through Italy,
Switzerland, and France. He spent a short time in the philosophical circle
of Paris, to which his name could not fail to be an introduction. He then
passed to Switzerland, and commenced the most important of his geological
notices at Mount Jura, where he found blocks of granite, gneiss, and mica
slate, lying loosely on the surface of mountains whose solid substance was
entirely calcareous. At Lucerne and Chamouni, he was prevented by adverse
weather, from making his intended searches among the interior valleys.
Towards winter he was about to return, when he received a letter from the
provost of Edinburgh, intimating that the patrons of the university
permitted his absence during the ensuing session—a circumstance which
enabled him to prolong his tour a whole year. After remaining for a month at
Geneva, he entered Italy by the Simplon. In the Academia del Cimento at
Florence, his enthusiasm for philosophical history was gratified by an
inspection of the instruments made by Galileo, among which was the original
telescope, made of two pieces of wood, coarsely hollowed out, and tied
together with thread. On the 12th of November he set out for Rome, which he
reached on the 18th. There he remained during the winter, occupying himself
with researches in the Vatican library, such geological observations as the
neighbourhood afforded, and the select English society always to be found in
the imperial city, among whom he found many of the friends he had met in
England. After the termination of the winter he went to Naples, where a
wider field for geological observation lay before him. The observations
which he made on this part of his route, not so much connected with the
action of the volcano as with the state of the surrounding country, are
unbodied in some interesting notes, an abstract of which may be found in the
memoir above referred to; but it is to be regretted that the amount of so
much accurate observation was not brought to bear on his Analysis of the
Theory of the Earth. Mr Playfair returned to Rome, whence, after a second
visit to Florence, he proceeded, by such gradations as enabled him
accurately to observe the mineralogy of the country, to Geneva. While
travelling through Switzerland, he visited, and prepared a short but curious
account of the Slide of Alpuach, by which trees are conveyed from the sides
of Pilatus into the lake of Lucerne, whence they proceed through the Aur to
the Rhine. On his return, he passed through Venice, Lyons, and Paris. In the
ensuing summer he retired to Burntisland, where he prepared a memoir on
Naval Tactics, in illustration of the discoveries of Clerk of Eldin, which
was published after his death. He had intended to publish in detached papers
his observations on the remarkable objects of his tour, and to have prepared
his Illustrations of the Huttonian Theory of the Earth, but he lived
scarcely long enough to commence these labours. For some years he had been
afflicted with a strangury, which alarmingly increased in the month of June,
1819, and he died on the ensuing 19th of July. He was buried on the 26th,
when the members of the Royal Medical Society, and a numerous body of public
and private friends, followed him to the grave.
The literary and domestic
character of this great and excellent man, have been drawn by Francis
Jeffrey, with whom, as the writer of many papers in the Edinburgh Review, Mr
Playfair must have been on an intimate footing. The former part of the
subject is open for the appreciation of the world, but as the latter can
only be told by one acquainted with it, we beg to extract a portion. "The
same admirable taste which is conspicuous in his writings, or rather the
higher principles from which that taste was but an emanation, spread a
similar charm over his whole life and conversation, and gave to the most
learned philosopher of his day the manners and deportment of the most
perfect gentleman. Nor was this in him the result merely of good sense and
good temper, assisted by an early familiarity with good company, and a
consequent knowledge of his own place and that of all around him. His
good-breeding was of a higher descent; and his powers of pleasing rested on
something better than mere companionable qualities. With the greatest
kindness and generosity of nature, he united the most manly firmness, and
the highest principles of honour; and the most cheerful and social
dispositions, with the gentlest and steadiest affections. Towards women, he
had always the most chivalrous feelings of regard and attention, and was,
beyond almost all men, acceptable and agreeable in their society, though
without the least levity or pretension unbecoming his age or condition. And
such, indeed, was the fascination of the perfect simplicity and mildness of
his manners, that the same tone and deportment seemed equally appropriate in
all societies, and enabled him to delight the young and the gay with the
same sort of conversation which instructed the learned and the grave. There
never, indeed, was a man of learning and talent who appeared in society so
perfectly free from all sorts of pretension, or notion of his own
importance, or so little solicitous to distinguish himself, or so sincerely
willing to give place to every one else. Even upon subjects which he had
thoroughly studied, he was never in the least impatient to speak, and spoke
at all times without any tone of authority; while so far from wishing to set
off what he had to say by any brilliancy or emphasis or expression, it
seemed generally as if he had studied to disguise the weight and originality
of his thoughts under the plainest form of speech, and the most quiet and
indifferent manner; so that the profoundest remarks and subtlest
observations were often dropped, not only without any solicitude that their
value should be observed, but without any apparent consciousness that they
possessed any."
This comment system requires
you to be logged in through either a Disqus account or an
account you already have with Google, Twitter, Facebook or
Yahoo. In the event you don't have an account with any of these
companies then you can create an account with Disqus. All
comments are moderated so they won't display until the moderator
has approved your comment. |
#!/bin/bash
current_path=$(pwd)
# check processor
function check_processor(){
echo "check processor service "
if [[ ! -e ${current_path}/conf/application-prod.properties ]];then
echo "${current_path}/conf/application-prod.properties not exist"
exit 1
fi
port=$(grep "server.port" ${current_path}/conf/application-prod.properties| head -1 | awk -F'=' '{print $NF}' | sed s/[[:space:]]//g)
if [[ $? -ne 0 ]];then
echo "get processor port fail"
exit 1
fi
curl -s -d 'payload={"a":"1"}&condition=a<10' http://127.0.0.1:${port}/weevent-processor/checkWhereCondition | grep "errorCode" >>/dev/null
if [[ $? -eq 0 ]];then
echo "processor service is ok"
else
echo "processor service is error"
fi
}
check_processor
|
Q:
File is not able to upload in Magnolia
I have the Controller below :
@Controller
public class UploadComponent {
private static final Logger logger = LoggerFactory.getLogger(UploadComponent.class);
@RequestMapping("/uploadFile")
public String render(@ModelAttribute("fileUpload") FileUpload fileUpload, ModelMap model)throws RepositoryException {
return "components/upload.jsp";
}
@RequestMapping(value = "/uploadFile", method = RequestMethod.POST)
public String uploadFileHandler(@ModelAttribute("fileUpload") FileUpload fileUpload, HttpServletRequest request) {
logger.info("post method executed");
CommonsMultipartFile file = fileUpload.getPhoto();
if (!file.isEmpty()) {
...
...
}
}
The Model Class as follows :
public class FileUpload implements Serializable {
CommonsMultipartFile photo;
String name;
public String getName() {
return name;
}
public void setName(String name) {
this.name = name;
}
public CommonsMultipartFile getPhoto() {
return photo;
}
public void setPhoto(CommonsMultipartFile photo) {
this.photo = photo;
}
}
}
My Jsp as follows :
<form:form commandName="fileUpload" method="POST"action="uploadFile"
enctype="multipart/form-data">
File to upload: <form:input type="file" path="Photo" class="pp_text" /><br />
Name: <form:input type="text" path="name" class="pp_button" /><br /> <br />
<input type="submit" value="Upload"> Press here to upload the file!
</form:form>
I have configure the CommonsMultipartResolver in applicationContext.xml file
When I am submitting the form I am unable to getting the file.
It is not setting the "Photo" field.
So I am getting the NullPointerException in Controller while retrieving the photo field.
Can anyone suggest me Where the problem exist?
How can I resolve this issue?
A:
Most likely, it is Magnolia getting in your way ... should be easy to verify. In your controller just before you get NPE, try to call MgnlContext.getParameter("Photo") and see what you get. Or to see whole posted form you can also do MgnlContext.getPostedForm().
If you verify that it is indeed Magnolia that holds the value of the field, you can either forget about processing field yourself and let Magnolia handle multipart for you or if that is not what you want, you can configure bypass for MultipartFilter in config:/server/filters/multipartRequest to tell Magnolia to not touch anything that is coming in for your controller uri.
If that the above doesn't help, you can try to add info.magnolia.debug.DumpHeadersFilter in the filter chain (anywhere after context filter) and see in the log what it tells you about incoming request. Despite the name, it will also print out params and values. Maybe that can give you some clue.
HTH,
Jan
|
fn main() {
let number = 6;
if number < 5 {
println!("condition was true");
} else if number > 10 {
println!("condition was false");
} else {
println!("other...")
}
let number = 6;
if number % 4 == 0 {
println!("number is divisible by 4");
} else if number % 3 == 0 {
println!("number is divisible by 3");
} else if number % 2 == 0 {
println!("number is divisible by 2");
} else {
println!("number is not divisible by 4, 3, or 2");
}
let condition = true;
let number = if condition { 5 } else { 6 };
println!("The value of number is: {}", number);
// let condition = true;
// let number = if condition { 5 } else { "six" }; // ^^^^^ expected integer, found &str
// println!("The value of number is: {}", number);
}
|
Mariano Vélez
Mariano Vélez was a Filipino boxer. He competed in the men's welterweight event at the 1948 Summer Olympics. At the 1948 Summer Olympics, he lost to Clifford Blackburn of Canada.
References
Category:Year of birth missing
Category:Possibly living people
Category:Filipino male boxers
Category:Olympic boxers of the Philippines
Category:Boxers at the 1948 Summer Olympics
Category:Place of birth missing |
[Establishing the cause of death in pneumopathies].
The article deals with determination and differential diagnosis of the cause of death in different forms of pneumopathy and mechanical asphyxia on the basis of developed morphometric method for separate evaluation of the volume of lung tissue per se, the air and pathologic contents of airways. |
News, views and top stories in your inbox. Don't miss our must-read newsletter Sign up Thank you for subscribing We have more newsletters Show me See our privacy notice Invalid Email
A parrot landed its owner in hot water after accidentally exposing a husband's affair with the housekeeper - in front of his wife.
The pesky bird began repeating the conversations the man was having with his lover, causing suspicion with his wife .
Realising that the parrot was picking up the flirty comments from inside the home, she put two and two together and exposed their love affair.
The couple live in Kuwait, where adultery is illegal, and so the wife marched to police with the parrot as evidence.
(Image: Getty)
Luckily for her spouse, they rejected it on the basis that the bird could have overheard the sweet nothings on the TV or radio.
The wife said she has suspected for some time that her husband was cheating on her, according to local newspaper Al Shahed Daily.
Adultery in Kuwait can result in a prison sentence or forced hard labour. |
Q:
Do operations on both input and select in one jquery line
I have this working code
$('input[name='+ string[1] +']').css({'background':input_accept_icon});
As you can see input with some name get's some new css.
Now I want to place both input and select elements in the same line.
I am trying this and other things but it's not working for now
$('fieldset > :tags(input,select)[name='+ string[1]+']').css({'background':input_accept_icon});
A:
Depending on your markup, you might want to use the :input selector. It matches <input>, <select>, <textarea> and <button> elements:
$(":input[name=" + string[1] + "]").css("background", input_accept_icon);
|
Q:
XSL: Test if there is only one child node
I have some XML-Code that looks like:
<l>
some text <app><rdg>text inside an app</rdg></app>
</l>
<l>
<app><rdg>line with text inside an app</rdg></app>
</l>
I want to process the XML with XSLT and append different attributes to the output, depending on:
If the line contains text and an <app> and an <rdg>with text in it
If line contains only text, that is inside an <rdg>-Element
I tried the following solution, which does not work for me:
<xsl:for-each select="l">
<xsl:choose>
<xsl:when test="app/rdg">
<myElement>
<xsl:attribute name="class" select="'case1'"/>
</myElement>
</xsl:when>
<xsl:when
test="app/rdg[not(../following-sibling::*) and
not(../preceding-sibling::*)]">
<myElement>
<xsl:attribute name="class" select="'case2'"/>
</myElement>
</xsl:when>
</xsl:choose>
</xsl:for-each>
Is there a way to distinguish these two (or of course even more) cases?
A:
Your first condition
If the line contains text and an <app> and an <rdg> with text in it
It is equal to this XPath expression:
text() and app[rdg]
Your second condition
If line contains only text, that is inside an <rdg>-Element
It's equal to this XPath expression:
not(.//text()[not(parent::rdg)])
All these in the context of an l element.
|
Affordable houses may soon be exempt from stamp duty, which varies between 4% and 8% of the transaction value.
Union minister for urban development and housing M Venkaiah Naidu said that his ministry has written to state governments to exempt affordable houses from stamp duty. Stamp duty is a state subject, with the state government fixing the rate and collecting the duty.
Addressing Credai, the Confederation of Real Estate Developers’ Associations of India, the minister said that the Centre would ensure that there was no net tax escalation in the housing sector, particularly the affordable housing segment, following the implementation of the goods and services tax ( GST ).
He said that the inclusion of the real estate sector in the GST framework would help the industry.
Affordable housing is exempt from service tax, which is around 5.35% of a property’s selling price. He said his ministry had already taken up with the finance ministry the need to continue the exemption under GST. He added that his ministry had also recommended to the finance ministry that the sector be taxed at a rate which is revenue neutral, and not a higher one.
The minister expressed his helplessness vis-a-vis the exclusion of stamp duty from GST, saying, “States have, in their wisdom, not adhered to the inclusion of stamp duty under GST.” “Thus, we need to move forward from this debate,” he said.
|
A Durban High Court judge has ruled in favour of a mother that wants to emigrate to the United Kingdom with her children, despite their father’s opposition.
IOL reports that Judge Isaac Madondo ruled that the woman and her two kids would have a better life in the United Kingdom than in South Africa, even though the father and family advocate did everything they could to stop it from happening.
According to Judge Madondo, the woman, who worked as a sales rep, is unable to take care of her children in SA, while in the UK they would have free schooling, healthcare and a safer environment than in SA.
“They will have a fulfilled life. There, tertiary education will also be subsidised. And their mother will have greater employment opportunities.”
The mother has full custody of the children as she was never married to the father of the kids, yet he refused to allow them to move to England, because he felt that “she has not properly investigated all the practicalities” and didn’t actually have a job to go to.
The woman has an ancestral visa to enter the UK, where she’s previously worked for close to a decade.
“She has found it difficult, if not impossible, to find higher income earning positions in South Africa. She has basically reached her ceiling here,” the judge said.
“She lives with her parents because she cannot afford her own home. Her parents are also now emigrating. She is not receiving the full maintenance from their father and has a shortfall of R4 669 every month.”
“Her concern is providing for her children. She is battling to find a good school for them. And her parents are continuously meeting her financial shortfalls.”
Despite her favourable chances in the UK, the family advocate proposed that she leave her kids in SA, but Judge Madondo again moved in favour of the UK.
“As a single mom with two small children in South Africa, she has numerous safety concerns and anxiety in her life. If she is forced to remain, she will not be able to maintain them. She will have no support base because her parents are relocating. She is battling to afford a small two-bedroom cottage, where in England she will easily be able to afford a three-bedroom house.”
“In England there is a family support system and the children will receive good quality education,” said Madondo, ruling that they would have a better life there. |
Peyton Manning visited our town recently and found things to his liking.
It was a whirlwind visit, but he spent time with, in roughly this order: Virginia McCaskey, Joe Maddon, Kris Bryant, Mike Ditka, Robert Smigel, George Wendt, assorted television crew members who dried him off after he was “baptized’’ in a trough of pseudo-Italian beef juice and a number of regular folks on the sidewalks who just wanted to chat.
Manning, of course, is the recently retired NFL quarterback who, by some measurements, is the greatest QB ever to play the game. He had come to Chicago to do work for his new show, “Peyton’s Places,” which will debut Sunday on ESPN+. More on that as we move ahead.
Chicago has special meaning to Manning beyond this TV gig, -something that local sports fans can appreciate. As you’ll recall, Manning directed the Colts’ comeback win over the Bears in Super Bowl XLI in Miami on Feb. 4, 2007. The score was 29-17, and the loss is as close as the Bears have come to an NFL championship since they won Super Bowl XX on Jan. 26, 1986.
It rained that night in Miami, steadily and evenly, not like a -cloudburst, but more like a lawn sprinkler set on medium. It was the first and only time rain fell in any appreciable amount during a Super Bowl, dumping a total of 0.92 inches on the field. This was important because Manning had prepared as best he could for the slop, and, clearly, Bears quarterback Rex Grossman had not.
“I’m thinking, ‘It never rains at the Super Bowl,” Manning says during a filming break, recalling that week. “But I saw the forecast.”
And that brought up something he’d learned at the University of Tennessee.
“Back then, Dave Cutcliffe [the Volunteers’ quarterbacks coach] said, about the third or fourth week in camp, ‘We’re doing the “Wet Ball Snap Drill,” boys!’ Equipment guys squirted water on the balls, and the centers snapped them to the quarterbacks. You just never know when you’ll play in the rain.
“I took the drill with me to Indianapolis, and we’d practice it every now and then. So we get down to Miami, and I did it again on that Saturday.”
Did it help?
“I think the Bears had two fumbled snaps between [center Olin] Kreutz and Grossman. [True.] Cutcliffe always said, ‘One fumbled snap is one too many.’ Interceptions, those are going to happen. But you fumble a handoff exchange or a snap? Inexcusable.”
Manning had his share of miscues in the muck that night, and it likely wasn’t the wet-ball drill that made the difference in the game. But it did matter that Colts coach Tony Dungy knew the Bears’ cover-2 defense inside and out from his years studying all NFL defenses.
“I felt like I really knew that defense so well. I saw it every day in practice,” Manning says. “Dungy took me through it, like the origins of it, like ‘This is why the Mike linebacker’s going deep, this is the reason.’ It’s a defense that tests your patience, so you have to be smart.”
He had to be really smart because Bears return man Devin Hester had scored on the opening kickoff, and it was 7-0 Bears with 14 seconds gone.
Recalling this, Manning becomes amused, like the cheerful, inquisitive, mischievous character he plays in all those entertaining TV ads, such as when he and brother Eli, the Giants quarterback, bicker behind father Archie’s back, like two devious second-graders.
“All week long in team meetings, we’ve said we’re not going to kick it to him — all week — we’re not going to do it,” he says. “And then we do. I don’t know what happened.’’
He literally didn’t. As Hester took off on his 92-yard bolt, Manning’s focus was elsewhere.
“I always wanted to play in a Super Bowl, and it always fascinated me that on the opening kickoff all the lights would go on and off, you know, the fans with their lights. So I’m sitting on the bench next to Reggie Wayne, and I said to myself, ‘I’m going to take a moment to watch this.’ So I’m looking behind me at all these lights, even in the rain you can see it all, and then I’m thinking: ‘Hmm, I didn’t hear a whistle.’ ”
Shortly after, he caught the Bears making a mistake in deep coverage and threw a 53-yard touchdown pass to Wayne. In retrospect, it probably wouldn’t have been right for an average quarterback like Grossman to beat a future Hall of Famer like Manning in a game of this magnitude. Manning threw for 71,940 yards and 539 touchdowns in his 17-year career, the second-most and most ever. He was named to 14 Pro Bowls, voted first-team All Pro seven times and is the only starting quarterback to win the Super Bowl with two franchises. Grossman has done none of those things.
Manning’s the guy who started all the walking around behind center, going up and down the line, yelling to his teammates, pointing out linebackers, free safeties, all kinds of stuff, playing pre-snap quarterback like some kind of a crazy auctioneer.
He’s 43 now, out of the game since 2015, and his legacy is that of the cerebral, teammate-friendly, humble ex-superstar who likely could do a whole slew of things if he put his mind to it. Coach? Analyst? Football executive? Businessman? Easy.
But for now, he says he likes being semi-retired, doing this show thing with NFL Films on a one-year contract, making some funny commercials, doing some speeches, keeping his hand in the game he loves but having free time.
“For the first time, I’m in control of my own schedule, after over a quarter of a century,” he says. “Last night my son had a baseball game, and I could be there.”
Yet, “Peyton’s Places” needs it’s star, and NFL Films and ESPN have a lot of folks seriously trying to make this a big success. During the one-day Chicago shooting, there are 70 people — from technicians to script-writers to camera crews — following Manning to his various locations. By the end, as many as 140 people will have worked on the episodes.
The show is a celebration of the history of the NFL in its 100th year, with Manning as the guide. He crisscrosses the U.S. on a series of shoots, checking out the people and places that helped build America’s favorite sport.
There’s a lot of deadpan humor involved, and, if the brief online trailer is any indication, the show will be informative but also loaded with Manning’s particular form of innocent, endearing slapstick.
“I want to know how stickum works!” he hollers in one episode before getting slathered with the stuff and catching a ball shot from a Jugs machine with one hand.
He heaves a football off a 20-story building in New York — an incredible, gravity-propelled rocket that some player in helmet and uniform tries to catch far below — and asks rhetorically, “If I complete it, is it worth me falling off the building?”
Then he’s asking Jim Brown in Los Angeles, “Was running out of bounds ever an option?”
Brown, still fearsome at 83, scoffs at the ignorance of the question as old footage shows him knocking players out of his way to stay inbounds: “No, no, no.”
He sees Joe Montana at a football museum and asks with a sincere and hopeful smile, “Does everybody who buys a museum ticket get to meet Joe Montana?’’
“No, of course not!” snaps Montana. “I’m only here on Wednesdays.’’
He reads a pre-draft scouting report to talent evaluator Mel Kiper Jr. about Kiper himself: “Weak, can’t tackle but handles a blow dryer better than anyone in the business.’’ It’s his serious look to Kiper that says, “Is that accurate?” that sells the bit.
He tells Joe Namath it’s cold outside, and Namath drapes him in his old, legendary and massive fur coat.
He arrives to coach some adolescent kids at a field while, for unexplained reasons, he’s dressed as Elvis Presley, replete with jumpsuit and wig.
“Quit looking at my chest hair!’’ he hollers. “Look at the play.’’
Neil Zender, a Notre Dame grad, football enthusiast and the coordinating producer at NFL Films who’s directing the show — which will run weekly until the Super Bowl — says that there might not be anybody else who can host these episodes the way Manning does.
“He loves people,” Zender says. “He connects with them, and he is so likeable. He has his dry humor, and his timing is great.”
Most of us know this from watching Manning do his Nationwide Insurance ads with country singer Brad Paisley, in which he, the clueless Manning, thinks he’s a vital part of “the band.” Then there’s the one for Mastercard in which he’s cheering on a deli worker by chanting, “Cut that meat! Cut that meat!”
“We have writers,” Zender says. “But the best jokes are him reacting to things.”
That becomes obvious when he’s on the grass at Wrigley Field before a Cubs game, being filmed from all different angles while talking casually with manager Maddon and player Bryant.
“Why didn’t they figure out, ‘Omaha!’ ” asks Maddon, referring to the audible Manning called often in a playoff game.
“Well, they play defense,” Manning says. Then he adds slyly, “I did get a lot of steaks out of that.”
Later, he sits with Smigel and Wendt in a Soldier Field concourse, decked out like them in Super Fan garb, wearing a mustache and shades, seated in front of a grotesque pile of meat, cheese, nachos, pickles, beer.
He nods and eats and stays deadpan serious as they discuss Bears lore.
“If der are aliens, de’re gonna land at Soldier Field,” Wendt says. “De’r gonna wanna see our leader: Mike Ditka.”
“Mike Ditka,” Manning repeats with the group.
To become a born-again Bears fan, Manning submits to a face-plant in the tub of brown tea water disguised as “Eye-talian” beef juice, while pastors Wendt and Smigel preside.
“Baby Peyton, my son,” Wendt says, “are you ready to be baptized into Bears Super Fan-dom?’’
“I’m only tipsy, so not really,” Manning replies.
No matter, Smigel and Wendt dunk his head in the liquid. Cut. Excellent!
Earlier, Manning had been with the real Ditka aboard a Shoreline Sightseeing boat that slowly worked its way up the Chicago River. Manning stood with Ditka near the bow, asking him about his life and career as the boat went under one bridge after another, past landmarks, tourists, kayakers, people sunbathing on the steps leading down to the river walk, other people hustling about their business on the streets above.
“I was born in Pennsylvania,” Da Coach says, responding to one question. “But Chicago’s my home.”
Manning asks about George Halas, Ditka’s coach and boss.
“My first contract I made $12,000 and got $6,000 for being Rookie of the Year. We sat at his kitchen table the next year, and he offered me $18,000. True story.”
He’s happier about his relationship with then-Bears quarterback Bill Wade. It was Wade who threw the ball to Ditka so much that a position known mostly as a blocking receiver’s spot abruptly became a major pass-receiving weapon.
“He fell in love with me. A tight end! A wonderful man.”
Manning asks about Dick Butkus.
“Meanest man I’ve ever met.”
The boat moves along, and when it pauses for a spell at a spot near a crowded waterfront restaurant-bar, people begin to notice who is aboard. Some holler out, “Ditka!” Others shout, “Omaha!” or sing the Nationwide jingle.
“Hi!” Ditka shouts to a group of onlookers. “You know Archie Manning’s son Peyton?”
Later, Manning points out the place on the river where in 1915 the SS Eastland capsized, killing 844 people.
“More people died than on the Titanic,” Manning tells Ditka somberly, adding that, incredibly, 20-year-old George Halas was supposed to be on the boat that was going across Lake Michigan for a company picnic. But he arrived late, and the boat had already tipped over.
“Had he been on that boat,” Manning says, “no NFL, no Chicago Bears.”
Ditka ponders this.
“George Halas was not gong to die in a boat accident,” Ditka states flatly.
Manning’s stay in Chicago was quick. In the weeks to come, he would head off to other football havens, ending his journey of discovery and good cheer in Canton, Ohio, in August at the Pro Football Hall of Fame. Thirty episodes total.
If they’re like the trailer, they should be a hoot.
Manning, as ever, is modest. He already has said a couple times that he’s not nuts about the self-serving title.
“Yeah, everybody likes the trailer,” he admits. “Everybody says it’s really good. But the trailer for ‘Police Academy 5’ was also good, and the movie sucked.”
Sure, but that movie never threw 55 touchdown passes in one season. Your host, Peyton Manning, most assuredly did. |
PPP interface for lwIP
Author: Sylvain Rochet
Table of Contents:
1 - Supported PPP protocols and features
2 - Raw API PPP example for all protocols
3 - PPPoS input path (raw API, IRQ safe API, TCPIP API)
4 - Thread safe PPP API (PPPAPI)
5 - Notify phase callback (PPP_NOTIFY_PHASE)
6 - Upgrading from lwIP <= 1.4.x to lwIP >= 2.0.x
1 Supported PPP protocols and features
======================================
Supported Low level protocols:
* PPP over serial using HDLC-like framing, such as wired dialup modems
or mobile telecommunications GPRS/EDGE/UMTS/HSPA+/LTE modems
* PPP over Ethernet, such as xDSL modems
* PPP over L2TP (Layer 2 Tunneling Protocol) LAC (L2TP Access Concentrator),
IP tunnel over UDP, such as VPN access
Supported auth protocols:
* PAP, Password Authentication Protocol
* CHAP, Challenge-Handshake Authentication Protocol, also known as CHAP-MD5
* MSCHAPv1, Microsoft version of CHAP, version 1
* MSCHAPv2, Microsoft version of CHAP, version 2
* EAP, Extensible Authentication Protocol
Supported address protocols:
* IPCP, IP Control Protocol, IPv4 addresses negotiation
* IP6CP, IPv6 Control Protocol, IPv6 link-local addresses negotiation
Supported encryption protocols:
* MPPE, Microsoft Point-to-Point Encryption
Supported compression or miscellaneous protocols, for serial links only:
* PFC, Protocol Field Compression
* ACFC, Address-and-Control-Field-Compression
* ACCM, Asynchronous-Control-Character-Map
* VJ, Van Jacobson TCP/IP Header Compression
2 Raw API PPP example for all protocols
=======================================
As usual, raw API for lwIP means the lightweight API which *MUST* only be used
for NO_SYS=1 systems or called inside lwIP core thread for NO_SYS=0 systems.
/*
* Globals
* =======
*/
/* The PPP control block */
ppp_pcb *ppp;
/* The PPP IP interface */
struct netif ppp_netif;
/*
* PPP status callback
* ===================
*
* PPP status callback is called on PPP status change (up, down, …) from lwIP
* core thread
*/
/* PPP status callback example */
static void status_cb(ppp_pcb *pcb, int err_code, void *ctx) {
struct netif *pppif = ppp_netif(pcb);
LWIP_UNUSED_ARG(ctx);
switch(err_code) {
case PPPERR_NONE: {
#if LWIP_DNS
const ip_addr_t *ns;
#endif /* LWIP_DNS */
printf("status_cb: Connected\n");
#if PPP_IPV4_SUPPORT
printf(" our_ipaddr = %s\n", ipaddr_ntoa(&pppif->ip_addr));
printf(" his_ipaddr = %s\n", ipaddr_ntoa(&pppif->gw));
printf(" netmask = %s\n", ipaddr_ntoa(&pppif->netmask));
#if LWIP_DNS
ns = dns_getserver(0);
printf(" dns1 = %s\n", ipaddr_ntoa(ns));
ns = dns_getserver(1);
printf(" dns2 = %s\n", ipaddr_ntoa(ns));
#endif /* LWIP_DNS */
#endif /* PPP_IPV4_SUPPORT */
#if PPP_IPV6_SUPPORT
printf(" our6_ipaddr = %s\n", ip6addr_ntoa(netif_ip6_addr(pppif, 0)));
#endif /* PPP_IPV6_SUPPORT */
break;
}
case PPPERR_PARAM: {
printf("status_cb: Invalid parameter\n");
break;
}
case PPPERR_OPEN: {
printf("status_cb: Unable to open PPP session\n");
break;
}
case PPPERR_DEVICE: {
printf("status_cb: Invalid I/O device for PPP\n");
break;
}
case PPPERR_ALLOC: {
printf("status_cb: Unable to allocate resources\n");
break;
}
case PPPERR_USER: {
printf("status_cb: User interrupt\n");
break;
}
case PPPERR_CONNECT: {
printf("status_cb: Connection lost\n");
break;
}
case PPPERR_AUTHFAIL: {
printf("status_cb: Failed authentication challenge\n");
break;
}
case PPPERR_PROTOCOL: {
printf("status_cb: Failed to meet protocol\n");
break;
}
case PPPERR_PEERDEAD: {
printf("status_cb: Connection timeout\n");
break;
}
case PPPERR_IDLETIMEOUT: {
printf("status_cb: Idle Timeout\n");
break;
}
case PPPERR_CONNECTTIME: {
printf("status_cb: Max connect time reached\n");
break;
}
case PPPERR_LOOPBACK: {
printf("status_cb: Loopback detected\n");
break;
}
default: {
printf("status_cb: Unknown error code %d\n", err_code);
break;
}
}
/*
* This should be in the switch case, this is put outside of the switch
* case for example readability.
*/
if (err_code == PPPERR_NONE) {
return;
}
/* ppp_close() was previously called, don't reconnect */
if (err_code == PPPERR_USER) {
/* ppp_free(); -- can be called here */
return;
}
/*
* Try to reconnect in 30 seconds, if you need a modem chatscript you have
* to do a much better signaling here ;-)
*/
ppp_connect(pcb, 30);
/* OR ppp_listen(pcb); */
}
/*
* Creating a new PPPoS session
* ============================
*
* In lwIP, PPPoS is not PPPoSONET, in lwIP PPPoS is PPPoSerial.
*/
#include "netif/ppp/pppos.h"
/*
* PPPoS serial output callback
*
* ppp_pcb, PPP control block
* data, buffer to write to serial port
* len, length of the data buffer
* ctx, optional user-provided callback context pointer
*
* Return value: len if write succeed
*/
static u32_t output_cb(ppp_pcb *pcb, u8_t *data, u32_t len, void *ctx) {
return uart_write(UART, data, len);
}
/*
* Create a new PPPoS interface
*
* ppp_netif, netif to use for this PPP link, i.e. PPP IP interface
* output_cb, PPPoS serial output callback
* status_cb, PPP status callback, called on PPP status change (up, down, …)
* ctx_cb, optional user-provided callback context pointer
*/
ppp = pppos_create(&ppp_netif,
output_cb, status_cb, ctx_cb);
/*
* Creating a new PPPoE session
* ============================
*/
#include "netif/ppp/pppoe.h"
/*
* Create a new PPPoE interface
*
* ppp_netif, netif to use for this PPP link, i.e. PPP IP interface
* ethif, already existing and setup Ethernet interface to use
* service_name, PPPoE service name discriminator (not supported yet)
* concentrator_name, PPPoE concentrator name discriminator (not supported yet)
* status_cb, PPP status callback, called on PPP status change (up, down, …)
* ctx_cb, optional user-provided callback context pointer
*/
ppp = pppoe_create(&ppp_netif,
ðif,
service_name, concentrator_name,
status_cb, ctx_cb);
/*
* Creating a new PPPoL2TP session
* ===============================
*/
#include "netif/ppp/pppol2tp.h"
/*
* Create a new PPPoL2TP interface
*
* ppp_netif, netif to use for this PPP link, i.e. PPP IP interface
* netif, optional already existing and setup output netif, necessary if you
* want to set this interface as default route to settle the chicken
* and egg problem with VPN links
* ipaddr, IP to connect to
* port, UDP port to connect to (usually 1701)
* secret, L2TP secret to use
* secret_len, size in bytes of the L2TP secret
* status_cb, PPP status callback, called on PPP status change (up, down, …)
* ctx_cb, optional user-provided callback context pointer
*/
ppp = pppol2tp_create(&ppp_netif,
struct netif *netif, ip_addr_t *ipaddr, u16_t port,
u8_t *secret, u8_t secret_len,
ppp_link_status_cb_fn link_status_cb, void *ctx_cb);
/*
* Initiate PPP client connection
* ==============================
*/
/* Set this interface as default route */
ppp_set_default(ppp);
/*
* Basic PPP client configuration. Can only be set if PPP session is in the
* dead state (i.e. disconnected). We don't need to provide thread-safe
* equivalents through PPPAPI because those helpers are only changing
* structure members while session is inactive for lwIP core. Configuration
* only need to be done once.
*/
/* Ask the peer for up to 2 DNS server addresses. */
ppp_set_usepeerdns(ppp, 1);
/* Auth configuration, this is pretty self-explanatory */
ppp_set_auth(ppp, PPPAUTHTYPE_ANY, "login", "password");
/*
* Initiate PPP negotiation, without waiting (holdoff=0), can only be called
* if PPP session is in the dead state (i.e. disconnected).
*/
u16_t holdoff = 0;
ppp_connect(ppp, holdoff);
/*
* Initiate PPP server listener
* ============================
*/
/*
* Basic PPP server configuration. Can only be set if PPP session is in the
* dead state (i.e. disconnected). We don't need to provide thread-safe
* equivalents through PPPAPI because those helpers are only changing
* structure members while session is inactive for lwIP core. Configuration
* only need to be done once.
*/
ip4_addr_t addr;
/* Set our address */
IP4_ADDR(&addr, 192,168,0,1);
ppp_set_ipcp_ouraddr(ppp, &addr);
/* Set peer(his) address */
IP4_ADDR(&addr, 192,168,0,2);
ppp_set_ipcp_hisaddr(ppp, &addr);
/* Set primary DNS server */
IP4_ADDR(&addr, 192,168,10,20);
ppp_set_ipcp_dnsaddr(ppp, 0, &addr);
/* Set secondary DNS server */
IP4_ADDR(&addr, 192,168,10,21);
ppp_set_ipcp_dnsaddr(ppp, 1, &addr);
/* Auth configuration, this is pretty self-explanatory */
ppp_set_auth(ppp, PPPAUTHTYPE_ANY, "login", "password");
/* Require peer to authenticate */
ppp_set_auth_required(ppp, 1);
/*
* Only for PPPoS, the PPP session should be up and waiting for input.
*
* Note: for PPPoS, ppp_connect() and ppp_listen() are actually the same thing.
* The listen call is meant for future support of PPPoE and PPPoL2TP server
* mode, where we will need to negotiate the incoming PPPoE session or L2TP
* session before initiating PPP itself. We need this call because there is
* two passive modes for PPPoS, ppp_set_passive and ppp_set_silent.
*/
ppp_set_silent(pppos, 1);
/*
* Initiate PPP listener (i.e. wait for an incoming connection), can only
* be called if PPP session is in the dead state (i.e. disconnected).
*/
ppp_listen(ppp);
/*
* Closing PPP connection
* ======================
*/
/*
* Initiate the end of the PPP session, without carrier lost signal
* (nocarrier=0), meaning a clean shutdown of PPP protocols.
* You can call this function at anytime.
*/
u8_t nocarrier = 0;
ppp_close(ppp, nocarrier);
/*
* Then you must wait your status_cb() to be called, it may takes from a few
* seconds to several tens of seconds depending on the current PPP state.
*/
/*
* Freeing a PPP connection
* ========================
*/
/*
* Free the PPP control block, can only be called if PPP session is in the
* dead state (i.e. disconnected). You need to call ppp_close() before.
*/
ppp_free(ppp);
3 PPPoS input path (raw API, IRQ safe API, TCPIP API)
=====================================================
Received data on serial port should be sent to lwIP using the pppos_input()
function or the pppos_input_tcpip() function.
If NO_SYS is 1 and if PPP_INPROC_IRQ_SAFE is 0 (the default), pppos_input()
is not IRQ safe and then *MUST* only be called inside your main loop.
Whatever the NO_SYS value, if PPP_INPROC_IRQ_SAFE is 1, pppos_input() is IRQ
safe and can be safely called from an interrupt context, using that is going
to reduce your need of buffer if pppos_input() is called byte after byte in
your rx serial interrupt.
if NO_SYS is 0, the thread safe way outside an interrupt context is to use
the pppos_input_tcpip() function to pass input data to the lwIP core thread
using the TCPIP API. This is thread safe in all cases but you should avoid
passing data byte after byte because it uses heavy locking (mailbox) and it
allocates pbuf, better fill them !
if NO_SYS is 0 and if PPP_INPROC_IRQ_SAFE is 1, you may also use pppos_input()
from an RX thread, however pppos_input() is not thread safe by itself. You can
do that *BUT* you should NEVER call pppos_connect(), pppos_listen() and
ppp_free() if pppos_input() can still be running, doing this is NOT thread safe
at all. Using PPP_INPROC_IRQ_SAFE from an RX thread is discouraged unless you
really know what you are doing, your move ;-)
/*
* Fonction to call for received data
*
* ppp, PPP control block
* buffer, input buffer
* buffer_len, buffer length in bytes
*/
void pppos_input(ppp, buffer, buffer_len);
or
void pppos_input_tcpip(ppp, buffer, buffer_len);
4 Thread safe PPP API (PPPAPI)
==============================
There is a thread safe API for all corresponding ppp_* functions, you have to
enable LWIP_PPP_API in your lwipopts.h file, then see
include/netif/ppp/pppapi.h, this is actually pretty obvious.
5 Notify phase callback (PPP_NOTIFY_PHASE)
==========================================
Notify phase callback, enabled using the PPP_NOTIFY_PHASE config option, let
you configure a callback that is called on each PPP internal state change.
This is different from the status callback which only warns you about
up(running) and down(dead) events.
Notify phase callback can be used, for example, to set a LED pattern depending
on the current phase of the PPP session. Here is a callback example which
tries to mimic what we usually see on xDSL modems while they are negotiating
the link, which should be self-explanatory:
static void ppp_notify_phase_cb(ppp_pcb *pcb, u8_t phase, void *ctx) {
switch (phase) {
/* Session is down (either permanently or briefly) */
case PPP_PHASE_DEAD:
led_set(PPP_LED, LED_OFF);
break;
/* We are between two sessions */
case PPP_PHASE_HOLDOFF:
led_set(PPP_LED, LED_SLOW_BLINK);
break;
/* Session just started */
case PPP_PHASE_INITIALIZE:
led_set(PPP_LED, LED_FAST_BLINK);
break;
/* Session is running */
case PPP_PHASE_RUNNING:
led_set(PPP_LED, LED_ON);
break;
default:
break;
}
}
6 Upgrading from lwIP <= 1.4.x to lwIP >= 2.0.x
===============================================
PPP API was fully reworked between 1.4.x and 2.0.x releases. However porting
from previous lwIP version is pretty easy:
* Previous PPP API used an integer to identify PPP sessions, we are now
using ppp_pcb* control block, therefore all functions changed from "int ppp"
to "ppp_pcb *ppp"
* struct netif was moved outside the PPP structure, you have to provide a netif
for PPP interface in pppoX_create() functions
* PPP session are not started automatically after you created them anymore,
you have to call ppp_connect(), this way you can configure the session before
starting it.
* Previous PPP API used CamelCase, we are now using snake_case.
* Previous PPP API mixed PPPoS and PPPoE calls, this isn't the case anymore,
PPPoS functions are now prefixed pppos_ and PPPoE functions are now prefixed
pppoe_, common functions are now prefixed ppp_.
* New PPPERR_ error codes added, check you have all of them in your status
callback function
* Only the following include files should now be used in user application:
#include "netif/ppp/pppapi.h"
#include "netif/ppp/pppos.h"
#include "netif/ppp/pppoe.h"
#include "netif/ppp/pppol2tp.h"
Functions from ppp.h can be used, but you don't need to include this header
file as it is already included by above header files.
* PPP_INPROC_OWNTHREAD was broken by design and was removed, you have to create
your own serial rx thread
* PPP_INPROC_MULTITHREADED option was misnamed and confusing and was renamed
PPP_INPROC_IRQ_SAFE, please read the "PPPoS input path" documentation above
because you might have been fooled by that
* If you used tcpip_callback_with_block() on ppp_ functions you may wish to use
the PPPAPI API instead.
* ppp_sighup and ppp_close functions were merged using an optional argument
"nocarrier" on ppp_close.
* DNS servers are now only remotely asked if LWIP_DNS is set and if
ppp_set_usepeerdns() is set to true, they are now automatically registered
using the dns_setserver() function so you don't need to do that in the PPP
callback anymore.
* PPPoS does not use the SIO API anymore, as such it now requires a serial
output callback in place of sio_write
* PPP_MAXIDLEFLAG is now in ms instead of jiffies
|
// Copyright 2009 The Go Authors. All rights reserved.
// Use of this source code is governed by a BSD-style
// license that can be found in the LICENSE file.
package unicode_test
import (
"testing"
. "unicode"
)
var testDigit = []rune{
0x0030,
0x0039,
0x0661,
0x06F1,
0x07C9,
0x0966,
0x09EF,
0x0A66,
0x0AEF,
0x0B66,
0x0B6F,
0x0BE6,
0x0BEF,
0x0C66,
0x0CEF,
0x0D66,
0x0D6F,
0x0E50,
0x0E59,
0x0ED0,
0x0ED9,
0x0F20,
0x0F29,
0x1040,
0x1049,
0x1090,
0x1091,
0x1099,
0x17E0,
0x17E9,
0x1810,
0x1819,
0x1946,
0x194F,
0x19D0,
0x19D9,
0x1B50,
0x1B59,
0x1BB0,
0x1BB9,
0x1C40,
0x1C49,
0x1C50,
0x1C59,
0xA620,
0xA629,
0xA8D0,
0xA8D9,
0xA900,
0xA909,
0xAA50,
0xAA59,
0xFF10,
0xFF19,
0x104A1,
0x1D7CE,
}
var testLetter = []rune{
0x0041,
0x0061,
0x00AA,
0x00BA,
0x00C8,
0x00DB,
0x00F9,
0x02EC,
0x0535,
0x06E6,
0x093D,
0x0A15,
0x0B99,
0x0DC0,
0x0EDD,
0x1000,
0x1200,
0x1312,
0x1401,
0x1885,
0x2C00,
0xA800,
0xF900,
0xFA30,
0xFFDA,
0xFFDC,
0x10000,
0x10300,
0x10400,
0x20000,
0x2F800,
0x2FA1D,
}
func TestDigit(t *testing.T) {
for _, r := range testDigit {
if !IsDigit(r) {
t.Errorf("IsDigit(U+%04X) = false, want true", r)
}
}
for _, r := range testLetter {
if IsDigit(r) {
t.Errorf("IsDigit(U+%04X) = true, want false", r)
}
}
}
// Test that the special case in IsDigit agrees with the table
func TestDigitOptimization(t *testing.T) {
for i := rune(0); i <= MaxLatin1; i++ {
if Is(Digit, i) != IsDigit(i) {
t.Errorf("IsDigit(U+%04X) disagrees with Is(Digit)", i)
}
}
}
|
Download Emeril's Delmonico: A Restaurant with a Past by Emeril Lagasse PDF
By Emeril Lagasse
For greater than a hundred years, Delmonico has embodied the spirit of recent Orleans. First opened in 1895, Delmonico eating place and Bar in New Orleans reopened its doorways a century later to great acclaim as Emeril's Delmonico. In his newest cookbook, America's favourite star chef provides a set of recipes which are tailored and simplified for domestic chefs, that includes a mixture of Creole classics and Emeril's kicked-up creations.
Emeril's Delmonico is filled with recipes for hearty, cutting edge meals steeped in New Orleans type. Illustrated with either modern full-color and classic black-and-white images, Emeril's Delmonico paints a full of life, evocative portrait of Emeril's vintage delicacies and the wealthy culinary historical past of recent Orleans.
For greater than a hundred years, Delmonico has embodied the spirit of recent Orleans. First opened in 1895, Delmonico eating place and Bar in New Orleans reopened its doorways a century later to great acclaim as Emeril's Delmonico. In his newest cookbook, America's favourite star chef provides a set of recipes which are tailored and simplified for domestic chefs, that includes a mixture of Creole classics and Emeril's kicked-up creations.
Emeril's Delmonico is filled with recipes for hearty, cutting edge meals steeped in New Orleans type. Illustrated with either modern full-color and classic black-and-white images, Emeril's Delmonico paints a full of life, evocative portrait of Emeril's vintage delicacies and the wealthy culinary historical past of recent Orleans.
<p class="MsoNormal" style="margin: 0in 0in 0pt">While “bread” as soon as implied an easy, sliced white loaf from the grocery store, shoppers have began to contemplate the product in a extra subtle gentle. Bread fans are extra conscious of the varied array of top of the range breads than ever sooner than and are trying to find out home made artisan items at neighborhood farmers’ markets, natural grocery shops, area of expertise shops…even the web.
This first-ever cookbook from excessive instances magazine—the world's such a lot depended on identify by way of getting stoned—is the deliciously definitive advisor to cannabis-infused cooking. effortless, available recipes and recommendation demystify the adventure of cooking with grass and provide a cornucopia of irie appetizers and entrees, stoner chocolates, hashish cocktails, and high-holiday feasts for any social gathering, from Time Warp Tamales and Sativa Shrimp Spring Rolls to Pico de Ganja Nachos and Pineapple convey Upside-Down Cake.
Supply Achatz's occupation as a chef has been equipped on beating the percentages, time after time. From humble Midwestern beginnings, he struck out into the culinary global and rose to super-stardom in Chicago, the place his iconoclastic imaginative and prescient helped rework the yankee fine-dining adventure. alongside the best way, he fought a dramatic conflict with melanoma that briefly stripped him of his skill to style.
In the end, the significant other cookbook to the hit YouTube cooking exhibit with recipes for one hundred twenty easy, scrumptious Italian-American classics
When Laura Vitale moved from Naples to the us at age twelve, she cured her homesickness by way of cooking up unending pots of her nonna’s sauce. She went directly to paintings in her father’s pizzeria, but if his eating place abruptly closed, she knew she needed to locate her long ago into the kitchen. with her husband, she introduced her net cooking express, Laura within the Kitchen, the place her enthusiasm, attraction, and impossible to resist recipes have gained her hundreds of thousands of lovers.
In her debut cookbook, Laura makes a speciality of easy recipes that any one can achieve—whether they've got somewhat time to spend within the kitchen or are looking to create a magnificent banquet. listed below are a hundred and ten all-new recipes for quick-fix suppers, equivalent to Tortellini with red Parmesan Sauce and One- Pan poultry with Potatoes, Wine, and Olives; leisurely entrées, together with Spinach and Artichoke-Stuffed Shells and Pot Roast alla Pizzaiola; and 10 fan favorites, like tacky Garlic Bread and No-Bake Nutella Cheesecake. Laura checks her recipes dozens of occasions to excellent them so the implications are continually impressive. With transparent directions and greater than a hundred colour images, Laura within the Kitchen is the correct advisor for somebody seeking to get cozy on the range and feature enjoyable cooking.
Line two cookie sheets with parchment paper. Remove one piece of dough from the refrigerator. Place the dough between two pieces of waxed paper and roll to ⅛ in/3 mm thick. Using cookie cutters, cut out as many shapes as possible. The dough is oily, so the cutter shouldn’t stick to the dough. 5 cm apart. Bake until the cookies are dark brown, about 15 minutes. Remove to wire racks to cool completely. Let the sheets cool completely and repeat with the remaining dough. TO MAKE THE ROYAL ICING / In a large bowl, whisk the egg whites until foamy.
In a small bowl, whisk the egg white until foamy, about 30 seconds. Add the sugar and whisk for 10 seconds. Add the oil and the water and whisk until combined. Add the vanilla and orange zest and whisk until combined. Add the flour and the salt and whisk until the mixture is smooth. Spoon the batter by teaspoonfuls onto the prepared sheet. 5 cm in diameter (no larger). The batter will look uneven, with some spots having more batter than others. Just try to make it as even as you can. Repeat to make another circle of batter, spacing it at least 2 in/5 cm from the first circle.
Once the cookies are baked, the outsides stay crunchy, while the insides are a bit chewy. When I add toasted nuts to the meringue, my preference is for pecans. You can use the leftover yolks to make Thumbprint Cookies (page 58). ABOUT 45 SMALL COOKIES OR 30 BIG COOKIES Preheat the oven to 300°F/150°C/gas mark 2. Line two cookie sheets with parchment paper. In the bowl of a stand mixer fitted with the whisk attachment, beat the egg whites on medium-high speed until foamy. Add the cream of tartar and beat for a few seconds to combine. |
1.. Introduction
================
Globally, tobacco use is associated with five million deaths per annum and is regarded as one of the leading causes of premature death \[[@b1-ijerph-06-00741]\]. Compared with non-smokers, smokers are 15 times more likely to develop lung cancer, 11 times more likely to develop chronic lung disease and twice as likely to have acute myocardial infarctions, AMIs, \[[@b2-ijerph-06-00741]\]. It is estimated that over 500,000 EU citizens die each year from smoking related ailments \[[@b3-ijerph-06-00741]\].
Environmental Tobacco Smoke (ETS, "secondhand smoke") has been defined as the smoke which non smokers are exposed to when they are in an indoor environment with smokers \[[@b4-ijerph-06-00741]\]. ETS has been shown to cause premature death and disease in children and adults who do not smoke, but are passively exposed to ETS \[[@b2-ijerph-06-00741]\]. Lung cancer risk has been shown to increase by over 20% with increasing levels of ETS in the workplace \[[@b5-ijerph-06-00741]\]. ETS exposure also increases population respiratory symptoms by 30--60% and it is well established that ETS is associated with cardiovascular disease \[[@b2-ijerph-06-00741]\]. ETS exposure has also been associated with a 31% increase in the risk of AMIs compared with a doubling of the risk associated with direct smoking \[[@b3-ijerph-06-00741]\]. The ingredients in cigarette smoke have been extensively studied and include aluminium phosphate, ammonia, nicotine, colorants, sweeteners and agri-chemical residues. There are also several known carcinogens in the emissions such as lead, benzene, 1,3-butadiene, formaldehyde, mercury and hydrogen cyanide which are frequently used as markers for ETS. More than 4,000 compounds including several toxic volatile organic compounds have been identified in ETS to date \[[@b6-ijerph-06-00741],[@b7-ijerph-06-00741]\] and it has been declared by the World Health Organisation, as well as by many other independent sources, as carcinogenic \[[@b8-ijerph-06-00741]\] with most of these studies also associating ETS with an increased risk of heart disease. ETS has also been shown to have adverse effects on reproduction and cot death in children \[[@b8-ijerph-06-00741]\]. Epidemiological evidence has shown that ETS exposure causes an increased risk of cancer of 20--30%, an increased risk of heart disease of 25--30%, an increased risk of strokes of up to 82% and an increased risk of other non-fatal respiratory illnesses \[[@b9-ijerph-06-00741]--[@b11-ijerph-06-00741]\].
Moreover, the risk of the above ailments are high for staff and patrons of bars, restaurants and other hospitality outlets, who are a unique group exposed to extreme levels of ETS, where concentrations of ETS have been shown to be very high \[[@b4-ijerph-06-00741],[@b12-ijerph-06-00741],[@b13-ijerph-06-00741]\], relative to other workers. The combination of cigarette smoke and the drinking of alcohol has also been shown to adversely affect macrophage function \[[@b14-ijerph-06-00741]\], thus exacerbating the adverse effects of smoking for the majority of people frequenting public houses. The incidence of such high levels of ETS in public houses and ETS exposure in the workplace has prompted governments around the world to introduce smoking bans and other tobacco control policies in order to reduce its environmental health cost. Banning smoking in indoor public places is regarded as one intervention method to limit ETS exposure among non-smokers, part of a larger effort to reduce tobacco product consumption world-wide, along with nicotine product taxation, adult and children education, and other such approaches \[[@b15-ijerph-06-00741]\].
The first smoking ban was attributed to Pope Urban VII in 1590 as he threatened to excommunicate anyone who "took tobacco in the porch-way of, or inside a church, whether it be by chewing, smoking with a pipe or sniffing in powdered form through the nose" \[[@b16-ijerph-06-00741]\]. The earliest citywide smoking bans were enacted shortly thereafter in Bavaria, Kursachsen, and certain parts of Austria in the late 1600s. Smoking was banned in Berlin in 1723, in Königsberg in 1742, and in Stettin in 1744 \[[@b16-ijerph-06-00741]\]. The first modern, nationwide smoking ban was imposed by the Nazi Party in every university, post office, military hospital and Nazi Party office in Germany, under the Institute for Tobacco Hazards Research, created in 1941 by Adolf Hitler \[[@b16-ijerph-06-00741]\]. Major anti-tobacco campaigns were widely broadcast by the Nazis until the demise of the regime in 1945.
In the latter part of the 20th century, research on the risks of ETS began to be made public. This public awareness eventually became public policy in 1975 when the U.S. state of Minnesota enacted the Minnesota Clean Indoor Air Act. This made it the first state to ban smoking in most public spaces (with the exception of bars) and as of October 2007, Minnesota enacted a ban on smoking in all restaurants and bars state-wide, called the Freedom to Breathe Act of 2007. In 1990, the U.S. city of San Luis Obispo, California, became the first city in the world to ban indoor smoking in all public places, including bars and restaurants. The success and resulting popularity of these smoking bans resulted in the implementation of various types of smoking bans in 35 U.S. states. In March 2004, the Irish Government implemented a ban on smoking in the workplace, the first country to do so \[[@b4-ijerph-06-00741],[@b12-ijerph-06-00741]\]. In Norway similar legislation was put into force in July of the same year. In March 2006, the Scottish Government became the first in the U.K. to implement a smoking ban, which in turn encouraged Wales, Northern Ireland and England to introduce their own legislation \[[@b17-ijerph-06-00741]\]. The whole of the U.K. became subject to a ban on smoking in enclosed public places in 2007.
Using the terms 'smoking ban' and 'tobacco control' as keywords an extensive literature search was carried out in the ScienceDirect, SCOPUS, MedLine and InderScience databases. From the numerous search results a total 63 relevant papers were selected for review. This paper reviews the results of these investigations, into the effects of smoking ban policy on ETS exposure; smoking prevalence; and children. This paper also reviews the evidence of other impacts of smoking bans and of possible alternative policy of tobacco control.
2.. Smoking Ban Policy and Exposure to ETS
==========================================
In a study of smoking lounges in California levels of a known marker of ETS, the known carcinogen benzene, were found to range from 3.5 to 14.8 μg/m^3^, depending on the number of cigarettes smoked, volume of the room and ventilation rate \[[@b18-ijerph-06-00741]\]. The ETS created by smoking in these environments was found to contribute to up to 60% of the benzene concentration in the room. A further study in Finland into benzene and other VOCs in workplaces where smoking was taking place found levels of benzene in the range 1.0 to 20.2 μg/m^3^, again depending on the number of cigarettes smoked \[[@b19-ijerph-06-00741]\]. The recommended annual average limit concentration of benzene, to which an individual is exposed, over a typical lifetime, is 5 μg/m^3^ \[[@b20-ijerph-06-00741]\]. These indoor air quality concentrations found as result of the presence of ETS can be clearly seen to greatly exceed the recommended limit value.
In the year 2000, the Tobacco Free Policy Review Group was set up in Ireland to carry out a fundamental review of health and tobacco and make recommendations to the Minister for Health and Children \[[@b8-ijerph-06-00741]\]. In line with the recommendations of this report the Office of Tobacco Control (OTC), a statutory body, was set up in May 2002 under the enactment of Section 2 of the Public Health (Tobacco) Act, 2002. This act paved the way for a complete ban on smoking in the workplace, which also included public bars, on March 29^th^ 2004. The banning of smoking in the public bar has received considerable media attention both in other E.U. countries and further a field since it was the first country to affect such a law. The policy was targeted particularly towards reducing the ETS exposure of public bar and other hospitality workers who had, up to then, been exposed to very high concentrations of ETS \[[@b4-ijerph-06-00741]\].
A number of investigations were carried out, in which experimental measurements of ETS concentrations were recorded both before and after the implementation of the Irish smoking ban. A study of this nature, which was carried out in nine pubs in Galway (Ireland), found a reduction in PM~2.5~ concentrations of up to 96% and a reduction in PM~10~ concentrations of up to 74% as a result of the smoking ban \[[@b12-ijerph-06-00741]\]. Studies of benzene concentrations in two pubs in Dublin (Ireland), following the implementation of a smoking ban have been found to be 0.5 μg/m^3^ on average \[[@b12-ijerph-06-00741]\]. This was an average reduction in benzene concentrations of 91% and an average reduction in 1,3-butadiene concentrations of 95% \[[@b4-ijerph-06-00741]\]. Both sets of pollutants in these two studies have been shown to have adverse effects on human health \[[@b20-ijerph-06-00741],[@b21-ijerph-06-00741]\].
Furthermore, modelling investigations into the effect of the Irish smoking ban on the absorption of ETS in the lungs of pub patrons found that the high concentrations of benzene and 1,3-butadiene over a three hour exposure period would potentially be 98% and 100% absorbed into the lungs before the smoking ban, compared to 57% and 65% absorbed into the lungs after the smoking ban was introduced, due to the lower concentrations. Therefore, the large reductions in indoor air quality in pubs in Ireland were also found to be complimented, in terms of health impacts, by a reduction in the percentage of pollutants absorbed into the lungs as a result of lower concentration gradients \[[@b4-ijerph-06-00741]\].
Studies have also been carried out in the United States into the effect of smoking bans on ETS exposure. Smoking bans have been introduced in various states and cities in the U.S., without the presence of a nationwide ban as was implemented elsewhere. In Delaware (U.S.), concentrations of particulate matter were reported to have fallen by 90% in public bars and restaurants following the implementation of a smoking ban \[[@b13-ijerph-06-00741]\]. The U.S. Center for Disease Control and Prevention carried out investigations of the level of serum cotinine in non smokers during the past decade, finding a reduction of approximately 70% comparing pre and post ban levels \[[@b22-ijerph-06-00741]\]. Cotinine is a metabolite of nicotine and is primarily present in non smokers as a result of ETS exposure. In addition 88% of non-smokers in the 3 year period had measurable levels of cotinine in their blood while only 43% had measurable level during 1999 to 2002.
Another investigation of the impact of a smoking ban policy, introduced in Spain on 1^st^ January 2006, found that airborne nicotine levels declined from an average of 0.23 μg/m^3^ before the ban to 0.10 μg/m^3^ after the ban in 44 public hospitals in Spain \[[@b23-ijerph-06-00741]\]. In general the study found that ETS in Spanish hospitals decreased although ETS exposure was still prevalent in certain places such as: the main entrance, fire escapes, emergency room waiting areas and cafeterias, explained by the fact that the ban still permits smoking in certain areas (cafeterias & bars). A further investigation of ETS exposure in Spain found that one third of the population were still exposed to ETS in the workplace despite the introduction of the smoking ban \[[@b24-ijerph-06-00741]\]. ETS exposure at the entrance to buildings remains problematic in many countries which have ban smoking indoors as smokers tend to go outside the front/back door to smoke, as discussed later in Section 7.
The smoking ban in Scotland, U.K., has been shown to have resulted in a drop in ETS concentrations in bars of 86% \[[@b17-ijerph-06-00741]\]. In addition studies have shown 39% reduction in general ETS exposure in Adults and Children in Scotland \[[@b25-ijerph-06-00741],[@b26-ijerph-06-00741]\]. In Italy, investigations of ETS exposure in two restaurants and two pubs in Milan and six bars in Trieste, following the implementation of a smoking ban, found reductions of 70 to 97% \[[@b27-ijerph-06-00741],[@b28-ijerph-06-00741]\].
3.. Smoking Ban Policy and Smoking Prevalence
=============================================
In addition to reducing the population exposure to ETS and thus improving environmental health smoking ban policy also aims to reduce smoking prevalence, improving the health of smokers. In this regard the policy targets individuals who are 'social smokers' and only partake of tobacco use in the social setting of a bar or night club. It also targets those smokers who wish to quit but find it difficult due to the presence of smoking in social outlets such as pubs and night clubs.
Following the implementation of the Irish smoking ban a drop in cigarette sales of 7.5% has been reported in the first six months \[[@b4-ijerph-06-00741]\]. In addition, smoking prevalence in the Irish population fell from 27% prior to the ban to 24.1% 8 months following the ban \[[@b29-ijerph-06-00741]\]. Irish smoking prevalence has since fallen to 23.6% in March 2008, a 1.2% decrease on smoking prevalence in March 2007 \[[@b30-ijerph-06-00741]\]. [Figure 1](#f1-ijerph-06-00741){ref-type="fig"} shows the variation in smoking prevalence over the past 5 years in Ireland, a marked decline in prevalence is notable following the introduction of the smoking ban in March 2004. Smoking prevalence reached its lowest levels in Ireland in February 2005 but subsequently rose in 2006 and is currently declining steadily.
Since the introduction of the Irish smoking ban, smoking prevalence has fallen by approximately 12.5%. However, this smoking ban policy alone cannot claim to be responsible for the entirety of this reduction as cigarette excise duty, anti-tobacco advertising and supports to quit smoking have increased during this period. Equally, in the U.K. as a whole, cigarette sales fell by 11% during July 2007, the first month of the smoking ban in England, compared with July 2006. A survey of 1750 smokers in the U.K., immediately following the implementation of a smoking ban in 2007, found that 1% had quit, and a further 3% intended to quit, in response to the policy measure \[[@b32-ijerph-06-00741]\]. In Italy, A systematic review and meta-analysis showed that smoke-free workplaces were associated with reductions in smoking prevalence of 3.8% among employees and with 3.1 fewer cigarettes smoked per day per continuing smoker \[[@b33-ijerph-06-00741],[@b34-ijerph-06-00741]\]. In Norway, among persons aged 16--74 years in 2003 (prior to their smoking ban) there was a smoking prevalence of 27.3%, which declined to 24.5% in 2006 after the ban \[[@b35-ijerph-06-00741]\].
Bans on smoking in restaurants in the United States have also been shown to help stop young people from becoming habitual smokers. A study of youths in Massachusetts found that those in towns with bans were 35 per cent less likely to be habitual smokers \[[@b36-ijerph-06-00741]\]. The various smoking ban policies introduced in the U.S. between 1993 and 2003 have been shown to account for about 9% of the decline in adult smoking prevalence during this period \[[@b37-ijerph-06-00741]\]. Indeed the same investigation has predicted a further reduction in smoking prevalence in the U.S. of 4.2% should the remaining states without smoking ban policies introduce such laws by 2005. Total prohibition of smoking in the workplace has been found to strongly affect tobacco industry sales volume. Smokers facing these restrictions consume 11%--15% less cigarettes than average and have quit rate that is 84% higher than average \[[@b38-ijerph-06-00741]\].
However, in the United States, the Centre for Disease Control has reported a levelling off of smoking rates in recent years despite a large number of ever more severe smoking bans and large tax increases. Anti-smoking groups claim this is due to funding reasons and it has also been suggested that a level of committed smokers has been reached: those unmotivated and increasingly defiant in the face of further anti-tobacco legislation \[[@b39-ijerph-06-00741]\].
4.. Smoking Ban Policy and Public Health
========================================
Investigations have also been carried out to quantify the health benefits of smoking ban policy. In the United States a number of investigations have attempted to quantify the effects on cardiovascular health in the population of smoking ban policy, for example in New York, a state-wide ban on smoking was found to reduce ETS exposure, incidence of AMIs and strokes, and a decrease in tobacco consumption \[[@b2-ijerph-06-00741]\]. In Helena, Montana, a ban on smoking was introduced in June 2002 and subsequently suspended on legal grounds in December 2002. Helena contained a single hospital which, from 1998 to 2001 and after December 2002, reported 80 AMIs per annum in patients from within the Helena community and 36 AMIs per annum in patients from outside the Helena community. During the 6 month period of the smoking ban, the reported AMIs in patients from within Helena fell to 48 per annum and remained at 36 per annum in patients from outside Helena. This unique set of circumstances showed that for those resident within Helena where the smoking ban was in place AMIs fell by 40%, while for those residents outside Helena AMI rates remained unchanged. In addition the suspension of the smoking ban policy returned AMI rate to pre ban levels.
Similarly, the AMI rates in two hospitals were compared in Colorado, where one hospital served a community which had just introduced a smoking ban and the other had not. The investigation found a decrease in AMIs of 27% in the metropolitan area and 19% in the surrounding county, while no change was found at the other hospital \[[@b2-ijerph-06-00741]\].
In other parts of the world, investigations have shown similar trends, following an the introduction of a smoking ban in Scotland, hospital emergency departments have reported a fall in admissions for AMIs of 17% compared with a year on year reduction trend of 3% \[[@b40-ijerph-06-00741]\]. In Italy a smoking ban was introduced in January 2005, whereby AMI incidence rates were again reduced as was smoking prevalence and ETS exposure in general \[[@b41-ijerph-06-00741]\].
While clear improvements in cardiac health have been shown in numerous studies, the health impacts of smoking ban policy has not generally been found to extend to children. A study of the impact of a smoking ban on asthma related emergency department (ED) visits carried out in the City of Lexington, Kentucky in the U.S. found a 25% decrease in ED visits 32 months after the ban was implement, compared with ED visits 40 months prior to the ban \[[@b42-ijerph-06-00741]\]. The study also showed that the pre and post ban asthma related ED visits of children were essentially unaffected. Children with high ETS exposure are predominantly exposed in the home and therefore their exposures are not affected by a ban on smoking bars, public places or the workplace \[[@b43-ijerph-06-00741]\]. Studies examining parental smoking bans in the home have found that in households containing non-smokers only that 85% had a total ban on indoor smoking in place. However 50% of households with children and one or more smokers present did not have a full indoor smoking ban in place \[[@b44-ijerph-06-00741]\]. Hence, smoking ban policies in the workplace in isolation will not protect the entire population and should be used in combination with other tobacco control initiatives such as taxation, early intervention schemes, education and advertising. Promotion of indoor smoking bans in the home to protect children is a key policy area which needs research and implementation \[[@b45-ijerph-06-00741]\].
5.. Other Impacts of Smoking Ban Policy
=======================================
In addition to its ineffectiveness in protecting the health of children, smoking ban policies have been shown to have a number of other impacts:
5.1.. Tourism/Business
----------------------
Opponents of smoking ban policy such as the alcohol and tobacco industries have carried out numerous investigations which show a negative economic impact on the hospitality industry as a result of the introduction of smoking ban policy \[[@b42-ijerph-06-00741]\]. In the United States the spread of smoking ban policy at local, state and national level has slowed as a result of concerns over its economic effects on business, particularly in the hospitality industry. Restaurant and bars owners have raised concerns over possible loss in revenue should smoking be banned on their premises, as they have done in numerous countries around the world in the run up to the implementation of a smoking ban policy \[[@b4-ijerph-06-00741]\]. The tobacco industry has fuelled this debate with claims that smoking ban policy will negatively impact on restaurants, bars, nightclubs and other hospitality venues resulting in job and profit losses \[[@b42-ijerph-06-00741]\]. Indeed the tobacco industry has a long history of highlighting the dire economic consequences of this and any other tobacco control measures such as increased taxes and bans on tobacco advertising \[[@b42-ijerph-06-00741],[@b46-ijerph-06-00741]\]. Interestingly, a recent review was carried out evaluating the quality of 97 studies on the economic impacts of smoking ban policies on the hospitality industry. This review found that, of those who reported a negative economic impact on business, 94% of these studies were sponsored by the tobacco industry \[[@b47-ijerph-06-00741]\].
In Ireland the alcohol industry, through the Vintners Association of Ireland, mounted the strongest opposition to the introduction of the smoking ban in 2003 and have since claimed it has had negative impacts on businesses in Ireland with the closure of many rural pubs. The Office of Tobacco Control has disputed these claims and has carried out investigations which show no negative effect on business as a result of the ban \[[@b29-ijerph-06-00741]\]. Instead findings have shown that the increases in the costs of alcohol and increases in the severity of drink driving legislation, enforcement and penalties, have resulted in rural pub closures and reductions in the pub trade.
Supporters of smoking ban policies have also produced numerous investigations which show a neutral or sometimes positive impact on businesses. A recent review compared the quality and funding source of studies concluding negative economic impacts of smoking ban policy to those concluding no such negative impact \[[@b47-ijerph-06-00741]\]. The studies were reviewed independently by two researchers, concluded that all of the best designed studies reported a neutral or positive impact of smoking ban policy on restaurant and bar sales and employment.
The direct medical cost of cardiovascular and other circulatory diseases in the U.S. in 1995 was 151 billion US dollars. Observational studies of the direct medical costs following smoking cessation in observed subjects showed reductions utilisation, which occurred after a lag of three to five years \[[@b48-ijerph-06-00741]\]. Therefore showing additional savings to the national economy of participating countries as well as having no negative effects on the tourism/hospitality industries.
5.2.. Prisons/Psychiatric Hospitals
-----------------------------------
Sensitive workplaces such as prisons, where every attempt to pacify inmates and protect workers is taken, require special attention when implementing smoking ban policy. Prison officials and guards are often concerned based on previous events in other prisons concerning riots, fostering a cigarette black market within the prison, and other problems resulting from a total prison smoking ban. Prisons have experienced riots when placing smoking bans into effect resulting in prisoners setting fires, destroying prison property, persons being assaulted and injured. A recent example occurred in Quebec (Canada) in February 2008, where a smoking ban was enforced on 18 prisons; the smoking ban was subsequently reversed following rioting by prisoners in these prisons. In Ireland in consultation with the prison service and psychiatric hospitals prior to the implementation of the smoking ban in 2004, both parties felt that the increased health protection afforded to them would be offset against increased risks of inmate attacks, and as a result the smoking ban in Ireland was not extended to these locations.
However, in the U.S. smoking bans have been extended to prisons in many states. Studies have investigated the symptoms of distress and nicotine dependence as predictors of nicotine withdrawal symptoms among incarcerated male smokers during mandated smoking bans \[[@b49-ijerph-06-00741]\]. The study concluded that the distressed smokers had the highest level of nicotine withdrawal, indicating that forcing prisoners to quit smoking may not be the best policy for their long term addiction to tobacco and their chances of quitting.
In psychiatric hospitals, the implementation of smoking bans has been treated with similar caution. However, some early investigations have concluded smoking bans can be implemented in psychiatric units without increases in disruption or adverse effects on staff morale \[[@b50-ijerph-06-00741]\]. In 1987 a smoking ban was implemented in a psychiatric ward in Washington, U.S., following which an investigation found no change in terms of ward atmosphere, PRN (anti-psychotic) medication usage, and negative incidents \[[@b51-ijerph-06-00741]\]. Similarly an investigation in response to staff concerns over a smoking ban at a psychiatric ward in New York, U.S., was carried out, whereby PRN medication, seclusion, restraint, elopement, incident reports and smoking-related discharges were monitored for 232 patients before and after the implementation of the ban. Statistical analysis revealed no significant differences in any of the measured variables following the ban and the study concluded that staff concerns were unfounded \[[@b50-ijerph-06-00741]\]. In more recent times an assessment of a partial smoking ban, which was followed by a total smoking ban, in a Swiss hospital was carried out with a view to quantifying the impacts on ETS concentrations and on patient reaction \[[@b52-ijerph-06-00741]\]. This investigation found that ETS concentrations decrease after the partial ban on smoking and decreased further after the total ban as would be expected. In addition, among patients, after the total ban, more smokers attempted to quit (18%) compared to before the total ban (2%).
5.3.. Drink Driving
-------------------
Increases in fatal accidents as a result of drink driving have been associated with the introduction of smoking bans in the U.S. \[[@b53-ijerph-06-00741]\]. Since smoking ban policies in the U.S. have been introduced in various jurisdictions across the country while falling short of an outright national ban, investigations have shown that smokers drive longer distances to bars in other jurisdictions which allow smoking in bars or to other bars within an area under a smoking ban which may facilitate non-compliance or provide outdoor seating. Evidence has shown this behaviour results increased alcohol-related traffic accidents and fatalities. This may be considered an argument against introducing a smoking ban policy or against implementing the policy at a level lower than the nationwide ban which would facilitate this behaviour.
5.4.. Musical Instruments
-------------------------
Traditional music playing in pubs is commonplace throughout bars in Ireland, Scotland and other parts of the U.K. As a result of the smoking bans introduced in these locations musicians and their instruments are now exposed to considerably lower concentrations of ETS. Musical instruments which are commonly seen in traditional music sessions include the accordion, concertina, melodeon and uilleann pipes, all of which are bellows-driven instruments. As these instruments are played, air from the surroundings is taken in on expansion and expelled on compression of the bellows, as are any pollutants in the air, such as ETS, which is circulated through the instrument in a similar manner.
Anecdotal evidence suggests that the interiors of such instruments, played regularly in smoke-filled environments, become dirty/clogged as a result of the trapping of contaminant particles circulating. Investigators in Ireland conducted a survey of all businesses involved in the repair/cleaning of musical instruments \[[@b54-ijerph-06-00741]\]. All participants in the survey encountered a strong smell of cigarette smoke emanating from bellows-driven instruments played in pre-ban smoke-filled environments when they opened; soot-like residue was also deposited throughout the instrument which could be substantial enough to affect the pitch of the instrument. All participants reported a distinct improvement in this situation since the implementation of the smoking ban. In addition, musicians playing wind instruments (for example, flutes and whistles) while exposed to ETS has been shown to be a risk factor in the contraction of lung cancer due to the higher breathing rates required \[[@b55-ijerph-06-00741]\]. Indeed a study has shown that individuals exposed to ETS markers such as benzene, breathing at higher rates, absorb more of the pollutant into theirs lungs \[[@b56-ijerph-06-00741]\]. Further anecdotal evidence provides examples of several famous traditional Irish musicians who have contracted and died from lung cancer.
6.. Provision of Smoking Areas
==============================
Included in Ireland's no smoking ban legislation is the provision for employers to create smoking areas for staff and customers provided that they adhere to the design parameters as set out in the legislation. Such smoking areas are then deemed to be exempt from the ban as they are open enough to natural ventilation such that they are effectively considered to be the outdoors. The legislation defines a legal smoking area to be either: *a place or premises that is wholly uncovered by any roof, whether fixed or movable* (Type I); or *an outdoor part of a place or premises covered by a fixed or movable roof, provided that not more than 50% of the perimeter of that part is surrounded by one or more walls or similar structures* (Type II). It is interesting to note that the regulation for the Type II smoking area does not specify any further design requirements (for example, the ratio on the length to breadth of the roof) which has lead to ambiguity, and scenarios where an almost totally enclosed area linked to an open area by an extended roof could still be deemed to comply within the law. A study of smoking areas was carried out in a selection of nine Dublin pubs in 2005 during peak evening hours. Four pubs had Type I smoking areas, four had Type II smoking areas whilst one pub had an illegal smoking area which was effectively a corridor enclosed on all sides. Results for the four pubs with Type I (i.e. uncovered) smoking areas showed mean benzene concentrations of 3.01 and 5.11 μg/m^3^ inside the pub and within the smoking area respectively; similarly, mean butadiene concentrations were 2.44 and 3.56 μg/m^3^ in each respective location. Results for the four pubs with Type II (i.e. covered) smoking areas showed mean benzene concentrations of 1.42 and 5.42 μg/m^3^ inside the pub and within the smoking area respectively; and mean butadiene concentrations of 1.20 and 4.46 μg/m^3^ in each respective location. The pub with the illegal (enclosed) smoking corridor measured mean benzene concentrations of 7.68 and 49.5 μg/m^3^ inside the pub and within the smoking area and mean butadiene concentrations of 3.52 and 60.05 μg/m^3^, respectively. Hence, the more enclosed Type II smoking areas had slightly elevated concentrations at the smoking area (compared to the open Type I area) but seemed to promote lower pollutant concentrations within the pubs. The concentrations in the smoking areas were also strongly related to smoker density, as expected. The indoor pollutant concentrations within the individual pubs were strongly correlated with pollutant concentrations in the smoking areas (most of which were at the pub exit), distance from the smoking area within the pub and the presence of any open windows into the pub in the proximity of the smoking area. These results are also interesting when compared the study carried out in Dublin directly after the smoking ban \[[@b4-ijerph-06-00741]\] in pubs without any smoking areas whereby smokers had to stand out on the street which showed benzene and butadiene concentrations of 0.54 and 0.22 μg/m^3^ inside the pub. This was considerably less than the mean value concentrations measured inside the pub from the 8 pubs with formal smoking areas with benzene and butadiene concentrations of 2.22 and 1.65 μg/m^3^. This indicates the negative impact on indoor air quality of locating the smoking areas at the main entrances to the pubs, with open doorways providing a direct link between the generally cooler outside air and warmer air inside the pub, thus creating draughts of the localised polluted air in the smoking area to move indoors.
7.. Other Tobacco Control Policies and Alternatives to Smoking Bans
===================================================================
Studies have shown that, restrictions on tobacco advertisements, governmental health warnings and taxation on tobacco products, have been successful in decreasing smoking prevalence from 42.4% in 1965 to 24.7% in 1998 in the United States \[[@b57-ijerph-06-00741]\]. Tobacco control programs have been introduced in various states in the U.S. since the 1980s, funded largely by tax revenue on cigarette sales. These tobacco control programs have included measures such as: television, radio and print media public education campaigns; school-based tobacco prevention programs; smoking cessation material; telephone 'quitlines'; policy change and enforcement; *etc*. In the states of Florida, California, Massachusetts and Oregon, where large scale tobacco control programs of this nature have been implemented, these tobacco control programs have been shown to reduce tobacco use \[[@b58-ijerph-06-00741]\]. In the period 1990 to 2000 where U.S. tobacco use declined nationally by 20%, in the four states mentioned the rate of decline was an average of 43%.
Excise Duty on cigarette sales is a widely used to reduce tobacco consumption and to generate revenue to fund tobacco control campaigns and to ease the financial burden of smoking-related illnesses and death. Increasing the unit price for tobacco products has been 'strongly recommended' as a measure to reduce ETS and tobacco usage, based on strong evidence of its effectiveness, particularly among adolescents and young adults \[[@b31-ijerph-06-00741]\]. An empirical investigation on the effectiveness of cigarette taxes on consumption in Taiwan, where the unit cost of cigarettes is very low in comparison to other countries, showed that a 44% increase in unit price would result in a 13% drop in consumption \[[@b59-ijerph-06-00741]\]. An investigation comparing the effectiveness of tobacco taxes and anti-smoking advertising campaigns on tobacco consumption, in the United States, found that a 10% increase in tax resulted in a 3% reduction in tobacco consumption \[[@b60-ijerph-06-00741]\]. While a 10% increase in anti-tobacco advertising expenditure resulted in a 0.5% decrease in tobacco consumptions. Both measures were shown to be effective but taxation was shown to be the more effective of the two.
The restriction or banning of tobacco advertising has been implemented in many countries as a method of tobacco control as research has shown that tobacco advertising increases tobacco consumption whilst comprehensive tobacco advertising bans reduce consumption and partial advertising bans have little or no effect \[[@b61-ijerph-06-00741]\]. It has been shown that a limited set of bans on advertising will not reduce the amount of tobacco advertising expenditure, instead it will be substituted/concentrated into media where the ban is not in operation. When more of the remaining media are eliminated, the options for substitution are also eliminated. An investigation of 22 OECD countries predicted that an introduction of comprehensive bans on tobacco advertising would reduce consumption by over 5% \[[@b61-ijerph-06-00741]\].
Opponents to the introduction of a total ban on smoking in the work place, such as the tobacco industry and the hospitality industry, have often cited the installation of efficient ventilation systems as a possible alternative method of reducing ETS exposure concentrations \[[@b62-ijerph-06-00741]\]. Ventilation technology falls into two main types: dilution ventilation systems and displacement ventilation systems. Dilution systems work by bringing in fresh air from outside to dilute the concentration of airborne pollutants within the venue -- this is by far and away the most common form of ventilation already existing in hospitality venues. Displacement ventilation technology works by supplying fresh air at or near ground level at a low velocity and at a slightly cooler temperature than the ambient indoor air temperature. The cooler air displaces the warmer air (and contaminants) which rise to the ceiling at which point it is exhausted from the room. However, independent investigations have found that while efficient ventilation systems will reduce indoor ETS pollution \[[@b63-ijerph-06-00741]\], they have been shown to be an unsatisfactory alternative to a total ban on smoking \[[@b8-ijerph-06-00741],[@b9-ijerph-06-00741]\]. For example, one investigation into particulate matter concentrations in pubs found that a ventilation rate of up to 400 air changes per hour would be required to reduce concentrations below permissible limits and therefore found ventilations system to be economically unsustainable in achieving the desired reductions in ETS \[[@b13-ijerph-06-00741]\]. Indeed the installation of such systems has been shown to be too complex and high in cost to enable widespread implementation \[[@b62-ijerph-06-00741]\].
8.. Discussion and Conclusions
==============================
The impacts of smoking ban policies on a number of issues has been identified above and are discussed further below, as are the needs for further research.
8.1.. Environmental Tobacco Smoke
---------------------------------
It is quite clear from the various investigations carried out around the world into the effects of smoking bans on ETS that the policy results in considerable reductions in ambient concentrations, typically in the range of 70--95% depending on the pollutant in question, the volume of the room, and number of cigarettes being smoked. It is also clear that other options such as ventilation systems are unsatisfactory alternatives to the policy in terms of achieving similar ETS reductions and are unsustainable in the present economic/energy conscious climate. However, while ETS concentrations have been shown to be reduced dramatically by smoking ban policies, ETS exposure in pubs, clubs, hospitals and restaurants has been shown to be problematic in certain locations, due to the provision of smoking areas. The location of smoking areas in the doorway of premises or the natural congregation of smokers in these areas, has been shown to lead to elevated ETS exposure concentrations within the premise. Premises which do not provide smoking areas in their main doorway or within their premises have been shown to have considerably lower ambient concentrations of ETS in Ireland. However, only a limited amount of research has been carried out in this area and further research is required to highlight the extent of the problem internationally and to propose measures to address it.
In addition, research has highlighted the failure of smoking ban policy in the protection of children and young adults from ETS exposure as their primary source of ETS is typically in the home. Research is required to identify alternative policies to address this deficiency. Notwithstanding this fact and the problems associated with smoking areas, smoking ban policy can be said to have successfully achieved its primary goal in reducing the exposure of non-smokers to ETS at the various locations around the globe where it has been implemented
8.2.. Smoking Prevalence
------------------------
The secondary goal of smoking ban policy, to reduce smoking prevalence and thus improve the health of smokers, has been investigated in different countries, which have generally shown similar downwards trends, with reductions in smoking prevalence of the order of 10% have typically been reported. These initial significant reductions have been attributed to social smokers or those who wish to quit but found the social aspect of smoking difficult to overcome. In the longer term however, some studies have revealed a slight increase in smoking prevalence following the initial drop directly after implementation of the ban, although the net downward trend remains.
In addition to reducing the number of smokers, studies have also identified larger reductions in the sales volumes in the tobacco industry following a smoking ban. Studies have shown greater reductions in cigarette sales volume than smoking prevalence following a ban on smoking. This evidence suggests that smoking ban policy reduces the number of smokers but also reduces the number of cigarettes being smoked among those who still smoke. Therefore, due to the consistent findings of reductions in smoking prevalence and sales volume, the secondary goal of the policy could also be said to be successful where it has been implemented.
8.3.. Health
------------
The adverse health effects of ETS on humans have been well established particularly in terms of cancer risks and cardiovascular disease. A number of studies have shown decreases in cases of AMI presenting at hospitals serving regions where a smoking ban has been introduced. Reductions in AMIs and emergency room visits of 17 to 25% have been reported in various investigations across the U.S. and Europe. Considering that heart disease is the number one cause of premature death in many countries across the world and is therefore attributed to a very large number of deaths annually, such reductions in AMIs is a considerable endorsement of smoking ban policy. Future research into the economic savings in terms of reduction in health costs versus reduction in cigarette excise duty should also be carried out, which could act as a further stimulus for countries still considering the implementation of such a policy.
8.4.. The Side Effects
----------------------
Partial introduction of smoking bans, such as in the United States, compared to nationwide bans have been shown to result in increased incidents of drinking driving fatalities, as has the lack of strict enforcement of the policy. The literature has thus highlighted that best practice, whereby a smoking ban is implemented at the national level and is rigorously enforced, avoids such undesirable side effects.
Impacts of the policy on businesses have been disputed between business interests, promoters of the smoking ban policy and the tobacco industry. However, while there are numerous studies claiming negative impacts and an equal number claiming no negative impact, reviews of this literature have found that to be the most rigorously designed studies, seem to report no negative or positive impacts on business. Those studies which reported the opposite were more likely to have been unscientific in their approach and most were sponsored by the tobacco industry.
Concerns have been raised about the implementation of smoking bans in prison and psychiatric hospitals although their implementation in the latter has generally been shown to be successful in many studies. In prisons however, numerous cases of rioting have been reported as a result of smoking bans and enforced abstinence on smokers has been shown to increase their nicotine withdrawal symptoms and nicotine dependence. Clearly research is still required to highlight alternative policies for prisons to protect the health of prisoners and prison workers alike.
8.5.. Other Anti-Smoking Policies
---------------------------------
Other anti-smoking policy measures such as advertising bans and cigarette taxes have also been shown to be effective in reducing smoking prevalence and ETS. Cigarette taxes were shown to be more effective in achieving reductions than an equivalent increase in anti-tobacco advertising. Furthermore, compared with the reductions achieved by the introduction of smoking bans, both cigarette taxes and advertising normally achieve lower results. However, none of these policies are in competition with one another and can be used together to greatly reduce tobacco usage and ETS exposure.
![Smoking Prevalence in Ireland June 2003 to February 2008 \[[@b31-ijerph-06-00741]\].](ijerph-06-00741f1){#f1-ijerph-06-00741}
|
Intel Compiler Intrinsics Guide - lkurusa
https://software.intel.com/sites/landingpage/IntrinsicsGuide/
======
SoManyIntrinsic
Hey folks, I'm the owner of the Intrinsics Guide at Intel. Let me know if you
have any specific feedback or questions you have.
~~~
Const-me
Before version 3.3.16 of that documentation, most instructions contained a
small table with architecture, latency and throughput columns.
Since version 3.3.16, including the current 3.4, the guide no longer contains
this info.
Why have you removed that?
~~~
SoManyIntrinsic
That was an oversight. I'll resolve that, and then you should see
latency/throughput data through Skylake.
~~~
Const-me
Awesome, thanks!
------
amelius
Some offtopic notes about this webpage.
Nice visual design.
Searching for "dot product" does not work, but searching for "dot-product"
does work.
Also, every character I type in the search box ends up as a new entry in my
browser history ...
~~~
lkurusa
This is one of the reasons I posted this. The visual design is very eye-
catching and the level of detail on the intrinsics is very nice. It's also
great to see which ones are for SSE{,2,3,S3,4.1} and AVX{,2,512}.
------
Const-me
Offline version:
[https://github.com/Const-me/IntelIntrinsics](https://github.com/Const-
me/IntelIntrinsics)
------
danieldk
Dash (and thus also Zeal) has a user-contributed docset of this guide. So, if
you want to search this quickly locally, you can do so with Dash.
------
exikyut
This is arguably tangential, but also arguably relevant:
How does hardware video decoding and encoding work?
Does the fact that modern processors have on-chip GPUs with acceleration mean
the instructions are any different?
(Graphics has long been a "???" of mine, but I don't want to get into
generalizations in this particular thread. Hardware video {de,en}coding seems
mildly relevant though.)
~~~
dooglius
Integrated graphics aren't part of any of the actual processors, but rather,
the integrated GPU sits alongside the CPUs as one core sits alongside another,
and sharing the chip's L3 cache. CPUs communicate with the GPU via a memory-
mapped interface, the same way they talk to most devices. The GPU itself does
have its own architecture and instruction set, a lot of which are going to
deal with specific coding schemes like H.265 rather than the generic sort of
instructions you'd find on a CPU.
------
Narishma
Why are there different names for the same intrinsic?
For example, _mm_add_pi8() seems to be identical to _m_paddb(). Same for
_m_empty() and _mm_empty().
Are there any subtleties I'm missing?
~~~
secure
_m seems to be the prefix for MMX, whereas _mm is the prefix for SSE.
I think the instructions which didn’t need to change just got a new intrinsic
alias so that each instruction set is self-contained, i.e. when working with
SSE, you should only need to look at the SSE docs, not also know the MMX docs
already.
~~~
my123
Also that those don't use the same set of registers, you're forced to do so
anyway
------
exikyut
If you select a checkbox on the left, when you clear it the page scrolls back
to the top. >_<
------
amelius
It would be nice if there was an online sandbox where you could easily play
with the instructions.
~~~
zbjornson
There are several C++ sandboxes online. This one lets you set the compiler
flags that you need for these SIMD ISAs, I think up through AVX2:
[http://www.compileonline.com/compile_cpp_online.php](http://www.compileonline.com/compile_cpp_online.php).
~~~
amelius
Yes that's certainly nice, but it would be even nicer if there was some
example code for every CPU instruction that you could run this way (accessible
using a single click).
------
adraenwan
CISC in a nutshell
~~~
Const-me
Same for RISC:
[https://developer.arm.com/technologies/neon/intrinsics](https://developer.arm.com/technologies/neon/intrinsics)
~~~
mmozeiko
I would not call ARM a RISC. What is RISC in your opinion? Lack of memory
addressing except load and store? Not true for ARMv8.1. Lack of microops? ARM1
(from 1985) has microops.
~~~
Const-me
Reduced set of instructions, and simple encoding of them.
ARM instructions are always 32 bit; this includes NEON. There’re signs ARM
developer indeed were trying to minimize their count (e.g. there’s no right
shift neon instruction, instead left shift is used with negative shift value).
Thumb instructions can be 16 bit, but still this is way simpler than x86,
where a single instruction can be between 8 and 120 bits.
~~~
mmozeiko
"Simple encoding" doesn't mean its RISC. There are simple encoding instruction
sets that are CISC. For example - PDP-10, it has fixed size, simple encoding,
but is "classically" known as CISC.
CISC vs RISC for modern CPUs (last 20 or 30 years) doesn't mean anything. Any
modern ARM or Intel is partially RISC and a CISC at the same time.
Think this way:
1) modern x86 micro-ops can be viewed as RISC. So x86 is RISC?
2) ARM1 (from 1985) had an micro-ops, that means user visible opcodes are not
reduced enough. So ARM it CISC? [http://www.righto.com/2016/02/reverse-
engineering-arm1-proce...](http://www.righto.com/2016/02/reverse-engineering-
arm1-processors.html) Not talking even about modern 64-bit arm cores.
~~~
Const-me
I don’t think implementation details are relevant for CISC vs RISC. At least
not anymore. I think it’s a characteristic of CPU’s instruction set. Not the
internal undocumented instructions, but the instructions publically available
to programmers.
Also, ARM says their CPU designs are based on RISC principles:
[https://developer.arm.com/products/architecture/cpu-
architec...](https://developer.arm.com/products/architecture/cpu-architecture)
------
skookumchuck
> without the need to write assembly code
You basically are writing assembly with these intrinsics.
~~~
Negative1
Not true -- this is substantially more portable (the GNU compiler for instance
will even give you fallback instructions). I number of years ago I wrote PPU
intrinsics (so not Intel, but similar) wrapped via macros that worked on both
the Xbox360 and PS3 PowerPC processor. On one instance I can remember (frustum
culling in a complex scene graph) I saw a 3ms frame time delta. This was a few
days of development time well spent.
I'm guessing these intrinics map 1:1 to some AMD equivalent. Oh, looky here:
[https://msdn.microsoft.com/en-
us/library/hh977022.aspx](https://msdn.microsoft.com/en-
us/library/hh977022.aspx)
|
Identifying sequence-structure pairs undetected by sequence alignments.
We examine how effectively simple potential functions previously developed can identify compatibilities between sequences and structures of proteins for database searches. The potential function consists of pairwise contact energies, repulsive packing potentials of residues for overly dense arrangement and short-range potentials for secondary structures, all of which were estimated from statistical preferences observed in known protein structures. Each potential energy term was modified to represent compatibilities between sequences and structures for globular proteins. Pairwise contact interactions in a sequence-structure alignment are evaluated in a mean field approximation on the basis of probabilities of site pairs to be aligned. Gap penalties are assumed to be proportional to the number of contacts at each residue position, and as a result gaps will be more frequently placed on protein surfaces than in cores. In addition to minimum energy alignments, we use probability alignments made by successively aligning site pairs in order by pairwise alignment probabilities. The results show that the present energy function and alignment method can detect well both folds compatible with a given sequence and, inversely, sequences compatible with a given fold, and yield mostly similar alignments for these two types of sequence and structure pairs. Probability alignments consisting of most reliable site pairs only can yield extremely small root mean square deviations, and including less reliable pairs increases the deviations. Also, it is observed that secondary structure potentials are usefully complementary to yield improved alignments with this method. Remarkably, by this method some individual sequence-structure pairs are detected having only 5-20% sequence identity. |
Environmental Policy Lecture 8 part 1
In lecture 8 Professor Sterner speaks about discounting, an exiting topic as he calls the discount rate "the value of the future". In spite of all uncertainties there are about impacts of Climate Change the biggest uncertainty considering its future costs seems to come from the discount rate.
In part 1 Sterner discusses the different concepts. He compares and explains the differences between discount rate and growth, and explains why it is impossible to have a steady high growth rate. He gives an example of the first contact he had with discount rates in the 70s in a discussion about the costs of dealing with nuclear waste. The opponents had by estimating a high discount rate argued that the future cost would be so low that it would not be a problem for future generation. This is the same logic, as Sterner shows, that Professor William Nordhaus uses in his calculations for the future costs of Climate Change, and also the main point which differs Nordhaus calculations from Professor Nicholas Stern.
When estimating future values one has to be careful when assuming discount rate, Sterner calculates and shows how extremely different the outcomes are with just small differences in discount rate.
"What does it mean to become 100 times richer?" A hundred years ago 10% of New York’s population had maids, now basically no one has a maid. The relative prices have gone up. Sterner further shows the importance of considering relative prices by illustrating with the market of agriculture which today is about 24% of world GDP . If agriculture would collapse and we would loose 95% it would not be the same as loosing about 23% of GDP since the still existing 5% of agriculture would basically become the entire GDP. |
4*k - 3*y. Let w be k/(-6) + (-15)/(-24). Which is the smallest value? (a) i (b) w (c) 0.2
b
Let w be -6*(-4)/60*20/(-4). Which is the second biggest value? (a) w (b) -3/11 (c) -0.5
c
Let a = -20 + 17. What is the third biggest value in 0.3, -2, a?
a
Let o = -6585558 - -13269899642/2015. Let m = o - 2/1209. Which is the third biggest value? (a) m (b) -0.4 (c) -1/4
b
Let u = 0.29 - 14.29. Let p = -14 - u. Which is the second smallest value? (a) 1 (b) 5 (c) p
a
Let j = -8 + 9.2. Let s = j - 1.1. Which is the third biggest value? (a) s (b) 0.2 (c) -2
c
Let q = -15.7 + 15.4. Let n be (-8)/22*1/(-2). What is the biggest value in 1, q, n?
1
Suppose 4*f + 9 = -3. Let m be 15/10 - (-6)/f. Let w(g) = g**2 + g - 2. Let z be w(-3). Which is the smallest value? (a) m (b) -3 (c) z
b
Let c(f) = -f**3 - 6*f**2 - 2*f - 5. Let y be c(-6). Let x(m) = m**2 - 7*m + 2. Let t be x(y). Let z = 0.01 + -0.21. What is the biggest value in 3, z, t?
3
Suppose -4*k - 4 = -r + 1, 0 = -5*r + 5*k - 20. Which is the fourth smallest value? (a) 1/5 (b) r (c) -0.4 (d) -2
a
Let l = 5.6 - 5.8. Which is the smallest value? (a) l (b) -1 (c) -7
c
Let h = 22 + -21.6. Which is the fourth biggest value? (a) -5 (b) -0.2 (c) h (d) 3
a
Let n = 44.08 + -42. Let o = n + -0.08. Which is the biggest value? (a) -3/7 (b) o (c) 0.1
b
Let b(k) = k**3 - 2*k + 2. Let d be b(2). Let j = d + -10. Let a = -1 + 2. What is the smallest value in j, -0.3, a?
j
Let u = -130/3 + 44. Let v = 2.9 + -3. What is the smallest value in -3, u, v?
-3
Let b = -1/72 - -19/72. Let u = -1/4 - b. What is the second smallest value in -0.3, -3/4, u?
u
Let j = -13 + 20. What is the third biggest value in j, 0.5, -5, -1?
-1
Let r = 517/684 + -1/171. Let m = -3/307 - 551/6447. Which is the third biggest value? (a) m (b) -0.4 (c) r
b
Let y = -7 + 10. Suppose 7*k - 16 = y*k. What is the third biggest value in 3, k, 2?
2
Suppose 3 = 2*y + 1. Let q be (2/3)/(y + 3). Which is the second biggest value? (a) 0.1 (b) q (c) -2
a
Let f = -250 - -247. Let o be (-1)/(-2)*(-16)/2. What is the second biggest value in 5, o, f?
f
Let f = 5.4 - 5. Let j be (1 + -1)/(-1 - -2). Let z = 4 + j. What is the third smallest value in -5, z, f?
z
Let p = 1.3 - 0.3. Let f = -0.97 + p. Let t = 1.03 - f. Which is the third smallest value? (a) t (b) -1 (c) -1/3
a
Let s be (-322)/440 - 9/(-12). Let v = -9/11 + s. What is the third smallest value in 2/7, v, 2/5?
2/5
Let y = -0.01 + -1.99. Let w = -1.5 - y. Let f = w + -0.4. Which is the biggest value? (a) f (b) -4 (c) 0.3
c
Let k = -1.1 - -5.1. Let z = k - -1. Which is the third smallest value? (a) -0.4 (b) 4 (c) z
c
Suppose 8 = 5*u - 17. Let k be (u/(-35))/(4/(-14)). Which is the second biggest value? (a) -0.5 (b) k (c) 3
b
Let d = -8 - -9. Let r = 5 + -8. Which is the second biggest value? (a) d (b) r (c) -0.3
c
Let t be (-1)/2 - (-151)/(-40). Let d be ((-62)/4)/(-2 - 2). Let o = t + d. Which is the second smallest value? (a) -0.1 (b) 0.4 (c) o
a
Let l = 7.2 + -7.05. Which is the second smallest value? (a) 5 (b) -0.3 (c) -4 (d) l
b
Suppose -a - 4*o + o = 19, 0 = -3*a + 2*o - 13. What is the third biggest value in -0.1, 2/3, a?
a
Let d be 1 + ((-2)/(-10) - 1). What is the third smallest value in 0.3, d, 2/15?
0.3
Let r = -0.9 + 2.6. Let t = r - 1.8. What is the third smallest value in t, 2, -1/12?
2
Let f = 5 + 5. Let x = f + -14. Which is the second biggest value? (a) -2/11 (b) x (c) 2
a
Let t = -119 + 119. Which is the smallest value? (a) t (b) 11 (c) -1/7
c
Let y(x) = -2 - x**3 + 4*x**2 - 2 - 6*x**2 + 0*x**2. Let q be y(-3). Which is the biggest value? (a) q (b) 0 (c) 4
a
Let v be 8/(-12) + (-8)/(-15). Which is the third smallest value? (a) v (b) 0 (c) 2
c
Let j = -172.1 + 188. Let w = -16 + j. Let z = -2 + 2. Which is the third biggest value? (a) w (b) z (c) 1
a
Let a = 1.1 - 1.6. What is the third biggest value in 0.4, -1, a, -2?
-1
Let i = 44 - 45. What is the second biggest value in i, -10, 1?
i
Suppose 5 = -3*g + 2, -m = -2*g - 2. Suppose 0 = -m*o - 4*o + 4. Which is the biggest value? (a) o (b) -5 (c) 5/2
c
Suppose 2*l + 9 = -3*m, -2*m - 3*m - 5*l - 10 = 0. What is the fourth biggest value in 0.3, 3, -0.2, m?
m
Let k = -3 + -13. Let w = 11 + k. What is the second smallest value in -2, w, 1/4?
-2
Let r = -51.3 + 44. Let n = r - -2.3. Which is the smallest value? (a) 5 (b) -1.2 (c) n
c
Suppose 5*t + 24 = -4*g, 21 = -4*t - 0*t - 5*g. What is the second biggest value in t, 9, 0.4?
0.4
Let h = 100352854/535 - 187575. Let u = 3/107 - h. Which is the smallest value? (a) -1 (b) 0.3 (c) u
a
Let v be 154/30 + -1 - 4. Let u = -733 - -16856/23. Let z = u + -8/115. What is the third biggest value in v, z, 2?
z
Let g = -0.013 + 0.113. What is the fourth biggest value in -3/2, g, 4/7, -2?
-2
Let l be 4/(-48)*8/(-3). What is the third smallest value in l, 3, 5?
5
Let n = -0.8 + 1. Let b = 1 - 2. Let d = b - -0.7. What is the third biggest value in n, 1/6, d?
d
Let u = 1/524 + -1061/6812. What is the third smallest value in u, 2/3, -0.4, 1?
2/3
Let v = 4.91 + 0.09. Let l = 14 - 13. What is the smallest value in l, -1/4, v?
-1/4
Let h = 106 - 122.3. Let w = -17 - h. Let x = w - -1. Which is the third biggest value? (a) 3/7 (b) x (c) 4
b
Let a = 94 - 93.9. Let p = 2.8 + 0.2. What is the third smallest value in a, p, -5?
p
Let l = -12.28 - -0.28. Let w = -6 - l. Which is the third biggest value? (a) 1/3 (b) w (c) 0.2
c
Let f(s) = -s + 12. Let y be f(10). Suppose y*k - 3*k = -5. Let x = -614/7 + 88. Which is the smallest value? (a) k (b) -5 (c) x
b
Let f be ((-4)/(-3))/((-2)/(-3)). Let x = f + -7. Which is the biggest value? (a) -1 (b) x (c) -1/7
c
Let n be 105/7*(-1)/(-3). Let o = -0.6 + 4.6. What is the biggest value in 2, o, n?
n
Suppose -f + 5*c - 3*c + 5 = 0, 3*c = -f + 5. What is the third biggest value in f, -2/7, -2, 1?
-2/7
Let c = -16/29 - 372/377. Let p = 1/26 + c. What is the second biggest value in p, -2/13, 3?
-2/13
Let z = -2 + 1.9. Let w = 47 - 31. Let r = w + -16.2. Which is the second biggest value? (a) z (b) 3 (c) r
a
Let h = 1 + 2. Let k be 4*(-3)/(h + -33). What is the second biggest value in 0.3, k, -0.4?
0.3
Let d = -0.005 - -4.605. Let i = -5 + d. Let j = -1 + 2. Which is the third smallest value? (a) 2/13 (b) j (c) i
b
Let n = -14 - -17. Let v = -1 + 1.5. What is the smallest value in n, v, -1?
-1
Let z be (1/(-2) + 1)*-2. Let x be z - -1 - 20/(-50). What is the smallest value in -2, x, 2/9?
-2
Let y(i) = -i**3 - 5*i**2 + 4. Let h be y(-5). Let m = 659/7980 + -7/76. Let k = m - 523/210. Which is the smallest value? (a) h (b) 0.1 (c) k
c
Suppose -4*b + 11 = -3*p, 0*b + 5*p = -3*b + 1. What is the third biggest value in -5, -2, b?
-5
Let o be (-3)/20 - (-2)/(-8). Let g = 6.7 - 6. Let m = g - 1. Which is the smallest value? (a) m (b) -2 (c) o
b
Let v be ((-34)/10 + 3)/(9/5). What is the second biggest value in -2/3, v, -0.3?
-0.3
Let f = 5 - 10. Let i = -12 + 18. Suppose -n - 4*n + i = -3*l, -6 = 3*l + n. What is the third biggest value in 0.3, l, f?
f
Let x be (-7)/49 - (-3)/7. What is the smallest value in x, 4, 0.1?
0.1
Let x = 19 + -16. Which is the smallest value? (a) x (b) 4 (c) 0.1
c
Let r = 2 + -3. What is the smallest value in -4, r, -1/5?
-4
Let k = 2 + -2.1. Let r = -0.05 - -0.45. Let d = 0.2 - r. Which is the second biggest value? (a) 0.2 (b) k (c) d
b
Suppose -t + 6*t = 0. What is the biggest value in 8, 1/6, t, -0.1?
8
Let v = -2.9 + 6.9. What is the third biggest value in -1, v, -5?
-5
Let y = 15 - 15. Let v = -5 + y. Which is the third biggest value? (a) -2/7 (b) v (c) -4
b
Let d(v) = -v**2 - 20*v. Let o be d(-19). Which is the second smallest value? (a) 1/3 (b) o (c) -0.4
a
Let w = -0.2 + 1.2. What is the smallest value in w, 2/9, 4?
2/9
Let t = -3199/11 - -291. Let m = 5.6 + 1.4. Let q = 3 - m. What is the third smallest value in t, q, -0.1?
t
Let s be ((-8)/(-20))/(3/(-30)). Let x = 0 + -5. Which is the second biggest value? (a) s (b) -0.01 (c) x
a
Suppose 7*i - 195 = 2*i. Let u be 0 + (-45)/i + 1. Suppose n = 5, 0 = 5*x - 3*n - 2*n. Which is the biggest value? (a) 0.3 (b) x (c) u
b
Let h = 0.6 + -0.7. Let u = -2 - -6. Which is the biggest value? ( |
US Q1 productivity unchanged
Construction lifts are parked near the Drydock Center in Boston, Massachusetts, on June 2, 2017. (Reuters photo)
WASHINGTON - US worker productivity was not as weak as initially thought in the first quarter, but the persistently soft trend is an obstacle to faster economic growth.
The Labor Department said on Monday nonfarm productivity, which measures hourly output per worker, was unchanged in the last quarter. It was previously reported to have declined at a 0.6% annualised pace.
The government also reported that the growth in labour costs at the start of the year was not as strong as reported in May, which could cast doubts on the tightening labour market's ability to unleash robust wage growth.
The revision to first-quarter productivity was in line with economists' expectations. Productivity increased at an unrevised 1.8% pace in the fourth quarter.
US financial markets were little moved by the report.
Compared to the first quarter of 2016, productivity grew at a 1.2% rate, pointing to some improvement.
Productivity has increased at an average annual rate of 0.6 percent over the last five years, below its long-term rate of 2.1% from 1947 to 2016, indicating that the economy's potential rate of growth has declined.
That suggests the Trump administration could struggle to achieve its 3 percent annual gross domestic product growth target. The economy grew at a 1.2% pace in the first quarter. It grew 1.6% in 2016 and annual GDP growth has not exceeded 2.6% since the 2007-09 recession ended.
Economists blame low capital expenditure, which they say has resulted in a sharp drop in the capital-to-labour ratio, for the weakness in productivity. There are also perceptions that productivity is being inaccurately measured, especially on the information technology side.
Companies have been hiring more workers to maintain output. First-quarter output per worker was revised up to a 1.7% growth rate from the previously reported 1% pace.
The increase in output came as total hours worked increased at an upwardly revised 1.7% rate. Hours worked were previously reported to have risen at a 1.6% rate in the first quarter.
Unit labour costs, the price of labour per single unit of output, increased at a 2.2% pace in the first quarter instead of the previously reported 3% rate.
Compared to the first quarter of 2016, unit labour costs rose at a 1.1% rate. Fourth-quarter unit labour costs were revised down to show them declining at a 4.6% rate from the previously reported 1.3% pace of increase.
Wage growth remains sluggish despite the unemployment rate being at a 16-year low of 4.3%. Hourly compensation increased at a 2.2% rate in the first quarter rather than the 2.4% pace reported in May.
Hourly compensation rose at a 2.3% rate from a year ago, down from the 3.9% pace estimated last month. |
<?xml version="1.0" encoding="utf-8"?>
<manifest xmlns:android="http://schemas.android.com/apk/res/android"
package="com.baoyz.bubbleimageview.sample"
android:versionCode="1"
android:versionName="1.0" >
<uses-sdk
android:minSdkVersion="8"
android:targetSdkVersion="21" />
<application
android:allowBackup="true"
android:icon="@drawable/ic_launcher"
android:label="@string/app_name"
android:theme="@style/AppTheme" >
<activity
android:name=".MainActivity"
android:label="@string/app_name" >
<intent-filter>
<action android:name="android.intent.action.MAIN" />
<category android:name="android.intent.category.LAUNCHER" />
</intent-filter>
</activity>
<activity
android:name=".SimpleActivity"
android:label="Simple" >
</activity>
<activity
android:name=".ChatListActivity"
android:label="ChatList" >
</activity>
</application>
</manifest>
|
Media Resources
Share
Comment
For wireless networks that share time-sensitive information on the fly, it’s not enough to transmit data quickly. That data also need to be fresh. Consider the many sensors in your car. While it may take less than a second for most sensors to transmit a data packet to a central processor, the age of that data may vary, depending on how frequently a sensor is relaying readings.
In an ideal network, these sensors should be able to transmit updates constantly, providing the freshest, most current status for every measurable feature, from tire pressure to the proximity of obstacles. But there’s only so much data that a wireless channel can transmit without completely overwhelming the network.
How, then, can a constantly updating network — of sensors, drones, or data-sharing vehicles — minimize the age of the information that it receives at any moment, while at the same time avoiding data congestion?
Engineers in MIT’s Laboratory for Information and Decision Systems are tackling this question and have come up with a way to provide the freshest possible data for a simple wireless network.
The researchers say their method may be applied to simple networks, such as multiple drones that transmit position coordinates to a single control station, or sensors in an industrial plant that relay status updates to a central monitor. Eventually, the team hopes to tackle even more complex systems, such as networks of vehicles that wirelessly share traffic data.
“If you are exchanging congestion information, you would want that information to be as fresh as possible,” says Eytan Modiano, professor of aeronautics and astronautics and a member of MIT’s Laboratory for Information and Decision Systems. “If it’s dated, you might make the wrong decision. That’s why the age of information is important.”
Modiano and his colleagues presented their method in a paper at IEEE’s International Conference on Computation Communications (Infocom), where it won a Best Paper Award. The paper will appear online in the future. The paper’s lead author is graduate student Igor Kadota; former graduate student Abhishek Sinha is also a co-author.
Keeping it fresh
Traditional networks are designed to maximize the amount of data that they can transmit across channels, and minimize the time it takes for that data to reach its destination. Only recently have researchers considered the age of the information — how fresh or stale information is from the perspective of its recipient.
“I first got excited about this problem, thinking in the context of UAVs — unmanned aerial vehicles that are moving around in an environment, and they need to exchange position information to avoid collisions with one another,” Modiano says. “If they don’t exchange this information often enough, they might collide. So we stepped back and started looking at the fundamental problem of how to minimize age of information in wireless networks.”
In this new paper, Modiano’s team looked for ways to provide the freshest possible data to a simple wireless network. They modeled a basic network, consisting of a single data receiver, such as a central control station, and multiple nodes, such as several data-transmitting drones.
The researchers assumed that only one node can transmit data over a wireless channel at any given time. The question they set out to answer: Which node should transmit data at which time, to ensure that the network receives the freshest possible data, on average, from all nodes?
“We are limited in bandwidth, so we need to be selective about what and when nodes are transmitting,” Modiano says. “We say, how do we minimize age in this simplest of settings? Can we solve this? And we did.”
An optimal age
The team’s solution lies in a simple algorithm that essentially calculates an “index” for each node at any given moment. A node’s index is based on several factors: the age, or freshness of the data that it’s transmitting; the reliability of the channel over which it is communicating; and the overall priority of that node.
“For example, you may have a more expensive drone, or faster drone, and you’d like to have better or more accurate information about that drone. So, you can set that one with a high priority,” Kadota explains.
Nodes with a higher priority, a more reliable channel, and older data, are assigned a higher index, versus nodes that are relatively low in priority, communicating over spottier channels, with fresher data, which are labeled with a lower index.
A node’s index can change from moment to moment. At any given moment, the algorithm directs the node with the highest index to transmit its data to the receiver. In this prioritizing way, the team found that the network is guaranteed to receive the freshest possible data on average, from all nodes, without overloading its wireless channels.
The team calculated a lower bound, meaning an average age of information for the network that is fresher than any algorithm could ever achieve. They found that the team’s algorithm performs very close to this bound, and that it is close to the best that any algorithm could do in terms of providing the freshest possible data for a simple wireless network.
“We came up with a fundamental bound that says, you cannot possibly have a lower age of information than this value — no algorithm could be better than this bound — and then we showed that our algorithm came close to that bound,” Modiano says. “So it’s close to optimal.”
The team is planning to test its index scheme on a simple network of radios, in which one radio may serve as a base station, receiving time-sensitive data from several other radios. Modiano’s group is also developing algorithms to optimize the age of information in more complex networks.
“Our future papers will look beyond just one base station, to a network with multiple base stations, and how that interacts,” Modiano says. “And that will hopefully solve a much bigger problem.”
This research was funded, in part, by the National Science Foundation (NSF) and the Army Research Office (ARO). |
Name
SGIX_texture_multi_buffer
Name Strings
GL_SGIX_texture_multi_buffer
Version
$Date: 1995/06/13 23:48:23 $ $Revision: 1.2 $
Number
53
Dependencies
EXT_texture_object affects the definition of this extension
Overview
This extension provides an API for the application to specify that
the OpenGL should handle multiple textures in such a way that,
wherever possible, a texture definition or redefinition can occur
in parallel with rendering that uses a different texture.
The texture_object extension allows the simultaneous definition
of multiple textures; any texture that is not being used for
rendering can, in principle, have its definition or operations
in its definition (e.g. downloading to hardware) occur in parallel
with the use of another texture. This is true as long as all
redefinitions strictly follow any use of the previous definition.
Conceptually this is similar to frame buffer double-buffering,
except that the intent here is to simply provide a hint to the
OpenGL to promote such double-buffering if and wherever possible.
The effect of such a hint is to speed up operations without
affecting the result. The user on any particular system must be
knowledgable and prepared to accept any trade-offs which follow
from such a hint.
GL_FASTEST in this context means that texture multi-buffering
is being used whenever possible to improve performance.
Generally, textures that are adjacent in a sequence of multiple
texture definitions have the greatest chance of being in
different buffers. The number of buffers available at any time
depends on various factors, such as the machine being used and
the textures' internal formats.
New Procedures and Functions
None
New Tokens
Accepted by the parameter of Hint, and by the
parameter of GetBooleanv, GetIntegerv, GetFloatv, and GetDoublev:
GL_TEXTURE_MULTI_BUFFER_HINT_SGIX 0x812E
Additions to the Specification
TBD
Additions to the GLX Specification
None
Dependencies on EXT_texture_object
If EXT_texture_object is not implemented, then references to
GL_TEXTURE_MULTI_BUFFER_HINT_SGIX in this specification are void.
Errors
None
New State
Get Value Get Command Type Initial Value Attrib
--------- ----------- ---- ------------- ------
GL_TEXTURE_MULTI_BUFFER_HINT_SGIX GetIntegerv Z3 DONT_CARE -
New Implementation Dependent State
None |
//
// Redistribution and use in source and binary forms, with or without
// modification, are permitted provided that the following conditions
// are met:
// * Redistributions of source code must retain the above copyright
// notice, this list of conditions and the following disclaimer.
// * Redistributions in binary form must reproduce the above copyright
// notice, this list of conditions and the following disclaimer in the
// documentation and/or other materials provided with the distribution.
// * Neither the name of NVIDIA CORPORATION nor the names of its
// contributors may be used to endorse or promote products derived
// from this software without specific prior written permission.
//
// THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS ``AS IS'' AND ANY
// EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
// IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
// PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR
// CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL,
// EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
// PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR
// PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY
// OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
// (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
// OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
//
// Copyright (c) 2008-2019 NVIDIA Corporation. All rights reserved.
#ifndef D3D11_RENDERER_TRAITS_H
#define D3D11_RENDERER_TRAITS_H
#include <RendererConfig.h>
#if defined(RENDERER_ENABLE_DIRECT3D11)
#include <tuple>
namespace SampleRenderer
{
namespace D3DTypes
{
enum D3DType
{
SHADER_PIXEL = 0,
SHADER_VERTEX,
SHADER_GEOMETRY,
SHADER_HULL,
SHADER_DOMAIN,
LAYOUT_INPUT,
STATE_RASTERIZER,
STATE_BLEND,
STATE_DEPTHSTENCIL,
NUM_TYPES,
NUM_SHADER_TYPES = SHADER_DOMAIN + 1,
NUM_NON_PIXEL_SHADER_TYPES = NUM_SHADER_TYPES - 1,
INVALID = NUM_TYPES
};
}
typedef D3DTypes::D3DType D3DType;
typedef std::string D3DStringKey;
template<typename d3d_type>
class D3DTraits
{
public:
typedef D3DStringKey key_type;
typedef IUnknown* value_type;
static D3DType getType() { return D3DTypes::INVALID; }
};
template <>
class D3DTraits<ID3D11VertexShader>
{
public:
// InputLayoutHash + Shader Name
typedef std::pair<PxU64, D3DStringKey> key_type;
typedef std::pair<ID3D11VertexShader*, ID3DBlob*> value_type;
static const char* getEntry() { return "vmain"; }
static const char* getProfile(D3D_FEATURE_LEVEL featureLevel = D3D_FEATURE_LEVEL_11_0)
{
switch(featureLevel)
{
case D3D_FEATURE_LEVEL_11_0: return "vs_5_0";
case D3D_FEATURE_LEVEL_10_1: return "vs_4_1";
case D3D_FEATURE_LEVEL_10_0: return "vs_4_0";
case D3D_FEATURE_LEVEL_9_1: return "vs_4_0_level_9_1";
case D3D_FEATURE_LEVEL_9_2: return "vs_4_0_level_9_2";
case D3D_FEATURE_LEVEL_9_3: return "vs_4_0_level_9_3";
default: RENDERER_ASSERT(0, "Invalid feature level"); return "vs_invalid";
}
};
static D3DType getType() { return D3DTypes::SHADER_VERTEX; }
static HRESULT create( ID3D11Device* pDevice, const void *pShaderBytecode, SIZE_T BytecodeLength, ID3D11ClassLinkage *pClassLinkage, ID3D11VertexShader **ppShader)
{
return pDevice->CreateVertexShader(pShaderBytecode, BytecodeLength, pClassLinkage, ppShader);
}
static void setConstants( ID3D11DeviceContext* pContext, UINT StartSlot, UINT NumBuffers, ID3D11Buffer *const *ppConstantBuffers )
{
pContext->VSSetConstantBuffers(StartSlot, NumBuffers, ppConstantBuffers);
}
};
template <>
class D3DTraits<ID3D11PixelShader>
{
public:
// Pass + Shader Name
typedef std::pair<PxU32, D3DStringKey> key_type;
typedef std::pair<ID3D11PixelShader*, ID3DBlob*> value_type;
static const char* getEntry() { return "fmain"; }
static const char* getProfile(D3D_FEATURE_LEVEL featureLevel = D3D_FEATURE_LEVEL_11_0) {
switch(featureLevel)
{
case D3D_FEATURE_LEVEL_11_0: return "ps_5_0";
case D3D_FEATURE_LEVEL_10_1: return "ps_4_1";
case D3D_FEATURE_LEVEL_10_0: return "ps_4_0";
case D3D_FEATURE_LEVEL_9_1: return "ps_4_0_level_9_1";
case D3D_FEATURE_LEVEL_9_2: return "ps_4_0_level_9_2";
case D3D_FEATURE_LEVEL_9_3: return "ps_4_0_level_9_3";
default: RENDERER_ASSERT(0, "Invalid feature level"); return "ps_invalid";
};
}
static D3DType getType() { return D3DTypes::SHADER_PIXEL; }
static HRESULT create( ID3D11Device* pDevice, const void *pShaderBytecode, SIZE_T BytecodeLength, ID3D11ClassLinkage *pClassLinkage, ID3D11PixelShader **ppShader)
{
return pDevice->CreatePixelShader(pShaderBytecode, BytecodeLength, pClassLinkage, ppShader);
}
static void setConstants( ID3D11DeviceContext* pContext, UINT StartSlot, UINT NumBuffers, ID3D11Buffer *const *ppConstantBuffers )
{
pContext->PSSetConstantBuffers(StartSlot, NumBuffers, ppConstantBuffers);
}
};
template <>
class D3DTraits<ID3D11GeometryShader>
{
public:
// Shader Name
typedef D3DStringKey key_type;
typedef std::pair<ID3D11GeometryShader*,ID3DBlob*> value_type;
static const char* getEntry() { return "gmain"; }
static const char* getProfile(D3D_FEATURE_LEVEL featureLevel = D3D_FEATURE_LEVEL_11_0)
{
switch(featureLevel)
{
case D3D_FEATURE_LEVEL_11_0: return "gs_5_0";
case D3D_FEATURE_LEVEL_10_1: return "gs_4_1";
case D3D_FEATURE_LEVEL_10_0: return "gs_4_0";
default: RENDERER_ASSERT(0, "Invalid geometry shader feature level") return "gs_invalid";
};
}
static D3DType getType() { return D3DTypes::SHADER_GEOMETRY; }
static HRESULT create( ID3D11Device* pDevice, const void *pShaderBytecode, SIZE_T BytecodeLength, ID3D11ClassLinkage *pClassLinkage, ID3D11GeometryShader **ppShader)
{
return pDevice->CreateGeometryShader(pShaderBytecode, BytecodeLength, pClassLinkage, ppShader);
}
static void setConstants( ID3D11DeviceContext* pContext, UINT StartSlot, UINT NumBuffers, ID3D11Buffer *const *ppConstantBuffers )
{
pContext->GSSetConstantBuffers(StartSlot, NumBuffers, ppConstantBuffers);
}
};
template <>
class D3DTraits<ID3D11HullShader>
{
public:
// Shader Name
typedef std::pair<PxU32, D3DStringKey> key_type;
typedef std::pair<ID3D11HullShader*,ID3DBlob*> value_type;
static const char* getEntry() { return "hmain"; }
static const char* getProfile(D3D_FEATURE_LEVEL featureLevel = D3D_FEATURE_LEVEL_11_0)
{
switch(featureLevel)
{
case D3D_FEATURE_LEVEL_11_0: return "hs_5_0";
default: RENDERER_ASSERT(0, "Invalid hull shader feature level") return "hs_invalid";
};
}
static D3DType getType() { return D3DTypes::SHADER_HULL; }
static HRESULT create( ID3D11Device* pDevice, const void *pShaderBytecode, SIZE_T BytecodeLength, ID3D11ClassLinkage *pClassLinkage, ID3D11HullShader **ppShader)
{
return pDevice->CreateHullShader(pShaderBytecode, BytecodeLength, pClassLinkage, ppShader);
}
static void setConstants( ID3D11DeviceContext* pContext, UINT StartSlot, UINT NumBuffers, ID3D11Buffer *const *ppConstantBuffers )
{
pContext->HSSetConstantBuffers(StartSlot, NumBuffers, ppConstantBuffers);
}
};
template <>
class D3DTraits<ID3D11DomainShader>
{
public:
// Shader Name
typedef std::pair<PxU32, D3DStringKey> key_type;
typedef std::pair<ID3D11DomainShader*, ID3DBlob*> value_type;
static const char* getEntry() { return "dmain"; }
static const char* getProfile(D3D_FEATURE_LEVEL featureLevel = D3D_FEATURE_LEVEL_11_0)
{
switch(featureLevel)
{
case D3D_FEATURE_LEVEL_11_0: return "ds_5_0";
default: RENDERER_ASSERT(0, "Invalid domain shader feature level") return "ds_invalid";
};
}
static D3DType getType() { return D3DTypes::SHADER_DOMAIN; }
static HRESULT create( ID3D11Device* pDevice, const void *pShaderBytecode, SIZE_T BytecodeLength, ID3D11ClassLinkage *pClassLinkage, ID3D11DomainShader **ppShader)
{
return pDevice->CreateDomainShader(pShaderBytecode, BytecodeLength, pClassLinkage, ppShader);
}
static void setConstants( ID3D11DeviceContext* pContext, UINT StartSlot, UINT NumBuffers, ID3D11Buffer *const *ppConstantBuffers )
{
pContext->DSSetConstantBuffers(StartSlot, NumBuffers, ppConstantBuffers);
}
};
template <>
class D3DTraits<ID3D11InputLayout>
{
public:
// InputLayoutHash + Shader Name
typedef std::pair<PxU64, ID3DBlob*> key_type;
typedef ID3D11InputLayout* value_type;
static D3DType getType() { return D3DTypes::LAYOUT_INPUT; }
};
template <>
class D3DTraits<ID3D11RasterizerState>
{
public:
typedef std::tr1::tuple<D3D11_FILL_MODE, D3D11_CULL_MODE, int> key_type;
typedef ID3D11RasterizerState* value_type;
static D3DType getType() { return D3DTypes::STATE_RASTERIZER; }
};
template <>
class D3DTraits<ID3D11DepthStencilState>
{
public:
// Depth enable + stencil enable
typedef std::pair<bool, bool> key_type;
typedef ID3D11DepthStencilState* value_type;
static D3DType getType() { return D3DTypes::STATE_DEPTHSTENCIL; }
};
template <>
class D3DTraits<ID3D11BlendState>
{
public:
typedef D3D11_RENDER_TARGET_BLEND_DESC key_type;
typedef ID3D11BlendState* value_type;
static D3DType getType() { return D3DTypes::STATE_BLEND; }
};
// This lets us lookup a traits class based on the D3DType key, which is rather handy
template<PxU32 N>
class D3DTraitsLookup { };
template<>
class D3DTraitsLookup<D3DTypes::SHADER_PIXEL> { typedef ID3D11PixelShader d3d_type; };
template<>
class D3DTraitsLookup<D3DTypes::SHADER_VERTEX> { typedef ID3D11VertexShader d3d_type; };
template<>
class D3DTraitsLookup<D3DTypes::SHADER_GEOMETRY> { typedef ID3D11GeometryShader d3d_type; };
template<>
class D3DTraitsLookup<D3DTypes::SHADER_HULL> { typedef ID3D11HullShader d3d_type; };
template<>
class D3DTraitsLookup<D3DTypes::SHADER_DOMAIN> { typedef ID3D11DomainShader d3d_type; };
template<>
class D3DTraitsLookup<D3DTypes::LAYOUT_INPUT> { typedef ID3D11InputLayout d3d_type; };
template<>
class D3DTraitsLookup<D3DTypes::STATE_BLEND> { typedef ID3D11BlendState d3d_type; };
template<>
class D3DTraitsLookup<D3DTypes::STATE_DEPTHSTENCIL> { typedef ID3D11DepthStencilState d3d_type; };
template<>
class D3DTraitsLookup<D3DTypes::STATE_RASTERIZER> { typedef ID3D11RasterizerState d3d_type; };
template <typename T>
struct NullTraits
{
static T get() { return 0; }
};
template <typename T>
struct NullTraits<T*>
{
static T* get() { return NULL; }
};
template<typename T1,typename T2>
struct NullTraits< std::pair<T1*,T2*> >
{
static std::pair<T1*,T2*> get() { return std::pair<T1*,T2*>((T1*)NULL,(T2*)NULL); }
};
} // namespace SampleRenderer
#endif // #if defined(RENDERER_ENABLE_DIRECT3D11)
#endif
|
Q:
Save state on component object directly?
The react documentation recommends to store a components state in its "state" property. But it appears that it's also well possible to use the component object itself as the state.
For example, instead of doing:
{
getInitialState:function(){
return {firstname: this.props.firstname||"",lastname:this.props.lastname||""}
},
render:function(){
return React.DOM.div({},"Hello, "+this.state.firstname+" "+this.state.lastname);
}
}
I could do something like this:
{
getInitialState:function(){
this.constructor(this.props);
return {};
},
constructor:function(props){
this.firstname = props.firstname||"";
this.lastname = props.lastname||"";
},
render:function(){
return React.DOM.div({},"Hello, "+this.firstname+" "+this.lastname);
}
}
To me this looks much cleaner. But I'm afraid that this could have any unexpected side effects that I'm unaware of.
Is this a bad idea? Will it have any disadvantages? Why do you think did the React devs even go for a "state" property? I mean, if it worked the way I'd like it worked by default, the state-property-pattern could still be used by everyone that prefers it, but those who don't like it wouldn't need to even have a "getInitialState" function.
A:
React is built on top of the idea that a component always reflects the components 'state'.
When altering state with setState, React will rerender the parts that have been altered.
Internally, a React component is a javascript object just as everything else.
So of course you can alter properties directly, but this will not prompt react to rerender the component. Thus, your component will not always reflect the altered properties.
Thus, even if it would work to alter properties directly, it's a bad design-pattern since it's harder to refactor to state if you ever need it. It also breaks the standard design-pattern of React, which will make it harder to read for other developers.
|
In the "old days" - say, 6 or 7 years ago - meeting planners focused primarily on logistics: The questions of when and where they would hold their conference and what types of facilities were available were paramount.
"Today's meeting planners are being asked to provide much more than the basics," says Steven Stout, CAE, Director of Meetings & Special Events at Hospitality Financial & Technology Professionals (HFTP). "We're being asked to build some sort of experience, something a little more unique than just education, he says. We're being charged with setting ourselves apart."
Create an engaging atmosphere. Stout says today's innovative conferences scrap the old idea of sitting in a room listening to one lecturer for an hour or more. Instead, planners are using hallways filled with couches, employing lots of white space, and creating smaller settings that allow attenders to choose between multiple speakers and shorter sessions throughout the day.
Make it experiential. Hands-on experiences are another way for attendees to learn, and participate, whether its using new technology, brainstorming on white boards, or taking a survey on a slew of iPads.
Know your group. It's important, Stout says, to consider your audience. He says customized content is often based on proposals or information from an advisory committee. But Stout contends that every group can benefit from trying something new.
Stout's group created a futuristic hotel room on the conference room floor called Guestroom 20X, which allowed attendees to experience the innovations for themselves. "We put them into the room," Stout says, "which is a sort of science museum."
Stout expected attendees to respond to the idea but was surprised by their enthusiasm and the long lines that lasted the length of the conference. Guestroom 20X is now a much-anticipated feature at HITEC, and is updated annually with cutting-edge features like massaging mattresses, self-cleaning showers, and high-definition artwork that changes with the guests' mood.
At a Texas Society of Association Executives (TSAE) Conference, says Stout, meeting planners customized attendees experiences in an entirely different way. They designed the conference layout with plenty of open space, and placed white boards throughout those spaces, encouraging attendees to congregate and capture their ideas on the white boards. Following the conference, TSAE published the white board ideas for everyone to share.
Although not all innovations are as well received as Guestroom 20X and TSAEs white board idea, Stout says its important to take risks. "We're competing so hard for professional development and travel dollars," he explains. "We want to create this experience where people go back to the office and really talk about it. We want them to say, Next year we have to go to that!" |
After asking himself how cells power themselves, Sarpeshkar had a realization: “We shouldn’t be working with batteries to power things, we should be working with glucose.” The prof, here in his dry lab, will lead the new academic cluster in computational science. Photo by John Sherman |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.